SANS Papers


一些來自SANS有關鑑識白皮書.....

Featured Papers


PaperAuthor
Techniques and Tools for Recovering and Analyzing Data from Volatile MemoryAmari, Kristine
Mobile Device ForensicsMartin, Andrew
A Forensic Primer for Usenet EvidenceLachniet, Mark
Mac OS X Malware AnalysisYonts, Joel
Data carving ConceptsMerola, Antonio
Ex-Tip: An Extensible Timeline Analysis Framework in PerlCloppert, Michael
Reverse Engineering the Microsoft exFAT File SystemShullich, Robert
Logic Models for Computer ForensicsGarrett, Jim
Google Desktop Search as an Analysis ToolPoldervaart, Chris
Taking advantage of Ext3 journaling file system in a forensic investigationNarvaez, Gregorio
A Forensic Investigation Plan and CookbookKing, Gerald
Analysis of a serial based digital voice recorderWright, Craig
Analysis of a seized USB FlashdriveYuen, Cheuk Wai
Unspoken Truths - Forensic Analysis of an Unknown BinaryVelocci, Louie
Forensic Analysis of a SQL Server 2005 Database ServerFowler, Kevvie
Forensic Analysis of a Compromised Intranet ServerObialero, Roberto
Discovery Of A Rootkit: A simple scan leads to a complex solutionMelvin, John
Lessons from a Linux CompromiseRitchie, John
CC Terminals, Inc.Forensic Examination Report: Examination of a USB Hard DriveDuckworth, Brent
Forensic Analysis of a Compromised NT Server(Phishing)Velazquez, Andres
CC Terminals Computer Forensics Analysis ReportDo, George
Analysis of a USB FlashdriveChablais, Christian
Forensic Analysis of a USB Flash DriveBennie, Norrie
Examining an Unknown Image & Analysis of a compromised HoneypotRamli, Farina
Forensic Examination of USB Data storage artifactReardon, Ben
Forensic analysis of a provided imagePereira, Rudolph
Analysis of an unknown USB JumpDrive imageHiew, Roger
Forensic Analysis on a compromised Windows 2000 systemNg, George
Forensic Analysis: Leila Conlay versus Robert Lawrence, Harassment CaseCarpenter, Matthew
Forensic Investigation of USB Flashdrive Image for CC TerminalsDiggs, Rhonda
Forensic Analysis of a Misused SystemShettler, David
Forensic analysis of a Fedora Core 3 NotebookHalm, Michael
Steganography for spies and spybots for hackersChristensen, Andrew
ANALYSIS OF AN IMAGE PROVIDED FROM THE GIAC WEBSITEReyes Mu�oz, Juan Carlos
Forensic with Open-Source Tools and Platform: USB Flash Drive Image Forensic AnalysisOng, Leonard
CC Terminals Harassment CaseFarrington, Dean
Computer forensics investigation - Image file analysisSpellane, Michael
Careless Crackers kill ComputersO'Brien, Conall
Camouflaged and Attacked?Marasky, Bertha
Analysis of WinHexDillinger, Jessica
Analyze an Unknown Image and Perform Forensic Tool ValidationWatson, Patricia
Forensic Analysis of Camouflage and Validation of X-Ways Forensics ToolAylor, Michael
Forensic Image Analysis of a USB FlashdriveHeerwagen, Howard
Forensic analysis of a seized USB Flashdrive imageDoyle, Ben
Analysis of an unknown diskSimsic, Jure
Report on the Forensic Analysis of a recovered Floppy DiskArmstrong, Steve
Analysis of a FAT16 formatted image using Linux, TSK and AutopsyHansen, Ove
Oracle Database Forensics using LogMinerWright, Paul
Infected or Owned?Chuvakin, Anton
Analysis of a 64MB Lexar Media USB JumpDriveChen, Joseph
Spanish-Forensic Analysis of a Windows 98b systemRuiz, Oscar
Forensic Analysis on a Windows 2000 ServerCassidy, Regis
Forensic Analysis of an Apple iBook G4Partida, Alberto
NTLast as a Forensic ToolGrime, Richard
Analyze an image and Perform ForensicPecorella, Francisco
Evaluaton of a Zero-Day Worm Variant at a Health ClinicTaylor, Jonathan
Analyze an Unknown Image and Forensic Tool Validation: SterilizeBecker, Steven
Analysis of a Windows XP Professional compromised systemSantander, Manuel
Analysis of a Commercial Keylogger installed on multiple systemsNamuth, Merlin
HONORS-Analysis of a USB Flashdrive ImageSiles, Raul
Analysis of a USB Flashdrive ImageWenchel, Kevin
A Touch of Superiority in LinuxGriffin, Slade
Forensic Analysis of a Windows 2000 ServerGhavalas, Byrne
Forensic analysis of a Windows XP SP1Ferrill, Rob
Forensic analysis of a honeypot RedHat Linux 6.2Read, Mark
Compromise analysis of a University SGI Indy workstation running IRIXRussel, Chris
