Table of Contents for
System Forensics, Investigation, and Response, 3rd Edition

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition System Forensics, Investigation, and Response, 3rd Edition by Easttom Published by Jones & Bartlett Learning, 2017
  1. Cover Page
  2. Contents
  3. System Forensics, Investigation, and Response
  4. Title Page
  5. Copyright Page
  6. Content
  7. Preface
  8. About the Author
  9. PART I Introduction to Forensics
  10. CHAPTER 1 Introduction to Forensics
  11. What Is Computer Forensics?
  12. Understanding the Field of Digital Forensics
  13. Knowledge Needed for Computer Forensics Analysis
  14. The Daubert Standard
  15. U.S. Laws Affecting Digital Forensics
  16. Federal Guidelines
  17. CHAPTER SUMMARY
  18. KEY CONCEPTS AND TERMS
  19. CHAPTER 1 ASSESSMENT
  20. CHAPTER 2 Overview of Computer Crime
  21. How Computer Crime Affects Forensics
  22. Identity Theft
  23. Hacking
  24. Cyberstalking and Harassment
  25. Fraud
  26. Non-Access Computer Crimes
  27. Cyberterrorism
  28. CHAPTER SUMMARY
  29. KEY CONCEPTS AND TERMS
  30. CHAPTER 2 ASSESSMENT
  31. CHAPTER 3 Forensic Methods and Labs
  32. Forensic Methodologies
  33. Formal Forensic Approaches
  34. Documentation of Methodologies and Findings
  35. Evidence-Handling Tasks
  36. How to Set Up a Forensic Lab
  37. Common Forensic Software Programs
  38. Forensic Certifications
  39. CHAPTER SUMMARY
  40. KEY CONCEPTS AND TERMS
  41. CHAPTER 3 ASSESSMENT
  42. PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
  43. CHAPTER 4 Collecting, Seizing, and Protecting Evidence
  44. Proper Procedure
  45. Handling Evidence
  46. Storage Formats
  47. Forensic Imaging
  48. RAID Acquisitions
  49. CHAPTER SUMMARY
  50. KEY CONCEPTS AND TERMS
  51. CHAPTER 4 ASSESSMENT
  52. CHAPTER LAB
  53. CHAPTER 5 Understanding Techniques for Hiding and Scrambling Information
  54. Steganography
  55. Encryption
  56. CHAPTER SUMMARY
  57. KEY CONCEPTS AND TERMS
  58. CHAPTER 5 ASSESSMENT
  59. CHAPTER 6 Recovering Data
  60. Undeleting Data
  61. Recovering Information from Damaged Media
  62. File Carving
  63. CHAPTER SUMMARY
  64. KEY CONCEPTS AND TERMS
  65. CHAPTER 6 ASSESSMENT
  66. CHAPTER 7 Email Forensics
  67. How Email Works
  68. Email Protocols
  69. Email Headers
  70. Tracing Email
  71. Email Server Forensics
  72. Email and the Law
  73. CHAPTER SUMMARY
  74. KEY CONCEPTS AND TERMS
  75. CHAPTER 7 ASSESSMENT
  76. CHAPTER 8 Windows Forensics
  77. Windows Details
  78. Volatile Data
  79. Windows Swap File
  80. Windows Logs
  81. Windows Directories
  82. Index.dat
  83. Windows Files and Permissions
  84. The Registry
  85. Volume Shadow Copy
  86. Memory Forensics
  87. CHAPTER SUMMARY
  88. KEY CONCEPTS AND TERMS
  89. CHAPTER 8 ASSESSMENT
  90. CHAPTER 9 Linux Forensics
  91. Linux and Forensics
  92. Linux Basics
  93. Linux File Systems
  94. Linux Logs
  95. Linux Directories
  96. Shell Commands for Forensics
  97. Kali Linux Forensics
  98. Forensics Tools for Linux
  99. CHAPTER SUMMARY
  100. KEY CONCEPTS AND TERMS
  101. CHAPTER 9 ASSESSMENT
  102. CHAPTER 10 Macintosh Forensics
  103. Mac Basics
  104. Macintosh Logs
  105. Directories
  106. Macintosh Forensic Techniques
  107. How to Examine a Mac
  108. Can You Undelete in Mac?
  109. CHAPTER SUMMARY
  110. KEY CONCEPTS AND TERMS
  111. CHAPTER 10 ASSESSMENT
  112. CHAPTER 11 Mobile Forensics
  113. Cellular Device Concepts
  114. What Evidence You Can Get from a Cell Phone
  115. Seizing Evidence from a Mobile Device
  116. JTAG
  117. CHAPTER SUMMARY
  118. KEY CONCEPTS AND TERMS
  119. CHAPTER 11 ASSESSMENT
  120. CHAPTER 12 Performing Network Analysis
  121. Network Packet Analysis
  122. Network Traffic Analysis
  123. Router Forensics
  124. Firewall Forensics
  125. CHAPTER SUMMARY
  126. KEY CONCEPTS AND TERMS
  127. CHAPTER 12 ASSESSMENT
  128. PART III Incident Response and Resources
  129. CHAPTER 13 Incident and Intrusion Response
  130. Disaster Recovery
  131. Preserving Evidence
  132. Adding Forensics to Incident Response
  133. CHAPTER SUMMARY
  134. KEY CONCEPTS AND TERMS
  135. CHAPTER 13 ASSESSMENT
  136. CHAPTER 14 Trends and Future Directions
  137. Technical Trends
  138. Legal and Procedural Trends
  139. CHAPTER SUMMARY
  140. KEY CONCEPTS AND TERMS
  141. CHAPTER 14 ASSESSMENT
  142. CHAPTER 15 System Forensics Resources
  143. Tools to Use
  144. Resources
  145. Laws
  146. CHAPTER SUMMARY
  147. KEY CONCEPTS AND TERMS
  148. CHAPTER 15 ASSESSMENT
  149. APPENDIX A Answer Key
  150. APPENDIX B Standard Acronyms
  151. Glossary of Key Terms
  152. References
  153. Index

Router Forensics

Using network forensics, you can determine the type of attack over a network. You can also, in some cases, trace the path back to the attacker. A router is a hardware or software device that forwards data packets across a network to a destination network. The destination network could be multiple networks away. A router may contain read-only memory with power-on self test code, flash memory containing the router’s operating system, nonvolatile random access memory (RAM) containing configuration information, and volatile RAM containing the routing tables and log information.

Router Basics

The basic networking hardware devices are as follows:

  • Network card

  • Hub

  • Switch

  • Router

A network interface card (NIC) is an expansion board you insert into a computer or a motherboard-mounted bit of hardware that allows the computer to be connected to a network. A NIC handles many things, such as the following:

  • Signal encoding and decoding

  • Data buffering and transmission

  • Media Access Control

  • Data encapsulation, or building the frame around the data

These are relatively simple devices that don’t store information that you can examine for any appreciable period of time.

A hub is used to connect computers on an Ethernet LAN. Essentially, a hub does not do anything to see that packets get to their proper destination. Instead, the hub takes any packet it receives and simply sends a copy of it out every port it has, except the port on which the packet entered the hub. This is based on the theory that the packet is going somewhere, so send it out all available avenues. This causes a lot of excess network traffic; hubs are used very rarely in modern networks.

A switch prevents traffic jams by ensuring that data goes straight from its origin to its proper destination, with no wandering in between. Switches remember the address of every node on the network and anticipate where data needs to go. A switch operates only with the computers on the same LAN. That is because a switch operates based on the MAC address in a packet, which is not routable. It cannot send data out to the Internet or across a wide area network (WAN). These functions require a router.

A router is similar to a switch, but it can also connect different logical networks or subnets and enable traffic that is destined for the networks on the other side of the router to pass through. Routers typically provide improved security functions compared with a switch. Routers utilize the IP address, which is routable, to determine the path of outgoing packets. Routers work at the Network Layer of the OSI model.

