Extracting Windows Command Line Details from Physical Memory
|
|
|
- Caroline Marsh
- 9 years ago
- Views:
Transcription
1 DIGITAL FORENSIC RESEARCH CONFERENCE Extracting Windows Command Line Details from Physical Memory By Richard Stevens and Eoghan Casey From the proceedings of The Digital Forensic Research Conference DFRWS 2010 USA Portland, OR (Aug 2 nd - 4 th ) DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and challenges to help drive the direction of research and development.
2 digital investigation 7 (2010) S57eS63 available at journal homepage: Extracting Windows command line details from physical memory Richard M. Stevens a, *, Eoghan Casey b a Information Security Institute, Johns Hopkins University, Baltimore, MD 21218, USA b cmdlabs, Baltimore, MD 21218, USA abstract Current memory forensic tools concentrate mainly on system-related information like processes and sockets. There is a need for more memory forensic techniques to extract user-entered data retained in various Microsoft Windows applications such as the Windows command prompt. The command history is a prime source of evidence in many intrusions and other computer crimes, revealing important details about an offender s activities on the subject system. This paper dissects the data structures of the command prompt history and gives forensic practitioners a tool for reconstructing the Windows command history from a Windows XP memory capture. At the same time, this paper demonstrates a methodology that can be generalized to extract user-entered data on other versions of Windows. ª 2010 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved. 1. Introduction The Microsoft Windows command prompt (cmd.exe) is often used by perpetrators of computer crime, and being able to reconstruct what instructions were executed on the command line can be important in a digital investigation. Some computer intruders go so far as to place their own copy of the command prompt executable on a compromised system to facilitate their unauthorized activities. The command history maintained by the Windows command prompt can contain valuable information such as what programs were executed with associated arguments, files and folders that were accessed, and unique information such as IP addresses, domain names and network shares (Aculina et al., 2008). If the command history can be reconstructed during an investigation it can provide significant context into how and what occurred on that system (Carvey, 2008). In some cases the command history might contain the only retrievable traces of a deleted file or suspect activity. The Windows XP command prompt provides command history functionality through the DOSKEY command. Unlike UNIX systems that maintain a command history file, the Windows XP command history is normally only accessible while the command window is still open. However traces of these commands can be found in memory and some information can be extracted by interpreting the associated data structures in a memory capture. This paper details how DOS- KEY stores commands in memory and provides forensic practitioners with a valuable tool that can provide significant insight and context into what actions were performed on a target computer. In addition, this paper demonstrates a methodology that can be generalized to extract user-entered data from a memory capture from newer versions of Windows. 2. Background Recent research and development in Windows memory forensics has provided the forensic practitioner with several * Corresponding author. addresses: [email protected] (R.M. Stevens), [email protected] (E. Casey) /$ e see front matter ª 2010 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved. doi: /j.diin
3 S58 digital investigation 7 (2010) S57eS63 valuable tools for investigating a computer crime or intrusion. Memory forensics offers several advantages over a traditional live forensics approach because it minimizes the impact on the target host, the analysis process may be repeated and verified, and the memory capture may be reanalyzed as new techniques and approaches are discovered (Walters and Petroni, 2007). In order to demonstrate the value of memory forensics as an alternative to traditional incident response techniques it is necessary to duplicate or exceed the functionality of the standard incident response commands. Recent work has made significant progress in providing access to much of this information, including running processes and threads, active network connections, file handles, and open DLL files (Walters and Petroni, 2007) (Betz, 2005). In addition to finding active system objects these approaches have proven successful in identifying system objects that are associated