Book Image

Digital Forensics with Kali Linux - Third Edition

By : Shiva V. N. Parasram
Book Image

Digital Forensics with Kali Linux - Third Edition

By: Shiva V. N. Parasram

Overview of this book

Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. This third edition is updated with real-world examples and detailed labs to help you take your investigation skills to the next level using powerful tools. This new edition will help you explore modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, Hex Editor, and Axiom. You’ll cover the basics and advanced areas of digital forensics within the world of modern forensics while delving into the domain of operating systems. As you advance through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. You’ll also discover how to install Windows Emulator, Autopsy 4 in Kali, and how to use Nmap and NetDiscover to find device types and hosts on a network, along with creating forensic images of data and maintaining integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, memory, and operating systems. By the end of this digital forensics book, you'll have gained hands-on experience in implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation – all using Kali Linux's cutting-edge tools.
Table of Contents (24 chapters)
1
Part 1: Blue and Purple Teaming Fundamentals
7
Part 2: Digital Forensics and Incident Response Fundamentals and Best Practices
10
Part 3: Kali Linux Digital Forensics and Incident Response Tools
15
Part 4: Automated Digital Forensics and Incident Response Suites
18
Part 5: Network Forensic Analysis Tools

Online PCAP analysis using packettotal.com

Let’s now have a look at a unique online resource for automated PCAP analysis that is freely available to us. This will be done using www.packettotal.com.

Figure 16.30 – PacketTotal file upload interface

Figure 16.30 – PacketTotal file upload interface

PacketTotal is completely free, with a simple user interface that allows the user to either drag their PCAP file into the upload area or click on the Upload button to upload and automatically analyze the .pcap file. The only restriction is a limit of 50 MB on .pcap file uploads.

We will now download a sample packet capture file and then upload that file to PacketTotal for automated analysis:

  1. Download the sample file for analysis at https://mega.nz/file/6FciHZhY#bF1M-9kwmWLgUfQ_uq2_9k1DICIUkeY4lrT58X8XVXs. The file is named Testing for SQL injection.pcap.
  2. Click on the Upload button, browse to the downloaded file, and then click on Open.
Figure 16.31 – PacketTotal PCAP file upload status

Figure 16.31 &...