Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Digital Forensics with Kali Linux
  • Table Of Contents Toc
  • Feedback & Rating feedback
Digital Forensics with Kali Linux

Digital Forensics with Kali Linux

By : Shiva V. N. Parasram
4.4 (11)
close
close
Digital Forensics with Kali Linux

Digital Forensics with Kali Linux

4.4 (11)
By: Shiva V. N. Parasram

Overview of this book

Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. This third edition is updated with real-world examples and detailed labs to help you take your investigation skills to the next level using powerful tools. This new edition will help you explore modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, Hex Editor, and Axiom. You’ll cover the basics and advanced areas of digital forensics within the world of modern forensics while delving into the domain of operating systems. As you advance through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. You’ll also discover how to install Windows Emulator, Autopsy 4 in Kali, and how to use Nmap and NetDiscover to find device types and hosts on a network, along with creating forensic images of data and maintaining integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, memory, and operating systems. By the end of this digital forensics book, you'll have gained hands-on experience in implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation – all using Kali Linux's cutting-edge tools.
Table of Contents (24 chapters)
close
close
1
Part 1: Blue and Purple Teaming Fundamentals
7
Part 2: Digital Forensics and Incident Response Fundamentals and Best Practices
10
Part 3: Kali Linux Digital Forensics and Incident Response Tools
15
Part 4: Automated Digital Forensics and Incident Response Suites
18
Part 5: Network Forensic Analysis Tools

Looking at the swap_digger tool to explore Linux artifacts

The swap_digger tool performs an automated analysis of the Linux swap file and can retrieve artifacts such as system passwords, usernames, and form credentials, and even Wi-Fi information such as SSIDs and perhaps even passwords if stored in the swap file.

Installing and using swap_digger

Follow these steps to install and use swap_digger for swap analysis:

  1. Change directories to the desktop in the terminal and clone swap_digger to the desktop by typing the following:
    git clone https://github.com/sevagas/swap_digger.git

The following screenshot shows the output of the preceding command for installing swap_digger.

Figure 11.9 – Installing swap_digger

Figure 11.9 – Installing swap_digger

  1. Change to the swap_digger directory by typing cd swap_digger and type the following command to ensure swap_digger will have the required access permissions:
    chmod +x swap_digger.sh
  2. To view all swap_digger usage options...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY