10/13/11. Objectives. Live Acquisition. When do we consider doing it? What is Live Acquisition? The Order of Volatility. When do we consider doing it?

Size: px
Start display at page:

Download "10/13/11. Objectives. Live Acquisition. When do we consider doing it? What is Live Acquisition? The Order of Volatility. When do we consider doing it?"

Transcription

1 Live Acquisition Objectives Understand what Live Acquisition is and when it is appropriate Understand the concept of Order of Volatility Understand live acquisition issues and limitations Be able to perform live acquisition using various tools and techniques CSC 486/586 2 What is Live Acquisition? Previously, our focus has been on dead or cold forensics Capture and analysis of static state data stored on digital storage media, where all captured data is a snapshot of the entire media at a single point in time where the data is write protected and/or not changing during acquisition. Live Acquisition involves the capture of data from a system that is running when you encounter it. Capture before you shut it down, or in lieu of shutting it down. Capture of ever-changing data stored on media or memory, including: Data stored on internal or external disks Data active in memory (RAM) Running processes, open network connections/ports, remote and local logged on users, ARP cache, and many other items. Write protection of running disks not possible with current tools or technology 3 When do we consider doing it? Loss of data during shutdown Pagefile set in registry to wipe at shutdown Evidence eliminator apps that remove data at shutdown Data not stored on disk (RAM contents, open ports, running processes, logged on users, etc.) Encryption Full Disk Encryption or open encrypted volumes Cached passwords/passphrases in RAM??? Volume of Data Too much to image everything? If you don t need it all 4 When do we consider doing it? Incident Response Volatile data, lost if you turn off the computer Suspect processes running only in RAM, not on disk. Court or client imposed business interruption restrictions Kiosk/Internet Café Maybe no hard drive, booted by CD and everything is in RAM Data in the Cloud Discuss with your attorney if not a consent or client/ consultant situation! The Order of Volatility The Order of Volatility is a concept, not a formal list or specific order you must follow. All data is volatile. Certain types of data are more persistent (longer-lasting) than others. Registers, caches, etc.: nanoseconds RAM contents: nanoseconds Network state (active/listening connections): miliseconds Running processes: seconds Disk contents: minutes Backup disks/storage: years Every process you do to capture or view a piece of data, modifies other pieces of system data in the process

2 Order of Volatility Capturing RAM will take time to complete, and during that time, other useful information such as running processes, open files, network connections, will likely have changed or disappeared. While overall memory is continuously changing, on a new system with a large amount of RAM, many memory pages may linger for considerable time without being overwritten. There is no absolute step-by-step order in which you should capture volatile data every case is different! The examiner must be aware of the overall context of the investigation in order to make informed decisions on the order of evidence acquisition, based on what information is most important to them in this case. 7 8 The computer is running, everything you do modifies the system in some way. The more you do, the more you modify. Only do what is necessary. Your process should be reproducible, but the results of your capture will likely not be reproducible. The state of the system and live data will never again be exactly the same as it was when you captured it. Pre-acquisition hash values of disks or partitions that are changing during acquisition will not verify against a hash of the captured data and are therefore not appropriate. Pre-acquisition hashes of individual files or any other data that is not changing during the live acquisition process will verify against hashes of the acquired data, and are therefore appropriate to utilize. Post-acquisition hashes are still appropriate to later authenticate that copies of your original captured data is identical. Not all tools are created equal! Many tools were not designed for live response but are often used as such and have a much larger system footprint than you might like. Typically, the smaller the memory footprint, the better. Can you really testify about what your live processes touched? Do all tools/methods touch the same memory addresses? What do they overwrite when you run them? How do you know? Did you perform comparison test of your tools using memory reading/debugging tools? 9 10 Imaging a running hard disk? You will get a smear image! If you need to boot a restored version of an image, a smear may not boot! Be aware of your capture tool s shortcomings. Does it capture NTFS or other file system unique attributes? What happens if the image/archive get s corrupted (bad sector), is it recoverable? Does it preserve all file system dates/times? Or modify them in the acquisition process? How is the compression/speed when acquiring? How long will this take?

