Chapter 7: Performing Forensic Analysis
Solution to Activity 7.2: Conduct the NIST Rhino Hunt
You can find a complete answer to the NIST Rhino hunt from Activity 7.2 at https://www.cfreds.nist.gov/dfrws/DFRWS2005-answers.pdf.
Solution to Activity 7.3: Security Tools
dd | A Linux tool used to create disk images |
md5sum | Used to determine whether a drive is forensically sound |
Volatility Framework | A memory forensics and analysis suite |
FTK | A full-featured forensic suite |
Eraser | A drive and file wiping utility sometimes used for anti-forensic purposes |
Write blocker | A device used to prevent forensic software from modifying a drive while accessing it |
WinDBG | A tool used to review Windows memory dumps |
Forensic drive duplicator | A device used to create a complete forensic image and validate it without a PC |