Introduction |
|
xvii | |
Why I Wrote This Book |
|
xviii | |
How This Book Is Unique |
|
xviii | |
Linux Forensic Analysis Scenarios |
|
xix | |
Target Audience and Prerequisites |
|
xxi | |
Who Should Read This Book? |
|
xxi | |
Prerequisite Knowledge |
|
xxii | |
Forensic Tools and Platforms Needed |
|
xxii | |
Scope and Organization |
|
xxiii | |
Content Scope |
|
xxiii | |
Book Organization and Structure |
|
xxiv | |
Overview of Chapters |
|
xxvi | |
Conventions and Format |
|
xxviii | |
Formatting and Presentation |
|
xxix | |
Data Flow Diagrams |
|
xxx | |
|
1 Digital Forensics Overview |
|
|
1 | (10) |
|
Digital Forensics History |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
Forensic Analysis Trends and Challenges |
|
|
5 | (1) |
|
Shift in Size, Location, and Complexity of Evidence |
|
|
5 | (1) |
|
Multi-Jurisdictional Aspects |
|
|
6 | (1) |
|
Industry, Academia, and Law Enforcement Collaboration |
|
|
6 | (1) |
|
Principles of Postmortem Computer Forensic Analysis |
|
|
7 | (1) |
|
Digital Forensic Standards |
|
|
7 | (1) |
|
|
7 | (1) |
|
Industry Regulation and Best Practice |
|
|
8 | (1) |
|
Special Topics in Forensics |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (2) |
|
|
11 | (20) |
|
|
12 | (1) |
|
|
12 | (2) |
|
|
14 | (1) |
|
Early Desktop Environments |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
Modern Desktop Environments |
|
|
22 | (1) |
|
|
23 | (1) |
|
The Evolution of Linux Distributions |
|
|
24 | (1) |
|
Debian-Based Distributions |
|
|
25 | (1) |
|
|
26 | (1) |
|
Red Hat-Based Distributions |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
Forensic Analysis of Linux Systems |
|
|
28 | (3) |
|
3 Evidence From Storage Devices And Filesystems |
|
|
31 | (52) |
|
Analysis of Storage Layout and Volume Management |
|
|
33 | (1) |
|
Analysis of Partition Tables |
|
|
33 | (4) |
|
|
37 | (4) |
|
|
41 | (3) |
|
Filesystem Forensic Analysis |
|
|
44 | (1) |
|
Linux Filesystem Concepts |
|
|
44 | (2) |
|
Forensic Artifacts in Linux Filesystems |
|
|
46 | (2) |
|
|
48 | (2) |
|
|
50 | (1) |
|
Filesystem Metadata: Superblock |
|
|
51 | (2) |
|
|
53 | (2) |
|
|
55 | (1) |
|
|
56 | (1) |
|
Filesystem Metadata: Superblock |
|
|
57 | (1) |
|
|
58 | (3) |
|
Multiple Devices and Subvolumes |
|
|
61 | (3) |
|
|
64 | (1) |
|
|
65 | (1) |
|
Filesystem Metadata: Superblock |
|
|
65 | (2) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
Identifying and Analyzing Swap |
|
|
69 | (2) |
|
|
71 | (1) |
|
Analyzing Filesystem Encryption |
|
|
72 | (2) |
|
LUKS Full-Disk Encryption |
|
|
74 | (3) |
|
eCryptfs Encrypted Directories |
|
|
77 | (3) |
|
Fscrypt and Ext4 Directory Encryption |
|
|
80 | (1) |
|
|
81 | (2) |
|
4 Directory Layout And Forensic Analysis Of Linux Files |
|
|
83 | (32) |
|
|
83 | (1) |
|
|
84 | (4) |
|
|
88 | (5) |
|
Hashsets and NSRL for Linux |
|
|
93 | (2) |
|
Linux File Types and Identification |
|
|
95 | (1) |
|
|
95 | (2) |
|
Magic Strings and File Extensions |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (3) |
|
|
104 | (1) |
|
|
104 | (3) |
|
Application and Distro-Specific Crash Data |
|
|
107 | (2) |
|
|
109 | (5) |
|
|
114 | (1) |
|
5 Investigating Evidence From Linux Logs |
|
|
115 | (30) |
|
|
116 | (1) |
|
Syslog Facility, Severity, and Priority |
|
|
116 | (2) |
|
|
118 | (1) |
|
Analyzing Syslog Messages |
|
|
119 | (2) |
|
|
121 | (1) |
|
Systemd Journal Features and Components |
|
|
121 | (1) |
|
Systemd Journal Configuration |
|
|
122 | (3) |
|
Analysis of Journal File Contents |
|
|
125 | (4) |
|
Other Application and Daemon Logs |
|
|
129 | (1) |
|
Custom Logging to Syslog or Systemd Journal |
|
|
129 | (2) |
|
Independent Server Application Logs |
|
|
131 | (2) |
|
Independent User Application Logs |
|
|
133 | (1) |
|
Plymouth Splash Startup Logs |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (3) |
|
The Linux Auditing System |
|
|
139 | (4) |
|
|
143 | (2) |
|
6 Reconstructing System Boot And Initialization |
|
|
145 | (38) |
|
|
145 | (2) |
|
|
147 | (1) |
|
|
148 | (2) |
|
|
150 | (2) |
|
|
152 | (1) |
|
