Home page logo
/

basics logo Security Basics mailing list archives

RE: images for computer forensics?
From: "Corey Watts-Jones" <cwattsjones () rogers com>
Date: Mon, 26 Feb 2007 17:04:56 -0500

I don't think I could possibly agree more. That's akin to walking into a
police station and asking if you can go and borrow some things from the
evidence room so you can see what real evidence is like.

Corey Watts-Jones
Systems Support Specialist

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On
Behalf Of Ansgar -59cobalt- Wiechers
Sent: Monday, February 26, 2007 11:31 AM
To: security-basics () securityfocus com
Subject: Re: images for computer forensics?

On 2007-02-26 Zhihao wrote:
Hi list, was wondering if anyone knows of any online resources I can
visit that has got real life case studies of cybercrime and actually
has got the disk image of the server that was hacked? or even a disk
image of a system that was used to compromise a server? Went over to
honeynet.org and they do have an image of a purposely hacked redhat
6.2 but I will prefer a resource that will have actual disk images
from a crime scene.

I sure hope that nothing like that exists and will ever exist, because
these images will most likely contain confidential, maybe even personal
data.

Regards
Ansgar Wiechers
-- 
"All vulnerabilities deserve a public fear period prior to patches
becoming available."
--Jason Coombs on Bugtraq

---------------------------------------------------------------------------
This list is sponsored by: BigFix

If your IT fails, you're out of business - or worse.  Arm your 
enterprise with BigFix, the single converged IT security and operations 
engine. BigFix enables continuous discovery, assessment, remediation, 
and enforcement for complex and distributed IT environments in real-time 
from a single console.
Think what's next. Think BigFix. 

http://ad.doubleclick.net/clk;82309979;15562032;o?http://www.bigfix.com/ITNe
xt/
---------------------------------------------------------------------------




---------------------------------------------------------------------------
This list is sponsored by: BigFix

If your IT fails, you're out of business - or worse.  Arm your 
enterprise with BigFix, the single converged IT security and operations 
engine. BigFix enables continuous discovery, assessment, remediation, 
and enforcement for complex and distributed IT environments in real-time 
from a single console.
Think what's next. Think BigFix. 

http://ad.doubleclick.net/clk;82309979;15562032;o?http://www.bigfix.com/ITNext/
---------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]