Digital Forensics with Open Source Tools: Using Open Sour... and over one million other books are available for Amazon Kindle. Learn more
  • List Price: CDN$ 75.63
  • You Save: CDN$ 10.26 (14%)
Only 1 left in stock (more on the way).
Ships from and sold by
Gift-wrap available.
Digital Forensics with Op... has been added to your Cart
Condition: Used: Good
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Digital Forensics with Open Source Tools Paperback – Apr 14 2011

See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
"Please retry"
CDN$ 65.37
CDN$ 51.63 CDN$ 50.02

Frequently Bought Together

Digital Forensics with Open Source Tools + Hacking Exposed 7: Network Security Secrets & Solutions
Price For Both: CDN$ 98.56

One of these items ships sooner than the other.

Buy the selected items together

Product Details

Product Description


"This is highly detailed material. Although the introductory chapter adopts an easy pace, with overviews of important technical concepts, most of the other chapters get right down to the practice of forensic analysis. This is not a book you're going to want to read in bed: you'll want this right next to a computer - preferably two or three computers running different operating systems - so that you can try the techniques for yourself as you work your way through. The authors admit that this book does not cover everything you need to know. For instance, it focuses entirely on 'dead drive' forensics - offline systems. Analysing running systems often requires high-level proprietary tools. But it does give an excellent grounding in the methods of digital forensic analysis and provides a valuable first step in learning the technicalities."--Network Security, May 2012, page 4

"Digital Forensics - MacGyver Style! The practical solutions of this book, Digital Forensics with Open Source Tools, save the day when commercial tools fail. During an incident, the clock ticks. Response teams scramble to pull anything together to solve the immediate challenge. Cory Altheide and Harlan Carvey take you through the tools and tactics that you need - the ones that in a pinch will get the job done. A welcome addition to my library."--Rob Lee, SANS Institute

"Intended for students and new computer professionals, or those new to open source applications, this guide to digital forensics provides practical instructions for many common tasks in data recovery and analysis using open source tools. Beginning with a discussion of setting up an open source examination platform and tool set, the work covers disk and file system analysis, Windows, GNU/Linux and Mac OS X systems and artifacts, Internet artifacts, file analysis and automated analysis. The volume includes numerous code examples and tips and tricks as well as an appendix of software tools."--Reference and Research Book News

"Intended for students and new computer professionals, or those new to open source applications, this guide to digital forensics provides practical instructions for many common tasks in data recovery and analysis using open source tools. Beginning with a discussion of setting up an open source examination platform and tool set, the work covers disk and file system analysis, Windows, GNU/Linux and Mac OS X systems and artifacts, Internet artifacts, file analysis and automated analysis. The volume includes numerous code examples and tips and tricks as well as an appendix of software tools. Chapter examples assume a basic knowledge of the Linux command line interface."--Reference and Research Book News

"The authors intended this book for two types of readers: complete novices in the world of digital forensics, and seasoned practitioners who are interested in learning more about open source tools that could help them in their work. And although it might seem difficult to merge the knowledge in such a way to make for an interesting book for both groups, in my opinion, the writers managed to do it beautifully."

From the Back Cover

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) 28 reviews
21 of 22 people found the following review helpful
DFWOST: No dongle? No problem! June 22 2011
By Brad Garnett - Published on
Format: Paperback
No dongle? No problem, says it all! Authors, Cory Altheide and Harlan Carvey, deliver a superb, field guide for digital forensic practitioners. This book is not a textbook on how to perform digital forensics, but a guide for the veteran or new forensic examiner to reference, to extend his/her analysis capabilities with open source tools. The authors bring their years of real world experience at practicing digital forensics, into a single publication.
Digital Forensics With Open Source Tools (DFWOST) begins by defining "free" vs. "open" and the digital forensic process, as well as the benefits of using open source tools. DFWOST quickly moves into setting up the examination workstation, that the examiner/analyst will use to perform the digital forensic examination; regardless, of the host operating system of your forensic machine.
While the book is not a textbook on how to perform a digital forensic examination, it does outline basic digital forensic concepts and terminology that the forensic examiner must comprehend to utilize the open source framework that the book mainly focuses upon, The Sleuth Kit.
From here, the book goes into depth with Windows, Linux, and Mac OS X operating systems and how to use open source tools to identify, parse, and "forensicate" the various system artifacts.
The book's final chapter focuses on automating forensic analysis and extending capabilities with open source tools Finally, the appendix is full of free, non-open source tools that you should become familiar with and integrate into your digital forensic toolkit. Remember, there are many ways to skin a cat! [Disclaimer: no kitteh's were harmed in compiling this book review :)]

