Home page logo
/

basics logo Security Basics mailing list archives

Re: images for computer forensics?
From: Jeromey Hannel <Jeromey.Hannel () wholefoods com>
Date: Mon, 26 Feb 2007 22:05:22 -0600


This is an older one and the answers are posted on the internet but this is
a real hack from the honeynet project.

Good luck!!

http://www.honeynet.org/challenge/index.html



On 2/26/07 4:35 PM, "Murda Mcloud" <murdamcloud () bigpond com> wrote:

Like people told me when I asked this-buy secondhand disks from ebay and go
crazeee! You will be amazed...
Also, here in Oz the council do a hard rubbish removal service once a year.
You leave your rubbish on the kerb and they collect it-or other people
scavenge. Scavenge and get your friends round to marvel at what info you can
rebuild from 'deleted' files. Or even wide open files. The process for
recovering files/logs etc is the same as if it were a 'crime scene'.

Like Ansgar said, nobody is going to want to open up their confidential case
data to the world.


-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On
Behalf Of Ansgar -59cobalt- Wiechers
Sent: Tuesday, February 27, 2007 2:31 AM
To: security-basics () securityfocus com
Subject: Re: images for computer forensics?

On 2007-02-26 Zhihao wrote:
Hi list, was wondering if anyone knows of any online resources I can
visit that has got real life case studies of cybercrime and actually
has got the disk image of the server that was hacked? or even a disk
image of a system that was used to compromise a server? Went over to
honeynet.org and they do have an image of a purposely hacked redhat
6.2 but I will prefer a resource that will have actual disk images
from a crime scene.

I sure hope that nothing like that exists and will ever exist, because
these images will most likely contain confidential, maybe even personal
data.

Regards
Ansgar Wiechers




---------------------------------------------------------------------------
This list is sponsored by: BigFix

If your IT fails, you're out of business - or worse.  Arm your 
enterprise with BigFix, the single converged IT security and operations 
engine. BigFix enables continuous discovery, assessment, remediation, 
and enforcement for complex and distributed IT environments in real-time 
from a single console.
Think what's next. Think BigFix. 

http://ad.doubleclick.net/clk;82309979;15562032;o?http://www.bigfix.com/ITNext/
---------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault