Computer Forensic Investigation – Phases of a Crime

Network enumeration – Research the target. Vulnerability analysis – Detect how to attack the target. Exploitation – Compromise the system. A Standard Intrusion Scenario Reconnaissance – Network enumeration and vulnerability analysis. Exploitation – The intruder launches their attack. Reinforcement – Escalate privileges, import tools onto the victim, hide their presence. May even patch the vulnerability […]

Computer Forensic Investigation – Definitions #2

Malware Malicious software that is unwanted on a computer system. Symptoms may include making the machine run slow, starting unknown processes, causing activity without the users action (unwanted). Virus Malware that replicate within the system without the users interaction. Once it has matured within the infected system, it will then deliver the payload. Often a […]