In this
blog, Sherlock is going solve his first cases by using a concept called live
analysis of a computer
Constable
Clark: Hello
Mr.Sherlock!! We had a case for you.
Sherlock: Hmm!! Go on Clark.
Constable
Clark: A
company XYZ reported a data breach that happens to them, we are trying to solve
this case but we are unable to find any clue we need your help Mr.Sherlock.
Sherlock: Watson!!!
1. I need all the IDS records of the
company
In
Digital forensics analysis plays a major role to get culprits. The major part
of cases is done in IDS record analysis.
2. I want
you to take the details of
Previous
pen-testing audit records and system repair details of the past few months.
Watson: What does an IDS record
consists?
Sherlock: An Intrusion
Detection System (IDS) is a system that monitors network traffic
for suspicious activity and issues alerts when such activity is discovered.
Sherlock: Clark, I want to establish a
connection between victim pc and my pc
The process of establishment of remote connection and investigation of the case
is called Live Analysis
Watson: How you’re going to perform a
live analysis, Was there any tool to perform live analysis.
Sherlock: Yes, there is a tool
called Netcat
What is
Netcat?
Netcat is a simple networking utility
which reads and writes data across a network connection using TCP/IP protocol
Watson: I reached victim place and
now help me to connect to you Sherlock.
Sherlock: Open the system to tell me what
operating system it is.
Watson: It is a Windows operating
system.
Sherlock: Now Open CMD and now enter
ipconfig
So you
can IP Address of the system
Send me
the IP Address
Watson: The IP Address is 10.0.2.4
Meanwhile
in Sherlock System
ifconfig(For
Forensic system IPAddress)
10.0.2.5(Sherlock IP Address) – Forensics
Workstation IP Address
nc -l
4656
Sherlock:
Watson,Type
this command in command prompt
For
example, you downloaded the netcat and it is saved in Downloads
Now in
CMD
Type cd
Downloads
dir
So you
see all the downlods
Now type
nc -l
10.0.2.5(forensic system ip) 4656
Then
after
dir | nc
– 10.0.2.5 4656
Watson: OK,Sherlock. Its done.
Sherlock: Yeah, Got access to the
drive.
This one
of the way to live analysis a system using netcat tools.
Live
analysis uses
running system to obtain volatile data for deeper understanding of events going
on
We need
live analysis because
Live data forensics follows
this aim but is only focused on computer systems that are powered on.
The main purpose is to acquire volatile data that would otherwise get lost if
the computer system is turned off or would be overwritten if
the computer system will stay turned on for a longer period.
The
outcome of the blog is to perform a live analysis on the victim system.
In next
blog will be learning on how capture the RAM and retrieve the data.
To be continued ….
Comments
Post a Comment