|
Forensics
P2V - Live Forensics Feb 15 2011 03:13PM solefarmer gmail com (10 replies) Re: P2V - Live Forensics Feb 22 2011 10:18AM Dave Howe (DaveHowe pentest googlemail com) (1 replies) Re: P2V - Live Forensics Feb 28 2011 04:59PM Paul Schmehl (pschmehl_lists tx rr com) (1 replies) Re: P2V - Live Forensics Feb 19 2011 10:46AM quark quark (quark maillist gmail com) (1 replies) Re: P2V - Live Forensics Feb 17 2011 11:01PM William Warren (hescominsoon emmanuelcomputerconsulting com) |
|
Privacy Statement |
to remain in "stealth mode".
Most of the mainstream tools can tell you exactly what is changed in the
registry, etc. when the agent is deployed.
Depending on budget and what you may or may not already have, I would
recommend the following:
F-Response (agent only solution) and FTK imager
F-Response and EnCase or FTK
FTK (allows remote collections)
Good Luck.
-----Original Message-----
From: listbounce (at) securityfocus (dot) com [email concealed] [mailto:listbounce (at) securityfocus (dot) com [email concealed]] On
Behalf Of solefarmer (at) gmail (dot) com [email concealed]
Sent: Tuesday, February 15, 2011 9:14 AM
To: forensics (at) securityfocus (dot) com [email concealed]
Subject: P2V - Live Forensics
Ladies, Gentlemen, and otherwise:
I have a situation whereby I need to obtain an image of an individual's
laptop suitable for potential prosecution in a US court; however, I only
have a limited window in which to grab the image, and was looking for
alternatives in order to not "spook" the poor guy or his co-workers who
would no doubt tell him about me, as I go into his office and randomly image
his drive!
I thought about using P2V (Physical to Virtual), but realize that such
software does make some steps to alter the system and thus may have court
challenges. Is there possibility such could be explained in court, or
perhaps md5 hash of his files(not the disk image) taken while online and
then compared to a virtual image of sorts.
Please advise, and I'm thinking of sending the winning submission a beer or
two or some other minor token of appreciation.
-----------------------------------------------------------------
Certify Software Integrity - thawte Code Signing Certificates
This guide will show you how Code Signing Certificates are used to secure
code that can be downloaded from the Internet. You will also learn how these
certificates operate with different software platforms.
http://www.dinclinx.com/Redirect.aspx?36;5000;25;1371;0;2;946;005be7f5c8
72ea
1f
-----------------------------------------------------------------
Certify Software Integrity - thawte Code Signing Certificates
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
http://www.dinclinx.com/Redirect.aspx?36;5000;25;1371;0;2;946;005be7f5c8
72ea1f
[ reply ]