UsingScapyduringaninvestigation
Summary
5.UsingPythonforVirtualizationForensics
Consideringvirtualizationasanewattacksurface
Virtualizationasanadditionallayerofabstraction
Creationofroguemachines
Cloningofsystems
Searchingformisuseofvirtualresources
Detectingroguenetworkinterfaces
Detectingdirecthardwareaccess
Usingvirtualizationasasourceofevidence
CreatingforensiccopiesofRAMcontent
Usingsnapshotsasdiskimages
Capturingnetworktraffic
Summary
6.UsingPythonforMobileForensics
Theinvestigativemodelforsmartphones
Android
ManualExamination
AutomatedExaminationwiththehelpofADEL
Ideabehindthesystem
Implementationandsystemworkflow
WorkingwithADEL
Movementprofiles
AppleiOS
GettingtheKeychainfromajailbrokeniDevice
ManualExaminationwithlibimobiledevice
Summary
7.UsingPythonforMemoryForensics
UnderstandingVolatilitybasics
UsingVolatilityonAndroid
LiMEandtherecoveryimage
VolatilityforAndroid
ReconstructingdataforAndroid
Callhistory
Keyboardcache
UsingVolatilityonLinux