0%

Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems that have been misused, abused, or the target of malicious attacks. This essential practitioner’s guide will show you how to locate and interpret digital evidence found on Linux desktops, servers, and IoT devices, draw logical conclusions, and reconstruct timelines of past activity after a crime or security incident. It's a book written for investigators with varying levels of Linux experience, and the techniques shown are independent of the forensic analysis platform and tools used.



Early chapters provide an overview of digital forensics as well as an introduction to the Linux operating system and popular distributions. From there, the book describes the analysis of storage, filesystems, files and directories, installed software packages, and logs. Special focus is given to examining human user activity such as logins, desktop environments and artifacts, home directories, regional settings, and peripheral devices used.



You’ll learn how to:



•Analyze partition tables, volume management, Linux filesystems, and directory layout
•Reconstruct the Linux startup process, from system boot and kernel initialization, to systemd unit files leading up to a graphical login
•Perform historical analysis of power, temperature, and physical environment, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes
•Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts, VPNs, firewalls, and proxy settings
•Perform analysis of time and locale settings, internationalization (language and keyboard settings), and Linux geolocation services
•Reconstruct user login sessions, analyze desktop artifacts, and identify traces of attached peripheral devices, including disks, printers, and mobile devices

Table of Contents

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. About the Author
  6. About the Technical Reviewer
  7. BRIEF CONTENTS
  8. CONTENTS IN DETAIL
  9. INTRODUCTION
    1. Why I Wrote This Book
    2. Target Audience and Prerequisites
    3. Scope and Organization
    4. Conventions and Format
  10. 1 DIGITAL FORENSICS OVERVIEW
    1. Digital Forensics History
    2. Forensic Analysis Trends and Challenges
    3. Principles of Postmortem Computer Forensic Analysis
    4. Special Topics in Forensics
  11. 2 LINUX OVERVIEW
    1. History of Linux
    2. Modern Linux Systems
    3. Linux Distributions
    4. Forensic Analysis of Linux Systems
  12. 3 EVIDENCE FROM STORAGE DEVICES AND FILESYSTEMS
    1. Analysis of Storage Layout and Volume Management
    2. Filesystem Forensic Analysis
    3. An Analysis of ext4
    4. An Analysis of btrfs
    5. An Analysis of xfs
    6. Linux Swap Analysis
    7. Analyzing Filesystem Encryption
    8. Summary
  13. 4 DIRECTORY LAYOUT AND FORENSIC ANALYSIS OF LINUX FILES
    1. Linux Directory Layout
    2. Linux File Types and Identification
    3. Linux File Analysis
    4. Crash and Core Dumps
    5. Summary
  14. 5 INVESTIGATING EVIDENCE FROM LINUX LOGS
    1. Traditional Syslog
    2. Systemd Journal
    3. Other Application and Daemon Logs
    4. Kernel and Audit Logs
    5. Summary
  15. 6 RECONSTRUCTING SYSTEM BOOT AND INITIALIZATION
    1. Analysis of Bootloaders
    2. Analysis of Kernel Initialization
    3. Analysis of Systemd
    4. Power and Physical Environment Analysis
    5. Summary
  16. 7 EXAMINATION OF INSTALLED SOFTWARE PACKAGES
    1. System Identification
    2. Distro Installer Analysis
    3. Package File Format Analysis
    4. Package Management System Analysis
    5. Universal Software Package Analysis
    6. Other Software Installation Analysis
    7. Summary
  17. 8 IDENTIFYING NETWORK CONFIGURATION ARTIFACTS
    1. Network Configuration Analysis
    2. Wireless Network Analysis
    3. Network Security Artifacts
    4. Summary
  18. 9 FORENSIC ANALYSIS OF TIME AND LOCATION
    1. Linux Time Configuration Analysis
    2. Internationalization
    3. Linux and Geographic Location
    4. Summary
  19. 10 RECONSTRUCTING USER DESKTOPS AND LOGIN ACTIVITY
    1. Linux Login and Session Analysis
    2. Authentication and Authorization
    3. Linux Desktop Artifacts
    4. User Network Access
    5. Summary
  20. 11 FORENSIC TRACES OF ATTACHED PERIPHERAL DEVICES
    1. Linux Peripheral Devices
    2. Printers and Scanners
    3. External Attached Storage
    4. Summary
  21. AFTERWORD
  22. APPENDIX: FILE/DIRECTORY LIST FOR DIGITAL INVESTIGATORS
  23. INDEX
18.119.104.238