Section 3: Practical Incident Response
This part will provide you with lots of practical examples related to the investigation of modern human-operated ransomware attacks and introduce you to the Unified Ransomware Kill Chain.
This section comprises the following chapters:
- Chapter 7, Digital Forensic Artifacts and Their Main Sources
- Chapter 8, Investigating Initial Access Techniques
- Chapter 9, Investigating Post-Exploitation Techniques
- Chapter 10, Investigating Data Exfiltration Techniques
- Chapter 11, Investigating Ransomware Deployment Techniques
- Chapter 12, The Unified Ransomware Kill Chain