with closed or disconnected processes, files and connections (Schuster, 2006). The ability to identify volatile information that is no longer accessible through the normal operation of the system is of substantial value. There is a need for more memory forensic techniques to extract user-entered data retained in various Microsoft Windows applications such as the Windows command prompt. Deallocated memory pages can remain in memory for some time and may be a source of forensically useful information even after a program has been closed (Solomon et al., 2007). As a result, memory pages that contain command history information may be recoverable even after the Windows command prompt has been closed. One approach to finding remnants of the command line history in memory captures is to search for known commands. In practice however there may be no known commands that can be used as a search term and it can be difficult to distinguish the command history from the contents of a file or of a display buffer. This approach also assumes that sequential commands are in the order they are entered, are not from several distinct command sessions, and are commands rather than unrelated command-like strings like a segment of a man page. A more useful approach to reconstructing command line history is to search the memory capture for the signature of the data structures used to store the command history. Dolan-Gavitt took this approach to identify Registry files stored in memory. This work was able to reconstruct a significant number of Registry keys that might not otherwise be recoverable (Dolan-Gavitt, 2008). Dolan-Gavitt s approach first identifies a Windows Registry hive by searching memory for a known header value. Once a Registry hive has been identified it is possible to identify the HiveList and resolve the remainder of the Registry hive objects. Kornblum s work also shows that the structures surrounding useful objects such as an encryption key can be used to identify object in memory (Kornblum, 2009). Both of these approaches demonstrate that a detailed knowledge of how data are stored in memory by an application is necessary to facilitate its recovery. DOSKEY has since been incorporated into the Windows command prompt as the DOSKEY command and allows the user to edit commands and access past commands. While using a Window command prompt the user can access past commands using the UP and DOWN arrows to cycle backwards and forwards through a list of saved commands. The entire command history can also be displayed by typing the command DOSKEY/history and the user can press the F7 key within the command prompt to open the DOSKEY command history window as shown in Fig. 1. By default DOSKEY displays at most the last 50 commands entered in the command prompt. This value can be configured by the user from a minimum buffer size of one command to a maximum buffer size of 999 commands. One interesting feature of the DOSKEY program is that it collapses sequential commands that are identical into a single DOSKEY history element. If the same command is entered several times in a row it will only be displayed once in the command history. DOSKEY also does not store empty commands. The command history buffer size can be modified by accessing the properties of the open command window. This variable can also be modified for all future command windows by editing the HKEY_CURRENT_USER\Console\HistoryBuffer- Size Registry key. DOSKEY also allows users to delete the contents of the command history by using the DOSKEY/reinstall command, and contains functionality that allows the creation and execution of DOS command macros (Microsoft, 2007). The DOSKEY command history is stored entirely in memory and is not written to the physical disk. The command history is only accessible when the command prompt is open and is no longer accessible when the command prompt is closed. In practice this makes recovering the command history difficult due to its volatile nature and the low likelihood of finding an open command window during an investigation (Carvey, 2008). These commands however may be recoverable from memory for some time after the window has been closed. In order to extract and reconstruct the DOSKEY command history, it is necessary to examine how DOSKEY stores commands in memory and then attempt to identify a signature or method in which they might be identified from a memory capture. 4. Data structures The only available information on how Windows command line information is stored can be found in functional 3. Windows command line history Microsoft operating systems originally provided command history functionality through the DOSKEY application. Fig. 1 e DOSKEY F7 History Option.
4 digital investigation 7 (2010) S57eS63 S59 commandhistory { 0x00 short ElementCount; 0x02 short endoffset; 0x04 short pointerindex; 0x06 short startoffset; 0x08 short HistoryBufferSize; Fig. 2 e A Single Command Element. explanations of the DOSKEY command on Microsoft TechNet (Microsoft, 2007). In order to understand more fully the functionality of the DOSKEY application and how it stores the command history in memory it was necessary to conduct a number of live experiments. Initial experiments were performed on Windows XP Professional SP3 on VMware Server configured with 512 MB of RAM. Windows XP was initially used to facilitate validation using publically available memory captures as discussed in the Evaluation section of this paper. Preliminary experiments revealed various remnants of commands in memory, primarily in Unicode. The majority of these remnants were from the display buffer of the command prompt window, or from messages generated when each command was executed. Each command did have a single string in memory that was associated with the DOSKEY command history. Through an analysis of these results the data structures for the DOSKEY command history element, the command history buffer and several possible methods for their identification were found. For example the command echo UniqueCommand1 as shown in Fig. 2 is 19 characters long which requires 38 bytes to store as a Unicode string. The short integer value stored at 0x4F2F30 that precedes the command string contains the hexadecimal value of 0x0026 which is equivalent to 38 decimal. Interestingly, these command elements were not found within the addressable memory of the command prompt executable but rather in the memory space of the Windows XP user run-time environment process (csrss.exe). This process, which is called the Client/Server Run-Time Subsystem, handles console or character based executables such as the command prompt executable cmd.exe (Russinovich and Solomon, 2005). Multiple experiments confirmed that the command history element was structured as indicated in Fig. 3. This data structure is useful for interpreting command history element that has already been located in memory, but is not sufficiently unique to be used as a signature. Fortunately a more distinctive memory structure was found that contains commandelement { } 0x00 short ByteCount; // Short, Little-Endian 0x02 char Command [ByteCount/2]; // UTF-16 Fig. 3 e Command Element Structure. } 0x16 commandhistory*? 0x20 commandhistory*? 0x24 0x28 commandelement1*; commandelement2*; 0x n commandelement HistoryBufferSize *; Fig. 4 e Command History Structure. a list of memory addresses, each of which points to a command history element. These memory addresses were found to be stored in sequential order in memory. Through additional experimentation it was determined that the command line history list was structured as indicated by Fig. 4. The most important element in this structure is the HistoryBufferSize. This value has a known default value of 50d or 0x0032 which provides an excellent indicator for a possible signature. The possible values for this field are between 0 and 999, or 0x0000 and 0x03E7. The ElementCount stores the number of commands stored in the DOSKEY CommandHistory structure. This value must be between 0 and the value stored in the HistoryBufferSize. The history array structure is fixed and has a maximum value of HistoryBufferSize. When a user enters more commands than the buffer can hold it overwrites the earliest stored entry with the most recent command. DOSKEY uses startoffset and endoffset to keep track of where the earliest and most recent commands are stored within the array of commandhistory elements. DOSKEY also maintains an index variable pointerindex which stores the index of the commandelement currently selected by the user if they have cycled within the list using the UP or DOWN keys. In practice, the DOSKEY Signature { } 0x00 0x02 0x04 0x06 short (between 0 and HistoryBufferSize) short (between -1 and HistoryBufferSize) short (between -1 and HistoryBufferSize) short (between 0 and HistoryBufferSize) 0x08 short (default value of 0x32) 0x16 0x20 commandhistory* (Valid Address) commandhistory* (Valid Address) Fig. 5 e DOSKEY Signature.
5 S60 digital investigation 7 (2010) S57eS63 Table 1 e Command history variables. Table 3 e Command History Variables. Element Count End offset Pointer index Start offset History buffer size Element Count End Offset Pointer index Start offset History buffer size pointerindex is typically 0. The startoffset, endoffset and pointerindex are also within the range of 0 and the value stored by the HistoryBufferSize. Of interest are two memory addresses located at offset 0x16 and 0x20 that contain the virtual address of the commandhistory object. This study was unable to determine the function of these values. However, research suggests that DOSKEY is capable of storing multiple history buffers, and these fields may be part of a double-linked list to additional commandhistory objects. These values may also be related to the DOSKEY commands macro functionality. In practice however these values were found to always indicate the address of the containing commandhistory object. The purpose of the values stored between 0x12 and 0x16 are also unknown. Additional study is required to determine the purpose of these fields. Based on these results, the following signature was constructed that identifies the DOSKEY command history structure in memory (Fig. 5). This signature is distinctive enough to locate any possible commandhistory objects in a memory capture with no prior knowledge of any possible commands. Once a commandhistory object is located, each commandelement within the object can be examined. Performing a brute force signature search across a memory capture is effective but time-consuming. Manual analysis to convert the physical to the virtual addresses and rebuild the command structure was relatively straight-forward but time-consuming. This process can be greatly aided by a tool that automatically maps out possible command history structures and their contents. possible DOSKEY signatures and output the results for relatively intensive, manual examination. This process proved to be useful but did not scale well and was time-consuming. To improve the process, a plug-in named cmd_history.py was written for the Volatility framework (Schuster, 2009); this plug-in both identified possible DOSKEY signatures and reconstructed the command history array that proved to be significantly faster and more resilient. The cmdhistoryscanner module in cmd_history.py was inspired by the cryptoscan module written by Jesse Kornblum for quickly searching for known object signatures (Kornblum, 2008). 6. Evaluation The signature and extraction method detailed in the previous section were validated using memory dumps made publically available by the Digital Forensics Research Workshop (DFRWS) and the National Institute of Standards and Testing (NIST) DFRWS 2008 Rodeo The Digital Forensics Research Workshop (DFRWS), 2008 Forensics Rodeo created a scenario where a trusted insider accessed confidential information without authorization. As part of the scenario a memory capture of the suspect laptop is provided. The signature-based approach identified a DOSKEY 5. Implementation The DOSKEY history signature was originally examined through a Perl script that parsed a memory capture for Table 2 e Command History Elements. Virtual Address Physical address Size (bytes) Command 004E8E88 149cfE88 8 cd \ 01283A20 14fbbA20 18 mkdir mem 01283B48 14fbbB48 12 cd mem 004E1FF8 80d6FF8 138 Z:\emidnight On My Mac \Downloads\mdd_1.3.exe -o svlaptop-memo Add. Command C0 14fbb9C0 88 (vxfer.exe X:\Secretplans \secretplans1.jpg 01283AE8 14fbbAE8 e...exe X:\Secretplans \secretplans B48 14fbbB48 12 cd mem 01283BA8 14fbbba8 84 svxfer.exe X:\Secretplans \secretplans7.jpg 004E1FA0 80d6FF8?? Table 4 e Command history elements. Virtual Address Physical address Size (bytes) Command 004E1F90 de7ff90 4 dd 004E2CB8 193ecCB8 6 cd\ 004E2D18 193ecD18 4 dr 004E2D28 193ecD28 6 ee: 004E2D38 193ecD38 4 e; 004E2D48 193ecD48 4 e: 004E2D58 193ecD58 4 dr 004E2D68 193ecD68 4 d; 004E2D78 193ecD78 4 d: 004E2D88 193ecD88 4 dr 004E2D98 193ecD98 4 ls 004E2Da8 193ecDa8 14 cd Docu 004E2DC0 193ecDC0 68 cd Documents and E2E58 193ecE58 4 dr 004E2E68 193ecE68 4 d: 004E2E78 193ecE78 12 cd dd\ 004E2E90 193ecE90 34 cd UnicodeRelease 004E2Ec0 193ecEc0 4 dr 004E2ED0 193ecED0 6 dd 004E dd if ¼ \\.\PhysicalMemory of ¼ c: \xp img conv ¼ noerror
6 digital investigation 7 (2010) S57eS63 S61 Table 5 e Command history variables. Element Count command history object at offset 0x152F9DB8 within the memory capture. The command history object indicated that there are four commands in the array (Table 1). On examination the array structure appeared to contain ten command element pointers, several of which resolved to valid command element objects as shown in Table 2. Several of the recovered command elements contain partial commands or are missing the ByteCount variable. The additional command elements indicate that the slack space within the command history buffer could be a valuable source of digital evidence. An examination of these additional commands led to the identification of several commands pertinent to the scenario. Further examination of the slack space at the end of each command element revealed several indications that earlier command elements were overwritten NIST reference data Set The DOSKEY history signature was also tested on Windows XP Memory images from the NIST Computer Forensics Reference Data Set project. These datasets are provided as reference data with documented contents that can be used to test tools and methodologies (NIST). Two memory images are provided for analysis: xp-laptop img and xp-laptop img. Both images were created using a Toshiba laptop running Windows XP. xp-laptop img: The signature-based approach identified a DOSKEY command history object at offset 0x19588D98. The command history object indicated that there are twenty commands in the array (Table 3). Each of the command elements appeared to be whole and intact (Table 4). xp-laptop img: The signature-based approach identified a DOSKEY command history object at offset 0x14408DA8. The command history object indicated that there are seven commands in the array tabulated below (Table 5). The seventh command entry was only partially recovered. The ByteCount variable however suggests that this command is the dd command used to take the memory sample (Table 6). While testing the initial signature it was found that the Table 6 e Command History Variables. Virtual address End Offset Physical address Pointer index Size (bytes) Start offset History buffer size Command 004E2D D28 4 d: 004E1F78 dcbff78 12 cd dd 004E2CC CC8 6 dir 004E2E E00 34 Cd UnicodeRelease 004E2CB CB8 6 dir/ 004E1F90 dcbff90 6 dd 004E1FF8 dcbfff8 88 dd... (presumably dd memory image command) command initiating the memory sample was often only partially recoverable. The final command element is an excellent example of the value of the ByteCount variable. In several instances throughout this study the ByteCount value remained intact but was followed by a partial command. It may be possible to infer the value of the command history element from the length stored in the ByteCount field and the fragment of the history item. In this case the ByteCount variable indicates the command is 44 characters long and started with dd e it is a reasonable assumption that this command relates to the dd command used to acquire the memory capture. 