Flash Data Recovery Tool: PC-3000 Flash

PC-3000 Flash Data Recovery PC-3000 Flash is a professional tool for recovering data from flash based storage devices like SD cards, USB sticks, etc.

PC-3000 is the product of years of development by the experts of ACE Laboratory Russia. It is capable of interfacing with NAND chips directly and reading the data, so you do not have to go through the complicated (and often impossible) process of repairing the controller board of the device.

Highlights of PC-3000 Flash:

  • Very easy to use. The operator does not have to be a data recovery expert.
  • Three recovery ‘steps’. First is to physically remove the NAND chip(s) from its controller, second is to read the raw data off the chip(s), and third is to decode the data into a logical image.
  • Complete support for input of your own NAND chip reading parameters in case the software suit does not currently support the chip(s) you are recovering.
  • Connects to any desktop or laptop PC running Windows 2000 or XP through the USB port. Small and portable.
  • Contains built in safety features to prevent electrical damage from incorrect chip insertion or previous physical damage to the NAND chip.
  • 20-30x faster at reading NAND chips than other chip readers.
  • The PC-3000 Flash Kit includes the hardware device for reading NAND chips, PC-3000 Flash Software, and the manual.

Useful Links:

  • List of Controllers supported by PC-3000 Flash
  • List of Memory Chips supported by PC-3000 Flash
  • Get more about PC-3000 Flash
Read More

First Steps in Computer Forensics: Securing Your Network

First Steps in Computer Forensics: Securing Your NetworkNo matter how secure your infrastructure is, sooner or later you will become a victim of a computer crime. Someone may point a DDoS (Distributed Denial of Service) attack at your services, may sniff your network, or may copy/delete confidential information. You may not even realize such a thing has happened. However, in an organized and secured network, you will be notified at the first signs of an attack. Now what? Your first normal reaction would be to stop the attack with whatever means possible. However, that may not be the best response. If you don’t possess the needed knowledge yourself, it might be a good idea to leave the crime scene as it is and let a computer forensics investigator deal with it. Let’s focus on the steps that the investigator would take. You may choose to take these steps alone but you will most likely not have all the necessary support tools and systems for that.

  1. Document the system – name, date, time, purpose, hardware, software, it all matters.
  2. Collect evidence – all the information about the attack should be securely taken off the target system. This is usually done through specific software that hashes all the information. This way, the information is legitimate and can be used as formal evidence for prosecution. The evidence that is usually collected includes active network connections, processes loaded into memory, and a copy of all the information on the disk with the respective creation, modification, and access values. The collector should be confident about the security of the system used for storage and analysis of the copied evidence. Only after this step, is it beneficial to unplug or shut down the affected system. If the affected system is saving logs on a remote server, copy them as well, although they are less likely to be compromised by the attack. In Linux, programs could still be running even after their files have been deleted. You can search for such programs with the command: file /proc/[0-9]*/exe|grep “(deleted)” . If you want to make a copy of this list use: /bin/dd if=/proc/filename/exe of=filename .
  3. Recreate the timeline of the attack – once all the information is copied on a secured workstation, the timeline of the attack can be recreated from the times of creation, modification, and access of all the files. This should be done before anything else, because the other steps can change the original times of the files. The timeline will show the last executed file, the last created/deleted folder, executed scripts, etc.
  4. Deeper analysis of the affected system – using the information collected in the previous steps, a deeper analysis can be performed of the system in order to find suspicious installations, creation or deletion of folders, and the like. Forensics investigators have specific tools for this step.
  5. File information restoration – the slack or unallocated space can be investigated for parts of files that, when combined, may indicate the time of deletion of files. It can be useful for the recreation of the steps of the attacker.
  6. Search – use all the information gathered so far to search for specific names, IP addresses, and file names, that can point you to the intruder.
  7. Report – no matter if the compromised system is your company’s or another’s, it is always good to document all your findings during the investigation. If it’s done right it can even be used in court.

Don’t make the mistake of not taking computer crimes seriously! In today’s digital world, computer crimes are just as serious as any other ones. Don’t hesitate to call a specialist if you’re not sure you can handle the investigation process alone. If your organization is big enough and your budget allows it, think about creating a Computer Security Incident Response Team which will be prepared for computer crimes and will have procedures and resources in place to handle them properly.

http://blog.monitis.com/index.php/2012/05/17/first-steps-in-computer-forensics/

Syndicated stories and blog feeds, all rights reserved by the author.

Read More