Difference between pages "Determining OS version from an evidence image" and "Training Courses and Providers"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(Windows 2000/2003/XP/Vista)
 
(COMMERCIAL TRAINING)
 
Line 1: Line 1:
One of the first steps an examiners will need to carry out once they have an evidence image is to log system metadata, including OS version and patch level. This may be of particular importance if the image in question is from a machine that is suspected of having been compromised.
+
This is the list of Training Course Providers, who offer training courses at specific dates/times and locations (referred to by [[Upcoming_events]]).
  
==Windows==
+
<b>PLEASE READ BEFORE YOU EDIT THE LIST BELOW</b><br>
 +
Providers of scheduled training course should be listed in alphabetical order, and should be listed in only one section.  Non-Commercial training is typically offered by governmental agencies or organizations that directly support law enforcement.  Tool Vendor training is training offered directly by a specific tool vendor, which may apply broadly, but generally is oriented to the vendor's specific tool (or tool suite).  Commercial Training is training offered by commercial companies which may or may not be oriented to a specific tool/tool suite, but is offered by a company other than a tool vendor.
  
===Windows 95/98/ME===
+
<i>Some training opportunities may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
  
Establish the boot volume, verify that it is a FAT file system, and locate the hidden text file \MSDOS.SYS. Locate the [Options]WinVer parameter:
+
The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv.
 +
<i> (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST)</i>
 +
Requests for additions, deletions or corrections to this list may be sent by email to David Baker <i>(bakerd AT mitre.org)</i>.
  
{| class="wikitable"
+
==NON-COMMERCIAL TRAINING==
 +
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="40%"|Website
 +
! width="20%"|Limitation
 
|-
 
|-
! WinVer
+
|Federal Law Enforcement Training Center
! OS
+
|http://www.fletc.gov/training/programs/computer-financial-intelligence/technical-operations
 +
|Limited To Law Enforcement
 
|-
 
|-
| 4.00.0950
+
|IACIS
| Windows 95
+
|http://www.cops.org/training
 +
|Limited To Law Enforcement and Affiliate Members of IACIS
 
|-
 
|-
| 4.00.1111
+
|SEARCH
| Windows 95 OSR2
+
|http://www.search.org/programs/hightech/calendar.asp
 +
|Limited To Law Enforcement
 
|-
 
|-
| 4.03.1212
+
|National White Collar Crime Center
| Windows 95 OSR2.1
+
|http://www.nw3c.org/ocr/courses_desc.cfm
 +
|Limited To Law Enforcement
 
|-
 
|-
| 4.03.1214
+
|}
| Windows 95 OSR2.5
+
 
 +
==TOOL VENDOR TRAINING==
 +
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="40%"|Website
 +
! width="20%"|Limitation
 
|-
 
|-
| 4.10.1998
+
|AccessData (Forensic Tool Kit FTK)
| Windows 98
+
|http://www.accessdata.com/courses.html
 
|-
 
|-
| 4.10.2222
+
|ASR Data (SMART)
| Windows 98 SE
+
|http://www.asrdata.com/training/
 
|-
 
|-
| 4.90.3000
+
|BlackBag Technologies (Macintosh Forensic Suite and MacQuisition Boot Disk)
| Windows ME
+
|http://www.blackbagtech.com/products/training.htm
|}
+
 
+
Alternatively, establish WinDir ([Paths]WinDir in \MSDOS.SYS), locate the %WINDIR%\SYSTEM.DAT registry file. Next, look up the registry key Software\Microsoft\Windows\CurrentVersion\, and values Version and VersionNumber. (Backup copies of SYSTEM.DAT may be found in .CAB files in %WINDIR%\SYSBCKUP.)
+
 
+
===Windows NT4===
+
 
+
===Windows 2000, XP, 2003, Vista ===
+
Information about a running system can be displayed using the command `ver` (and `systeminfo` on some systems).
+
 
+
During a forensic examination, information regarding the version of Windows can be found in a number of places.  For example, by default, the Windows directory on Windows XP is "C:\Windows", where on Windows NT and 2000, it was "C:\Winnt".  This is not definitive, however, because this directory name is easily modified during installation.
+
 
+
Determining the version of Windows from the Software Registry Hive file - navigate to the ''Microsoft\Windows NT\CurrentVersion'' key, and examine the values beneath the key; specifically, values such as ProductName, CSDVersion, ProductId (if available), BuildLab, and on Vista, BuildLabEx.
+
 
+
Determining the version of Windows from file version information - locate the file %WinDir%\system32\ntoskrnl.exe and review the file version information/strings from the resource section of the PE file.  You can view this information with a hex editor, or extract it using a variety of means.  There is a Perl module (Win32::File::VersionInfo) that will allow you to extract this information, and the Perl script [http://sourceforge.net/project/showfiles.php?group_id=164158&package_id=203967 kern.pl] illustrates a platform independent means of examining the PE header and ultimately locating the file version information.
+
 
+
In order to determine the difference between Windows XP Professional and Home versions, look for the %WinDir%\system32\prodspec.ini file; it contains information regarding the Product type (either XP Pro or Home). Another way to do this is to look at Microsoft Product Code (first 5 digits of ''Product ID''). Some of these values:
+
 
+
{| class="wikitable" border="1"
+
 
|-
 
|-
!Value (MPC)!!Version
+
|CPR Tools (Data Recovery)
 +
|http://www.cprtools.net/training.php
 
|-
 
|-
|55034 || Windows XP Professional English
+
|Guidance Software (EnCase)
 +
|http://www.guidancesoftware.com/training/course_schedule.aspx
 
|-
 
|-
|55683 || Windows XP Professional Russian
+
|Nuix (eDiscovery)
 +
|http://www.nuix.com.au/eDiscovery.asp?active_page_id=147
 
|-
 
|-
|55681 || Windows XP Home Edition Russian
+
|Paraben (Paraben Suite)
|}
+
|http://www.paraben-training.com/training.html
 
+
=== Other ===
+
* Windows 2008
+
* Windows 7
+
* Windows 8
+
 
+
Different editions per version?
+
 
+
==Unix/Linux==
+
Information about a running system, including the kernel version, can be displayed using the command `uname -a`. However, this is not much good if you performing dead analysis on a disk image.
+
 
+
===Linux===
+
A number of Linux distributions create a file in ''/etc'' to identify the release or version installed.
+
 
+
<pre>
+
/etc/issue
+
/etc/issue.net
+
</pre>
+
 
+
{| class="wikitable" border="1"
+
 
|-
 
|-
!Distro!!Tag
+
|Technology Pathways(ProDiscover)
 +
|http://www.techpathways.com/DesktopDefault.aspx?tabindex=6&tabid=9
 
|-
 
|-
|Red Hat || /etc/redhat-release
+
|SubRosaSoft (MacForensicsLab)
 +
|http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=index&cPath=2
 +
|-
 +
|WetStone Technologies (Gargoyle, Stego Suite, LiveWire Investigator)
 +
|https://www.wetstonetech.com/trainings.html
 
|-
 
|-
|Debian  || /etc/debian-version
 
 
|}
 
|}
  
=== (Open) Solaris ===
+
==COMMERCIAL TRAINING==
 
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
===Free/Net/OpenBSD===
+
|- style="background:#bfbfbf; font-weight: bold"
A first indicator of the presence of a BSDs operating system is the partition table on a MBR-partitioned disk:
+
! width="40%"|Title
 
+
! width="40%"|Website
{| class="wikitable" border="1"
+
! width="20%"|Limitation
 
|-
 
|-
!OS!!Partition type
+
|Computer Forensic Training Center Online (CFTCO)
 +
|http://www.cftco.com/
 
|-
 
|-
|FreeBSD || FreeBSD (0xA5)
+
|CCE Bootcamp
 +
|http://www.cce-bootcamp.com/
 
|-
 
|-
|OpenBSD || OpenBSD (0xA6)
+
|e-fense Training
 +
|http://www.e-fense.com/training.php
 
|-
 
|-
|NetBSD || NetBSD (0xA9)
+
|H-11 Digital Forensics
 +
|http://www.h11-digital-forensics.com/training/viewclasses.php
 
|-
 
|-
|}
+
|High Tech Crime Institute
 
+
|http://www.gohtci.com
You can get the release and version of BSDs operating system inside the kernel images, even with only a disk image.
+
 
