Book Image

Learning Python for Forensics

By : Chapin Bryce
Book Image

Learning Python for Forensics

By: Chapin Bryce

Overview of this book

This book will illustrate how and why you should learn Python to strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials. The tutorials use an interactive design, giving you experience of the development process so you gain a better understanding of what it means to be a forensic developer. Each chapter walks you through a forensic artifact and one or more methods to analyze the evidence. It also provides reasons why one method may be advantageous over another. We cover common digital forensics and incident response scenarios, with scripts that can be used to tackle case work in the field. Using built-in and community-sourced libraries, you will improve your problem solving skills with the addition of the Python scripting language. In addition, we provide resources for further exploration of each script so you can understand what further purposes Python can serve. With this knowledge, you can rapidly develop and deploy solutions to identify critical information and fine-tune your skill set as an examiner.
Table of Contents (24 chapters)
Learning Python for Forensics
Credits
About the Authors
Acknowledgments
About the Reviewer
www.PacktPub.com
Preface
Index

A detailed look at keyloggers


Keyloggers take two primary forms, either as hardware adapters or software applications. This chapter will primarily focus on keyloggers as software applications. That said, it is important to be aware of the use of hardware keyloggers from a security perspective in the digital forensics and network security fields.

Hardware keyloggers

Hardware keyloggers can come in a variety of packages, using different methods to capture user data. One method is through interfacing with the keyboard or another IO (input/output) device before it connects to the computer. Sitting in the middle of the keyboard and computer, this device will capture the information as signals sent between the keyboard and computer. These "man-in-the-middle" keyloggers can be both wired and wireless. A fairly common application of hardware keyloggers might be seen with ATMs or other payment devices where a fake pin pad or intervening board is placed to intercept pin numbers entered into the machines...