document.body.classList.toggle('menu-open', show); // Add 'menu-open' class to body.

Digital Forensics With Open Source Tools – Eliza’s Cyber Security Book Club

th4ts3cur1ty.company - Meet The Team - Eliza
Written by Eliza-May Austin
July 18, 2024

Join our CEO – Eliza-May Austin, a seasoned leader with extensive experience in the field – as she dives into some of the most challenging topics in cyber security. Unlike many books written by authors who simply enjoy writing, Eliza brings her real-world expertise and senior leadership perspective to the table, providing honest and insightful reviews of the texts she has tackled.

In Eliza’s Cyber Security Book Club, you’ll gain valuable perspectives from a true practitioner and leader. So grab a cuppa, get ready to explore cyber security like never before, and embark on a journey through the most critical issues in the field.

WEEK 2: "Digital Forensics With Open Source Tools" by Cory Altheide and Harlan Carvey

“Digital Forensics With Open Source Tools” has been on my shelf for years, having first been published in 2011. In technology terms this may as well be the 1800s, yet it remains a valuable resource. While some content is outdated, the majority of the information is still relevant and covers essential basics. Consequently, it is a good, affordable option for students when purchased second hand.

The book addresses common open-source tools such as Sleuth Kit and FTK, which are still in use today. It also discusses tools that are less frequently mentioned now, such as OffVis. Beyond tools, the book delves into core native functionalities like the dd command and fundamental forensic concepts, including file system structure, file carving, and slack space.

Despite the passage of time, this book continues to serve as a solid introduction to digital forensics, making it a worthwhile addition to any aspiring professional’s library.

Rating "Digital Forensics With Open Source Tools"

I would rate this book 2 out of 5 for overall enjoyment. While it still has some merit, there are more valuable resources available.

If you are a seasoned professional, you might want to skip this one. However, for those less experienced, it offers an easy read with short sections that cover enough depth for any IT student to feel confident with the material.

I would particularly recommend this book to forensics practitioners working in environments heavily reliant on specific commercial tools. It serves as a useful refresher on the fundamental principles of forensics, reminding readers why they examine particular elements and how to approach their analysis. It helps break the reliance on tool-specific navigation and encourages a deeper understanding of the underlying concepts.

Technical rating: 3/5 

Experience rating: 3/5

Seniority required: 1/5

OVERALL RATING
COMING UP NEXT WEEK…

“SCADA Security: What’s broken and how to fix it” by Andrew Ginter.

Read now >

Like what you see? Share with a friend!

th4ts3cur1ty.company - Meet The Team - Eliza

This article is written by

Eliza-May Austin

CEO

Eliza exudes a captivating, no-nonsense demeanour that defines the services provided by th4ts3cur1ty company. As a proud Yorkshire woman, she boasts an impressive expertise in tea, gravy, and local hiking trails. Clients value Eliza’s practical, assertive stance on security, especially in challenging situations. Quietly dubbed the “Winston Wolfe of cyber”, she navigates complex conditions with a calm and strategic approach. Trust her to handle security matters with finesse and to get you out of a bind with determined resolve.