The art of memory forensics [electronic resource] : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters.

As a followup to the best-seller Malware Analyst's Cookbook, experts in IT security bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The...

Full description

Saved in:
Bibliographic Details
Online Access: Online Access (A-Z Journals and Newspapers)
Main Author: Ligh, Michael Hale
Other Authors: Case, Andrew (Digital forensics researcher), Levy, Jamie, Walters, Aaron
Other title:Detecting malware and threats in Windows, Linux, and Mac memory
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Format: Electronic eBook
Language:English
Published: Indianapolis, IN : Wiley, [2014]
Subjects:
Table of Contents:
  • Machine generated contents note: 1.Systems Overview
  • Digital Environment
  • PC Architecture
  • Operating Systems
  • Process Management
  • Memory Management
  • File System
  • I/O Subsystem
  • Summary
  • 2.Data Structures
  • Basic Data Types
  • Summary
  • 3.The Volatility Framework
  • Why Volatility?
  • What Volatility Is Not
  • Installation
  • The Framework
  • Using Volatility
  • Summary
  • 4.Memory Acquisition
  • Preserving the Digital Environment
  • Software Tools
  • Memory Dump Formats
  • Converting Memory Dumps
  • Volatile Memory on Disk
  • Summary
  • 5.Windows Objects and Pool Allocations
  • Windows Executive Objects
  • Pool-Tag Scanning
  • Limitations of Pool Scanning
  • Big Page Pool
  • Pool-Scanning Alternatives
  • Summary
  • 6.Processes, Handles, and Tokens
  • Processes
  • Process Tokens
  • Privileges
  • Process Handles
  • Enumerating Handles in Memory
  • Summary
  • 7.Process Memory Internals
  • What's in Process Memory?
  • Enumerating Process Memory
  • Summary
  • Contents note continued: 8.Hunting Malware in Process Memory
  • Process Environment Block
  • PE Files in Memory
  • Packing and Compression
  • Code Injection
  • Summary
  • 9.Event Logs
  • Event Logs in Memory
  • Real Case Examples
  • Summary
  • 10.Registry in Memory
  • Windows Registry Analysis
  • Volatility's Registry API
  • Parsing Userassist Keys
  • Detecting Malware with the Shimcache
  • Reconstructing Activities with Shellbags
  • Dumping Password Hashes
  • Obtaining LSA Secrets
  • Summary
  • 11.Networking
  • Network Artifacts
  • Hidden Connections
  • Raw Sockets and Sniffers
  • Next Generation TCP/IP Stack
  • Internet History
  • DNS Cache Recovery
  • Summary
  • 12.Windows Services
  • Service Architecture
  • Installing Services
  • Tricks and Stealth
  • Investigating Service Activity
  • Summary
  • 13.Kernel Forensics and Rootkits
  • Kernel Modules
  • Modules in Memory Dumps
  • Threads in Kernel Mode
  • Driver Objects and IRPs
  • Device Trees
  • Auditing the SSDT
  • Contents note continued: Kernel Callbacks
  • Kernel Timers
  • Putting It All Together
  • Summary
  • 14.Windows GUI Subsystem, Part I
  • The GUI Landscape
  • GUI Memory Forensics
  • The Session Space
  • Window Stations
  • Desktops
  • Atoms and Atom Tables
  • Windows
  • Summary
  • 15.Windows GUI Subsystem, Part II
  • Window Message Hooks
  • User Handles
  • Event Hooks
  • Windows Clipboard
  • Case Study: ACCDFISA Ransomware
  • Summary
  • 16.Disk Artifacts in Memory
  • Master File Table
  • Extracting Files
  • Defeating TrueCrypt Disk Encryption
  • Summary
  • 17.Event Reconstruction
  • Strings
  • Command History
  • Summary
  • 18.Timelining
  • Finding Time in Memory
  • Generating Timelines
  • Ghost in the Enterprise
  • Summary
  • 19.Linux Memory Acquisition
  • Historical Methods of Acquisition
  • Modern Acquisition
  • Volatility Linux Profiles
  • Summary
  • 20.Linux Operating System
  • ELF Files
  • Linux Data Structures
  • Linux Address Translation
  • procfs and sysfs
  • Contents note continued: Compressed Swap
  • Summary
  • Processes and Process Memory
  • Processes in Memory
  • Enumerating Processes
  • Process Address Space
  • Process Environment Variables
  • Open File Handles
  • Saved Context State
  • Bash Memory Analysis
  • Summary
  • 22.Networking Artifacts
  • Network Socket File Descriptors
  • Network Connections
  • Queued Network Packets
  • Network Interfaces
  • The Route Cache
  • ARP Cache
  • Summary
  • 23.Kernel Memory Artifacts
  • Physical Memory Maps
  • Virtual Memory Maps
  • Kernel Debug Buffer
  • Loaded Kernel Modules
  • Summary
  • 24.File Systems in Memory
  • Mounted File Systems
  • Listing Files and Directories
  • Extracting File Metadata
  • Recovering File Contents
  • Summary
  • 25.Userland Rootkits
  • Shellcode Injection
  • Process Hollowing
  • Shared Library Injection
  • LD_PRELOAD Rootkits
  • GOT/PLT Overwrites
  • Inline Hooking
  • Summary
  • 26.Kernel Mode Rootkits
  • Accessing Kernel Mode
  • Hidden Kernel Modules
  • Contents note continued: Hidden Processes
  • Elevating Privileges
  • System Call Handler Hooks
  • Keyboard Notifiers
  • TTY Handlers
  • Network Protocol Structures
  • Netfilter Hooks
  • File Operations
  • Inline Code Hooks
  • Summary
  • 27.Case Study: Phalanx2
  • Phalanx2
  • Phalanx2 Memory Analysis
  • Reverse Engineering Phalanx2
  • Final Thoughts on Phalanx2
  • Summary
  • 28.Mac Acquisition and Internals
  • Mac Design
  • Memory Acquisition
  • Mac Volatility Profiles
  • Mach-O Executable Format
  • Summary
  • 29.Mac Memory Overview
  • Mac versus Linux Analysis
  • Process Analysis
  • Address Space Mappings
  • Networking Artifacts
  • SLAB Allocator
  • Recovering File Systems from Memory
  • Loaded Kernel Extensions
  • Other Mac Plugins
  • Mac Live Forensics
  • Summary
  • 30.Malicious Code and Rootkits
  • Userland Rootkit Analysis
  • Kernel Rootkit Analysis
  • Common Mac Malware in Memory
  • Summary
  • 31.Tracking User Activity
  • Keychain Recovery
  • Mac Application Analysis
  • Contents note continued: Summary.