|
Forensics
P2V - Live Forensics Feb 15 2011 03:13PM solefarmer gmail com (10 replies) Re: P2V - Live Forensics Feb 22 2011 10:18AM Dave Howe (DaveHowe pentest googlemail com) (1 replies) Re: P2V - Live Forensics Feb 28 2011 04:59PM Paul Schmehl (pschmehl_lists tx rr com) (1 replies) Re: P2V - Live Forensics Feb 17 2011 11:01PM William Warren (hescominsoon emmanuelcomputerconsulting com) |
|
Privacy Statement |
> DD on a live system, using netcat (both exist for windows), will allow you to
> image to a separate system over the network.
Been there, done that, but only on machines I controlled enough to be assured
it was essentially a quiesced system, and not in a forensics mode. What are
people doing to deal with filesystem skew caused by activity during the hour or
two it can take to image over the network? It's one thing to lose a few 'last
accessed' times on files that were touched after they were copied, it's
something else when the resulting filesystem won't even fsck or chkdisk
properly because something major changed during the imaging.
This is particularly important if you're trying to be stealthy and image a
system that's being used - even innocent actions like renaming folders can
cause issues with the resulting image.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQFNaE6ucC3lWbTT17ARAm0OAJ9Jt+sY+uUEhs7Rb/f9lpPV8gudUQCgksV+
hXguDOPRwBU4ylDpYJci6rQ=
=9II+
-----END PGP SIGNATURE-----
[ reply ]