In this section of the book we are going to learn about some useful forensics tricks.
We are going to talk about partitions, file-systems, carving, memory, logs, backups, OSs, and much more.
So if you are doing a professional forensic analysis to some data or just playing a CTF you can find here useful interesting tricks.
This isn't necessary the first step to perform once you have the image. But you can use this malware analysis techniques independently if you have a file, a file-system image, memory image, pcap... so it's good to keep these actions in mind:
if you are given a forensic image of a device you can start analyzing the partitions, file-system used and recovering potentially interesting files (even deleted ones). Learn how in:
Deep inspection of specific file-types and Software
If you have very suspiciousfile, then depending on the file-type and software that created it several tricks may be useful.
Read the following page to learn some interesting tricks: