Security Basics mailing list archives
RE: images for computer forensics?
From: "Murda Mcloud" <murdamcloud () bigpond com>
Date: Tue, 27 Feb 2007 08:35:26 +1000
Like people told me when I asked this-buy secondhand disks from ebay and go crazeee! You will be amazed... Also, here in Oz the council do a hard rubbish removal service once a year. You leave your rubbish on the kerb and they collect it-or other people scavenge. Scavenge and get your friends round to marvel at what info you can rebuild from 'deleted' files. Or even wide open files. The process for recovering files/logs etc is the same as if it were a 'crime scene'. Like Ansgar said, nobody is going to want to open up their confidential case data to the world. -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Ansgar -59cobalt- Wiechers Sent: Tuesday, February 27, 2007 2:31 AM To: security-basics () securityfocus com Subject: Re: images for computer forensics? On 2007-02-26 Zhihao wrote:
Hi list, was wondering if anyone knows of any online resources I can visit that has got real life case studies of cybercrime and actually has got the disk image of the server that was hacked? or even a disk image of a system that was used to compromise a server? Went over to honeynet.org and they do have an image of a purposely hacked redhat 6.2 but I will prefer a resource that will have actual disk images from a crime scene.
I sure hope that nothing like that exists and will ever exist, because these images will most likely contain confidential, maybe even personal data. Regards Ansgar Wiechers -- "All vulnerabilities deserve a public fear period prior to patches becoming available." --Jason Coombs on Bugtraq --------------------------------------------------------------------------- This list is sponsored by: BigFix If your IT fails, you're out of business - or worse. Arm your enterprise with BigFix, the single converged IT security and operations engine. BigFix enables continuous discovery, assessment, remediation, and enforcement for complex and distributed IT environments in real-time from a single console. Think what's next. Think BigFix. http://ad.doubleclick.net/clk;82309979;15562032;o?http://www.bigfix.com/ITNe xt/ --------------------------------------------------------------------------- --------------------------------------------------------------------------- This list is sponsored by: BigFix If your IT fails, you're out of business - or worse. Arm your enterprise with BigFix, the single converged IT security and operations engine. BigFix enables continuous discovery, assessment, remediation, and enforcement for complex and distributed IT environments in real-time from a single console. Think what's next. Think BigFix. http://ad.doubleclick.net/clk;82309979;15562032;o?http://www.bigfix.com/ITNext/ ---------------------------------------------------------------------------
Current thread:
- images for computer forensics? Zhihao (Feb 26)
- Re: images for computer forensics? Ansgar -59cobalt- Wiechers (Feb 26)
- RE: images for computer forensics? Corey Watts-Jones (Feb 26)
- RE: images for computer forensics? Murda Mcloud (Feb 26)
- Re: images for computer forensics? Jeromey Hannel (Feb 27)
- Re: images for computer forensics? Pablo Sanz Mercado (Feb 27)
- Re: images for computer forensics? Ansgar -59cobalt- Wiechers (Feb 26)