Routers determine where to send information from one computer to another. Routers are specialized computers that send your messages and those of every other Internet user speeding to their destinations along thousands of pathways. Routers maintain a routing table to keep track of routes, or which connections are to be used for different networks. Some of these routes are programmed in manually, but many are “learned” automatically by the router. It does this by examining incoming packets and, if one comes from an IP address the router has not seen before, adding that address to its routing table. Modern routers also inform each other about new routes and routes that are no longer working to make routing as efficient as possible.

Modern routers are complex devices. They don’t only direct packets along a path. Routers can often filter, shape, or give priority to traffic according to company or customer needs. Router capabilities and function depend highly on where the router is placed in a network. Clearly, a router directing traffic between a company’s floors will act different than a router on the network perimeter with the Internet. In contrast, the typical home router acts more as a firewall and issues IP addresses by its Dynamic Host Configuration Protocol (DHCP) capabilities.

Virtually all routers are programmable, maintain logs, and are configured by a command line interface. Among several router vendors, the largest market share holder is Cisco, so it is worthwhile to become familiar with at least the basics of working with a Cisco router. For a good overview of Cisco routers, the document at http://www.cisco.com/c/en/us/td/docs/ios/fundamentals/command/reference/cf_book.pdf will be a great help. Or search for Cisco IOS command reference guide materials.

Types of Router Attacks

Routers can be vulnerable to several types of attacks, including router table poisoning. Router table poisoning is one of the most common and effective attacks. To carry out this type of attack, an attacker alters the routing data update packets that the routing protocols need. This results in incorrect entries in the routing table. This, in turn, can result in artificial congestion, can overwhelm the router, or can allow an attacker access to data in the compromised network by sending data to a different destination or over a different route than anticipated.

Getting Evidence from the Router

Even though a router is just a special-purpose computer running a routing program, getting evidence from a router is quite different from getting evidence from a PC, laptop, or server. The first major difference is that with a router, you do not shut down the device and image it. The reason is that once you shut it down, you will have potentially lost valuable evidence. For this reason, router forensics requires a great deal of care. You must make absolutely certain not to alter anything, and you must be meticulous in documenting your process.

The first step is to connect with the router so you can run certain commands. HyperTerminal is a free tool that can be used to connect to and interact with your routers. Because the router is live, it is important to record everything you do. Fortunately, HyperTerminal makes this easy, as shown in FIGURE 12-5.

Several commands are important to router forensics. The most important and most commonly used commands from Cisco routers are described here. The commands for different brands of routers, or even different Cisco routers, may be different, but there are equivalent commands:

  • The show version command provides a significant amount of hardware and software detail about the router. It displays the platform, operating system version, system image file, any interfaces, the amount of RAM the router has, and the number of network and voice interfaces there are.

FIGURE 12-5
Recording with HyperTerminal.

Courtesy of HILGRAEVE.

  • The show running-config command provides the currently executing configuration.

  • The show startup-config command provides the system’s start-up configurations.

  • Differences between show startup-config and show running-config can be indicative of a hacker having altered the system.

  • The show ip route command shows the routing table. Manipulating that routing table is one primary reason hackers infiltrate routers.

You will probably find the preceding commands useful in your forensic examination. However, you may find several other commands useful as well, including the following:

  • show clock detail

  • show reload

  • show ip arp

  • show users

  • show logging

  • show ip interface

  • show interfaces

  • show tcp brief all

  • show ip sockets

  • show ip nat translations verbose

  • show ip cache flow

  • show ip cef

  • show snmp user

  • show snmp group

The release of version 11.2 of Cisco IOS (operating system) introduced the new command show tech-support. This command has allowed for the collection of multiple sources of information concerning the router in a single command. This one command outputs the same as running all of the following commands:

  • show version

  • show running-config

  • show stacks

  • show interface

  • show controller

  • show process cpu

  • show process memory

  • show buffers

For readers who are looking for more in-depth, highly technical router forensics information, the following papers might be interesting: