2,2 Computer Forensics

If, during the proccss of live response, the investigator notices a particular

process that catches his attention as being suspicious, he may dump the

memory image of this process so that he can dissect it later on.

When Powering Down Isn't an Option

Once the live response has completed, the investigator needs to decide if he

should power down the machine to perform a postmortem, how he should

do so, and if he can afford to generate additional artifacts during the process

(i.e., create a crash dump). In the event that the machine in question cannot

be powered down, live response may be the only option available.

This can be the case when a machine is providing mission critical services

(e.g., financial transactions) and the owner literally cannot afford downtime.

Perhaps the owner has signed a service level agreement (SLA) that imposes

punitive measures for downtime. The issue of liability also rears its ugly head

as the forensic investigator may also be held responsible for damages if the

machine is shut down (e.g., operational costs, recovering corrupted files, lost

transaction fees, etc.). Finally, there's also the investigative angle. In some

cases, a responder might want to keep a machine up so that he can watch

what an attacker is doing and perhaps track the intruder down.

The Debate over Pulling the Plug

One aspect of live response that investigators often disagree on is how to

power down a machine. Should they perform a normal shutdown or simply

yank the power cable (or remove the battery)?

Both schools of thought have their arguments. Shutting down a machine through

the appropriate channels allows the machine to perfomi all of the actions it

needs to in order to maintain the integrity of the file system. If you yank the

power cable of a machine, it may leave the file system in an inconsistent state.

In contrast, formally shutting down the machine also exposes the machine to

shutdown scripts, scheduled events, and the like, which could be maliciously

set as booby traps by an attacker who realizes that someone is on to him. I'll

also add that there have been times where I was looking at a compromised

machine while the attacker was actually logged on. When the attacker beĀ¬

lieved 1 was getting too close for comfort, he shut down the machine himself

to destroy evidence. Yanking the power allows the investigator to sidestep

this contingency by seizing initiative.

In the end, it's up to the investigator to use his or her best judgment based on

the specific circumstances of an incident.

Parti I 43