Windows Forensics
Dr. Phil Polstra                    @ppolstra
PhD, CISSP, CEH                     http://philpolstra.com
         Certifications:
         http://www.securitytube-training.com
         Pentester Academy: http://www.PentesterAcademy.com
                             ©SecurityTube.net
Collecting Volatile Data
         ©SecurityTube.net
               High Level Process
 Call                                           Dead      Yes   Acquire
Placed   Incident? Yes   Live Analysis
                                              Analysis?         Images
          No                             No
         Lessons                                                 Dead
         Learned             Write Reports
                                                                Analysis
                                ©SecurityTube.net
                   Data to Collect
●
    Date and Time
    –   Clock may be skewed
    –   Might be in different timezone
●
    Network interfaces
    –   Funny networks
    –   Promiscuous mode?
●
    Network connections
                               ©SecurityTube.net
          Data to Collect (cont.)
●
    Open ports                     ●
                                       Mounted filesystems
●
    Programs associated with       ●
                                       Scheduled jobs
    ports
                                   ●
                                       Process memory dumps
●
    Currently logged on users
                                   ●
                                       Clipboard contents
●
    Running processes
●
    Running services
                                   ●
                                       Driver information
●
    Open files                     ●
                                       Shares
●
    Routing tables                 ●
                                       Command history
                          ©SecurityTube.net
Collecting Data
     ©SecurityTube.net