Am 20. Dec, 2002 schw=E4tzte foodog so:
> I have a question I hope someone can help with.
>
> Suppose:
> A Bad Person hacks an NT4/W2K/XP/.NyET box (I know - pretty fanciful).
> A Good Person shuts it off and drops the box amongst all the other crap
> in my office.
>
> I'd like to boot it from CD using Knoppix (for ex.) and use dd to snag
> an image copy of the NTFS or FAT32 partitions, copying them off to a
> Linux box. Then, presumably, I can use goodies like the Coroner's
> Toolkit or @Stake's enhanced version of same to poke around in the
> remains at my leisure (and send the Tainted Box off to be reimaged and
> start the cycle again).
>
> Can someone suggest a command to store the image elsewhere using scp or
> even ftp?
dd if=3D/dev/hda1 | ssh remote_host dd of=3D/var/tmp/hda1_from_cracked_box.=
img
Do a sanity check on that. It should be a bit for bit copy of the drive,
though. No FS changes, etc.
Make sure you have room for the image and the remote location is also
secure.
> Slight digression: If I dutifully document/timestamp each step of the
> process and do an md5sum of the image immediately after creation, is
> that likely to be "usable evidence" later on if the need arises?
That I don't know. Check w/ legal council at your workplace. I'd think gpg
sig would be better, but I've seen someone give a non-definitive answer tha=
t
gpg/pgp has not yet been accepted by the courts, but md5 has. Do both.
Cross-sign both with each other.
ciao,
der.hans
--=20
# https://www.LuftHans.com/ http://www.TOLISGroup.com/
# ... make it clear I support "Free Software" and not "Open Source",
# and don't imply I agree that there is such a thing as a
# "Linux operating system". - rms