Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Forensic Discovery

Forensic Discovery

List Price: $39.99
Your Price: $39.99
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: a trifle unsettling
Review: A trifle unsettling. The authors go through ways to do analysis on a computer, to see if it has been broken into. They focus on unix and linux machines, though most of their work also pertains to Microsoft computers.

The discussion can also give you insight into how these operating systems run, and specifically how they handle file management. Because an understanding of the general picture is vital to seeing how an attack might be conducted.

Naturally, a lot of space is devoted to studying what rootkits can do, and the traces they might leave. But the authors also take us down to the hardware. One very insightful chapter delves into how deleted files might persist on your computer, and for how long. We all know how Peter Norton in the 1980s was the first to introduce an undo for file deletion under MSDOS. But this book goes further. The authors studied several computers for how long a deleted file's contents might actually still exist on the disk, before being overwritten. While they only studied a few computers, they claim, probably reasonably, that these had typical usage. One was an ftp and web server, for example. They found half lives ranging from 12 days to 35 days. So be careful! If those files are your sensitive data, more stringent measures might be needed to fully erase them.

Rating: 5 stars
Summary: A focused look at digital forensics by two pioneers
Review: Farmer and Venema do for digital archaeology what Indiana Jones did for historical archaeology. 'Forensic Discovery' unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder. I highly recommend reading this book.

I appreciate books that don't rehash previously published material. Plenty of authors have written books with the word 'forensics' in the title, and many impart little or no useful or original information. (Exceptions include this book, along with Mandia and Prosise's 'Incident Response and Computer Forensics, 2nd Ed' and Jones' 'Real Digital Forensics,' forthcoming.) While 'Forensic Discovery' discusses concepts familiar to kernel developers or others with low-level operating system knowledge, the book is useful because it places such details in the concept of a security investigation.

'Forensic Discovery' is exactly the sort of forensic book I enjoy, because it is primarily concerned with intrusions. Broadly speaking, there are two types of 'forensic investigators:' those that know how to image a hard drive and search for pornography, and those that know how to respond to and investigate an intrusion. Farmer and Venema are clearly in the second category, and their examples focus on intrusion scenarios rather than workplace misuse of the Internet. Their statement regarding the conservative approach advocated by the US DoJ on p. 195 makes their stance clear.

Chapters 6 and 8 were two of my favorites. Ch 6 discusses virtual machines, system call and library monitoring, and debugging. The authors also show the relationship between disassembled code and decompiled C source code. Ch 8 offers a solid introduction to virtual memory managers. Throughout the book Farmer and Venema give command equivalents for Linux, FreeBSD, and Solaris. Windows makes infrequent appearances,, although ch 8 presents a Windows memory dump case.

'Forensic Discovery' is unique in that many of the author's conclusions are based on their own experiments. They seek to gauge file system and memory persistence using real-world systems, rather than unsubstantiated theories. 'Forensic Discovery' complements books on analyzing malware and victim systems, such as those by Skoudis, Carrier, Hoglund, and Jones. At 198 pages it is a quick read, but definitely worth your time and money.

Rating: 4 stars
Summary: Hard-core information for the security specialist...
Review: Security professionals who find themselves trying to piece together an attack will find a lot of value in the book Forensic Discovery by Dan Farmer and Wietse Venema (Addison-Wesley).

Chapter Breakout:
Part 1 - Basic Concepts: The Spirit of Forensic Discovery; Time Machines
Part 2 - Exploring System Abstractions: File System Basics; File System Analysis; Systems and Subversion; Malware Analysis Basics
Part 3 - Beyond the Abstractions: The Persistence of Deleted File Information; Beyond Processes
Appendix: The Coroner's Toolkit and Related Software; Data Gathering and the Order of Volatility
References; Index

As attacks become more and more common in today's computing environment, it's important to know how to preserve evidence in such a way that 1) you can trace what happened and 2) the information is admissible as evidence in case of prosecution. Farmer and Venema do a good job in showing a system administrator what steps need to be taken to safely analyze an attack. The book is targeted towards readers with a solid understanding of Windows and Unix file systems, networking, and processes. Readers without that background knowledge will get some of the conceptual information but will bog down on the details. And there are plenty of details... For instance, the authors show how information can persist in memory and on disk far longer than might be expected. In some cases, we could be talking months or years. Using tools that they recommend, you can analyze this "empty space" and find important clues as to what may or may not have happened. It also underscores the importance of freezing a computer's state as soon as possible after an incident so that this empty space doesn't get overwritten and lost for analysis.

Definitely a worthwhile addition to the bookshelf of security analysts who live this stuff on a daily basis...

Rating: 4 stars
Summary: Brief but intense
Review: They say it's good to leave your audience wanting more, but I'm not sure how correct that is with tech books. In this case I am definitely wanting more. About a third of the book is on basic operating system introductory material. The rest of the book starts to get in-depth on file system analysis, hacker trapping, and some basic data analysis. But then it ends. And I wanted more.

Definitely a good start at file system analysis, specifically on Unix machines. But you will definitely be left wanting more of the same.

Rating: 5 stars
Summary: One of the best security books published in the last year
Review: When most people think of forensics, television shows like Quincy and CSI come to mind. Where such shows deviate from reality is the unrealistic speed at which the actors are able to identify, apprehend and prosecute the perpetrators. In the real world, (unlike television, where the crime must be solved by the end of the family hour), crimes are solved with slow, deliberate and methodical steps. The prodigious incidence of digital crime has elevated computer forensics to a critical role within the field of information security. The focus of computer forensics is twofold: first is the attempt to determine whether a breach has occurred and to stop the perpetrator; second is prosecution of the offender, if the breach was a criminal activity.

Security luminaries Dan Farmer and Wietse Venema wrote one of the first vulnerability scanners (SATAN) almost 10 years ago; SATAN was the precursor to ISS Scanner, Retina and nmap. Venema wrote such well-known security applications as the TCP Wrapper program and the Postfix mail server. Farmer and Venema's new book Forensic Discovery is a valuable book that grounds a computer-savvy reader in the world of digital forensics.

An image of a pipe by artist René Magritte is on the cover with the caption Ceci nest pas une pipe. ("This is not a Pipe.") The picture demonstrates that an object exists on many planes; the simple recognition of the picture initiates the belief that we are seeing something, but it is only known in representation. Surrealist painting and digital forensics coalesce in that the digital forensic investigator must think broadly and unconventionally in order to reconstruct an incident, all the time keeping in mind that often what initially seems obvious is neither real nor correct.

The material in the book is an outgrowth of a one-time seminar the authors gave in 1999 on digital forensics and analysis. At the seminar, Farmer and Venema rolled out The Coroner's Toolkit (TCT), a collection of tools for gathering and analyzing forensic data on a Unix system. TCT is heavily referenced throughout the book.

The book initially seems thin, at just 198 pages, but there is no filler and the information is presented in a fast and furious manner. Part one of the book comprises 35 pages and is an introduction to the foundations of digital forensics and what to look for in an digital investigation.

Part two (chapters 3-6) is the nucleus of the book, which quickly gets into low-level details about file systems and operating system environments. While other forensics books focus exclusively on the discovery and gathering of data; Forensic Discovery adds needed insight on how to judge the trustworthiness of the observation and the data itself. Again, the idea is that not everything is as obvious as it may initially seem. An effective investigation often requires intense analysis, where meaningful conclusions take time.

Chapter 4, "File System Analysis," notes that while computers have significantly evolved since their inception, little has changed in last 30 years in the way that file systems actually handle data.

Chapter 5, "Systems and Subversion," is particularly interesting as it deals with system startup and shutdown, from a forensics perspective. The chapter shows that there are thousands of possible opportunities to subvert the integrity of a system without directly changing a file during startup and shutdown. A crucial decision that must be made during an incident is whether to shut down the system or let it remain on-line. There are advantages and disadvantages to each approach, and the book details them.

Part three (chapters 7-8) is about the persistence of deleted file information. The authors' research reveals that data can be quite resistant to destruction. The book shows that a huge amount of data and metadata can survive intended deletion as well as accidental damage.

Forensic Discovery is unusual in that other books on forensics are often nothing more than checklists and step-by-step instructions on what to do during an incident. Forensic Discovery provides a broad framework on the nature of data and how it can be recovered for forensic purposes. By understanding the underlying operating system, the act of analyzing and dealing with a security breach becomes much easier.

The book's target reader is anyone who wants to deepen his understanding of how computer systems work, as well as anyone who is likely to become involved with the technical aspects of computer intrusion or system analysis. The topics are too advanced, to make it the right book for the novice system administrator. For the technical reader, though, Forensic Discovery is one of the best computer security books published in the last year. The value of the information is immense, and the extensive experience that the authors bring is unmatched.



Rating: 5 stars
Summary: Amazine Book
Review: You hear on the news once in a while about what the authorities have found on a computer system owned by the bad guys. At present fifty percent of the cases the FBI now opens involve a computer.

I have to say thought that I didn't realize how much data could be recovered from a system. Deleted files can remain on a hard drive for months, even years. Data from RAM I thought would simply disappear when the power was removed, not so.

This is a book where everyone in the computer organization should read the first chapter. The subsequent chapters get too deep, too fast for the casual reader, even for the casual Unix administrator. And understanding them will make a good start on a niche within the computer business, a profession in its own right.

The one thing that the book teaches is that too make your system truly secure, you must disconnect it from the network, power it down, and vaporize the hard drive and memory, and while your're at it perhaps the rest of the machine as well. And don't forget the backup disks, memory sticks or whatever.

Amazing Book.


<< 1 >>

© 2004, ReviewFocus or its affiliates