🪟Windows
Live Data Collection
Live Data Collection from Windows System
Create a Response Toolkit
It is critical to use trusted commands in all incident responses, irrespective of type of incident. An investigator should maintain a CD or a floppy that involves a minimum of the tools described below
Saving Information Collected During Initial Response
There are four options available when the information has been retrieved from the live system:
The information obtained from the hard drive of the target system should be saved.
The obtained data should be noted by hand.
The data obtained from the floppy disks or other external devices should be saved.
The obtained data should be stored from forensic system by using cryptcat or Netcat.
Moving of Data using Netcat
Obtain Volatile Data
We need to retrieve temporal data from windows NT/2000 system before powering off the system. We collect the following temporal/volatile data before forensic duplication:
The date and the time of the system.
List of users that are currently logged on.
Entire file system's time and date stamp.
List of processes that are currently running.
List of sockets that are open currently.
Applications that are listening on the open sockets.
List of systems that have current or had recent connections to the system.
Collect Temporal Data
REFERENCES
Last updated