Index

Note: Page numbers followed by “f” and “t” indicate figure and table respectively

A

Access Data, 59
Access Data Registry Viewer, 155156
AcquireDriver.Batch.xml, 65
AcquireMemory.Batch.xml, 65
AcquireProcessMemory.Batch.xml, 65
Acquisition module, 40
Active reconnaissance, 6
Administrator account, 2930
hash, 18
ADS. See Alternate Data Streams
Advanced search, 139, 137
Agile Risk Management LLC, 34
Alert.ids file, 142
Alternate Data Streams (ADS), 154158
Analysis Application icon, 86
Analysis software, 228229
Anti-virus, 6, 18, 22
logs, 163
Appendices, 233
AppEvent.evt, 160
APT, 2
Armitage tool, 6
application, 7
BackTrack distribution, 7
file system, exploring of, 19
hashes dumping, 17
Host pane of, 11
“Hosts” menu on, 10
Metasploit in, ...

Get Network Intrusion Analysis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.