Learn Computer Forensics by William Oettinger
Author:William Oettinger
Language: eng
Format: epub, mobi, pdf
Publisher: Packt Publishing Ltd
Published: 2020-04-28T00:00:00+00:00
Figure 5.4 – Jean's email header
When you look at the sender and recipient columns, and when the data is sorted chronologically, you can get a good idea about the email communication between the attacker and Jean. It appears they have compromised Allison's account, as we can see the name 'Alex' and the email account [email protected] associated with the account.
Using the event list feature of X-Ways Forensics allows us to pinpoint when the file was compromised and from what vector. Now we can direct our investigation to Allison's computer to determine whether the attacker compromised her system. Based on these initial results, I believe that the attacker targeted Jean in a phishing attack.
What I like about X-Ways Forensics is its ability to gather the dates and times from traditional sources and combine them with the actual artifacts, in this case, the emails. This gives you another level of granularity and context for your investigation.
The X-Ways Forensics documentation lists the following as sources of information for the event list feature:
Download
Learn Computer Forensics by William Oettinger.mobi
Learn Computer Forensics by William Oettinger.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7667)
Filmora Efficient Editing by Alexander Zacharias(5197)
The Infinite Retina by Robert Scoble Irena Cronin(4636)
Linux Device Driver Development Cookbook by Rodolfo Giometti(3821)
Learn Wireshark - Fundamentals of Wireshark. by Lisa Bock(3563)
Edit Like a Pro with iMovie by Regit(3075)
Linux Administration Best Practices by Scott Alan Miller(2769)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic & Jasmin Redzepagic(2749)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2434)
Docker on Windows by Stoneman Elton(2234)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2217)
Mastering PowerShell Scripting - Fourth Edition by Chris Dent(2061)
Hands-On AWS Penetration Testing with Kali Linux by Karl Gilbert(2018)
Hands-On Linux for Architects by Denis Salamanca(1944)
Computers For Seniors For Dummies by Nancy C. Muir(1909)
Programming in C (4th Edition) (Developer's Library) by Stephen G. Kochan(1900)
Creative Projects for Rust Programmers by Carlo Milanesi(1870)
The Old New Thing by Raymond Chen(1854)
Linux Kernel Debugging by Kaiwan N Billimoria(1681)
