Table of Contents

System Forensics, Investigation, and Response Day 4 to end

Day 6

Binary Analysis..2

Process Wiretapping..25

Malware Dissection..36

x2 is the program

gdb x2

objdump -x x2

readelf -a x2

The Forensic Challenge Hands-On Case Study..70

The Analysis..95

Analysis Results..100

File Analysis..105

Unallocated Space Analysis..146

Swap Space Analysis..149

Find something on these

lots of 0x90's in a transmission is buffer overflow attack winalysis least privilage Pen-trap, trap and trace WinHex substantial nexus

another file recovery tool - Rapier

http://www.citadelsystems.net/index.php/forensics-tools/34-data-carver/46-rapier