Analysis of Kernel Initialization |
|
|
153 | (1) |
|
Kernel Command Line and Runtime Parameters |
|
|
154 | (1) |
|
|
155 | (2) |
|
|
157 | (1) |
|
Analyzing initrd and initramfs |
|
|
158 | (3) |
|
|
161 | (1) |
|
|
161 | (3) |
|
Systemd Initialization Process |
|
|
164 | (2) |
|
Systemd Services and Daemons |
|
|
166 | (2) |
|
Activation and On-Demand Services |
|
|
168 | (4) |
|
Scheduled Commands and Timers |
|
|
172 | (3) |
|
Power and Physical Environment Analysis |
|
|
175 | (1) |
|
Power and Physical Environment Analysis |
|
|
175 | (1) |
|
Sleep, Shutdown, and Reboot Evidence |
|
|
176 | (3) |
|
Human Proximity Indicators |
|
|
179 | (3) |
|
|
182 | (1) |
|
7 Examination Of Installed Software Packages |
|
|
183 | (42) |
|
|
184 | (1) |
|
Distro Release Information |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Distro Installer Analysis |
|
|
187 | (1) |
|
|
188 | (2) |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
Package File Format Analysis |
|
|
193 | (1) |
|
Debian Binary Package Format |
|
|
194 | (4) |
|
|
198 | (2) |
|
|
200 | (2) |
|
Package Management System Analysis |
|
|
202 | (1) |
|
|
203 | (3) |
|
|
206 | (2) |
|
|
208 | (2) |
|
|
210 | (2) |
|
Universal Software Package Analysis |
|
|
212 | (1) |
|
|
213 | (2) |
|
|
215 | (3) |
|
|
218 | (1) |
|
Software Centers and GUI Frontends |
|
|
219 | (2) |
|
Other Software Installation Analysis |
|
|
221 | (1) |
|
Manually Compiled and Installed Software |
|
|
221 | (1) |
|
Programming Language Packages |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (2) |
|
8 Identifying Network Configuration Artifacts |
|
|
225 | (30) |
|
Network Configuration Analysis |
|
|
226 | (1) |
|
Linux Interfaces and Addressing |
|
|
226 | (3) |
|
Network Managers and Distro-Specific Configuration |
|
|
229 | (2) |
|
|
231 | (3) |
|
|
234 | (3) |
|
Wireless Network Analysis |
|
|
237 | (1) |
|
|
237 | (5) |
|
|
242 | (2) |
|
|
244 | (2) |
|
Network Security Artifacts |
|
|
246 | (1) |
|
WireGuard, IPsec, and OpenVPN |
|
|
246 | (3) |
|
Linux Firewalls and IP Access Control |
|
|
249 | (3) |
|
|
252 | (1) |
|
|
253 | (2) |
|
9 Forensic Analysis of Time And Location |
|
|
255 | (18) |
|
Linux Time Configuration Analysis |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (2) |
|
Daylight Saving and Leap Time |
|
|
259 | (1) |
|
|
260 | (2) |
|
Timestamps and Forensic Timelines |
|
|
262 | (2) |
|
|
264 | (1) |
|
Locale and Language Settings |
|
|
264 | (2) |
|
|
266 | (2) |
|
Linux and Geographic Location |
|
|
268 | (1) |
|
Geographic Location History |
|
|
269 | (2) |
|
GeoClue Geolocation Service |
|
|
271 | (1) |
|
|
272 | (1) |
|
10 Reconstructing User Desktops And Login Activity |
|
|
273 | (52) |
|
Linux Login and Session Analysis |
|
|
273 | (2) |
|
|
275 | (3) |
|
|
278 | (3) |
|
|
281 | (3) |
|
|
284 | (4) |
|
Authentication and Authorization |
|
|
288 | (1) |
|
User, Group, and Password Files |
|
|
288 | (5) |
|
|
293 | (3) |
|
|
296 | (2) |
|
|
298 | (2) |
|
Biometric Fingerprint Authentication |
|
|
300 | (1) |
|
|
301 | (2) |
|
|
303 | (1) |
|
Desktop Settings and Configuration |
|
|
303 | (4) |
|
|
307 | (1) |
|
|
308 | (2) |
|
Desktop Bookmarks and Recent Files |
|
|
310 | (1) |
|
|
311 | (2) |
|
Well-Integrated Desktop Applications |
|
|
313 | (2) |
|
Other Desktop Forensic Artifacts |
|
|
315 | (2) |
|
|
317 | (1) |
|
|
317 | (3) |
|
|
320 | (1) |
|
Network Shares and Cloud Services |
|
|
321 | (3) |
|
|
324 | (1) |
|
11 Forensic Traces of Attached Peripheral Devices |
|
|
325 | (14) |
|
|
326 | (1) |
|
|
326 | (1) |
|
Identify Attached USB Devices |
|
|
327 | (2) |
|
Identify PCI and Thunderbolt Devices |
|
|
329 | (1) |
|
|
330 | (1) |
|
Analysis of Printers and Printing History |
|
|
331 | (2) |
|
Analysis of Scanning Devices and History |
|
|
333 | (1) |
|
External Attached Storage |
|
|
334 | (1) |
|
Storage Hardware Identification |
|
|
335 | (1) |
|
Evidence of Mounted Storage |
|
|
336 | (1) |
|
|
337 | (2) |
Afterword |
|
339 | (4) |
Appendix: File/Directory List For Digital Investigators |
|
343 | (18) |
Index |
|
361 | |