Part IV: Tools for Computer Forensics and Incident Response - USA Order Công cụ & ứng dụng ủy quyền trang web

Hot

Với thương hiệu USAOrder.VN & Hà Nội Lab Ra đời vào năm 2004 chuyên về laptop nhập chính hãng từ Mỹ và hiện tại là nơi kết nối các sản phẩm chính hãng từ Mỹ và thế giới USAOrder.VN hiện hỗ trợ các mặt hàng hóa khó số lượng lớn trong nước và quốc tế hỗ trợ đưa ra giải pháp tối ưu quy trình vận chuyển tự động hóa tiết kiệm, hiệu quả thông quan bảo đảm an toàn.

Post Top Ad

Thứ Bảy, 9 tháng 6, 2018

Part IV: Tools for Computer Forensics and Incident Response

Part IV: Tools for Computer Forensics and Incident Response

Chapter List

Chapter 20: Creating a Bootable Environment and Live Response Tool Kit

Chapter 20: Creating a Bootable Environment and Live Response Tool Kit

Overview

When a call comes in that a system has been hacked, the forensic consultant has to be ready to move quickly. Sometimes, the victim system will be so badly damaged by the attack that the machine won’t even be able to boot. Some victim systems may be functional, but the “powers that be” will allow the victim to be taken offline to perform proper analysis on it. Still others, however, will require that the system remain online while the analysis is performed. No matter what the scenario, the forensic consultant has to be prepared to deal with it.
In this chapter, we’ll tell you how to create a bootable response media (usually either CD-ROM or floppy) that contains all the tools you’ll need to perform a proper response analysis to an attack. We’ll also put together a collection of critical Windows and Unix tools that can be used for forensic analysis on live systems.
Click To expand


Previous Section
 < Day Day Up > 
Next Section
Chapter 21: Commercial Forensic Duplication Tool Kits

Chapter 21: Commercial Forensic Duplication Tool Kits

Overview

Once the decision is made that an investigation will take place, it is usually a good idea to obtain a forensic image of the machines involved in the incident. Several choices of forensic duplication software are available; both commercial and noncommercial tools have withstood the burden the legal system has placed on them. This chapter reviews several tools that are available commercially. Typically, mid-sized to large organizations lean toward commercially available software, so this chapter describes four of the most popular packages: EnCase, Safeback, SnapBack, and Ghost.
Once the decision is made that an investigation will take place, it is usually a good idea to obtain a forensic image of the machines involved in the incident. Forensic images, also called evidence grade or bit-stream copies, exactly replicate all sectors on a given storage device.
You may want to read the Case Study at the end of the chapter first to familiarize yourself with the hard drives and the situation you will face when you use these forensic duplication tools. The Case Study will be referred to as the “example” within the following sections.
Note 
The tools discussed in this chapter perform forensic duplication and not analysis. See Chapters 22, 23, and 24 for information on tools to aid in forensic analysis.
In keeping with the flow of the investigation, we now move to the Forensic Duplication step in the timeline:
Chapter 22: Open-Source Forensic Duplication Tool Kits

Chapter 22: Open-Source Forensic Duplication Tool Kits

Overview

Chapter 21 reviewed several commercially distributed tool kits that perform forensic duplications. The tool kit discussed in this chapter can be assembled for free, and in a modest amount of time, you can easily master its use.
With the proliferation of open-source operating systems such as Linux, OpenBSD, NetBSD, and FreeBSD, a whole suite of tools (and source code) is available to the general public that never existed before. Many of the general system administration tools such as dd, losetup, vnconfig, and md5sum can be used for investigations just as effectively as their commercial counterparts.
This chapter explains the use of these tools and how they have proved to be important additions to the investigator’s tool kit. Because these tools are free and the results of the duplication methods they provide can be imported into nearly any forensic analysis suite, you may prefer to use these tools over any others. It is important that you note, however, that to use these tools, you’ll need a high level of experience and a slight knowledge of file system technical details.
Just as we discussed needing a trusted boot disk (or CD-ROM) in Chapter 21, forensic duplication with noncommercial software has the same requirement. Because Linux is an open-source operating system, many successful distributions have been developed to make Linux run on CDs or floppy disks without accessing the hard drive. We suggest you check out Trinux, which is a Linux distribution designed to run off of a CD-ROM. You can research Trinux at http://trinux.sourceforge.net. Knoppix, available at http://www.knoppix.net, follows the same vein. It is designed to be installed from a CD-ROM, has excellent documentation, and has been more actively developed than Trinux. Knoppix will have more support for “strange” hardware and more recent tools. Additionally, a similar distribution of FreeBSD is offered at http://sourceforge.net/projects/freebsdtogo/ and properly named FreeBSD To Go.
Another project worth mentioning is F.I.R.E, or the Forensic and Incident Response Environment. It offers an easy-to-navigate menu system for performing a wide variety of forensics and security analyses on a computer without altering the evidence. For more information about forensics-capable CDs, see http://www.linux-forensics.com/links.html. For information on bootable CDs in general, see http://www.distrowatch.com/dwres.php?resource=cd.
Multiple Linux distributions have been designed for the forensics examiner to run off a CD-ROM, including Trinux, Knoppix, Knoppix-STD, FIRE, and many others. These versatile distributions are complete with analysis tools, data collection resources, disk recovery utilities, security testing capabilities, and even virus scanning. Information about each distribution is shown in the following table.
Distribution
Web Site
Strong Points
Trinux
Small size allows it to run on old computers
Knoppix
Best hardware detection and GUI, extensive list of tools
Knoppix-STD
Knoppix Security Tools distribution includes an extensive suite of security, incident response, and forensics-related tools
F.I.R.E
Forensic and incident response environment has nice menu system that makes it easy to use
In this chapter, we are still within the forensic duplication stage of our investigation:
Click To expand
Chapter 23: Tool Kits to Aid in Forensic Analysis
Chapter 24: Tools to Aid in Internet Activity Reconstruction
Chapter 25: Generalized Editors and Viewers




Previous Section
 < Day Day Up > 
Next Section

Không có nhận xét nào:

Đăng nhận xét

Post Top Ad