3 What tool(s) will you use to analyze the data you capture? RAM analysis tools are new and developing, but far from refined. Much data is not in plain ASCII text format. Will you be able to search or decipher the captured live data? Most everything (process list, open ports, etc.) will be included in a RAM image, but parsing out this info in a usable format may be difficult or impossible with current tools. Capture of items like process lists, open ports, etc. using Sysinternals tools (or other) may be a better option. Tools & Techniques Local Data Collection Physical access to subject computer Portable tools run locally Forensic disk imaging Archiving, backup, logical copying Volatile data capturing Data captured onto locally attached disk (USB, IEEE1394, etc.) Network Data Collection Pre-installed on network computers On-the-fly options (push remote agent) Run tool locally & push result to other machine on the network via netcat or similar External network scan of subject computer Physical Access Many tools require Administrative or elevated permissions to run and access various protected system information. Console may be locked. Remote network collection of data may be possible. Limited options in an adversarial situation without Administrator cooperation. Portable Tools Run from a disk you introduce to the running system (i.e. CD/DVD/USB/IEEE1394/SATA/etc.) When possible, always use your own trusted tools and/or binaries. Do not rely on the soundness of built-in OS tools or those pre-installed on a subject computer, especially in potentially compromised systems (i.e. incident response) Example: command.com edited with a HEX editor to swap DIR and DEL commands

4 Some of your standard tools will run on a variety of OSs For example, FTK Imager Lite runs on most live Windows versions. Many OS component tools (i.e. netstat, nbtstat, ipconfig, etc.) are OS version dependant and you must have trusted versions of any such tools for all the OS versions you will encounter Disk Imaging Archiving, Backup, Logical Copying Volatile Data Collection RAM, Process and system info collection RAM, Process & system info Automated tool kits Windows Forensics Toolchest (WFT) Incident Response Collection Report (IRCR) First Responders Evidence Disk (FRED) Computer Online Forensic Evidence Extractor (COFEE) Sysinternals Suite Many Sysinternals tools are used in the above automated tool kits. Standard OS commands (your own binaries) X-Ways Capture RAM capture: WinEn, dd, Nigilant32, FTK Imager, WinHex/ XWF, and many more

5 10/13/11 Network Data Collection Network Data Collection Pre-installed or ability to push remote agent to subject machine with Admin permissions. Most remote agents can be installed/pushed in normal or stealth modes to avoid detection. Tools: 25 OnlineDFS EnCase Enterprise (or FIM) AccessData Enterprise ProDiscover-IR F-Response Several others 26 NetCat Network Scans Results without Admin credentials Network Scans Results with Admin credentials For those really adventurous and not afraid of electricity Results affected by Firewall or other IDS/IPS protection. Results affected by user credentials utilized to perform scan. Only scans and reports on the items you specify in your scanning tool s profile. Exhaustive scanning profiles can take significant time. 29 5

6 Wiebetech Hot Plug Physical seizure without shutdown??? Take it back to your office to work on it. products/hotplug.php Keep system console from locking or hibernating with Mouse Jiggler v=erq4to_a3z8 G8sEYCOv-o&feature=related Questions??? Use the discussion board, as usual 31 6

ANALYSIS AND VALIDATION

ANALYSIS AND VALIDATION UNIT V ANALYSIS AND VALIDATION Validating Forensics Objectives Determine what data to analyze in a computer forensics investigation Explain tools used to validate data Explain common data-hiding techniques

More information

This version has been archived. Find the current version at on the Current Documents page. Archived Version. Capture of Live Systems

This version has been archived. Find the current version at   on the Current Documents page. Archived Version. Capture of Live Systems Scientific Working Group on Digital Evidence Capture of Live Systems Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail

More information

Ed Ferrara, MSIA, CISSP

Ed Ferrara, MSIA, CISSP MIS 5208 - Lecture 12 Investigation Methods Data Acquisition Ed Ferrara, MSIA, CISSP eferrara@temple.edu Objectives List digital evidence storage formats Explain ways to determine the best acquisition

More information

Live Response for Windows Systems

Live Response for Windows Systems Live Response for Windows Systems Matt Churchill Douglas County Sheriff s Office NebraskaCERT Conference 2007 Agenda Who am I? What is live response? Why is it important? What info can we acquire? What

More information

Remote Device Mounting Service

Remote Device Mounting Service HOW TO USE REMOTE DEVICE MOUNTING SERVICES The Remote Data Mounting Services (RDMS) lets you acquire live evidence from active and remote network computers. You can gather many types of active information

More information

AccessData AD Enterprise Release Notes

AccessData AD Enterprise Release Notes AccessData AD Enterprise 6.5.1 Release Notes Document Date: 07/30/2018 2018 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues

More information

Computer Hacking Forensic Investigator. Module X Data Acquisition and Duplication

Computer Hacking Forensic Investigator. Module X Data Acquisition and Duplication Computer Hacking Forensic Investigator Module X Data Acquisition and Duplication Scenario Allen a forensic investigator was hired by a bank to investigate employee fraud. The bank has four 30 GB machines

More information

Windows Forensics Advanced

Windows Forensics Advanced Windows Forensics Advanced Index: CF102 Description Windows Forensics - Advanced is the next step for forensics specialists, diving deeper into diverse processes on Windows OS serving computer investigators.

More information

Incident Response Data Acquisition Guidelines for Investigation Purposes 1

Incident Response Data Acquisition Guidelines for Investigation Purposes 1 Incident Response Data Acquisition Guidelines for Investigation Purposes 1 1 Target Audience This document is aimed at general IT staff that may be in the position of being required to take action in response

More information

Digital Forensics Lecture 02- Disk Forensics

Digital Forensics Lecture 02- Disk Forensics Digital Forensics Lecture 02- Disk Forensics Hard Disk Data Acquisition Akbar S. Namin Texas Tech University Spring 2017 Analysis of data found on a storage device It is more common to do dead analysis

More information

CIS Project 1 February 13, 2017 Jerad Godsave

CIS Project 1 February 13, 2017 Jerad Godsave CIS 484-75-4172 Project 1 February 13, 2017 Jerad Godsave Part 1) a) Below are a few screenshots indicating verification that the original evidence and the newly created.e01 forensic image match: Part

More information

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak CSN08101 Digital Forensics Lecture 6: Acquisition Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Objectives Storage Formats Acquisition Architecture Acquisition Methods Tools Data Acquisition

More information

Source: https://articles.forensicfocus.com/2018/03/02/evidence-acquisition-using-accessdata-ftk-imager/

Source: https://articles.forensicfocus.com/2018/03/02/evidence-acquisition-using-accessdata-ftk-imager/ by Chirath De Alwis Source: https://articles.forensicfocus.com/2018/03/02/evidence-acquisition-using-accessdata-ftk-imager/ Forensic Toolkit or FTK is a computer forensics software product made by AccessData.

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 11 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

Introduction to Volume Analysis, Part I: Foundations, The Sleuth Kit and Autopsy. Digital Forensics Course* Leonardo A. Martucci *based on the book:

Introduction to Volume Analysis, Part I: Foundations, The Sleuth Kit and Autopsy. Digital Forensics Course* Leonardo A. Martucci *based on the book: Part I: Foundations, Introduction to Volume Analysis, The Sleuth Kit and Autopsy Course* Leonardo A. Martucci *based on the book: File System Forensic Analysis by Brian Carrier LAM 2007 1/12h Outline Part

More information

AccessData Imager Release Notes

AccessData Imager Release Notes AccessData Imager 3.4.0.5 Document Date: 10/27/2015 2015 AccessData Group, Inc. All rights reserved. This document lists the changes in the verion of AccessData Imager. All known issues published with

More information

Digital Forensics Lecture 01- Disk Forensics

Digital Forensics Lecture 01- Disk Forensics Digital Forensics Lecture 01- Disk Forensics An Introduction to Akbar S. Namin Texas Tech University Spring 2017 Digital Investigations and Evidence Investigation of some type of digital device that has

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 10 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

FTK Imager 2.9 Release Notes

FTK Imager 2.9 Release Notes FTK Imager 2.9 Release Notes These release notes apply to AccessData FTK Imager 2.9 IMPORTANT INFORMATION If the machine running imager has an active internet connection and you are viewing HTML from the

More information

AccessData Imager Release Notes

AccessData Imager Release Notes AccessData Imager 3.3.0 Document Date: 12/08/2014 2014 AccessData Group, Inc. All rights reserved. This document lists the changes in AccessData Imager 3.3.0. All known issues published with previous release

More information

Financial CISM. Certified Information Security Manager (CISM) Download Full Version :

Financial CISM. Certified Information Security Manager (CISM) Download Full Version : Financial CISM Certified Information Security Manager (CISM) Download Full Version : http://killexams.com/pass4sure/exam-detail/cism required based on preliminary forensic investigation, but doing so as

More information

Introduction to Computer Forensics

Introduction to Computer Forensics Introduction to Computer Forensics Subrahmani Babu Scientist- C, Computer Forensic Laboratory Indian Computer Emergency Response Team (CERT-In) Department of Information Technology, Govt of India. babu_sivakami@cert-in.org.in

More information

AccessData Imager Release Notes

AccessData Imager Release Notes AccessData Imager 3.4.0 Document Date: 4/08/2015 2015 AccessData Group, Inc. All rights reserved. This document lists the changes in AccessData Imager 3.4.0. All known issues published with previous release

