Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] Network Forensics Uses GNU/Linux

  • Subject: [News] Network Forensics Uses GNU/Linux
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Tue, 22 Jan 2008 06:52:34 +0000
  • Newsgroups: comp.os.linux.advocacy
  • Organization: Netscape / schestowitz.com
  • User-agent: KNode/0.10.4
FBI requests spawn network forensics startup

,----[ Quote ]
| Net/FSE, which stands for Network Forensic Search Engine, is Linux-based 
| server software that provides a Web interface for network managers to easily 
| see an analytical profile of host-to-host activity based on NetFlow router 
| data as well as log information related to the organization's firewall, 
| intrusion-detection systems and security-information management.    
`----

http://www.linuxworld.com.au/index.php?id=2113131704&rid=-50


Related:

Notes on Vista forensics

,----[ Quote ]
| The problems are not only related to forensic software, however, and
| while some may be addressed with a simple driver update others may
| be considered even more fundamental as Scott A Moulton of Forensic
| Strategy Services, LLC. explains: "I still have major problems
| mounting large drives under Vista. I use many 1 terabyte or 2
| terabyte drives and Vista is absolutely worthless on these drives -
| I'm lucky if Vista does not actually mess the drive up. Deleting
| files is a nightmare and sometimes takes days. Just simply copying
| files is so slow it is unbearable.
| 
| "I received quite a few responses from people who have had similar
| issues and it seems that DRM [Digital Rights Management] may be the
| most probable cause. They've found that Vista tries to check each 
| file to see if there is a protection flag on it or not before even
| deleting the file."
`----

http://www.theregister.co.uk/2007/04/16/vista_forensics_2/page3.html


,----[ Quote ]
| Vista—Microsoft’s latest operating system—may prove to be most
| appropriately named, especially for those seeking evidence of how a
| computer was used.
`----

http://www.abanet.org/journal/ereport/jy13tkjasn.html


How to break forensics software 

,----[ Quote ]
| One of the problems they found was that EnCase didn't like mangled MBRs, and 
| from this they noticed that Linux and EnCase handled file systems in a 
| completely different way. If you make a directory loop manually, EnCase hides 
| all the files from that point on while Linux can see it just fine. Similarly, 
| if you make a deeply nested directory, thousands deep with no other children, 
| EnCase crashes. Both can be used to hide things, and both will be fixed in a 
| near future revision.      
`----

http://www.theinquirer.net/default.aspx?article=41616

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index