On Fri, 15 Sep 2000 [EMAIL PROTECTED] wrote:

> What would people recommend for a Information Security Forensic Toolkit??

grep, dd and mount.

> 
> A software utility that would protect the subject computer system during 
> the forensic examination from any possible alteration, damage, data 
> corruption, or virus introduction.

Pull the drive and mount it read only on a different computer.  Image copy
that to a new drive if you need to fsck the filesystem.

> A software utility that would discovers all files on the subject system. 
> This includes existing normal files, deleted yet remaining files, hidden 
> files, password-protected files, and encrypted files.

"Deleted yet remaining files" is a concept from DOS filesystems, and
doesn't translate well outside of that- remaing disk blocks from old files
is more accurate to modern filesystems.

> Another utility that would  recover all (or as much as possible) of 
> discovered deleted files.

This is filesystem specific.

> A data viewer that would reveal (to the extent possible) the contents of 
> hidden files as well as temporary or swap files used by both the 
> application programs and the operating system.

I typically use grep's regexp-based pattern matching combined with dd's
bit-wise view of the filesystem in question for string-based stuff.  Going
beyond that depends on the filesystem type and data necessary.

> A report utility that would produce number of accesses, etc (if possible 
> and if legally appropriate) the contents of protected or encrypted files.

Encryption used is so much of a differentiator that a common tool seems
less useful than specific per-application utilities and
brute-force/dictionary-based decryption routines to run popular
encryption programs.

> An analysis utility that would analyze all possibly relevant data found in 
> special (and typically inaccessible) areas of a disk. This includes but is 
> not limited to what is called 'unallocated' space on a disk (currently 
> unused, but possibly the repository of previous data that is relevant 
> evidence), as well as 'slack' space in a file (the remnant area at the end 
> of a file, in the last assigned disk cluster, that is unused by current 
> file data, but once again may be a possible site for previously created and 
> relevant evidence).

Once again, that's FS-dependent (ntfs is different than fat32 is different
than ext2...)  Using dd gets around a lot of that.

> A report utility that would prints out an overall analysis in
> some sort of pre-defined format.

I've never needed to produce automated report, as critical things tended
to be either "why we looked at the specific files/disk areas we did, or
"we looked at every darned thing there was." 
 
> If someone was developing this type of tool for the InfoSec community, 
> would this type of tool be of much interest on either the Linux or the 
> Windows platform. (i.e Windows 9x, NT, 2k)

I think Linux would be more useful simply because getting support for
read-only mounting of non-native filesystems is easy - also direct disk
access without a device driver is trivial (as is writing a device driver
if necessary.)

Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to