Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: Internet Explorer History
From: mikeiscool <michaelslists () gmail com>
Date: Mon, 17 Jul 2006 12:22:08 +1000

On 7/17/06, Erin Carroll <amoeba () amoebazone com> wrote:
"attempted to make a purchase"? Does that mean the transaction was processed
but declined due to lack of funds or other reasons? If so, pull the account
record on the card. It's a company issued card so no privacy laws apply as
far as I know. The credit issuer should be able to show all "hits" on the
account, approved or not (including credit verification queries etc).

From the way your question is worded it seems they already have the above
information and need the hard data to back it up in case of pursuing
prosecution (or protection from prosecution if the employee files wrongful
termination). If for some reason you still require the data from the laptop
check the cookie cache as well as the temp folder which may contain
information to bolster what's found in the index.dat. If this is to be used
or may be used in legal proceedings, do *not* pull the forensics information
from the laptop interactively but create a write-only locked disk image and
pull the info from that. This preserves the chain of evidence etc so there
can be no question on the integrity of the data.

I would recommend reading up on the legal aspects of obtaining data forensic
evidence prior to proceeding.

Oh, and there are multiple tools available to read the index.dat. Index Dat
Spy 2.0 and others, google around for some.

Of course, just because his _computer_ viewed the site and made the
purchase doesn't mean that _he_ actually did.

-- mic

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault