Page 660 - StudyBook.pdf
P. 660

644    Chapter 11 • Operational and Organizational Security: Incident Response

                  9. Place circuit cards, disks, and the like in antistatic bags for transport. Keep
                      all equipment away from heat sources and magnetic fields.




              EXAM WARNING
                  Remember that copies of data made for examination should be created
                  on forensically sterile media. If other data resides on the disk or CD
                  storing the image file (or copy of original data), it can be argued that
                  the evidence was compromised by this other data. When CDs that can
                  be rewritten (CD-RW) are used, it can be argued that the evidence was
                  preexisting data or that it was corrupted in some manner.






              EXERCISE 11.02

              VIEWING VOLATILE DATA IN MEMORY

                  You have received a complaint about a possible hacking attempt on
                  servers used by the company for file storage. These machines run
                  Windows NT Server and Windows 2000 Server OSes. When you arrive,
                  you find that these machines are still running. You want to document
                  any volatile information that resides in memory before proceeding with
                  further forensic procedures. Follow the following steps to acquire this
                  volatile data:
                      1. Using a computer running Windows NT or Windows 2000, click
                         Start | Run. Type CMD at the Run command, and click OK.
                      2. When a window opens, you will see a command prompt. Type
                         NETSTAT and then press Enter. Document any information on
                         current network connections that is displayed. This will show
                         whether the hacker is still connected to the machine.

                      3. Type IPCONFIG and then press Enter. Document any information
                         about the state of the network.
                      4. Type ARP –A to view the ARP cache. Document the information
                         on addresses of computers that are connected to the system. This
                         will show the addresses of machines recently connected to the
                         system, and may show the IP address of the machine used by the
                         hacker.



          www.syngress.com
   655   656   657   658   659   660   661   662   663   664   665