This section focuses on implementing the concepts learned in relation to sophisticated forensic scenarios by making use of manual and automated approaches.
The following chapters will be covered in this section:
- Chapter 6, Investigating Good, Known, and Ugly Malware
- Chapter 7, Investigating C2 Servers
- Chapter 8, Investigating and Analyzing Logs
- Chapter 9, WLAN Forensics
- Chapter 10, Automated Evidence Aggregation and Analysis