liuyan1
驱动老牛
驱动老牛
  • 注册日期2001-08-27
  • 最后登录2023-04-18
  • 粉丝0
  • 关注0
  • 积分1031分
  • 威望477点
  • 贡献值0点
  • 好评度187点
  • 原创分0分
  • 专家分0分
  • 社区居民
阅读:2339回复:15

文件系统新书<<File System Forensic Analysis>>

楼主#
更多 发布于:2005-08-03 16:46
  Table of Contents
1. Digital Investigation Foundations.

2. Computer Foundations.

3. Hard Disk Data Acquisition.

4. Volume Analysis.

5. PC-based Partitions.

6. Server-based Partitions.

7. Multiple Disk Volumes.

8. File System Analysis.

9. FAT Concepts and Analysis.

10. FAT Data Structures.

11. NTFS Concepts.

12. NTFS Analysis.

13. NTFS Data Structures.

14. Ext2 and Ext3 Concepts and Analysis.

15. Ext2 and Ext3 Data Structures.

16. UFS1 and UFS2 Concepts and Analysis.

17. UFS1 and UFS2 Data Structures.

Appendix. The Sleuth Kit and Autopsy.



Brian Carrier
Addison-Wesley, Paperback, Published March 2005, 569 pages, ISBN 0321268172
List Price: $49.99
Our Price: $28.25
You Save: $21.74 (43% Off)
 

 
Availability: In-Stock  


Moves beyond the basics and shows how to use tools to recover and analyze forensic evidence.
Brian Carrier is a leader in the field, and his book is positioned to be the authoritative reference.

More advanced and specific than current books, all of which present general overviews of the forensic analysis process.

Companion Web site includes open source tools used in the book and sample file system images.
Preface

One of the biggest challenges that I have faced over the years while developing The Sleuth Kit (TSK) has been finding good file system and media management (partition tables, RAID etc.) documentation. It has also been challenging to explain to users why certain files cannot be recovered or what to do when a corrupt file system is encountered because there are no good references to refer them to. It is easy to find resources that describe file systems at a high level, but source code is typically needed to learn the details. This book describes how data are stored on disk and where and how digital evidence can be found.

There are two target audiences for this book. One is the experienced investigator that has learned about digital investigations from real cases and using analysis tools. The other is someone who is new to the field and is interested in learning about the general theory of an investigation and where digital evidence may exist, but is not yet looking for a book that has a tutorial on how to use a specific tool.

The value of the material in this book is that it helps to provide an education rather than training on a specific tool. Consider some of the more formal sciences or engineering disciplines. All undergraduates are required to take a couple of semesters of physics, chemistry, or biology. These courses are not required because the students will be using all of the material for the rest of their careers. In fact, software and equipment exist to perform many of the calculations students are forced to memorize. The point of the classes is to provide students with insight about how things work so that they are not constrained by their tools.

The goal of this book is to provide an investigator with an education similar to what Physics 101 is to a mechanical engineer. The majority of digital evidence is found on a disk and knowing how and why the evidence exists can help an investigator to better testify about it. It will also help an investigator find errors and bugs in his analysis tools because he can conduct sanity checks on the tool output.

The recent trends in digital investigations have shown that more education is needed. Forensic labs are being accredited for digital evidence and there are debates about the required education and certification levels. Numerous universities offer courses and even Master's degrees in computer forensics. Government and university labs are conducting theoretical research in the area and focusing on future as well as current problems. There are also peer-reviewed journals for publishing research and investigation techniques. All of these new directions require in-depth knowledge outside of a specific tool or technique.

The approach of this book is to describe the basic concepts and theory of a file system and then apply it to an investigation. For each file system, the book covers analysis techniques and special considerations that the investigator should make. Scenarios are given to reinforce how the information can be used in an actual case. In addition, the data structures associated with file system and media management system are given and disk images are analyzed by hand so that the reader can see where the various data are located. If you are not interested in parsing data structures then you can skip those sections. Only non-commercial tools are used so that you can download them for free and duplicate the results on your systems.
Roadmap

This book is organized into three parts. Part 1 provides the basic foundations and Parts 2 and 3 provide the technical meat of the book. The book is organized so that we move up the layers of abstraction in a computer. We start by discussing hard disks and then discuss how disks are organized into partitions. After we discuss partitions, we discuss the contents of partitions, which is typically a file system.

Part 1 starts with Chapter 1 and discusses the approach that I take to a digital investigation. The different phases and guidelines are presented so that you know where I use the techniques described in this book. This book does not require that you use the same approach that I do. Chapter 2 provides the computer foundations and describes data structures, data encoding, the boot process, and hard disk technology. Chapter 3 provides the theory and a case study of hard disk acquisition so that we have data to analyze in Parts 2 and 3.

Part 2 of the book is on Media Management Analysis, which is the analysis of data structures that organize storage devices. This is typically the lowest layer of data structures on a disk. Chapter 4 provides a general overview of the analysis techniques and Chapter 5 covers the common DOS partitions as well as Apple partitions and GPT partitions, which are found in IA64 systems. Chapter 6 covers Unix partitions that can be found in BSD and Sun systems. Chapter 7 covers media management systems that span multiple disks, including RAID and volume spanning.

Part 3 of the book is on File System Analysis, which is the analysis of data structures that organize the partitions. Chapter 8 covers the general theory of file system analysis and defines terminology for the rest of Part 3. Each file system has at least two chapters dedicated to it where the first chapter covers the basic concepts and investigation techniques and the second chapter includes the data structures and manual analysis of example disk images. You have a choice of reading the two chapters in parallel, reading one after the other, or skipping the data structures chapter altogether.

The designs of the file systems are very different and therefore they are described using a general file system model. The general model organizes the data in a file system into one of five categories: file system, content, metadata, file name, and application. This general model is used to describe each of the file systems so that it is easier to compare them.

Chapters 9 and 10 cover the common FAT file system and Chapters 11, 12, and 13 cover NTFS. Next, we skip to the Unix file systems with Chapters 14 and 15 on the Linux EXT2 and EXT3 file systems. Lastly, Chapters 16 and 17 cover UFS1 and UFS2, which are found in FreeBSD, NetBSD, OpenBSD, and Sun Solaris.

After Part 3 of this book, you will know where a file existed on disk and all of the various data structures that needed to be in sync for you to view it. This book does not discuss how to analyze the file's contents. That falls into the Application Analysis realm and requires another book.
楼上的客,楼下的客,听我老坎说明白,要苛屎有草纸,不要扯我的麦席子,要苛尿有夜壶,不要在床上划地图。
liuyan1
驱动老牛
驱动老牛
  • 注册日期2001-08-27
  • 最后登录2023-04-18
  • 粉丝0
  • 关注0
  • 积分1031分
  • 威望477点
  • 贡献值0点
  • 好评度187点
  • 原创分0分
  • 专家分0分
  • 社区居民
沙发#
发布于:2005-08-05 11:15
znsoft 老大,偶将该书预览的第5章"基于PC的分区"上传,没详细看,看了一下其示意图,觉得是看到的做的最直观的.大家都评价一下,看目录这本书仿佛并非只针对NT的文件系统,但可能是近几年来唯一的文件系统的新书了.在亚马讯现在评价也不错,5个星.如果是好书,强烈支持引进
附件名称/大小 下载次数 最后更新
0321268172.zip (183KB)  133
楼上的客,楼下的客,听我老坎说明白,要苛屎有草纸,不要扯我的麦席子,要苛尿有夜壶,不要在床上划地图。
游客

返回顶部