OS X Incident Response

Scripting and Analysis

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, General Computing
Cover of the book OS X Incident Response by Jaron Bradley, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jaron Bradley ISBN: 9780128045039
Publisher: Elsevier Science Publication: May 7, 2016
Imprint: Syngress Language: English
Author: Jaron Bradley
ISBN: 9780128045039
Publisher: Elsevier Science
Publication: May 7, 2016
Imprint: Syngress
Language: English

OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acquiring an up-and-coming skillset.

Digital forensics is a critical art and science. While forensics is commonly thought of as a function of a legal investigation, the same tactics and techniques used for those investigations are also important in a response to an incident. Digital evidence is not only critical in the course of investigating many crimes but businesses are recognizing the importance of having skilled forensic investigators on staff in the case of policy violations.

Perhaps more importantly, though, businesses are seeing enormous impact from malware outbreaks as well as data breaches. The skills of a forensic investigator are critical to determine the source of the attack as well as the impact. While there is a lot of focus on Windows because it is the predominant desktop operating system, there are currently very few resources available for forensic investigators on how to investigate attacks, gather evidence and respond to incidents involving OS X. The number of Macs on enterprise networks is rapidly increasing, especially with the growing prevalence of BYOD, including iPads and iPhones.

Author Jaron Bradley covers a wide variety of topics, including both the collection and analysis of the forensic pieces found on the OS. Instead of using expensive commercial tools that clone the hard drive, you will learn how to write your own Python and bash-based response scripts. These scripts and methodologies can be used to collect and analyze volatile data immediately.

For online source codes, please visit:

https://github.com/jbradley89/osx_incident_response_scripting_and_analysis

  • Focuses exclusively on OS X attacks, incident response, and forensics
  • Provides the technical details of OS X so you can find artifacts that might be missed using automated tools
  • Describes how to write your own Python and bash-based response scripts, which can be used to collect and analyze volatile data immediately
  • Covers OS X incident response in complete technical detail, including file system, system startup and scheduling, password dumping, memory, volatile data, logs, browser history, and exfiltration
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acquiring an up-and-coming skillset.

Digital forensics is a critical art and science. While forensics is commonly thought of as a function of a legal investigation, the same tactics and techniques used for those investigations are also important in a response to an incident. Digital evidence is not only critical in the course of investigating many crimes but businesses are recognizing the importance of having skilled forensic investigators on staff in the case of policy violations.

Perhaps more importantly, though, businesses are seeing enormous impact from malware outbreaks as well as data breaches. The skills of a forensic investigator are critical to determine the source of the attack as well as the impact. While there is a lot of focus on Windows because it is the predominant desktop operating system, there are currently very few resources available for forensic investigators on how to investigate attacks, gather evidence and respond to incidents involving OS X. The number of Macs on enterprise networks is rapidly increasing, especially with the growing prevalence of BYOD, including iPads and iPhones.

Author Jaron Bradley covers a wide variety of topics, including both the collection and analysis of the forensic pieces found on the OS. Instead of using expensive commercial tools that clone the hard drive, you will learn how to write your own Python and bash-based response scripts. These scripts and methodologies can be used to collect and analyze volatile data immediately.

For online source codes, please visit:

https://github.com/jbradley89/osx_incident_response_scripting_and_analysis

More books from Elsevier Science

Cover of the book The Transformation of Academic Health Centers by Jaron Bradley
Cover of the book Combustion, Flames and Explosions of Gases by Jaron Bradley
Cover of the book The Path from Biomarker Discovery to Regulatory Qualification by Jaron Bradley
Cover of the book Training Manual for Behavior Technicians Working with Individuals with Autism by Jaron Bradley
Cover of the book Compact Heat Exchangers by Jaron Bradley
Cover of the book Digital Disruption and Electronic Resource Management in Libraries by Jaron Bradley
Cover of the book Road Pricing by Jaron Bradley
Cover of the book Handbook of Friction-Vibration Interactions by Jaron Bradley
Cover of the book Animal and Translational Models for CNS Drug Discovery by Jaron Bradley
Cover of the book Proceedings of the International Conference on Colloid and Surface Science by Jaron Bradley
Cover of the book Advances in Heat Transfer by Jaron Bradley
Cover of the book Optimising Sweet Taste in Foods by Jaron Bradley
Cover of the book Renewable Energy Systems by Jaron Bradley
Cover of the book Fundamentals of Interface and Colloid Science by Jaron Bradley
Cover of the book Engineering Maintainability: by Jaron Bradley
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy