000 04942cam a2200613Ii 4500
001 ocn949752822
003 OCoLC
005 20190328114815.0
006 m o d
007 cr |n|||||||||
008 160512s2016 mau o 001 0 eng d
040 _aYDXCP
_beng
_erda
_epn
_cYDXCP
_dOPELS
_dOCLCF
_dN$T
_dCOO
_dD6H
_dK6U
_dDEBSZ
_dLIV
_dU3W
_dOCLCA
_dVVB
_dEZ9
_dAU@
_dWYU
019 _a958083936
_a958392745
020 _a9780128045039
_q(electronic bk.)
020 _a0128045035
_q(electronic bk.)
020 _z012804456X
020 _z9780128044568
035 _a(OCoLC)949752822
_z(OCoLC)958083936
_z(OCoLC)958392745
050 4 _aQA76.9.A25
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aBradley, Jaron,
_eauthor.
245 1 0 _aOS X incident response : scripting and analysis /
_h[electronic resource]
_cJaron Bradley.
264 1 _aCambridge, MA :
_bSyngress Publishers is an imprint of Elsevier,
_c2016.
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aIncludes index.
588 0 _aOnline resource; title from PDF title page (ScienceDirect, viewed May 19, 2016).
504 _aIncludes bibliographical references.
520 _aWritten for analysts who are looking to expand their understanding of a lesser-known operating system, this book focuses exclusively on OS X attacks, incident response, and forensics, and covers a wide variety of topics, including both the collection and analysis of the forensic pieces found on the OS. --
_cEdited summary from book.
505 0 _aCover; Title Page; Copyright Page; Contents; Acknowledgments ; Chapter 1 -- Introduction; Is there really a threat to OS X?; What is OS X; The XNU Kernel; Digging Deeper; Requirements; Forensically sound versus incident response; Incident Response Process; The Kill Chain; Applying the Killchain; Analysis environment; Malware Scenario; Chapter 2 -- Incident Response Basics; Introduction; Picking a language; Python; Ruby; Bash; Root versus nonroot; Yara; Basic Commands for Every Day Analysis; grep; egrep; cut; awk; sed; sort; uniq; Starting an IR Script; Collection; Analysis; Analysis Scripts.
505 8 _aYarafly.shYara Results Sorted and Counted; Conclusion; Chapter 3 -- Bash Commands; Introduction; Basic Bash commands; System Info; date; hostname; uptime; sw_vers; uname (-a); spctl ( -- status); bash -version; Who Info; whoami; who; w; finger (-m); last (); screen (-ls) (-x); User information; id; groups; printenv; dscl . -ls /Users; Process Information; ps (aux); Network Information; ifconfig; netstat (-ru) (-an); lsof (-p ) (-i); smbutil (statshares -a); arp (-a); security dump-trust-settings (-s) (-d); networksetup; System startup; launchctl list; crontab -l; atq; kextstat.
505 8 _aAdditional Commandsmdfind (-name) (-onlyin); sysctl (-a); history; security list-keychains; nvram; du -h; diskutil list; Miscellaneous; codesign (-d) (-vv); file; md5; tcpdump; printenv; nettop (-m); DTrace; Bash Environment Variables; Scripting the Collection; Analysis; Conclusion; Chapter 4 -- File System; Introduction; Brief history; HFS+ overview; Volume Header; Allocation File; Catalog File; Attributes B-Tree; Inodes, Timestamps, Permissions, and Ownership; Inodes; Timestamps; Timestamps for Files; Timestamps for Folders; Permissions; Special File Permissions; Directory Permissions.
505 8 _aSticky BitExtended Attributes; Access Control Lists; Resource Forks; File Types and Traits; OS X Specific File Extensions; .dmg; .kext; .plist; .app; .dylib; .pkg; Mach-O binary; Popular Scripting Languages Found on OS X; File Hierarchy Layout; /Applications; /Library; /System; /Users; /Volumes; /.vol; /bin; /usr; /cores; /sbin; /dev; /etc; /tmp; /private; /var; Miscellaneous Files; Hidden Files and Directories; .DS_Store; .Spotlight-V100; .metadata_never_index; .noindex; File Artifacts; Logs and Rotation; Key File Artifacts.
630 0 0 _aMac OS.
630 0 7 _aMac OS.
_2fast
_0(OCoLC)fst01386304
650 7 _aCOMPUTERS
_xSecurity
_xOnline Safety & Privacy.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xNetworking.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 0 _aComputer security.
650 0 _aIntrusion detection systems (Computer security)
650 0 _aComputer crimes
_xInvestigation.
650 7 _aComputer crimes
_xInvestigation.
_2fast
_0(OCoLC)fst00872065
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
650 7 _aIntrusion detection systems (Computer security)
_2fast
_0(OCoLC)fst01762593
655 4 _aElectronic books.
655 0 _aElectronic books.
776 0 8 _iPrint version:
_z012804456X
_z9780128044568
_w(OCoLC)944209939
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128044568
999 _c247331
_d247331