Chapter 4 DF
Chapter 4 DF
Netcat is a widely used tool to transfer the data from target system to
remote forensic workstations.
Live Data Collection
4.1 Introduction
4.2 Facts in Criminal Moving of Data Using Netcat
Case Netcat is a freely available tool that can
4.3 People Involved in be used to establish a communication
Data Collection channel between hosts.
Techniques There are two practices promoted by
4.4 Live Data this technique:
Collection 1. It helps to quickly get on and off the
target system.
4.5 Live Data collection 2. It also provides offline feature of
from UniX system reviewing the information which
was previously attained.
We need to initialize a Netcat listener on the forensic work station. We also need
to redirect all the incoming data. Figure 4.2 shows the incoming connection on
port 2222. The file called pslist will contain all the information received on the
port 2222. The output to the response command is provided to the forensic
workstations by using Netcat on the target system. Figure 4.3 runs the command
for pslist, by sending the output to the forensic workstation with the IP address
192.168.0.20.
4.1 Introduction Live Data Collection
4.2 Facts in Criminal
Case
4.3 People Involved in • Obtaining Volatile Data
Data Collection
Techniques We collect the following temporal/volatile data before forensic
4.4 Live Data duplication:
Collection 1. The date and the time of the system.
2. List of users that are currently logged on.
4.5 Live Data collection
3. Entire file system’s time and date stamp.
from UniX system 4. List of processes that are currently running.
5. List of sockets that are open currently.
6. Applications that are listening on the open sockets.
7. List of systems that have current or had recent connections to the
system.
4.1 Introduction Live Data Collection
4.2 Facts in Criminal
• Documenting and Managing the Investigation
Case
4.3 People Involved in For accurate incident response, it is necessary to have technical skills.
Data Collection Practices that are documented and organized are important.
Techniques There are two main reasons for documenting the actions while responding
to the victim system:
4.4 Live Data
1. To protect an organization to which you belong.
Collection 2. . To collect the data that may become evidence against the offender or
4.5 Live Data collection criminal.
from UniX system
An example of this form is illustrated in the following table:
Live Data Collection
4.1 Introduction
4.2 Facts in Criminal
Case • Collecting Temporal Data
4.3 People Involved in Following are the steps used for collecting the data:
Data Collection 1. Run a Trusted cmd.exe
Techniques 2. Recording the system time and date
4.4 Live Data 3. Identify who has logged on to the system and who are the remote
Collection access users.
4.5 Live Data collection 4. Record creation, access time, and all the modifications made to
from UniX system the files
5. Identifying open ports.
6. List of applications that are associated with those ports.
7. List of all running processes.
8. List of current and recent connections.
9. Record date and time of target system.
10. Commands accessed at the time of initial response.
4.1 Introduction Live Data collection from UniX system
4.2 Facts in Criminal
Case
4.3 People Involved in
Collecting the data
Data Collection The following information should be collected:
Techniques 1. Date and time of the system.
4.4 Live Data 2. A list of users who are currently logged on.
Collection 3. Entire file system’s time and date stamps.
4.5 Live Data 4. List of processes that are currently in running state.
collection from UNIX 5. List of currently open socket.
system 6. List of application that is listening to those open ports.
7. List of systems that have current or recent connections to the
system.
4.1 Introduction Live Data collection from UniX system
4.2 Facts in Criminal
Case
4.3 People Involved in For obtaining live data, following steps should be followed:
Data Collection 1. Run a trusted shell.
Techniques 2. Record the time and date of the system.
4.4 Live Data 3. Identify who is currently logged on to the system.
Collection 4. Record creation, alteration, and access time of each file.
4.5 Live Data 5. Identify open ports
collection from UNIX 6. Enlist applications associated with open ports.
system 7. Identify the running processes
8. List the current and recent connections.
9. Record the time of the system.
10.Record the steps taken
11.Record cryptographic checksum.
4.1 Introduction Live Data collection from UniX system
4.2 Facts in Criminal
Case Storing Information Obtained During Initial Response
4.3 People Involved in Most of the UNIX variants place their log files in /var/adm. To know
Data Collection where the logs are stored, you need to be familiar with each variants
Techniques of the UNIX system.
4.4 Live Data
Collection Following shows the binary log files of particular interest:
1. Utmp file accessed with w command.
4.5 Live Data
2. Wtmp file accessed with last utility.
collection from UNIX
3. Last log file accessed with last log utility.
system 4. Process accounting logs accessed with lastcomm utility.