08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

contain evidence are mail servers, which could contain not only email but also<br />

attachments to the email, and the email logs. The site may keep web server logs<br />

that would show which websites a user may have visited. The network or<br />

domain servers may show login data, file download data, application usage,<br />

privilege levels, directory permissions, and a multitude of other data that may<br />

be useful in an investigation. Security testing records may show the<br />

configuration of a user’s workstation that may be helpful in certain types of<br />

investigations.<br />

Besides the computers on the network, other network devices may<br />

contain useful information. These devices include firewalls which may have<br />

some useful data in the firewall logs, border or intranet segregating routers<br />

which may have data in router logs, intrusion detection systems, web servers,<br />

DNS servers, and so on. Any of these devices, logs, or information may help in<br />

an investigation to determine what happened, when it happened, how it<br />

happened, and to or by whom. Network forensics is time consuming and<br />

usually requires the assistance of the network administrator or expert help.<br />

Since, in most cases, a court is not going to give law enforcement permission to<br />

seize a whole network, it usually requires that a search be completed on-site.<br />

This increases the possibility of missing valuable information. Usually the<br />

search has to be completed within a time limit, and that means that law<br />

enforcement has little time to respond to a configuration or system that is not<br />

familiar to them. Much preparation is required to conduct a network search.<br />

Law enforcement officials can help themselves by gathering data that helps<br />

determine configurations such as operating system types, hardware issues,<br />

storage issues, application issues, and so on. If an investigator knows he is<br />

going to have to search a local area network with one file server running an NT<br />

server with ten workstations running Windows 98 and that the application most<br />

likely to have the data they are seeking is Microsoft Access, then he should<br />

prepare for this eventuality. He must insure he has the capability on hand to<br />

search the network.<br />

There are many methods to uncover data from a remote access, or to<br />

change or acquire data. The system logs may be the best starting place. If data<br />

were changed, older versions of the file should then be compared. Some files<br />

are stored temporarily, and these may also be a source for comparison. If this<br />

system were part of a network, file servers may store backups of these files.<br />

Again, a file comparison can be used. All network access devices have the<br />

capability to store audit or login logs, and these may be very useful in<br />

determining the source of a remote entry into a system.<br />

325

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!