Forensic analysis of a compromised Solaris serverShepherd, Russell
Analysis on a compromised RedHat 8.0 machineDeline, Jessica
Analysis on a compromised Linux RedHat 8.0 HoneypotBryner, Jeff
Forensic analysis of a Windows 98 systemShenk, Jerry
Forensic Analysis on a Windows 2000 systemHayday, John
Forensic Investigation of a Hacked Redhat 7.1 SystemKhedekar, Nihar
Perform Forensic Analysis on a Red Hat Linux release 7.1.2 ServerPawar, Pramod
Forensic Analysis of a Red Hat Linux release 7.1 ServerVK, Vijaykumar
Use of SSH as a forensic toolBro, Layne
Forensic Analysis on a compromised Windows 2000 HoneypotHewitt, Peter
Forensic Tool Validation of Compromised Computer Inventory SystemPerry, James
How not to use a rootkitWilson, Michael
Analysis of a Red Hat HoneypotShewmaker, James
Forensic Analysis on a compromised Linux Web ServerMalone, Jeri
Forensic Analysis of a Sun Ultra SystemChmielarski, Tom
Forensic Validity of NetcatWorman, Michael
Forensic Analysis on a Windows 2000 Pro WorkstationCragg, David
Forensic Analysis on acquired EBay Hard DrivesBunnell, Richard
Forensic Analysis on a Linux IPNET challenge systeRinaldi, Alfredo
Forensic Analysis of a Windows 2000 Web ServerLiu, Yi-Chung
Evaluation of The Forensic ToolkitKamoshida, Akiteru
Forensic Analysis of an EBay acquired DriveWesemann, Daniel
Analysis of a Compromised Honeypot-VMware/Linux7.3Hall, Stephen
Becoming a Forensic Investigator/Use of Forensic ToolkitMaher, Mark
Forensic analysis of a Windows 2000 computer literacy training and software development deviceRichard, Golden
Sys Admins and Hackers/Analysis of a hacked systemFresen, Lars
Forensic Analysis of a Windows 2000 server with IIS and OracleBinde, Beth
Romanian Winter-Forensic Analysis of a Linux systemLadstaetter, Garnot
Forensic Analysis of a compromised Sun Ultra 5 workstationMadzelan, Carl
Forensic analysis of a compromised Linux RedHat 7.3 systemMiller, Kevin
Analysis of a Linux HoneypotHudak, Tyler
Forensic Analysis Procedures of a Compromised system using EncaseMcGurk, Jeffrey
Analysis of tar2d2 as a Forensic ToolAdelstein, Frank
Forensic analysis of a Compromised Red Hat 7.2 Web ServerWalker, Martin
Forensic analysis of a Compromised Windows 2000 workstationFraser, Charles
Forensic Examination of a home firewall and network services systemCarlson, Brian
Evaluation of Crocwareis Mount Image Pro as a Forensic ToolTower-Pierce, Hugh
Forensic Tool Evaluation-PascoLarabee, Rick
Forensic Tool Evaluation-MiTeC Registry File ViewerFiscus, Kevin
Hidden Data Is Evidence Too/Metadata Assistant tool EvaluationPelcher, Bob
Compromised Redhat Linux 7.2 Honeypot AnalysisAnderson, Jason
Forensic analysis/process for a Windows 2000 SP2 Pro with IIS installedCallahan, Jennie
Trash and Treasure-Computer Forensics and Public Domain Data (Bmap Tool Analysis)Scott, Michael
Evaluation of Forensics SF-5000u as forensic HardwareHickey, Steven
Hackers and Trackers(Linux Forensic Analysis)Scott, Andy
Review of Foundstone Vision as a forensic toolBingham, Bil
Forensic Analysis of a RedHat 7.1 Server with Apache Web ServerSierra, Aaron
Analysis of a Suspect Red Hat 6.2 Linux ServerVenere, Guilherme
Forensics under Brazilian Legislation(HoneyPot evaluation)Piccolini, Jacomo
Piping a Shell in a ICMP Tunnel-A Forensic Study of Malicious CodeNoakes, Robert
Analysis of an IRC-bot compromised Microsoft Windows systemKolde, Jennifer
Eavaluation of Linux ext2 file system debugger/debugfs for forensic useHarvey, Michael
Evaluation of Windows Forensic ToolchestMcDougal, Monty
An Endeavor Down the Forensic Highway(Windows 2000 Professional)Westphal, Kristy
Forensic Analysis of a Honeypot Redhat 6.2 systemOlensky, Sven
Forensic Analysis of a Compromised Windows NT4 workstationHammill, Adrian
Analysis of a Windows 2000 corporate web serverCordeschi, Carlo
Forensic event with a Microsoft Windows 2000 ServerNolin, Norbert
Validaton of icat and ils for Forensic UseGabler, David
Safe at Home?Perez, David
Evaluation of a Honeypot Windows 2000 Server with an IIS Web/FTP ServerPearlstein, Kenneth
Forensic Tool Validation, and Legal Issues of Incident HandlingVera, Christopher
Forensic Analysis and process of a Mandrake Linux 9.1 systemDa Cruz, Dennis
Binary Analysis, Forensics and Legal IssuesWyman, Michael
Analyses of Italian Malware, Romanian Rootkits, and United States Computer LawFord, Michael
Forensic Analysis of a Compromised SystemLee, Richard
Analysis of a compromised RedHat 6.2 web server running ApacheFilmer, Bradley
If it quacks like a duck, is it really a duck?Hall, Andrew
Forensic Analysis of Shared WorkstationKerr, Michael
Ironically , Some Targets Are Harder Than OthersClarkson, Michael
Legal Issues of Computer Incident HandlingPsaila, Helen
Forensics and Incident Response : Three InvestigationsHutson, Brian
Digging covert tunnels Analysis of an unknown binaryMurr, Michael
Computer Forensic Analysis of an Unknown Binary and The Complete Computer Forensic Investigation of a Hard DriveCapellini, Brian
An Exercise In Practical Computer Forensic AnalysisCampaign, Adam
Forensic Analysis of a MUD Gaming/Development ServerBanghart, John
Forensic Investigation, Analysis, Documentation, and LawPrentner, Karl
Forensic Analysis of Suplused system hard drivesBellamy, Jr., William
Analyzing a Binary File and File Partitions for Forensic EvidenceButler, James
Open Source Forensic Analysis - Windows 2000 Server -Arnes, Andre
Forensic Analysis of Another HoneypotLisman, Jarrad
Forensic Analysis Think pad 600 laptop running Windows 2000 serverBowers, Brad
Analysis of a Suspect Red Hat Linux 7.2 System Running Apache v1.3.22Lee, Christopher
EasyRecovery Professional (ER Pro)Khalid, Kamarul Baharin
A Proposal for a Binary Comparison TechniqueLamastra, Gerardo
Forensic Analysis of dual bootable Operating System (OS) running a default Red Hat 6.2 Linux server installation and Windows 98Othman, Mohd Shukri
Analysis of a Software Write Blocker - That Works?Chevalier, Suzanne
Forensic Analysis of an unfamiliar Windows 2000 systemKurasiewicz, Jeff
An Examination of a Compromised Solaris Honeypot, an Unknown Binary, and the Legal Issues Surrounding Incident InvestigationsMccauley, Robert
Analysis of LOKI2, Using mtree as a Forensic Tool, and Sharing Data with Law EnforcementKorty, Andrew
Forensic Studies in the Digital Worldde Jong, Mark
System Analysis of a Compromised Windows 2000 Professional SystemStuart, Robin
Loki & the Honeypot: Forensic AnalysesGeiger, Matthew
Use of sg_dd for Computer ForensicsStone, Michael
Forensic Analysis of a Discarded University Computer SystemCraiger, Philip
Analysis of a Suspect Windows 2000 Server SP3 Running IISFaber, Sid
Forensic analysis of a compromised RedHat Linux 7.0 systemCunningham, Jacob
Analysis of a Compromised Honeypot on a Cable ModemSchlereth, Matthew
Validation of Norton Ghost 2003Brozycki, John
Validation of NTLast v3.0Dolak, John
Analysis of a Suspect Red Hat Linux 6.2 SystemStrubinger, Ray
Analysis of a Suspect Windows 95 SR2 SystemFiliberto, James
Validation of TASK v1.50 fsstat and dstatGinski, Richard
A Search for the Origin of a September 2001 Bomb ThreatCurd, Bill
Validation of The Coroner's Toolkit v1.11 mactimeDalton, Matthew
Validation of GNU tar v1.13.19 & v1.13.25 and GNU cpio v2.4.2 & v2.5Calabrese, Chris
Analysis of a Compromised Windows NT 4.0 Server Running MS SQL Server 7.0Lukacs, Steven
Validation of GNU strings v2.11.90.0.8Desai, Neil
Validation of Process Accounting RecordsClausing, Jim
Analysis of a Honeypot running Red Hat Linux 6.2Murphy, Keven
Analysis and Comparison of Red Hat Linux 6.2 Honeypots With & Without LIDS-enabled KernelsOwen, Greg
Analysis of a Suspect Red Hat Linux 6.2 SystemVan Riper, Ryan
Analysis of a Compromised Red Hat Linux 7.2 SystemPierce, Jerry
Analysis of an Unknown Red Hat Linux 7.3 SystemPedersen, Stephen
Analysis of an Unknown Mac OS X Public Beta System Using Mac OS X 10.2Miller, Roland
Validation of ISObuster v1.0Dietz, Steven
Analysis of a Suspect Windows XP Professional SystemWagner, Dave
Analysis of a Potentially Misused Windows 95 SystemLeibolt, Gregory
Validation of Restorer 2000 Pro v1.1 (Build 110621)Brooker, Denis
Validation of a Modified UNIX "script" Command to Monitor Shell SessionsBarnett, Ryan
Analysis of a Suspect Red Hat Linux 6.1 SystemFung, James
Analysis of a Virus Infected Windows 98 SE SystemHayler, Richard



轉自:SANS

0 意見: