TABLE OF CONTENTS
Investigative And Forensic Methodologies
From Malware Analysis To Malware Forensics
Chapter 1. Malware Incident Response
Building Your Live Response Toolkit
Volatile Data Collection Methodology
Collecting Process Information
Correlate Open Ports with Running Processes and Programs
Identifying Services and Drivers
Non-Volatile Data Collection from a Live Windows System
Forensic Duplication of Storage Media on a Live Windows System
Forensic Preservation of Select Data on a Live Windows System
Get Malware Forensics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.