Here's why I am giving this book a five star review:

1) Altheide and Carvey walk the reader through compiling a forensic examination workstation to utilize for a digital forensic investigation. It's full of tips, command line refreshers, and best practices delivered from experienced digital forensic professionals with perfect symmetry (i.e., "It is best to complete Y, to avoid Z").

2) In regards to symmetry, Altheide and Carvey do an awesome job of describing The Sleuth Kit Tools, breaking down the common TSK prefixes and each layer of TSK tools, which for new examiners can be task within itself. If you are new to TSK, DFWOST is the perfect companion.

3) Altheide and Carvey eliminate the barrier of just having OS specific forensic tools. Linux and Mac OS X users can now play in their own sandbox, using their own toys (Of course, Linux and Mac users knew this all along).

4) Chapter 8 on File Analysis is the longest chapter (41 pages in length), covering analysis of image files, audio and video files, archive files, and documents. This chapter breaks down a file's content and metadata. DFWOST puts file analysis into a practical and digestible format, that a new examiner should be able to apply immediately to a forensic investigation.

5) The book's length, based on the subject matter is spot on and not too cumbersome (255 pages including Appendix on Free, Non Open Tools). Just as Carvey done with Windows Registry Forensics (WRF), Digital Forensics With Open Source Tools (DFWOST) takes a sniper approach on the subject matter. Depending on what type of reader you are, you may knock it out in a single reading session; or, it may take several reading sessions, which will allow you to follow along, complete the examples, and exercises outlined in the book.

6) Lastly, the DFWOST print version that I purchased is signed by both authors. I was able to catch both authors at the Open Source Digital Forensics Conference last week in NoVa. Thank you gentlemen!

The book's content, length, and practical application make it a necessity for the digital forensic examiner's toolkit! Now, go forth and 'forensicate', DFWOST-style!
10 of 10 people found the following review helpful
Break out of the GUI! June 13 2011
By Chad Tilbury - Published on
Format: Paperback
With more forensic books hitting the shelves, I find myself prioritizing those by authors I know and trust. I have worked with Cory Altheide and he is an extremely talented forensic professional with a passion for open source tools. Not surprisingly, I would not categorize this as a beginner book. Open source tools require a higher level of interaction than their commercial counterparts, but are a great way to take your forensic skills to the next level. While teaching, I often see students frustrated that there is no one tool that can do it all. Such a tool does not exist, no matter how much you are able to pay for it. Free and open source tools fill large gaps in the capabilities of commercial forensic suites and will continue to do so in the foreseeable future.

The book begins with an excellent section on setting up your forensic workstation, using either Linux or Windows as a host. I was immediately impressed with how succinctly the authors were able to cover this topic. File system analysis is broken into three chapters covering Linux, Windows, and OS X. It is rare to find more than one of these operating systems covered, and references to all three continue throughout the rest of the book. This breadth does come at a cost; a fair amount of system knowledge is assumed. As an example, NTFS is covered in six pages and readers are assumed to have prior knowledge of concepts like NTFS attributes and resident versus non-resident files. Without a doubt, Digital Forensics with Open Source Tools (DFWOST) runs at a blistering pace. This is a boon for more advanced practitioners who do not want to rehash old concepts. However, there were several instances when "newer" artifacts like the Linux Logical Volume Manager (LVM) were discussed that I found myself wanting more. In other sections I found some of the best topic coverage in print. The discussion of image metadata in Chapter 8 is particularly comprehensive.

Of course the coverage of open source tools is why many will buy this book. In this regard it does not disappoint. I was pleased to find nearly all of my favorite tools covered along with many new ones. I found myself dog-earing pages to return back to when time permits. Harlan Carvey's touch was evident in the coverage of Windows based tools. Tools are covered in conjunction with their related forensic artifacts, reinforcing key concepts and underscoring tool relevance. While coverage is ample, tools are not discussed exhaustively. Readers will need to work with the tools themselves to fully understand their capabilities - an approach which I agree with.

Overall, I found DFWOST to be a tremendous asset in an area with few published resources. If you are looking to push your forensic skills forward, I highly recommend this book.
12 of 14 people found the following review helpful
Open Source Forensics Goodness June 16 2011
By Eric Huber - Published on
Format: Paperback
Let me start off by stating that I was provided a free review copy of this book by the authors and their publisher. I know both Cory Altheide and Harlan Carvey and I'm an admirer of their work in the field. If I hadn't been provided a review copy of the book, I would have purchased it on my own and reviewed it because of the trust I have in their abilities as researchers and writers. Part of me wishes I hadn't written that sentence because I know Harlan Carvey is working on another book and I probably just eliminated any possibility of getting a free review copy. Someday I'll learn, but today is clearly not that day.

Unsurprisingly, Cory and Harlan turned out a five star effort. The book does three things for the reader. First, it explains the purpose and use of a variety of open source digital forensic tools (as well as using an appendix to explain some free, but non-open source tools), it provides the reader with some foundational education on file system forensics (Windows, Apple, and Linux), and it explains selected important topics in digital forensics such as web browser forensics, shortcut files, and mail artifacts.

I had a bit of an internal debate regarding whether this book is something that an entry level person would be able to grasp in its entirety. Some of the concepts presented such as the more advanced file system forensic issues can be relatively complicated for a beginner. Ultimately, I think this complexity is a strength of the book in that it makes it a learning barometer of sorts. A good use of this book for a new forensic examiner would be to use it as a guide to determine which portions they already know and which portions are they find confusing. It's the confusing bits that should spur them onto further learning and research until they can come back to the book and understand the concepts that the authors are putting forth. This could have easily been a poorly written book whose explanations were impenetrable to someone new to the field, but it's well written enough that I think it serves as a good initial text for someone who is interested in the field.

This is also a useful book for experienced examiners who want to learn about the variety of open source tools that are available beyond the more expensive, but very popular closed source tools such as EnCase and FTK. While I find those tools to be very useful and beneficial, there has been quite a bit of development and innovation in the open source digital forensics community that can and should be leveraged by both new and experienced examiners.

Price is the potential concern that some might have with this book and that is understandable given the price. I have declined to purchase other interesting looking Syngress titles in the past because I didn't know enough about the authors or the books to justify the risk at the price they were offered. This book is relatively thin and I suspect there will be some concern about the price-to-page ratio. Had this book been written by authors unknown to me, I might very well have declined to purchase it if I hadn't been provided a review copy. However, in the case of this work, it's very much worth the price. This a very well done work that has been created by two respected practitioners and authors in the field and should be on the shelf of every person who is trying to break into the digital forensics field.
8 of 10 people found the following review helpful
Great resource for the forensic analyst or incident responder April 25 2011
By Amazon Customer - Published on
Format: Paperback
When I first saw the title for Digital Forensics with Open Source Tools (DFwOST) I thought to myself "Oh great, another mash up of Carrier's File System Forensic Analysis, Farmer & Venema's Forensic Discovery and the freely available Sleuthkit documentation." What I found, however, was a well-written, detailed and concise book detailing many of the most important, and freely available, open source tools that could be wielded in the name of system forensics and incident response. I've known both authors, Cory Altheide and Harlan Carvey, for quite some time and both are well known in forensic circles. The voice throughout the book is consistant and it's difficult to see where one author picks up and the other leaves off (well, when the conversation switches to RegRipper I'm fairly certain that Harlan is the predominate voice).

The first chapter outlines what constitutes a `free' vs. `open' tool, the various licenses and the benefits of standardizing on a mixed bag of non-commercial tools - hint, portability between jobs is a big bonus. Chapter 2, surprisingly, shows you how to build your own open source examination platform and walks the read through the installation and configuration of software, interpreters and other tools for both a Linux or Windows host. Chapters 3 through 7 provide overviews, tips and tricks on everything from disk and file system analysis techniques to searching for artifacts on Windows, Linux and OS X systems in addition to Internet specific artifacts like those left by browsers and mail clients. Chapter 8 gives a somewhat high-level view of file analysis concepts and provides some file-specifc format information for the investigator-on-the-go (who can really remember the various metadata available in a PDF file anyway?). Chapter 9 discussed the automation of analysis and some of the tools used to help extract common files, create timelines and work with graphical investigative environments like PyFLAG and the Digital Forensics Framework. Finally, the Appendix provides some high-level information on some complimentary, though not open, tools to help with the forensic process.

I can honestly say that I read this book in a matter of hours - not to mention in one sitting. My forensic knowledge and training did allow me to read through the book at a fairly decent pace but I think that even the most green of forensic analysts would walk away with a more detailed knowledge of the forensic process and the open source tools that could be used to undertake a forensic exercise. The book is not going to explain the file system and its intricacies at any great length but really, there are other books already written that do that. Also, the book won't show you how to do everything with the tools it mentions but it certainly will point the reader at some new tools that they may have never known about previously. It's safe to say that DFwOST is certainly no substitute for forensic training or experience but if you already have all of the standard forensics books on your bookshelf (you know the ones), you'd do well to save a slot for DFwOST as a quick reference for some of the newer tools not covered in those older tomes.
2 of 2 people found the following review helpful
Excellent Book, Five Stars! Aug. 2 2011
By Colin C. Sheppard - Published on
Format: Paperback Verified Purchase
As Cory and Harlan state in the introduction, this book is intended for two audiences; new forensic practitioners and experienced digital forensics practitioners new to open source tools. I believe they have succeeded in providing top-notch material for both audiences. Several excellent five star reviews have already been posted, which I agree with wholeheartedly. In order to avoid simply rehashing these existing reviews, I would like to simply state that I believe Cory and Harlan did two things very well with DFWOST:

1. As Cory and Harlan state in the introduction to Chapter 2, "Being able to build software properly is critical for an examiner using open source tools". Speaking as a seasoned examiner that consistently leverages the majority of the tools in DFWOST, we sometimes forget that the configuration of various interpreters (Perl, Python, Ruby) and the proper installation of tools from source are a difficult task for those new to open source tools. This technical hurdle often inhibits the adoption of open source utilities by even senior analysts. I believe Cory and Harlan had this hurdle in mind when authoring DFWOST, as they provide their readers with valuable information regarding these tasks. Chapter 2 does an excellent job of stepping the reader through the installation of various interpreters and utilities for both the Linux and Windows environments. Before I read DFWOST, I was curious if Cory and Harlan would leverage an available Linux-based live distro and bypass the topic of installation and configuration of an examination system all together. I was happy to see they they did not take this route, as dependency on a live distro can simply add a layer of abstraction for a new student.

2. Instead of bloating DFWOST with content that has been covered in depth in existing publications, Cory and Harlan opt to simply direct readers to these resources. Given both the author's resumes (and previous publications), they could of easily supplied this information in DFWOST to unnecessarily bulk this book up. For instance, when the topic of advanced Windows Registry analysis is mentioned, the reader is directed to Harlan's Windows Registry Forensics. This may be construed as self-serving, but the same is done when the topic of Windows binary (PE) analysis is entered. In this case, the reader is directed towards Malware Analyst's Cookbook by Ligh, Adiar, Hartstein, and Richard. In my opinion, both these publications are the definitive sources for their perspective topics. It is refreshing to see the authors direct their readers to the appropriate place, instead of diving into a topic that probably doesn't have the appropriate real estate dedicated for discussion in the first place.

As with any material these two authors provide to the community, DFWOST should be required reading for any examiner - not just open source hobbyists and newbies. I hope we see another great publication from both Cory and Harlan in the near future. They make a good team.