|
Forensics
P2V - Live Forensics Feb 15 2011 03:13PM solefarmer gmail com (10 replies) Re: P2V - Live Forensics Feb 22 2011 10:18AM Dave Howe (DaveHowe pentest googlemail com) (1 replies) Re: P2V - Live Forensics Feb 19 2011 10:46AM quark quark (quark maillist gmail com) (1 replies) Re: P2V - Live Forensics Feb 17 2011 11:01PM William Warren (hescominsoon emmanuelcomputerconsulting com) |
|
Privacy Statement |
<DaveHowe.pentest (at) googlemail (dot) com [email concealed]> wrote:
> On 15/02/2011 15:13, solefarmer (at) gmail (dot) com [email concealed] wrote:
>> Ladies, Gentlemen, and otherwise:
>>
>> I have a situation whereby I need to obtain an image of an individual's
>> laptop suitable for potential prosecution in a US court; however, I only
>> have a limited window in which to grab the image, and was looking for
>> alternatives in order to not "spook" the poor guy or his co-workers who
>> would no doubt tell him about me, as I go into his office and randomly
>> image his drive!
>
> Here's one I have done in the past.
> Use psexec, mapped drives, whatever to gain access to the machine while
> running. rename ntldr to something else - next time the machine shuts
> down, it won't come up again.
>
> User screams, brings in machine for maint
>
Very clever, but it will cause you problems in court. You altered the
drive before you removed it. Can you prove you didn't alter anything else?
If not, your image isn't forensically sound and won't hold up in court.
To obtain a forensically sound image, you need to capture the drive, either
physically or over the network, without making any changes to it. You also
need to be able to prove that the image is identical to the drive you
captured, which means the md5 sum checks out and the image needs to be
read-only
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
*******************************************
"It is as useless to argue with those who have
renounced the use of reason as to administer
medication to the dead." Thomas Jefferson
"There are some ideas so wrong that only a very
intelligent person could believe in them." George Orwell
-----------------------------------------------------------------
Certify Software Integrity - thawte Code Signing Certificates
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
http://www.dinclinx.com/Redirect.aspx?36;5000;25;1371;0;2;946;005be7f5c8
72ea1f
[ reply ]