Errata

Page 2, last sentence on the page, replace “file analysis tool like Dependency Walker (depends.com)” with “www.dependencywalker.com.”

Page 19, in the second paragraph under the section “Network Configuration,” replace “…Figure 1.13 and Microsoft’s Promqry, which requires detached dot needs to be reattached to “.NET” framework.” with “…Figure 1.13, and Microsoft’s Promqry, which requires the .NET Framework.”

Page 71, in the second paragraph under the heading “Collect Event Logs,” add the following sentence to the second paragraph: “Examining the Event Logs on Kim’s laptop, we learn that logging is configured to overwrite events older than one day old, leaving little log evidence to correlate with the data we’ve collected during live response.” ...

Get Malware Forensics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.