Integrating Python with Leading Computer Forensics Platforms
By Chet Hosmer
()
About this ebook
Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be immediately put to use. Noted author Chet Hosmer demonstrates how to extend four key Forensic Platforms using Python, including EnCase by Guidance Software, MPE+ by AccessData, The Open Source Autopsy/SleuthKit by Brian Carrier and WetStone Technologies, and Live Acquisition and Triage Tool US-LATT. This book is for practitioners, forensic investigators, educators, students, private investigators, or anyone advancing digital forensics for investigating cybercrime.
Additionally, the open source availability of the examples allows for sharing and growth within the industry. This book is the first to provide details on how to directly integrate Python into key forensic platforms.
- Provides hands-on tools, code samples, detailed instruction, and documentation that can be immediately put to use
- Shows how to integrate Python with popular digital forensic platforms, including EnCase, MPE+, The Open Source Autopsy/SleuthKit, and US-LATT
- Presents complete coverage of how to use Open Source Python scripts to extend and modify popular digital forensic Platforms
Chet Hosmer
Chet Hosmer serves as an Assistant Professor of Practice at the University of Arizona in the Cyber Operations program, where he is teaching and researching the application of Python and Machine Learning to advanced cybersecurity challenges. Chet is also the founder of Python Forensics, Inc. a non-profit organization focused on the collaborative development of open-source investigative technologies using Python and other popular scripting languages. Chet has made numerous appearances to discuss emerging cyber threats including NPR, ABC News, Forbes, IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com, and Wired Magazine. He has 7 published books with Elsevier and Apress that focus on data hiding, passive network defense strategies, Python Forensics, PowerShell, and IoT.
Read more from Chet Hosmer
Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology Rating: 4 out of 5 stars4/5PowerShell and Python Together: Targeting Digital Investigations Rating: 0 out of 5 stars0 ratingsData Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols Rating: 5 out of 5 stars5/5Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity Rating: 0 out of 5 stars0 ratingsPython Passive Network Mapping: P2NMAP Rating: 4 out of 5 stars4/5Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time Rating: 0 out of 5 stars0 ratings
Related to Integrating Python with Leading Computer Forensics Platforms
Related ebooks
Cuckoo Malware Analysis Rating: 0 out of 5 stars0 ratingsOS X Incident Response: Scripting and Analysis Rating: 0 out of 5 stars0 ratingsLearning Penetration Testing with Python Rating: 0 out of 5 stars0 ratingsEffective Python Penetration Testing Rating: 0 out of 5 stars0 ratingsPractical Data Science with Python 3: Synthesizing Actionable Insights from Data Rating: 0 out of 5 stars0 ratingsMastering Social Media Mining with Python Rating: 5 out of 5 stars5/5Mastering Python Forensics Rating: 4 out of 5 stars4/5Advanced Python Development: Using Powerful Language Features in Real-World Applications Rating: 0 out of 5 stars0 ratingsFlask Blueprints Rating: 0 out of 5 stars0 ratingsMastering Flask Rating: 0 out of 5 stars0 ratingsPython for Secret Agents - Volume II Rating: 0 out of 5 stars0 ratingsPython For Data Science Rating: 0 out of 5 stars0 ratingsMastering Python Regular Expressions Rating: 5 out of 5 stars5/5Getting Started with tmux Rating: 0 out of 5 stars0 ratingsMastering Scala Machine Learning Rating: 0 out of 5 stars0 ratingsSQL Injection Attacks and Defense Rating: 5 out of 5 stars5/5InfoSecurity 2008 Threat Analysis Rating: 0 out of 5 stars0 ratingsBuilding Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition Rating: 0 out of 5 stars0 ratingsDigital Triage Forensics: Processing the Digital Crime Scene Rating: 2 out of 5 stars2/5Learn Python in 7 Days Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing with Kali Linux - Second Edition Rating: 0 out of 5 stars0 ratingsWindows Malware Analysis Essentials Rating: 5 out of 5 stars5/5Kali Linux Network Scanning Cookbook - Second Edition Rating: 0 out of 5 stars0 ratingsThird-Party JavaScript Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsThe Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Rating: 4 out of 5 stars4/5
