Table of contents : Analysis PointsFinding Malware-Windows 7 Analysis Goal Image Survey Constructing a Timeline USB Device Analysis Analysis Summary Analysis Points Final Words 3 User Activity Introduction CFReDS Hacking Case Image Analysis Goals Analysis Plan Timeline Additional Data Summary Lessons Learned Data Theft Analysis Goals Analysis Plan Connected Devices Data Theft Outlook PST File Other Data Sources Summary Lessons Learned Joe's PC Analysis Goals Analysis Plan Analysis Viewing ThumbCache Database Contents Sufficiency Summary Lessons Learned 4 Web Server Compromise IntroductionWindows 2008 Web Server Analysis Goals Analysis Plan Data Extraction Analysis Web Server Logs Findings Summary 5 Setting Up A Testing Environment Introduction Setting Up A Testing Environment Configuration Testing and Documentation File System Tunneling Deleting Files Volume Shadow Copies Final Words Index Back Cover