The Art of Memory Forensics
Home > Computing and Information Technology > Computer security > The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

|
     0     
5
4
3
2
1




International Edition


About the Book

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

Table of Contents:
Introduction xvii I An Introduction to Memory Forensics 1 1 Systems Overview 3 Digital Environment 3 PC Architecture 4 Operating Systems  17 Process Management 18 Memory Management   20 File System 24 I/O Subsystem 25 Summary 26 2 Data Structures  27 Basic Data Types   27 Summary 43 3 The Volatility Framework  45 Why Volatility? 45 What Volatility Is Not   46 Installation 47 The Framework 51 Using Volatility 59 Summary 67 4 Memory Acquisition 69 Preserving the Digital Environment 69 Software Tools 79 Memory Dump Formats 95 Converting Memory Dumps 106 Volatile Memory on Disk 107 Summary 114 II Windows Memory Forensics 115 5 Windows Objects and Pool Allocations 117 Windows Executive Objects  117 Pool-Tag Scanning 129 Limitations of Pool Scanning 140 Big Page Pool 142 Pool-Scanning Alternatives  146 Summary 148 6 Processes, Handles, and Tokens 149 Processes  149 Process Tokens 164 Privileges 170 Process Handles 176 Enumerating Handles in Memory 181 Summary 187 7 Process Memory Internals  189 What’s in Process Memory? 189 Enumerating Process Memory 193 Summary 217 8 Hunting Malware in Process Memory 219 Process Environment Block  219 PE Files in Memory 238 Packing and Compression   245 Code Injection 251 Summary 263 9 Event Logs 265 Event Logs in Memory  265 Real Case Examples 275 Summary 279 10 Registry in Memory  281 Windows Registry Analysis  281 Volatility’s Registry API 292 Parsing Userassist Keys 295 Detecting Malware with the Shimcache 297 Reconstructing Activities with Shellbags   298 Dumping Password Hashes  304 Obtaining LSA Secrets  305 Summary 307 11 Networking 309 Network Artifacts  309 Hidden Connections 323 Raw Sockets and Sniffers 325 Next Generation TCP/IP Stack   327 Internet History   333 DNS Cache Recovery   339 Summary 341 12 Windows Services 343 Service Architecture 343 Installing Services 345 Tricks and Stealth 346 Investigating Service Activity 347 Summary 366 13 Kernel Forensics and Rootkits 367 Kernel Modules   367 Modules in Memory Dumps 372 Threads in Kernel Mode  378 Driver Objects and IRPs 381 Device Trees  386 Auditing the SSDT 390 Kernel Callbacks   396 Kernel Timers 399 Putting It All Together  402 Summary 406 14 Windows GUI Subsystem, Part I 407 The GUI Landscape 407 GUI Memory Forensics 410 The Session Space  410 Window Stations   416 Desktops 422 Atoms and Atom Tables 429 Windows 435 Summary 452 15 Windows GUI Subsystem, Part II 453 Window Message Hooks 453 User Handles 459 Event Hooks  466 Windows Clipboard 468 Case Study: ACCDFISA Ransomware 472 Summary 476 16 Disk Artifacts in Memory  477 Master File Table  477 Extracting Files   493 Defeating TrueCrypt Disk Encryption  503 Summary 510 17 Event Reconstruction 511 Strings  511 Command History 523 Summary 536 18 Timelining 537 Finding Time in Memory 537 Generating Timelines   539 Gh0st in the Enterprise 543 Summary 573 III Linux Memory Forensics 575 19 Linux Memory Acquisition 577 Historical Methods of Acquisition 577 Modern Acquisition 579 Volatility Linux Profiles 583 Summary 589 20 Linux Operating System 591 ELF Files 591 Linux Data Structures  603 Linux Address Translation   607 procfs and sysfs   609 Compressed Swap   610 Summary 610 21 Processes and Process Memory 611 Processes in Memory   611 Enumerating Processes 613 Process Address Space   616 Process Environment Variables   625 Open File Handles 626 Saved Context State 630 Bash Memory Analysis 630 Summary 635 22 Networking Artifacts 637 Network Socket File Descriptors  637 Network Connections   640 Queued Network Packets 643 Network Interfaces 646 The Route Cache   650 ARP Cache   652 Summary655 23 Kernel Memory Artifacts 657 Physical Memory Maps 657 Virtual Memory Maps  661 Kernel Debug Buffer   663 Loaded Kernel Modules 667 Summary 673 24 File Systems in Memory  675 Mounted File Systems  675 Listing Files and Directories 681 Extracting File Metadata 684 Recovering File Contents 691 Summary 695 25 Userland Rootkits  697 Shellcode Injection 698 Process Hollowing 703 Shared Library Injection 705 LD_PRELOAD Rootkits 712 GOT/PLT Overwrites  716 Inline Hooking 718 Summary 719 26 Kernel Mode Rootkits 721 Accessing Kernel Mode 721 Hidden Kernel Modules 722 Hidden Processes  728 Elevating Privileges 730 System Call Handler Hooks  734 Keyboard Notifiers 735 TTY Handlers 739 Network Protocol Structures 742 Netfilter Hooks 745 File Operations 748 Inline Code Hooks 752 Summary754 27 Case Study: Phalanx2 755 Phalanx2 755 Phalanx2 Memory Analysis  757 Reverse Engineering Phalanx2   763 Final Thoughts on Phalanx2 772 Summary 772 IV Mac Memory Forensics 773 28 Mac Acquisition and Internals 775 Mac Design  775 Memory Acquisition   780 Mac Volatility Profiles  784 Mach-O Executable Format 787 Summary 791 29 Mac Memory Overview 793 Mac versus Linux Analysis  793 Process Analysis   794 Address Space Mappings 799 Networking Artifacts   804 SLAB Allocator   808 Recovering File Systems from Memory 811 Loaded Kernel Extensions   815 Other Mac Plugins 818 Mac Live Forensics 819 Summary 821 30 Malicious Code and Rootkits 823 Userland Rootkit Analysis   823 Kernel Rootkit Analysis 828 Common Mac Malware in Memory   838 Summary 844 31 Tracking User Activity  845 Keychain Recovery 845 Mac Application Analysis   849 Summary 858 Index 859


Best Sellers


Product Details
  • ISBN-13: 9781118825099
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 234 mm
  • No of Pages: 912
  • Returnable: N
  • Sub Title: Detecting Malware and Threats in Windows, Linux, and Mac Memory
  • Width: 191 mm
  • ISBN-10: 1118825098
  • Publisher Date: 03 Oct 2014
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Spine Width: 48 mm
  • Weight: 1632 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
John Wiley & Sons Inc -
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!