Index

A

AccessData, registry viewer, 222–223
“AccessProtectionLog.txt” log, 215
Active system monitoring
for Linux system
network traffic analyzing utilities, 583–584
network visualization tool, 584–585
ports, 585
Process Spying, 582
for Windows system
API calls, 508–509
file system monitoring, 498–499
network activity, 503–505
ports, 507–508
processess monitoring, 497–498
registry monitoring, 499–502
Address Resolution Protocol (ARP)
on live Linux system, 107
on live Windows system, 32–33
Adore LKM Rootkit, 248–252
Adore rootkit, 111–112
AFICK (Another File Integrity Checker), 579
AFX Rootkit, 206–207
AIDE (Advanced Intrusion Detection Environment), 579
Alternate Data Stream (ADS), 221
American Standard Code for Information Interchange ...

Get Malware Forensics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.