+
{| class="wikitable" border="1"
+
 
|-
 
|-
!OS!!Kernel path
+
|Infosec Institute
 +
|http://www.infosecinstitute.com/courses/security_training_courses.html
 
|-
 
|-
|FreeBSD || /boot/kernel/kernel
+
|ManTech Computer Security Training
 +
|http://www.mantech.com/msma/isso.asp
 
|-
 
|-
|OpenBSD || /bsd
+
|Mobile Forensics, Inc
 +
|http://mobileforensicsinc.com/
 
|-
 
|-
|NetBSD || /netbsd
+
|NTI (an Armor Forensics Company)
 +
|http://www.forensics-intl.com/training.html
 +
|-
 +
|Security University
 +
|http://www.securityuniversity.net/classes.php
 +
|-
 +
|Steganography Analysis and Research Center (SARC)
 +
|http://www.sarc-wv.com/training.aspx
 +
|-
 +
|SysAdmin, Audit, Network, Security Institute (SANS)
 +
|http://www.sans.org/training/courses.php
 +
|-
 +
|Vigilar
 +
|http://www.vigilar.com/training/
 
|-
 
|-
 
|}
 
|}
 
You can use <tt>strings</tt> and <tt>grep</tt> tools to find this information with <tt>strings kernel_path | grep os_name</tt>. (e.g.: <tt>strings /bsd | grep OpenBSD</tt>)
 
 
===AIX===
 
 
===HP/UX===
 
 
===Other===
 
* BSDI
 
 
==Other==
 
* Plan9
 
* QNX RTOS
 
* OS2
 
* MacOS-X/IOS
 
* DOS
 
 
[[Category:Howtos]]
 

Revision as of 09:30, 5 December 2008

This is the list of Training Course Providers, who offer training courses at specific dates/times and locations (referred to by Upcoming_events).

PLEASE READ BEFORE YOU EDIT THE LIST BELOW
Providers of scheduled training course should be listed in alphabetical order, and should be listed in only one section. Non-Commercial training is typically offered by governmental agencies or organizations that directly support law enforcement. Tool Vendor training is training offered directly by a specific tool vendor, which may apply broadly, but generally is oriented to the vendor's specific tool (or tool suite). Commercial Training is training offered by commercial companies which may or may not be oriented to a specific tool/tool suite, but is offered by a company other than a tool vendor.

Some training opportunities may be limited to Law Enforcement Only or to a specific audience. Such restrictions should be noted when known.

The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv. (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST) Requests for additions, deletions or corrections to this list may be sent by email to David Baker (bakerd AT mitre.org).

NON-COMMERCIAL TRAINING

Title Website Limitation
Federal Law Enforcement Training Center http://www.fletc.gov/training/programs/computer-financial-intelligence/technical-operations Limited To Law Enforcement
IACIS http://www.cops.org/training Limited To Law Enforcement and Affiliate Members of IACIS
SEARCH http://www.search.org/programs/hightech/calendar.asp Limited To Law Enforcement
National White Collar Crime Center http://www.nw3c.org/ocr/courses_desc.cfm Limited To Law Enforcement

TOOL VENDOR TRAINING

Title Website Limitation
AccessData (Forensic Tool Kit FTK) http://www.accessdata.com/courses.html
ASR Data (SMART) http://www.asrdata.com/training/
BlackBag Technologies (Macintosh Forensic Suite and MacQuisition Boot Disk) http://www.blackbagtech.com/products/training.htm
CPR Tools (Data Recovery) http://www.cprtools.net/training.php
Guidance Software (EnCase) http://www.guidancesoftware.com/training/course_schedule.aspx
Nuix (eDiscovery) http://www.nuix.com.au/eDiscovery.asp?active_page_id=147
Paraben (Paraben Suite) http://www.paraben-training.com/training.html
Technology Pathways(ProDiscover) http://www.techpathways.com/DesktopDefault.aspx?tabindex=6&tabid=9
SubRosaSoft (MacForensicsLab) http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=index&cPath=2
WetStone Technologies (Gargoyle, Stego Suite, LiveWire Investigator) https://www.wetstonetech.com/trainings.html

COMMERCIAL TRAINING

Title Website Limitation
Computer Forensic Training Center Online (CFTCO) http://www.cftco.com/
CCE Bootcamp http://www.cce-bootcamp.com/
e-fense Training http://www.e-fense.com/training.php
H-11 Digital Forensics http://www.h11-digital-forensics.com/training/viewclasses.php
High Tech Crime Institute http://www.gohtci.com
Infosec Institute http://www.infosecinstitute.com/courses/security_training_courses.html
ManTech Computer Security Training http://www.mantech.com/msma/isso.asp
Mobile Forensics, Inc http://mobileforensicsinc.com/
NTI (an Armor Forensics Company) http://www.forensics-intl.com/training.html
Security University http://www.securityuniversity.net/classes.php
Steganography Analysis and Research Center (SARC) http://www.sarc-wv.com/training.aspx
SysAdmin, Audit, Network, Security Institute (SANS) http://www.sans.org/training/courses.php
Vigilar http://www.vigilar.com/training/