Forensic

这篇博客介绍了ASIS-CTF2013中的网络取证分析题目,包括rm -rf、spcap、pcap和memdump等环节,探讨了这些有趣的热身题目。

这种类型的题,比较有趣,大概是热身一类的题吧。

rm -rf (ASIS-CTF2013)

这道题,给了一个镜像文件。里面文件貌似挺多的。
不过直接用WinHex打开搜一下ASIS_密码就出来了。



spcap (ASIS-CTF2013)

这个题目名字的意思大概就是,simple pcap
拿Wireshark打开这个包,Statistics->Conversations 里面看到
有两个IP通信比较频繁


Statistics->Protocol Hierarchy Statistics
里面看到有一个图片格式的数据传输了




File - > export -> object 吧图片导出来,就可以看到Flag了





pcap (ASIS-CTF2013)

这题应该是比较难一点的,pcap
照例上wireshark    Statistics->Protocol Hierarchy Statistics 里面看到一些乱七八糟的东西,
虽然没大看懂但是还是装作很懂的看了一下。
一般情况下容易藏数据的地方在  HTTP traffic  TCP Data  U
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools—including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for "dead analysis" Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值