±Forensic Focus Partners
±Your Account

![]() |
![]() |
![]() |
![]() |
±Latest Articles
±Latest Videos
±Latest Jobs
Back to top
Skip to content
Skip to menu
Back to top
Back to main
Skip to menu
Imaging across a network
Page Previous 1, 2, 3, 4-
jamie - Site Admin
Re: Imaging across a network
Nice post, Max. I'm a cryptcat user but I'll certainly be taking a look at socat.
Cheers,
Jamie
_________________
Jamie Morris
Forensic Focus
Web: www.forensicfocus.com
Twitter: twitter.com/ForensicFocus
Facebook: www.facebook.com/forensicfocus
Cheers,
Jamie
_________________
Jamie Morris
Forensic Focus
Web: www.forensicfocus.com
Twitter: twitter.com/ForensicFocus
Facebook: www.facebook.com/forensicfocus
-
hogfly - Senior Member
Re: Imaging across a network
While we are on the subject of open source forensics...
This is a great quick and dirty intro to forensics on linux
www.blackhat.com/prese...willis.pdf
This is a great quick and dirty intro to forensics on linux
www.blackhat.com/prese...willis.pdf
-
azariah2000 - Newbie
Re: Imaging across a network
For those of you not familure with EnCase Enterprise Edition (EEE), it may not be open source, it may not be cheap, but it certainly does the job.
The ability to acquire a system across the WAN without having to deploy personnel around the globe is awesome.
The Incident Response Concurrent Connection (IRCC) provides all the information you could want on a live system to rapidly review if a incidnet has occured. We have detected zero day viruses and initial attacks using the IRCC technology.
The ability to acquire a system across the WAN without having to deploy personnel around the globe is awesome.
The Incident Response Concurrent Connection (IRCC) provides all the information you could want on a live system to rapidly review if a incidnet has occured. We have detected zero day viruses and initial attacks using the IRCC technology.
-
Andy - Senior Member
Re: Imaging across a network
Hi Azariah, I am interested in you comment relating to EnCase Enterprise Edition.
It’s not quite what I had in mind - I was thinking more along the lines of imaging across a secure network and not altering the original data in any way. The use of the Enterprise Edition requires the installation of a servelet on the target drive (thus altering the original evidence) - which is ok if monitoring activity on a network, with permission and authority, but when your are trying to make a forensically sound copy (i.e. - not altering it in any way and verified with MD5 hashing) of a seized hard drive - it's a bit awkward.
I have used EEE in the past and agree for forensic network monitoring it’s a fantastic piece of kit; however I would not like to attempt an acquisition of any reasonable sized drive across a WAN, as even with a super fast connection it would an incredible amount of time to complete. For example - I recently tried downloading a version of Linux off the internet with my 1MB connection. It was 1.5GB in size and took 2 attempts and almost 8 hours. Now times that by 100 (for a 150 GB HDD). It only takes a dodgy connection and it fails….. a nightmare prospect when its an important investigation. My understanding of its best use is to use it to identify a suspect machine – then isolate it, then image it locally.
I actually took my time trial version of EEE home and used it on my wireless network (11 MB). I managed to examine/preview my other machines on my home LAN. However they took ages to mount and I noticed a quite bit of lag. I imagine I could have grown a beard waiting for an acquisition.
What experiences have you had with bandwidth and benchmarking such acquisitions?
Andy
- azariah2000
The ability to acquire a system across the WAN without having to deploy personnel around the globe is awesome.
It’s not quite what I had in mind - I was thinking more along the lines of imaging across a secure network and not altering the original data in any way. The use of the Enterprise Edition requires the installation of a servelet on the target drive (thus altering the original evidence) - which is ok if monitoring activity on a network, with permission and authority, but when your are trying to make a forensically sound copy (i.e. - not altering it in any way and verified with MD5 hashing) of a seized hard drive - it's a bit awkward.
I have used EEE in the past and agree for forensic network monitoring it’s a fantastic piece of kit; however I would not like to attempt an acquisition of any reasonable sized drive across a WAN, as even with a super fast connection it would an incredible amount of time to complete. For example - I recently tried downloading a version of Linux off the internet with my 1MB connection. It was 1.5GB in size and took 2 attempts and almost 8 hours. Now times that by 100 (for a 150 GB HDD). It only takes a dodgy connection and it fails….. a nightmare prospect when its an important investigation. My understanding of its best use is to use it to identify a suspect machine – then isolate it, then image it locally.
I actually took my time trial version of EEE home and used it on my wireless network (11 MB). I managed to examine/preview my other machines on my home LAN. However they took ages to mount and I noticed a quite bit of lag. I imagine I could have grown a beard waiting for an acquisition.

What experiences have you had with bandwidth and benchmarking such acquisitions?
Andy
-
blaresutton - Newbie
Re: Imaging across a network
I predominantly image across networks, rather than direct disk to disk imaging.
Typically I will obtain speeds between 700mb / min and 1GB / min.
Someone raised the question earlier in the post regarding how you can ensure the integrity and confidentiality of the image. Their suggested solution was to use socat - and that's fine, too, it works. However, instead of encryption, why not just use the md5 hash that you are calculating anyway?
My process is to pipe dcfldd into nc at the source, and nc into dcfldd at the destination, recording the md5 from both. If they match, there is your integrity. And as far as confidentiality is concerned, configure your IP's in a closed subnet, so no hosts can snoop.
The reason why I use this so much more than disk to disk is because around 80% of my work is imaging servers with RAID arrays, and typically I won't have an IDE port available. Using the network is so much easier than having to stuff around with the actual hardware.
Cheers,
Blare Sutton
PPB Forensics
Typically I will obtain speeds between 700mb / min and 1GB / min.
Someone raised the question earlier in the post regarding how you can ensure the integrity and confidentiality of the image. Their suggested solution was to use socat - and that's fine, too, it works. However, instead of encryption, why not just use the md5 hash that you are calculating anyway?
My process is to pipe dcfldd into nc at the source, and nc into dcfldd at the destination, recording the md5 from both. If they match, there is your integrity. And as far as confidentiality is concerned, configure your IP's in a closed subnet, so no hosts can snoop.
The reason why I use this so much more than disk to disk is because around 80% of my work is imaging servers with RAID arrays, and typically I won't have an IDE port available. Using the network is so much easier than having to stuff around with the actual hardware.
Cheers,
Blare Sutton
PPB Forensics
-
jamie - Site Admin
Re: Imaging across a network
Blare,
Welcome to Forensic Focus.
Kind regards,
Jamie
_________________
Jamie Morris
Forensic Focus
Web: www.forensicfocus.com
Twitter: twitter.com/ForensicFocus
Facebook: www.facebook.com/forensicfocus
Welcome to Forensic Focus.
Kind regards,
Jamie
_________________
Jamie Morris
Forensic Focus
Web: www.forensicfocus.com
Twitter: twitter.com/ForensicFocus
Facebook: www.facebook.com/forensicfocus