Information Technology For You
Health Informatics: Practical Guide Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Computer Science: A Concise Introduction Rating: 4 out of 5 stars4/5CompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsHow to Write Effective Emails at Work Rating: 4 out of 5 stars4/5Data Analytics for Beginners: Introduction to Data Analytics Rating: 4 out of 5 stars4/5AWS Certified Cloud Practitioner: Study Guide with Practice Questions and Labs Rating: 5 out of 5 stars5/5Visual Studio Code for Python Programmers Rating: 0 out of 5 stars0 ratingsAn Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5Investigating Child Exploitation and Pornography: The Internet, Law and Forensic Science Rating: 5 out of 5 stars5/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5The iPadOS 17: The Complete User Manual to Quick Set Up and Mastering the iPadOS 17 with New Features, Pictures, Tips, and Tricks Rating: 0 out of 5 stars0 ratingsLinux Command Line and Shell Scripting Bible Rating: 3 out of 5 stars3/5How to Find a Wolf in Siberia (or, How to Troubleshoot Almost Anything) Rating: 0 out of 5 stars0 ratingsCODING INTERVIEW: Advanced Methods to Learn and Excel in Coding Interview Rating: 0 out of 5 stars0 ratingsInformation Security Best Practices: 205 Basic Rules Rating: 0 out of 5 stars0 ratingsThe Programmer's Brain: What every programmer needs to know about cognition Rating: 5 out of 5 stars5/5How To Use Chatgpt: Using Chatgpt To Make Money Online Has Never Been This Simple Rating: 0 out of 5 stars0 ratingsRaspberry Pi :Raspberry Pi Guide On Python & Projects Programming In Easy Steps Rating: 3 out of 5 stars3/5ChatGPT: The Future of Intelligent Conversation Rating: 4 out of 5 stars4/5Data Governance For Dummies Rating: 0 out of 5 stars0 ratingsWindows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5Summary of Super-Intelligence From Nick Bostrom Rating: 5 out of 5 stars5/5Beginner's Guide to Information Security Rating: 0 out of 5 stars0 ratingsPractical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratings
Reviews for Integrating Python with Leading Computer Forensics Platforms
0 ratings0 reviews
Book preview
Integrating Python with Leading Computer Forensics Platforms - Chet Hosmer
be.
Chapter 1
Integrating Python With Forensics Platforms
Abstract
This chapter introduces the key objectives of the book and identifies other resources for further study, along with basic Python fundamentals for those new to the language. We also define the specific forensic platforms that will be the basis for the integration methods. We must answer the critical question of what options for integration exist and how might they be useful to forensics? Finally, we answer how do the resulting scripts and integrations benefit from using Python?
Keywords
Python; Forensics; Encase; Guidance Software; MPE +; Access Data; Paraben P2 Commander; WetStone; US-LATT; Autopsy; Brian Carrier; Open source; Preprocessing; Postprocessing; Application programming interface; Hard problems; Encryption; Steganography; Rainbow tables; Geo-location; eXtensible Markup Language; Comma-separated value
Introduction
The Python programming language and environment has proven to be easy to learn and use, and is adaptable to virtually any domain or challenge problem. Companies such as Google, Dropbox, Disney, Industrial Light and Magic, and YouTube just to mention a handful are using Python within their operations. Additionally, organizations such as NASA's Jet Propulsion Lab, the National Weather Service, the Swedish Meteorological and Hydrological Institute (SMHI), and Lawrence Livermore National Laboratory rely on Python to build models, make predictions, run experiments, and control critical operational systems.
When integrating Python with computer forensic platforms, several areas can benefit:
(1) Automation of current manual processes
(2) Rapid prototyping of new examination methods
(3) Access to a rich library of packages that can accelerate the development of new approaches
(4) Enhanced performance by leveraging multiprocessing, set theory, dictionaries, and other advanced methods that are ideally suited to enhance forensic examination
For those new to Python, the best place to start is at the Python Software Foundation (PSF), website at www.python.org as depicted in Fig.