IntermediateForensicsLinuxDefensive

Practical Linux Forensics

A Guide for Digital Investigators

4 / 5

Bruce Nikkel's reference for forensic analysts working post-mortem on Linux images: filesystems, journaling, logs, persistence locations, and the chain of custody discipline around them.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2021
Publisher
No Starch Press
Pages
400
Language
English

Read this if

Incident responders and forensic analysts working modern Linux systems. Nikkel covers ext4 / XFS / Btrfs internals, systemd journaling, persistence locations, and the chain-of-custody discipline that distinguishes evidence from notes. The post-systemd reference the field needed.

Skip this if

Windows-only forensic analysts, or beginners without IR experience. The book assumes filesystem fluency and command-line forensics comfort.

Key takeaways

  • Modern Linux forensics is not just "parse syslog"; systemd, journald, and the move to overlay-based containers each created new artifact classes.
  • The book's chapter on persistence enumeration is the cleanest in print; cron, systemd timers, init.d, profile files, all named.
  • Most cloud workloads are Linux, which means most cloud-incident forensics is Linux forensics; the book is the right starting reference.

Notes

Pair with Practical Packet Analysis (Sanders) for the network side and with Practice of Network Security Monitoring (Bejtlich) for the program-level frame. Nikkel's earlier book Practical Forensic Imaging is the natural prerequisite if you don't already know acquisition. Required reading for any IR analyst handling cloud or container investigations.