More information

Freeware Live Forensics tools evaluation and operation tips

Freeware Live Forensics tools evaluation and operation tips Edith Cowan University Research Online Australian Digital Forensics Conference Security Research Centre Conferences 2006 Freeware Live Forensics tools evaluation and operation tips Ricci Ieong ewalker

More information

Computer Forensics: Investigating File and Operating Systems, Wireless Networks, and Storage, 2nd Edition. Chapter 5 Windows Forensics II

Computer Forensics: Investigating File and Operating Systems, Wireless Networks, and Storage, 2nd Edition. Chapter 5 Windows Forensics II Computer Forensics: Investigating File and Operating Systems, Wireless Networks, and Storage, 2nd Edition Chapter 5 Windows Forensics II Objectives After completing this chapter, you should be able to:

More information

S23: You Have Been Hacked, But Where s the Evidence? A Quick Intro to Digital Forensics Bill Pankey, Tunitas Group

S23: You Have Been Hacked, But Where s the Evidence? A Quick Intro to Digital Forensics Bill Pankey, Tunitas Group S23: You Have Been Hacked, But Where s the Evidence? A Quick Intro to Digital Forensics Bill Pankey, Tunitas Group You Have Been Hacked, But Where s the Evidence? A Quick Intro to Digital Forensics Bill

More information

AccessData FTK Quick Installation Guide

AccessData FTK Quick Installation Guide AccessData FTK Quick Installation Guide Document date: May 20, 2014 2014 AccessData Group, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system,

More information

User Panel: Forensics & Incident Response It s important to have options! Lance Mueller CISSP, GCIH, GREM, EnCE, CCE, CFCE

User Panel: Forensics & Incident Response It s important to have options! Lance Mueller CISSP, GCIH, GREM, EnCE, CCE, CFCE User Panel: Forensics & Incident Response It s important to have options! Lance Mueller CISSP, GCIH, GREM, EnCE, CCE, CFCE lance@bitsecforensics.com Goals: Discuss some important Incident Response & Forensic

More information

COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) V9

COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) V9 COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) V9 Course Code: 3401 Prepare for the CHFI certification while learning advanced forensics investigation techniques. EC-Council released the most advanced computer

More information

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 2 Understanding Computer Investigations

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition Chapter 2 Understanding Computer Investigations Objectives Explain how to prepare a computer investigation Apply a systematic approach to an

More information

Volatile Data Acquisition & Analysis

Volatile Data Acquisition & Analysis Volatile Data Acquisition & Analysis Villanova University Department of Computing Sciences D. Justin Price Spring 2014 VOLATILE INFORMATION Memory that requires power to maintain data. Exists as Physical

More information

FIRST RESPONDER FORENSICS

FIRST RESPONDER FORENSICS FIRST RESPONDER FORENSICS or Can I Pull the Plug Now? Mick Walsh Special Agent United States Secret Service Miami Electronic Crimes Task Force THE U.S. SECRET SERVICE Created in 1865 at the end of the

More information

SYSTEM SPECIFICATIONS GUIDE

SYSTEM SPECIFICATIONS GUIDE SYSTEM SPECIFICATIONS GUIDE AD Enterprise NETWORK INVESTIGATION AND POST-BREACH ANALYSIS v6.5 Revision (May 8, 2018) www.accessdata.com Contents AccessData Enterprise Overview and System Specifications

More information

AccessData AD Lab Release Notes

AccessData AD Lab Release Notes AccessData AD Lab 6.2.1 Release Notes Document Date: 4/24/2017 2017 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for this

More information

AccessData. Forensic Toolkit. Upgrading, Migrating, and Moving Cases. Version: 5.x

AccessData. Forensic Toolkit. Upgrading, Migrating, and Moving Cases. Version: 5.x AccessData Forensic Toolkit Upgrading, Migrating, and Moving Cases Version: 5.x 1 AccessData Legal and Contact Information Document date: March 27, 2014 Legal Information 2014 AccessData Group, Inc. All

More information

AccessData Forensic Toolkit Release Notes

AccessData Forensic Toolkit Release Notes AccessData Forensic Toolkit 6.2.1 Release Notes Document Date: 4/24/2017 2017 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues

More information

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic

More information

AccessData Triage 2.4 Release Notes

AccessData Triage 2.4 Release Notes AccessData Triage 2.4 Release Notes Document Date: October 25, 2013 2013 AccessData Group, Inc. All rights reserved Introduction These Release Notes cover important information, new features, and fixed

More information

AccessData. Forensic Toolkit. Upgrading, Migrating, and Moving Cases. Version: 5.x

AccessData. Forensic Toolkit. Upgrading, Migrating, and Moving Cases. Version: 5.x AccessData Forensic Toolkit Upgrading, Migrating, and Moving Cases Version: 5.x 1 AccessData Legal and Contact Information Document date: February 11, 2015 Legal Information 2015 AccessData Group, Inc.

More information

AccessData Forensic Toolkit Release Notes

AccessData Forensic Toolkit Release Notes AccessData Forensic Toolkit 5.6.4 Release Notes Document Date: 9/8/2015 2015 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

AccessData AD Lab Release Notes

AccessData AD Lab Release Notes AccessData AD Lab 6.3.1 Release Notes Document Date: 6/27/2018 2018 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for this

More information

AccessData AD Lab 6.3 Release Notes

AccessData AD Lab 6.3 Release Notes AccessData AD Lab 6.3 Release Notes Document Date: 11/07/2017 2017 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for this

More information

Chapter 5 Live Data Collection Windows Systems

Chapter 5 Live Data Collection Windows Systems Chapter 5 Live Data Collection Windows Systems Ed Crowley Spring 10 1 Topics Live Investigation Goals Creating a Response Toolkit Common Tools and Toolkits Preparing the Toolkit Storing Information Obtained

More information

Guide to Computer Forensics. Third Edition. Chapter 11 Chapter 11 Network Forensics

Guide to Computer Forensics. Third Edition. Chapter 11 Chapter 11 Network Forensics Guide to Computer Forensics and Investigations Third Edition Chapter 11 Chapter 11 Network Forensics Objectives Describe the importance of network forensics Explain standard procedures for performing a

More information

AccessData Triage 2.3 Release Notes

AccessData Triage 2.3 Release Notes AccessData Triage 2.3 Release Notes Document Date: August 26, 2013 2013 AccessData Group, Inc. All rights reserved Introduction These Release Notes cover important information, new features, and fixed

More information

10 th National Investigations Symposium

10 th National Investigations Symposium 10 th National Investigations Symposium AVOIDING FORENSIC PITFALLS First Responders Guide to Preserving Electronic Evidence 6 November 2014 Bronwyn Barker Electronic Evidence Specialist Investigation 5

More information

Computer Forensic Capabilities. Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice

Computer Forensic Capabilities. Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice Computer Forensic Capabilities Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice Agenda What is computer forensics? Where to find computer evidence Forensic

More information

Fundamentals of Linux Platform Security

Fundamentals of Linux Platform Security Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Fundamentals of Linux Platform Security Module 11 Introduction to Forensics Overview

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

Notes: Describe the architecture of your product. Please provide also which Database technology is used for case management and evidence management.

Notes: Describe the architecture of your product. Please provide also which Database technology is used for case management and evidence management. EF-1. All protocols used between the different components in the distributed architecture (management server, agents, database, forensic analyst system, etc) shall be encrypted and signed. EF-2. The Enterprise

More information

AccessData Forensic Toolkit 6.2 Release Notes

AccessData Forensic Toolkit 6.2 Release Notes AccessData Forensic Toolkit 6.2 Release Notes Document Date: 4/3/2017 2017 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for

More information

ECCouncil Computer Hacking Forensic Investigator (V8)

ECCouncil Computer Hacking Forensic Investigator (V8) ECCouncil 312-49v8 ECCouncil Computer Hacking Forensic Investigator (V8) Version: 9.0 QUESTION NO: 1 ECCouncil 312-49v8 Exam What is the First Step required in preparing a computer for forensics investigation?

More information

AD Enterprise 6.5 Installation & Upgrade Guide Contents

AD Enterprise 6.5 Installation & Upgrade Guide Contents AD Enterprise 6.5 Installation & Upgrade Guide Contents Preparing to Install AD Enterprise... 3 Supported Operating Systems... 3 Hardware Considerations... 3 Obtaining the Software... 3 New AD Enterprise

More information

AccessData Forensic Toolkit Release Notes

AccessData Forensic Toolkit Release Notes AccessData Forensic Toolkit 5.3.3 Release Notes Document Date: 5/19/2014 2014 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues

More information

Defeating Forensic Analysis

Defeating Forensic Analysis Defeating Forensic Analysis CEIC 2006 Technical Lecture 1 Thursday, May 4 10:30 am to 11:30 am Presented by Vincent Liu and Patrick Stach Welcome Vincent Liu Managing Director, Stach & Liu Researcher,

More information

Exam Number/Code: Exam Name: Computer Hacking. Version: Demo. Forensic Investigator.

Exam Number/Code: Exam Name: Computer Hacking. Version: Demo. Forensic Investigator. Exam Number/Code:312-49 Exam Name: Computer Hacking Forensic Investigator Version: Demo http://www.it-exams.com QUESTION NO: 1 When an investigator contacts by telephone the domain administrator or controller

More information

Forensic Analysis of ios Device Backups

Forensic Analysis of ios Device Backups Forensic Analysis of ios Device Backups ios Apple s mobile operating system Originally known as iphone OS Unveiled in 2007 Current version is 8.3, released April 8, 2015 ios Runs on: iphone ipod Touch

More information

TomTom GPS Device Forensics

TomTom GPS Device Forensics TomTom GPS Device Forensics Written by Ben LeMere & Andy Sayers For more information visit GPSForensics.org blemere@gpsforensics.org asayers@gpsforensics.org Introduction: The sales of portable navigation

More information

Microsoft. TS Windows 7,Configuring.

Microsoft. TS Windows 7,Configuring. 70-680 Microsoft TS Windows 7,Configuring http://www.pass4sureofficial.com Dumpspdf.com is a reputable IT certification examination guide, study guides and audio exam provider, we not only ensure that

More information

LabSim Mapping Matrix

LabSim Mapping Matrix LabSim Mapping Matrix A+ Guide to Hardware Managing, Maintaining, and Troubleshooting Fourth Edition (220-601) Mapping: LabSim to Chapters LabSim Chapter Reference / 1.0 Computing Overview 1.1 Using the

More information

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday Contact Information Contact Center Operating Hours Contact Monday through Thursday Friday Phone: 1.801.796.0944 8 AM 5 PM Eastern Time 8 AM 3 PM Eastern Time Online chat: http://support.paraben.com 10

More information

Travel Lite ( 旅 ) USER MANUAL. 2.5 SATA to USB EXTERNAL ENCLOSURE

Travel Lite ( 旅 ) USER MANUAL. 2.5 SATA to USB EXTERNAL ENCLOSURE Travel Lite ( 旅 ) USER MANUAL 2.5 SATA to USB EXTERNAL ENCLOSURE Hardware Installation Guide HDD Formatting Guide Please NOTE: In order to enable HOT-SWAP function, please check to make sure the motherboard

More information

AccessData ediscovery 6.3 and Patches Release Notes

AccessData ediscovery 6.3 and Patches Release Notes AccessData ediscovery 6.3 and Patches Release Notes Document Date: 5/8/2018 2018 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues

More information

TestOut PC Pro - English 6.0.x COURSE OUTLINE. Modified

TestOut PC Pro - English 6.0.x COURSE OUTLINE. Modified TestOut PC Pro - English 6.0.x COURSE OUTLINE Modified 2019-01-02 TestOut PC Pro Outline - English 6.0.x Videos: 142 (17:10:32) Demonstrations: 144 (17:38:44) Simulations: 117 Fact Sheets: 189 Exams: 132

More information

Memory Analysis. CSF: Forensics Cyber-Security. Part II. Basic Techniques and Tools for Digital Forensics. Fall 2018 Nuno Santos

Memory Analysis. CSF: Forensics Cyber-Security. Part II. Basic Techniques and Tools for Digital Forensics. Fall 2018 Nuno Santos Memory Analysis Part II. Basic Techniques and Tools for Digital Forensics CSF: Forensics Cyber-Security Fall 2018 Nuno Santos Previous classes Files, steganography, watermarking Source of digital evidence

More information

Incident Response Toolkit :

Incident Response Toolkit : Incident Response Toolkit : Initial Incident Response Handling Sunday, August 24, 2003 Balwant Rathore, CISSP Founder, Open Information System Security Group 1 Index Keep the Toolkit CD Handy Sample Toolkit

More information

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

COMPUTER HACKING Forensic Investigator

COMPUTER HACKING Forensic Investigator COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach

More information

SEAhawk and Self Encrypting Drives (SED) Whitepaper

SEAhawk and Self Encrypting Drives (SED) Whitepaper Suite 301, 100 Front Street East, Toronto, Ontario, M5A 1E1 SEAhawk and Self Encrypting Drives (SED) Whitepaper This paper discusses the technology behind Self-Encrypting Drives (SEDs) and how Cryptomill

More information

Forensics for Cybersecurity. Pete Dedes, CCE, GCFA, GCIH

Forensics for Cybersecurity. Pete Dedes, CCE, GCFA, GCIH Forensics for Cybersecurity Pete Dedes, CCE, GCFA, GCIH WHO AM I? Pete Dedes, Forensics Analyst, Sword & Shield Enterprise Security Education Bachelor s of Science Computer Science, University of Tennessee

More information

WipeDrive Home 9. IMPORTANT! PLEASE READ CAREFULLY:... 3 General Information... 3 WipeDrive Overview... 3 System Requirements...

WipeDrive Home 9. IMPORTANT! PLEASE READ CAREFULLY:... 3 General Information... 3 WipeDrive Overview... 3 System Requirements... Table of Contents IMPORTANT! PLEASE READ CAREFULLY:... 3 General Information... 3 WipeDrive... 3 Overview... 3 System Requirements... 3 Key Features... 4 Secure Removal of HPA and DCO... 4 Secure Erase

More information

WHAT S NEW IN SECURITY+ SY0-401?

WHAT S NEW IN SECURITY+ SY0-401? WHAT S NEW IN SECURITY+ SY0-401? PRESENTED BY NETCOM LEARNING PRESENTER BRAD PARKER, MCT WHY SHOULD I TAKE SYO-401? CompTIA has increased the coverage of the Security+ exam Demonstrates a better understanding

More information

ACRONIS TRUE IMAGE 11 HOME REVIEWER S GUIDE

ACRONIS TRUE IMAGE 11 HOME REVIEWER S GUIDE ACRONIS TRUE IMAGE 11 HOME REVIEWER S GUIDE Acronis True Image 11.0 Home provides the maximum flexibility to ensure you are adequately protected and can recover from unforeseen events such as viruses,

More information

AccessData Forensic Toolkit Release Notes

AccessData Forensic Toolkit Release Notes AccessData Forensic Toolkit 5.3.13 Release Notes Document Date: 9/1/2015 2015 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues

More information

The Big Chill. Freezing Data for Analysis

The Big Chill. Freezing Data for Analysis The Big Chill Freezing Data for Analysis The Magic Button Absolute Zero Processes Disks Memory Network Internet... Or, speed yourself up Heisenberg s Principle of System Analysis Real - impossible to know

More information

AccessData Imager Release Notes

AccessData Imager Release Notes AccessData Imager 4.2.0 Document Date: 11/21/2017 2017 AccessData Group, Inc. All rights reserved. This document lists the changes in this release of AccessData Imager. All known issues published with

More information

Macintosh Forensic Survival Course

Macintosh Forensic Survival Course Macintosh Forensic Survival Course Duration: 5 days/level Date: On demand Venue: On demand Language: English Seat availability: On demand (recommended no more than 12) Learning Objectives: Macintosh Forensic

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 7 Fixing Windows Problems

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 7 Fixing Windows Problems : Managing, Maintaining, and Troubleshooting, 5e Chapter 7 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do

More information

AccessData ediscovery 6.3 and Patches Release Notes

AccessData ediscovery 6.3 and Patches Release Notes AccessData ediscovery 6.3 and Patches Release Notes Document Date: 7/18/2018 2018 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues

More information

FairWarning Mapping to PCI DSS 3.0, Requirement 10

FairWarning Mapping to PCI DSS 3.0, Requirement 10 FairWarning Mapping to PCI DSS 3.0, Requirement 10 Requirement 10: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are

More information

Product Questions: 486 Version: 12.0

Product Questions: 486 Version: 12.0 Vendor: Eccouncil Exam Code: 312-49 Exam Name: Computer Hacking Forensic Investigator Exam v9 Version: DEMO Question: 1 Product Questions: 486 Version: 12.0 This organization maintains a database of hash

More information

Forensic Toolkit System Specifications Guide

Forensic Toolkit System Specifications Guide Forensic Toolkit System Specifications Guide February 2012 When it comes to performing effective and timely investigations, we recommend examiners take into consideration the demands the software, and

More information

BIG DATA ANALYTICS IN FORENSIC AUDIT. Presented in Mombasa. Uphold public interest

BIG DATA ANALYTICS IN FORENSIC AUDIT. Presented in Mombasa. Uphold public interest BIG DATA ANALYTICS IN FORENSIC AUDIT Presented in Mombasa Uphold public interest Nasumba Kwatukha Kizito CPA,CIA,CISA,CISI,CRMA,CISM,CISSP,CFE,IIK Internal Audit, Risk and Compliance Strathmore University

More information

Running head: FTK IMAGER 1

Running head: FTK IMAGER 1 Running head: FTK IMAGER 1 FTK Imager Jean-Raymond Ducasse CSOL-590 June 26, 2017 Thomas Plunkett FTK IMAGER 2 FTK Imager Outline Process for Adding Individual Files & Folders as Evidence Items Although

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 12 Troubleshooting Windows and Applications

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 12 Troubleshooting Windows and Applications Chapter 12 Troubleshooting Windows and Applications Objectives Learn about Windows tools to help you when troubleshooting Windows and application problems Learn about general strategies and steps you can

More information

Macrorit Partition Expert 4.3.5

Macrorit Partition Expert 4.3.5 Content Macrorit Partition Expert 4.3.5... 1 User Manual... 1 Welcome... 1 About Macrorit Partition Expert... 1 Main Features... 1 Advanced Features... 1 Tools... 2 Unique Technology... 2 System Requirements:...

More information

Introduction to the File Manager

Introduction to the File Manager EmBootKit User Guide Contents 1. About the File Manager............................................................................................ 2 2. How to start.....................................................................................................

More information

Your Own Virtual Playground. CS 1585 :: Doug McGeehan

Your Own Virtual Playground. CS 1585 :: Doug McGeehan Your Own Virtual Playground CS 1585 :: Doug McGeehan Overview Follow these steps on your personal laptop or home PC. 1. 2. 3. 4. 5. Open this URL in your browser: http://tiny.cc/dsl-vm Download and Install

More information

Dell EMC Isolated Recovery

Dell EMC Isolated Recovery Dell EMC Isolated Recovery Andreas El Maghraby Advisory Systems Engineer DPS @andyem_si GLOBAL SPONSORS Incident Response: Categories of Cybercrime Activity April to June 2016 37% 27% 12% 9% 7% 7% 5% 2

More information

Digital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma

Digital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma Digital Forensics at a University Calvin Weeks Director, University of Oklahoma Calvin Weeks Director, Former Director of IT Security Certified EnCASE Examiner (EnCE) VP of the local chapter of HTCIA Co-Chair

More information

Using SimplySecure to Deploy, Enforce & Manage BitLocker

Using SimplySecure to Deploy, Enforce & Manage BitLocker Whitepaper Using SimplySecure to Deploy, Enforce & Manage BitLocker Organizational management plus access control managed through the cloud Rob Weber February 2019 What is BitLocker? Microsoft s BitLocker

More information

Windows Memory Analysis. Jesse Kornblum

Windows Memory Analysis. Jesse Kornblum C Y B E R S E C T O R Windows Memory Analysis Jesse Kornblum Why Memory Analysis Windows without Windows Gathering Information Parsing the Processes The Rootkit Paradox Address Translation Recovering Executables

More information

An Introduction to Incident Detection and Response Memory Forensic Analysis

An Introduction to Incident Detection and Response Memory Forensic Analysis An Introduction to Incident Detection and Response Memory Forensic Analysis Alexandre Dulaunoy - TLP:WHITE a@foo.be February 11, 2016 An overview to incident response Detection Analysis Containment Investigation

More information

CSE 4482 Computer Security Management: Assessment and Forensics. Computer Forensics: Working with Windows and DOS Systems

CSE 4482 Computer Security Management: Assessment and Forensics. Computer Forensics: Working with Windows and DOS Systems CSE 4482 Computer Security Management: Assessment and Forensics Computer Forensics: Working with Windows and DOS Systems Instructor: N. Vlajic,, Fall 2010 Required reading: Guide to Computer Forensics

More information

Scientific Working Group on Digital Evidence

Scientific Working Group on Digital Evidence Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail before or contemporaneous to the introduction of this document, or

More information

Introduction Disks RAID Tertiary storage. Mass Storage. CMSC 420, York College. November 21, 2006

Introduction Disks RAID Tertiary storage. Mass Storage. CMSC 420, York College. November 21, 2006 November 21, 2006 The memory hierarchy Red = Level Access time Capacity Features Registers nanoseconds 100s of bytes fixed Cache nanoseconds 1-2 MB fixed RAM nanoseconds MBs to GBs expandable Disk milliseconds

More information

Forensic Analysis. The Treachery of Images. Alexandre Dulaunoy. February 5, Forensic Analysis Bibliography Use case Q and A

Forensic Analysis. The Treachery of Images. Alexandre Dulaunoy. February 5, Forensic Analysis Bibliography Use case Q and A Bibliography Use case Q and A The Treachery of Images February 5, 2016 Bibliography Use case Q and A Introduction Disclaimer Images ( The Treachery of Images ) (1928) Rene Magritte La Trahison des Bibliography

More information