Digital Investigation

Live Analysis

When the operating system or other resources of the system being investigated is used to find evidence.

  • advantages: get data from RAM of a running process

  • disadvantages: risk of getting false information because the software could maliciously hide or falsify data.

Post-mortem analysis

When trusted applications in a trusted operating system are used to find evidence (lab environment).

  • advantages: fully controlled environment.

  • disadvantages: information from RAM is lost, e. g. key to decrypt a file, ...

A post-mortem analysis is more ideal, but not always possible.

Examples

A server has been compromised, how it occurred and who did it?

  • Find data that were created by events related to the incident recover deleted log entries from the server.

  • Find attack tools.

  • Find the vulnerabilities that existed on the server.

  • Using this data, and more, we develop an hypotheses.

    • Which vulnerability the attacker used to gain access.

    • What he/she did afterwards.

  • Later, examine the firewall configuration and logs.

    • Determine that some of the scenarios in our hypotheses are impossible because that type of network traffic could not have existed.

    • Evidence was found that refutes one or more hypotheses.

Last updated