background preloader

Forensics

Facebook Twitter

CAINE LiveUSB. CAINE LiveUSB guide What you need:- This guide works only for 1.5 version of CAINE Live CD, because the Caine 2.0 is patched!

CAINE LiveUSB

So you have to download NBCaine.- A USB stick (at least 2GB) Start CAINE from cd-rom, select the graphics mode, insert the usb stick, then start a shell and run the command liveusb.Through the screen that appears, choose any option you want and at the end press the button "Start" to start the installation on the USB.After the installation, DO NOT re-boot the system, but disconnect and re-connect the usb stick, open a shell and mount in read/write mode the first partition of the key. Supporting the professional computer security industry.

Download FCCU GNU/Linux Forensic Boot CD 12.1 for Linux - FCCU GNU/Linux Forensic Bootable CD is a bootable CD based on KNOPPIX. FCCU GNU/Linux Forensic Bootable CD is a bootable CD based on KNOPPIX that contains a lot of tools suitable for computer forensic investigatins, including bash scripts.

Download FCCU GNU/Linux Forensic Boot CD 12.1 for Linux - FCCU GNU/Linux Forensic Bootable CD is a bootable CD based on KNOPPIX

FCCU GNU/Linux Forensic Boot CD's main purpose is to create images of devices prior to analysis, and it is used by the Belgian Federal Computer Crime Unit. Forensic Memory Capture roundup. Due to the recent rounds of troubleshooting, the posts lately haven’t been the meaty material I’ve been setting aside.

Forensic Memory Capture roundup

I’ve got a massive “new & improved” round-up linkfest bursting at the seams. Then there is some WinPE 3.0 & DISM notes. Some stuff acquired by dear friend TinyApps.Org Blog regarding Read-Only Honoring of USB media. Create a mysql database, tables and insert data. How do I create a MySQL database, tables, and insert (store) data into newly created tables?

Create a mysql database, tables and insert data

MySQL is a free and open source database management system. You need to use sql commands to create database. You also need to login as mysql root user account. To create a database and set up tables for the same use the following sql commands: CREATE DATABASE - create the database. Login as the mysql root user to create database: $ mysql -u root -p Sample outputs: mysql> The Acquisition and Analysis of Random Access Memory - Journal of Digital Forensic Practice. To create a MySQL database and set privileges to a user. MySQL is a widely spread SQL database management system mainly used on LAMP (Linux/Apache/MySQL/PHP) projects.

To create a MySQL database and set privileges to a user

In order to be able to use a database, one needs to create: a new database, give access permission to the database server to a database user and finally grant all right to that specific database to this user. Tools:Memory Imaging. The physical memory of computers can be imaged and analyzed using a variety of tools.

Tools:Memory Imaging

Because the procedure for accessing physical memory varies between operating systems, these tools are listed by operating system. Once memory has been imaged, it is subjected to memory analysis to ascertain the state of the system, extract artifacts, and so on. One of the most vexing problems for memory imaging is verifying that the image has been created correctly. That is, verifying that it reflects the actual contents of memory at the time of its creation. Side notes: "FIRST 2009 Conference" - Computer Forensic Blog. The Forum of Incident Response and Security Teams (FIRST) is going to held its annual conference from June 28 to July 3, 2009 in Kyoto, Japan.

Side notes: "FIRST 2009 Conference" - Computer Forensic Blog

Registration is now open to the interested public. I'm exited to announce that my half-day tutorial Windows Memory Forensics with Volatility was accepted! From the abstract: The analysis of main memory can provide valuable help in incident response and forensic investigations. One of the most promising tools in this field is the Volatility framework.

Memory analysis: "PTFinder for Windows Vista" - Computer Forensic Blog. Forensic.seccure. Memory Collection and Analysis Tools. Time stamp service prices. Non-profit organizations that are performing public domain research can use the service at 30 cents (USD $0.30) per timestamp.

Time stamp service prices

DigiStamp's founders are scientists themselves. Volume users of the service Volume discounts begin if you use 1000 timestamps in a year, or about 85 timestamps per month. Trusted timestamping. Trusted timestamping is the process of securely keeping track of the creation and modification time of a document.

Trusted timestamping

Security here means that no one — not even the owner of the document — should be able to change it once it has been recorded provided that the timestamper's integrity is never compromised. The administrative aspect involves setting up a publicly available, trusted timestamp management infrastructure to collect, process and renew timestamps. History[edit] The idea of timestamping information is actually centuries old.

For example, when Robert Hooke discovered Hooke's law in 1660, he did not want to publish it yet, but wanted to be able to claim priority. Classification[edit] Computer Forensics: The Complete Documentation. CSM IT Team Wins Digital Forensics Competition - Southern Maryland News, Charles County, Calvert County and St. Mary's County News. Printer friendly ShareThis The College of Southern Maryland forensics team is presented with the Annual Digital Forensics Competition first place award by Johns Hopkins University Director of Technology Programs John Baker, Sr., far right.

CSM IT Team Wins Digital Forensics Competition - Southern Maryland News, Charles County, Calvert County and St. Mary's County News

From left, CSM Business and Technology Chair and Professor Jeff Tjiputra, CSM students Ed Sealing of Indian Head and David Shelnutt of Waldorf, CSM Faculty Advisor Rob Murphy and CSM student Michael Gargano of Hughesville. Information technology students at the College of Southern Maryland tested their cyber security skills at the Johns Hopkins University’s Annual Digital Forensics Competition recently and came out on top. REMnux: A Linux Distribution for Reverse-Engineering Malware. REMnux is a lightweight Linux distribution for assisting malware analysts with reverse-engineering malicious software. The distribution is based on Ubuntu and is maintained by Lenny Zeltser. On this page you will find: About REMnux REMnux incorporates a number of tools for analyzing malicious executables that run on Microsoft Windows, as well as browser-based malware, such as Flash programs and obfuscated JavaScript.

This popular toolkit includes programs for analyzing malicious documents, such PDF files, and utilities for reverse-engineering malware through memory forensics. Cannot power on a virtual machine because the virtual disk cannot be opened. File extension VMDK details - VMDK files How To (by File Extension Seeker) Recreating vmdk descriptor files for a. View topic - recreate descriptor for *-flat.vmdk. Carving malware from live memory - Dissecting The Hack. Introduction After spending some time in our laboratory, experimenting with some ruby scripts for the metasploit framework, I conducted a small experiment. I was wondering what if I could carve files out of memory-dump files ?! It could be possible to carve out portable executables/malware as well. This write-up demonstrates what I did. How to get malware Getting infected with malware these days is simple. As easy as this is, collecting malware for further analysis in a laboratory environment requires some other type of machine.

Collecting malware, trojans, irc-bots, worms and other type nasties to study their behavior in a safe and controlled environment requires computer systems called honeypots. File recovery / data carving. PhotoRec Data Carving. Data carving is the process of extracting a collection of data from a larger data set. Data carving techniques frequently occur during a digital investigation when the unallocated file system space is analyzed to extract files. The files are "carved" from the unallocated space using file type specific header and footer values. File system structures are not used during the process. File Carving: Recover Data From Hard Drive, USB and CD-ROM. Recover Deleted Files with Foremost,scalpel in Ubuntu  Digital Forensics & eDiscovery in Anticipation of Litigation. Introduction to Network Forensics « Computer Forensics Analysis and Training Center, Inc. ChRiStIaAn008's Channel. Dealing with Split Raw Images in Digital Forensics.