Book Image

Python Digital Forensics Cookbook

By : Chapin Bryce, Preston Miller
Book Image

Python Digital Forensics Cookbook

By: Chapin Bryce, Preston Miller

Overview of this book

Technology plays an increasingly large role in our daily lives and shows no sign of stopping. Now, more than ever, it is paramount that an investigator develops programming expertise to deal with increasingly large datasets. By leveraging the Python recipes explored throughout this book, we make the complex simple, quickly extracting relevant information from large datasets. You will explore, develop, and deploy Python code and libraries to provide meaningful results that can be immediately applied to your investigations. Throughout the Python Digital Forensics Cookbook, recipes include topics such as working with forensic evidence containers, parsing mobile and desktop operating system artifacts, extracting embedded metadata from documents and executables, and identifying indicators of compromise. You will also learn to integrate scripts with Application Program Interfaces (APIs) such as VirusTotal and PassiveTotal, and tools such as Axiom, Cellebrite, and EnCase. By the end of the book, you will have a sound understanding of Python and how you can use it to process artifacts in your investigations.
Table of Contents (11 chapters)

Introduction

Perhaps it is becoming a bit of a cliché, but it remains true that as technology evolves it continues to become more integrated with our lives. Never has this been so apparent as with the development of the first smartphone. These precious devices seemingly never leave the possession of their owners and often receive more interaction than human companions. It should be no surprise then that a smartphone can supply investigators with lots of insight into their owner. For example, messages may provide insight into the state of mind of the owner or knowledge of particular facts. They may even shed light on previously unknown information. Location history is another useful artifact we can extract from these devices and can be helpful to validate an individual's alibi. We will learn to extract this information and more.

A common source of evidentiary value on...