Security Basics mailing list archives
Re: images for computer forensics?
From: Jeromey Hannel <Jeromey.Hannel () wholefoods com>
Date: Mon, 26 Feb 2007 22:05:22 -0600
This is an older one and the answers are posted on the internet but this is a real hack from the honeynet project. Good luck!! http://www.honeynet.org/challenge/index.html On 2/26/07 4:35 PM, "Murda Mcloud" <murdamcloud () bigpond com> wrote:
Like people told me when I asked this-buy secondhand disks from ebay and go crazeee! You will be amazed... Also, here in Oz the council do a hard rubbish removal service once a year. You leave your rubbish on the kerb and they collect it-or other people scavenge. Scavenge and get your friends round to marvel at what info you can rebuild from 'deleted' files. Or even wide open files. The process for recovering files/logs etc is the same as if it were a 'crime scene'. Like Ansgar said, nobody is going to want to open up their confidential case data to the world. -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Ansgar -59cobalt- Wiechers Sent: Tuesday, February 27, 2007 2:31 AM To: security-basics () securityfocus com Subject: Re: images for computer forensics? On 2007-02-26 Zhihao wrote:Hi list, was wondering if anyone knows of any online resources I can visit that has got real life case studies of cybercrime and actually has got the disk image of the server that was hacked? or even a disk image of a system that was used to compromise a server? Went over to honeynet.org and they do have an image of a purposely hacked redhat 6.2 but I will prefer a resource that will have actual disk images from a crime scene.I sure hope that nothing like that exists and will ever exist, because these images will most likely contain confidential, maybe even personal data. Regards Ansgar Wiechers
--------------------------------------------------------------------------- This list is sponsored by: BigFix If your IT fails, you're out of business - or worse. Arm your enterprise with BigFix, the single converged IT security and operations engine. BigFix enables continuous discovery, assessment, remediation, and enforcement for complex and distributed IT environments in real-time from a single console. Think what's next. Think BigFix. http://ad.doubleclick.net/clk;82309979;15562032;o?http://www.bigfix.com/ITNext/ ---------------------------------------------------------------------------
Current thread:
- images for computer forensics? Zhihao (Feb 26)
- Re: images for computer forensics? Ansgar -59cobalt- Wiechers (Feb 26)
- RE: images for computer forensics? Corey Watts-Jones (Feb 26)
- RE: images for computer forensics? Murda Mcloud (Feb 26)
- Re: images for computer forensics? Jeromey Hannel (Feb 27)
- Re: images for computer forensics? Pablo Sanz Mercado (Feb 27)
- Re: images for computer forensics? Ansgar -59cobalt- Wiechers (Feb 26)