Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Introduction

Like Chapter 7, this chapter addresses methodology, techniques, and tools for conducting an initial analysis of a suspect file, but instead focuses in the Linux environment. For purposes of discussion, a new incident response scenario will serve as the vehicle for analysis. Then, in Chapter 10, we'll continue the investigation of the suspect file with hands-on Linux-based behavioral and static analysis tools and techniques.

Remember that “reverse engineering” and some of the techniques discussed in this chapter fall within the proscriptions of certain international, federal, state, or local laws. Remember also that some of the referenced tools may be considered “hacking tools” in some jurisdictions, and are subject to similar legal regulation or use restrictions. Please refer to Chapter 11, “Legal Considerations” for more details, and consult with counsel prior to implementing any of the techniques and tools discussed in these and subsequent chapters.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint