Preface |
|
xv | |
Acknowledgments |
|
xix | |
About the Authors |
|
xxi | |
Case Studies |
|
xxv | |
|
Part I Live Incident Response |
|
|
1 | (72) |
|
|
3 | (44) |
|
|
5 | (24) |
|
|
6 | (1) |
|
Current Network Connections |
|
|
6 | (3) |
|
|
9 | (1) |
|
Executables Opening TCP or UDP Ports |
|
|
10 | (2) |
|
Cached NetBIOS Name Tables |
|
|
12 | (1) |
|
Users Currently Logged On |
|
|
13 | (1) |
|
The Internal Routing Table |
|
|
14 | (1) |
|
|
15 | (2) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (6) |
|
|
26 | (3) |
|
Analyzing Nonvolatile Data |
|
|
29 | (14) |
|
System Version and Patch Level |
|
|
30 | (1) |
|
File System Time and Date Stamps |
|
|
31 | (4) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (4) |
|
|
42 | (1) |
|
|
43 | (4) |
|
|
47 | (26) |
|
|
48 | (10) |
|
|
49 | (1) |
|
Current Network Connections |
|
|
49 | (1) |
|
|
50 | (1) |
|
Executables Opening TCP or UDP Ports |
|
|
51 | (2) |
|
|
53 | (2) |
|
|
55 | (1) |
|
The Internal Routing Table |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
Analyzing Nonvolatile Data |
|
|
58 | (12) |
|
System Version and Patch Level |
|
|
58 | (1) |
|
File System Time and Date Stamps |
|
|
59 | (2) |
|
File System MD5 Checksum Values |
|
|
61 | (1) |
|
Users Currently Logged On |
|
|
62 | (1) |
|
|
62 | (2) |
|
|
64 | (2) |
|
|
66 | (1) |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
70 | (3) |
|
Part II Network-Based Forensics |
|
|
73 | (88) |
|
Collecting Network-Based Evidence |
|
|
75 | (20) |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
A Standard Intrusion Scenario |
|
|
82 | (2) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (5) |
|
|
88 | (3) |
|
Collecting and Storing Traffic |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (2) |
|
Analyzing Network-Based Evidence for a Windows Intrusion |
|
|
95 | (34) |
|
Statistical Data: First Trace |
|
|
96 | (1) |
|
|
97 | (5) |
|
Session Data: First Trace |
|
|
102 | (4) |
|
Full Content Data: First Trace |
|
|
106 | (2) |
|
Statistical Data: Second Trace |
|
|
108 | (2) |
|
|
110 | (4) |
|
Session Data: Second Trace |
|
|
114 | (2) |
|
Full Content Data: Second Trace |
|
|
116 | (11) |
|
|
127 | (2) |
|
Analyzing Network-Based Evidence for a Unix Intrusion |
|
|
129 | (32) |
|
|
130 | (1) |
|
|
131 | (4) |
|
|
135 | (5) |
|
|
140 | (19) |
|
|
159 | (2) |
|
Part III Acquiring a Forensic Duplication |
|
|
161 | (44) |
|
Before You Jump Right In. . . |
|
|
163 | (8) |
|
Preparing for a Forensic Duplication |
|
|
163 | (3) |
|
Document, Document, Document |
|
|
166 | (5) |
|
Commercial-Based Forensic Duplications |
|
|
171 | (16) |
|
The Read-Only IDE-to-Firewire Device |
|
|
171 | (4) |
|
Acquiring a Forensic Duplication with EnCase |
|
|
175 | (6) |
|
Acquiring a Forensic Duplication with FTK |
|
|
181 | (6) |
|
Noncommercial-Based Forensic Duplications |
|
|
187 | (18) |
|
|
187 | (6) |
|
Creating an Evidence File |
|
|
188 | (4) |
|
Creating an Evidence Hard Drive |
|
|
192 | (1) |
|
|
193 | (2) |
|
|
195 | (2) |
|
NED---The Open Source Network Evidence Duplicator |
|
|
197 | (8) |
|
Part IV Forensic Analysis Techniques |
|
|
205 | (276) |
|
Common Forensic Analysis Techniques |
|
|
207 | (40) |
|
|
207 | (11) |
|
|
207 | (7) |
|
|
214 | (4) |
|
Production of Time Stamps and Other Metadata for Files |
|
|
218 | (7) |
|
|
218 | (3) |
|
|
221 | (4) |
|
|
225 | (8) |
|
|
225 | (5) |
|
|
230 | (3) |
|
File Signatures and Electronic Discovery |
|
|
233 | (5) |
|
|
233 | (3) |
|
|
236 | (2) |
|
String Searching and File Fragments |
|
|
238 | (9) |
|
|
238 | (6) |
|
|
244 | (3) |
|
Web Browsing Activity Reconstruction |
|
|
247 | (26) |
|
Commercial Forensic Tools |
|
|
248 | (12) |
|
|
260 | (11) |
|
Pasco---An Open Source Web Browsing Investigation Tool |
|
|
260 | (8) |
|
Galleta---An Open Source IE Cookie Investigation Tool |
|
|
268 | (3) |
|
|
271 | (2) |
|
E-Mail Activity Reconstruction |
|
|
273 | (18) |
|
Commercial Forensic Tools |
|
|
273 | (2) |
|
|
275 | (16) |
|
|
275 | (16) |
|
Microsoft Windows Registry Reconstruction |
|
|
291 | (10) |
|
Identifying Installed Programs |
|
|
292 | (4) |
|
Identifying ``Most Recently Used'' Documents |
|
|
296 | (5) |
|
Forensic Tool Analysis: An Introduction to Using Linux for Analyzing Files of Unknown Origin |
|
|
301 | (45) |
|
|
302 | (1) |
|
A Hands-On Introduction to Forensic Tool Analysis: Hello World! |
|
|
303 | (40) |
|
|
305 | (30) |
|
Dynamic Analysis of Hello |
|
|
335 | (8) |
|
|
343 | (3) |
|
Forensic Tool Analysis: A Hands-On Analysis of the Linux File aio |
|
|
346 | (63) |
|
|
346 | (7) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
350 | (2) |
|
|
352 | (1) |
|
|
353 | (55) |
|
System Call Trace (strace) |
|
|
353 | (5) |
|
|
358 | (6) |
|
Recovering the Uncompressed aio Binary |
|
|
364 | (10) |
|
Recovery by Identifying the Packer That Was Used |
|
|
374 | (3) |
|
Static Analysis of the Recovered Uncompressed Binary |
|
|
377 | (20) |
|
Dynamic Analysis of the Recovered Uncompressed Binary |
|
|
397 | (11) |
|
|
408 | (1) |
|
|
408 | (1) |
|
Forensic Tool Analysis: Analyzing Files of Unknown Origin (Windows) |
|
|
409 | (72) |
|
|
409 | (1) |
|
A Hands-On Introduction to Forensic Tool Analysis: Hello World! |
|
|
410 | (34) |
|
Static Analysis of hello.exe |
|
|
415 | (23) |
|
Dynamic Analysis of hello.exe |
|
|
438 | (6) |
|
|
444 | (1) |
|
A Hands-On Forensic Tool Analysis: sak.exe |
|
|
444 | (35) |
|
Static Analysis of sak.exe |
|
|
444 | (13) |
|
Dynamic Analysis of sak.exe |
|
|
457 | (22) |
|
|
479 | (2) |
|
Part V Creating a Complete Forensic Tool Kit |
|
|
481 | (32) |
|
Building the Ultimate Response CD |
|
|
483 | (20) |
|
Preparing the Windows Live Response Tools |
|
|
483 | (9) |
|
Preparing the Unix Live Response Tools |
|
|
492 | (8) |
|
Forensic Duplication Tools |
|
|
500 | (3) |
|
|
501 | (1) |
|
|
502 | (1) |
|
Making Your CD-ROM a Bootable Environment |
|
|
503 | (10) |
|
Knoppix---A Linux Distribution on a CD-ROM |
|
|
503 | (1) |
|
|
504 | (9) |
|
Part VI Mobile Device Forensics |
|
|
513 | (82) |
|
Forensic Duplication and Analysis of Personal Digital Assistants |
|
|
515 | (56) |
|
|
515 | (2) |
|
Forensic Acquisition Utilizing EnCase |
|
|
517 | (14) |
|
|
518 | (4) |
|
|
522 | (9) |
|
Forensic Acquisition Utilizing Paraben's PDA Seizure |
|
|
531 | (9) |
|
Forensic Acquisition Utilizing Palm Debugger |
|
|
540 | (16) |
|
Forensic Analysis of the Palm IIIc |
|
|
556 | (3) |
|
Forensic Analysis of the HP iPAQ Pocket PC 2003 |
|
|
559 | (4) |
|
Forensic Analysis of the Palm m505 |
|
|
563 | (7) |
|
|
570 | (1) |
|
Forensic Duplication of USB and Compact Flash Memory Devices |
|
|
571 | (6) |
|
|
571 | (4) |
|
Duplicating Compact Flash Cards |
|
|
575 | (2) |
|
Forensic Analysis of USB and Compact Flash Memory Devices |
|
|
577 | (18) |
|
|
577 | (11) |
|
|
578 | (7) |
|
|
585 | (3) |
|
|
588 | (7) |
|
|
589 | (4) |
|
|
593 | (2) |
|
Part VII Online-Based Forensics |
|
|
595 | (30) |
|
|
597 | (12) |
|
|
597 | (3) |
|
|
600 | (1) |
|
|
601 | (2) |
|
|
603 | (2) |
|
|
605 | (4) |
|
|
609 | (16) |
|
Importing the TLD Zone Files into Postgres |
|
|
610 | (6) |
|
Translating FQDNs to IP Addresses |
|
|
616 | (3) |
|
|
619 | (1) |
|
|
620 | (5) |
|
Appendix An Introduction to Perl |
|
|
625 | (12) |
|
|
625 | (3) |
|
|
628 | (1) |
|
|
629 | (3) |
|
|
632 | (2) |
|
Processing Live IR Data Collected |
|
|
634 | (1) |
|
The Data Problem with Microsoft Excel |
|
|
635 | (2) |
Index |
|
637 | |