Chapter 13 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.. Investigating Computer Intrusions.

Slides:



Advertisements
Similar presentations
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 4.1 Chapter 4.
Advertisements

Chapter 17 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of Windows Systems.
Chapter 18 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of UNIX Systems.
1 Chapter 24 - Renal Cortical and Medullary Microcirculations: Structure and Function Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 19 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of Macintosh Systems.
Chapter 15 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Computer Basics for Digital Investigators.
Chapter 08 The T Cell Receptor: Proteins and Genes
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Modeling Constraints with Parametrics
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Copyright © 2016 Elsevier Inc. All rights reserved.
Chapter 01 Foundations of Digital Forensics
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Chapter 41 Work-Related Musculo-Skeletal Disorders
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Chapter 65 - The Hormonal Regulation of Calcium Metabolism
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 11.
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 10.
Chapter 28 - Renal Hyperplasia and Hypertrophy
Copyright © 2014, 2000, 1992 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Modeling Cross-Cutting Relationships with Allocations
Portable Biotechnology
© 2012 Elsevier, Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Modeling Text-Based Requirements and their Relationship to Design
Modeling Functionality with Use Cases
Customizing SysML for Specific Domains
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
IntroductionMolecular Structure and Reactivity
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 12.
Chapter 6.
Chapter 6.
Copyright © 2012, Elsevier Inc. All rights Reserved.
© 2012 Elsevier, Inc. All rights reserved.
Chapter 103 Long-Term Care: The Global Impact
Chapter 01.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 08.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 64 - Renal Calcium Metabolism
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 57 - Renal Ammonium Ion Production and Excretion
© 2015 Elsevier, Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 15 Contraception
Chapter 29 - Stem Cells and Generation of New Cells in the
Chapter 78 Vaccination and Screening in Cervical Cancer
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 15.
Chapter 77 Cervical Cancer: Burden of Disease
Chapter 20 Assisted Reproductive Technologies
Chapter 3.
© 2015 Elsevier, Inc. All rights reserved.
Presentation transcript:

Chapter 13 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.. Investigating Computer Intrusions

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.1 Use of the nmap scanning tool to obtain information about what services are running on a remote computer.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.2 Metasploit being used to exploit a vulnerability on a remote Windows computer.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.3 Directory listing obtained from a remote system after gaining remote access via a vulnerability exploited using Metasploit.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.4 Listing showing details about processes running on a Windows system.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.5 Order of volatility.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.6 Unusual process viewed using Alt-Ctrl-Del.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.7 EnCase used to analyze Linux system showing rootkit installations script.