Perl scripting for windows security live response, forensic analysis, and monitoring
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required,...
Autor principal: | |
---|---|
Otros Autores: | , |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress
c2007.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627132906719 |
Tabla de Contenidos:
- Front Cover; Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring; Copyright Page; Dedication Page; Author; Technical Editor; Contributing Author; Contents; Preface; Author Acknowledgements; Part I: Perl Scripting and Live Response; Built-in Functions; Win32.pl; Pclip.pl; Running Processes; Netstat1.pl; Netstat2.pl; Netstat3.pl; Accessing the API; Getsys.pl; WMI; Fw.pl; Nic.pl; Ndis.pl; Di.pl; Ldi.pl; Accessing the Registry; Bho.pl; Uassist.pl; ProScripts; Acquire1.pl; Final Touches; Part II: Perl Scripting and Computer Forensic Analysis; Log Files
- Parsing Binary FilesLslnk.pl; Registry; SAMParse.pl; SECParse.pl; Recentdocs.pl; UAssist.pl; Event Logs; Evt2xls.pl; Parsing RAM Dumps; Lsproc.pl; Lspi.pl; ProScripts; Uassist.pl; SysRestore.pl; Prefetch.pl; Parsing Other Data; Cc-sort.pl; Final Touches; Part III: Monitoring Windows Applications with Perl; In This Toolbox; Core Application Processes; Monitoring System Key Performance Indicators; Monitoring System CPU Utilization; Monitoring System Memory Utilization; Monitoring System Network Utilization; Monitoring a Core Application Process
- Monitoring Process Availability a Specific ProcessMonitoring CPU Utilization for a Specific Process; Monitoring Memory Utilization for a Specific Process; Setting and Using Thresholds; Loading an XML Configuration File; Evaluating Thresholds; Taking Action; Putting it all Together; Core Application Dependencies; Monitoring Remote System Availability; Monitoring Available Disk Space; Monitoring Remote Disk Availability; Monitoring Remote Databases; Monitoring Other Dependencies; Web Services; Monitoring Web Service Availability; Monitoring Web Service Functionality
- Building a Monitoring SystemSummary; Index