Difference between revisions of "Determining OS version from an evidence image"

From ForensicsWiki
Jump to: navigation, search
(New page: One of the first steps an examiner will need to carry out once they have an evidence image is log system metadata, including OS version and patch level. This may be of particular importanc...)
 
(=Windows 95/98/ME)
Line 2: Line 2:
  
 
==Windows==
 
==Windows==
===Windows 95/98/ME==
+
===Windows 95/98/ME===
 
The family of DOS based Windows operating systems.
 
The family of DOS based Windows operating systems.
  

Revision as of 03:30, 31 July 2007

One of the first steps an examiner will need to carry out once they have an evidence image is log system metadata, including OS version and patch level. This may be of particular importance if the image in question is from a machine that is suspected of having been compromised.

Windows

Windows 95/98/ME

The family of DOS based Windows operating systems.

Windows NT

tbc

Windows 2000/2003/XP

tbc

Unix/Linux

Information about a running system, including the kernel version, can be displayed using the command `uname -a`. However this is not much good if you performing dead analysis on a disk image.

Linux

tbc

Solaris

tbc

Free/Net/OpenBSD

AIX

tbc

HP/UX

tbc