7. Interesting behaviors During the research a number of scenarios were examined to determine how the DOSKEY command stored useful information and how that information might be recovered. Several of the scenarios proved to be quite interesting and significantly improved the studies understanding of the DOSKEY command. A test scenario was created that tested the effect of the DOSKEY/reinstall command. This command installs a new copy of doskey and effectively clears the current DOSKEY command history buffer (Hill, 1998). The test environments utilized a number of known commands, executed the DOS- KEY/reinstall command and then examined the resulting memory capture. In this case the signature failed to identity a valid DOSKEY command history object within memory. A manual search for commands within the test command group failed to identify any intact command history elements for any of the search terms. A test virtual machine was built to examine this case. It was determined that when the reinstall command was performed, the DOSKEY command history values below are reinitialized to Fig. 6. This places the endoffset and pointerindex values outside of the values specified within the initial search parameters. Unfortunately this command also appears to reinitialize the pointers within the commandhistory array and the command history elements within the array. In subsequent tests a semi-intact command history and command history elements were successfully identified after the reinstall command was performed. In these cases it appears that portions of memory were reallocated so that orphaned fragments of the original objects were left intact. On examination these values appear to be the default values created when commandhistory { 0x00 short ElementCount = 0x0000; 0x02 short endoffset = 0xFFFF; 0x04 short pointerindex = 0xFFFF; 0x06 short startoffset = 0x0000; 0x08 short HistoryBufferSize; (Default 0x32) Fig. 6 e Default Command History Signature.
7 S62 digital investigation 7 (2010) S57eS63 a new command window is opened, so the presence of a blank DOSKEY command history buffer is not necessarily indicative of the reinstall command being performed. It was also noted that when multiple command prompts were opened, an independent DOSKEY command history buffer object was created for each command prompt. This was verified in a test scenario by opening two command prompts, entering unique commands into each command prompt, taking a memory capture and analyzing the resulting memory dump. The signature correctly identified two command buffer history structures which contained the command history of each command prompt respectively. In cases where the contents of multiple command prompt sessions can be found in memory, an analysis of the buffer would allow the commands for each session to be identified and separated. Several test environments were also created to test the recovery of DOSKEY command history buffer structures after a command window had been closed. This scenario involved opening two command prompts and entering unique commands into each command prompt. A baseline memory capture was then taken. One of the two command prompts was then closed, followed by a second memory capture shortly afterwards. This allowed for the comparison of allocated memory both before and after the command prompt had been closed and tested the recovery of a command history buffer in an ideal situation. In the initial tests of this scenario the entirety of the command history buffer was successfully recovered along with the majority of the associated command elements. In several cases the signature search was unable to find a valid command history structure because the structure had partially overwritten in memory. In these cases a manual analysis revealed partial fragments of the original DOSKEY history structures but was unable to recover the entire command history. 8. Conclusions Data structures such as those used by the DOSKEY command provide an excellent example of how memory forensics can provide forensic practitioners with valuable insight into what occurred on a compromised or suspect system. The presence of a preceding short value equal to the length of the following string in bytes could indicate that the string is a DOSKEY command. While this signature is useful in verifying that a suspect DOS command is a command history element it is not sufficiently distinct to be easily identified in a memory capture. It might be possible to combine this signature with a frequency analysis of DOS commands (such as looking for a greater than normal incidence of the : and \ characters) but it would be difficult to distinguish commands from surrounding Unicode values. The DOSKEY command stores the command history in a relatively simple data structure that exhibits sufficiently distinct characteristics to be readily identified within a memory capture. This study has shown that using this data structure, it is possible to recover the command history from a memory capture using this signature. The results of this study also demonstrated that the DOSKEY command buffer can contain slack space that often contains commands from earlier command windows or after the DOSKEY history has been cleared using the DOSKEY/reinstall command. Both the commandhistory and commandelement objects contain metadata that could prove to be of forensic value, even when it is not possible to recover the entire command history structure. Metadata within these data structures could allow the forensic examiner to determine the number of commands typed, determine the presence of missing commands, determine the order in which commands were entered and in some cases suggest the contents of a partially recovered command. The topedown approach of first identifying the command history buffer object proved to be highly effective when the command history structure was intact in memory. In practice however this structure may be partially overwritten when the command window is closed. Future approaches based on the signature of individual element should incorporate a level of tolerance to identify partial structures where one or more fields have been overwritten. It is still possible to use a bottomeup approach in these cases if an examiner is able to successfully identify a command element object. The success of the DOSKEY signature is based on the assumption that the examiner can determine the history buffer size. In most cases this will be the default value and in many cases the actual value can be determined by examining the systems registry. Reducing the dependence on the history buffer size might prove to be useful but could lead to a higher incidence of false positives. Identifying the purpose of the memory addresses stored at offsets 0x16 and 0x20 may also further refine the effectiveness of this signature. Future work in this area should find substantial value in examining similar data structures in other operating systems, and in particular Windows Vista, Windows 7 and the Power- Shell command prompt replacement. As this work expands it may be possible to implement a tool capable of carving a wide variety of such objects from memory. The process of extracting user-entered data from memory captures would be aided by the development of a unified signature database containing details about various data structures in memory. references Aqulina JM, Casey E, Malin CH. Malware forensics: investigating and analyzing Malicious Code. Burlington, MA, USA: Syngress Publishing; pp 60. Betz C. DFRWS 2005 Challenge Report, Digital Forensic Research Workshop 2005 Memory Analysis Challenge; Carvey H. Windows forensics analysis: incident response and Cybercrime investigation Secrets. Burlington, MA, USA: Syngress Publishing; pp. 39. Digital Forensics Research Workshop forensics Rodeo. accessed from, Dolan-Gavitt B. Forensic analysis of the windows registry in memory. Digital Investigation 2008;5(Suppl. 1). The Proceedings of the Eighth Annual DFRWS Conference. Hill T. The windows NT command Shell, windows NT Shell Scripting. accessed from. MacMillan Technical Publishing, aspx#xsltsection ; Kornblum J. CryptoScanner TrueCrypt Volatility plugin. accessed from,
8 digital investigation 7 (2010) S57eS63 S63 Kornblum J. Practical Methods for Dealing with Full Disk Encryption, Presented at Department of Defense Cyber Crime Conference; NIST (n.d.). Computer forensic reference data Sets, memory images. accessed from, Basic_Memory_Images.html. Russinovich MR, Solomon DA. Microsoft windows Internals, Microsoft windows Server 2003, windows XP, and windows th ed. Redmond, WA, USA: Microsoft Press; pp 53. Schuster A. Searching for processes and threads in Microsoft windows memory dumps. In: Proceedings of the 2006 digital forensics research Workshop (DFRWS); Schuster A. Windows Memory Forensics with Volatility (course slides), presented at FIRST accessed, forensikblog.de/files/talks/first2009-windows_memory_ Forensics_with_Volatility.zip; Solomon J, Heubner E, Bem D, Szeynska M. User data persistence in physical memory. Digital Investigation June 2007;4(2). Walters A, Petroni Jr NL. Volatools, integrating volatile memory forensics into the digital investigation process. Black Hat DC; Eoghan Casey is an Incident Response and Digital Forensic Analyst, responding to security breaches and analyzing digital evidence in a wide range of investigations, including network intrusions with international scope. He has extensive experience using digital forensics in response to security breaches to determine the origin, nature and extent of computer intrusions, and has utilized forensic and security techniques to secure compromised networks. He teaches at the Johns Hopkins University Information Security Institute and is the author of the widely used text book Digital Evidence and Computer Crime now in its second edition, is editor of the Handbook of Computer Crime Investigation. He is also the editor-in-chief of Elsevier s Digital Investigation journal. Richard Stevens is a Senior Systems Security Analyst for T. Rowe Price, where he is responsible for digital forensics, incident response and malware analysis. Richard holds a Bachelor of Computing (Honours) from the University of Tasmania, a Postgraduate Diploma in Information Security & Intelligence from Edith Cowan University and a Master of Science in Security Informatics from Johns Hopkins University. Richard s research is primarily focused on how memory forensics and malware analysis can be applied within the enterprise.
Q-CERT Workshop. Matthew Geiger [email protected]. 2007 Carnegie Mellon University
Memory Analysis Q-CERT Workshop Matthew Geiger [email protected] 2007 Carnegie Mellon University Outline Why live system forensics? Previous techniques Drawbacks and new thinking Approaches to memory acquisition
RECOVERING FROM SHAMOON
Executive Summary Fidelis Threat Advisory #1007 RECOVERING FROM SHAMOON November 1, 2012 Document Status: FINAL Last Revised: 2012-11-01 The Shamoon malware has received considerable coverage in the past
Using the HFSD journal for deleted file recovery
available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin Using the HFSD journal for deleted file recovery Aaron Burghardt*, Adam J. Feldman Booz Allen Hamilton, Herndon, VA 20171,
CHAD TILBURY. [email protected]. http://forensicmethods.com @chadtilbury
CHAD TILBURY [email protected] 0 Former: Special Agent with US Air Force Office of Special Investigations 0 Current: Incident Response and Computer Forensics Consultant 0 Over 12 years in the trenches
Automated Windows Event Log Forensics
DIGITAL FORENSIC RESEARCH CONFERENCE Automated Windows Event Log Forensics By Rich Murphey Presented At The Digital Forensic Research Conference DFRWS 2007 USA Pittsburgh, PA (Aug 13 th - 15 th ) DFRWS
Microsoft Vista: Serious Challenges for Digital Investigations
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2008 Microsoft Vista: Serious Challenges for Digital Investigations Darren R. Hayes and Shareq Qureshi Seidenberg School of
A Day in the Life of a Cyber Tool Developer
A Day in the Life of a Cyber Tool Developer by Jonathan Tomczak [email protected] Jonathan Tomczak ( Front Man ) Software Engineer w/ over 7 years experience working in software and web development Dave
Practical Methods for Dealing with Full Disk Encryption. Jesse Kornblum
C Y B E R S E C T O R Practical Methods for Dealing with Full Disk Encryption Jesse Kornblum Outline Introduction Types of Targets Finding Keys Tool Marks Example - BitLocker BitLocker Weakness Conclusion
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
SQL Server An Overview
SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
Alternate Data Streams in Forensic Investigations of File Systems Backups
Alternate Data Streams in Forensic Investigations of File Systems Backups Derek Bem and Ewa Z. Huebner School of Computing and Mathematics University of Western Sydney [email protected] and [email protected]
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
PN 00651. Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00
PN 00651 Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 First Edition This documentation was prepared to assist licensed
PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference
PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference What PTK is about PTK forensics is a computer forensic framework based on command line tools
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
32-Bit Workload Automation 5 for Windows on 64-Bit Windows Systems
32-Bit Workload Automation 5 for Windows on 64-Bit Windows Systems Overview 64-bit Windows Systems Modifying the Working Folder for Universal Server Components Applications Installed in the Windows System
FORENSIC ANALYSIS OF UNALLOCATED SPACE IN WINDOWS REGISTRY HIVE FILES. Jolanta Thomassen A DISSERTATION. The University of Liverpool
FORENSIC ANALYSIS OF UNALLOCATED SPACE IN WINDOWS REGISTRY HIVE FILES By Jolanta Thomassen A DISSERTATION Submitted to The University of Liverpool in partial fulfillment of the requirements for the degree
Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile
Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile Even before being acquired by Microsoft in 2011, Skype had already established a strong presence in the VoIP and instant messaging
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Practical Cryptographic Key Recovery
SMA CYBER Sector Practical Cryptographic Key Recovery Jesse Kornblum Outline Introduction Targets Current Methods Tool Marks Example - BitLocker Conclusion Targets Documented Open Source TrueCrypt Undocumented
Shadow Volume Trash: $Recycle.Bin Forensics for Windows 7 and Windows Vista Shadow Volumes
Shadow Volume Trash: $Recycle.Bin Forensics for Windows 7 and Windows Vista Shadow Volumes Timothy R. Leschke Forensic Computer Engineer U.S. Department of Defense Cyber Crime Institute 911 Elkridge Landing
Exchange Mailbox Protection Whitepaper
Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange
Last modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version 1.1.058
Last modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version 1.1.058 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Installing the TeamDrive Personal Server...
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Cleartext Passwords in Linux Memory
Cleartext Passwords in Linux Memory Sherri Davidoff [email protected] July 26, 2008 Abstract Upon examination, the memory of a popular Linux distribution contained many cleartext passwords, including login,
EVTXtract. Recovering EVTX Records from Unallocated Space PRESENTED BY: Willi Ballenthin OCT 6, 2013. Mandiant Corporation. All rights reserved.
EVTXtract Recovering EVTX Records from Unallocated Space PRESENTED BY: Willi Ballenthin OCT 6, 2013 What do we have here today? A technical presentation on a novel forensic technique for recovering past
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Digital forensic techniques for static analysis of NTFS images
Digital forensic techniques for static analysis of NTFS images Mamoun Alazab Internet Commerce Security Laboratory University of Ballarat, Australia [email protected] Sitalakshmi Venkatraman Internet
W ith the ubiquity of e-mail comes the increased A BNA, INC. DIGITAL DISCOVERY & E-EVIDENCE! Exchange Message Tracking Logs Message Forensics
A BNA, INC. DIGITAL DISCOVERY & E-EVIDENCE! VOL. 11, NO. 8 REPORT APRIL 14, 2011 BNA INSIGHT Exchange Message Tracking Logs Message Forensics BY JAMES R. SCARAZZO W ith the ubiquity of e-mail comes the
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
1 Basic commands. 2 Terminology. CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger
CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger 1 Basic commands This section describes a list of commonly used commands that are available on the EECS UNIX systems. Most commands are executed by
Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide
Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide This guide applies to the following Lexmark devices: Printers C780 C782 C935 T640 T642 T644 Multifunction Products X646
technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
Crash Proof - Data Loss Prevention
Crash Proof - Data Loss Prevention Software Crash Proof - Data Loss Prevention Crash Proof is data loss prevention software which once installed revives 100% data in the event of a data loss situation.
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Deploying EFS: Part 2
Deploying EFS: Part 2 John Morello You can think of any Encrypting File System (EFS) deployment as having essentially two parts: the back-end design portion focusing on certificate management and recovery
EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE
EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE Mamoun Alazab, Sitalakshmi Venkatraman, Paul Watters University of Ballarat, Australia {m.alazab, s.venkatraman, p.watters} @ballarat.edu.au ABSTRACT
Computer Forensics: Permanent Erasing
Computer Forensics: Permanent Erasing Prepared By : Yousef T. Aburabie and Mohamd Alomari Supervised By: Dr. Lo ai Tawalbeh, New York Institute of Technology (NYIT)-Jordan s campus-2006 Introduction "Delete"
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,
Web Browser Session Restore Forensics A valuable record of a user s internet activity for computer forensic examinations
A valuable record of a user s internet activity for computer forensic examinations Each session of activity in a Mozilla browser is recorded by the browser so that in the event of the browser crashing
Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected]
Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected] Education Ph.D. in Computer Science, University of New Orleans, 2009. Dissertation Topic: Advanced Techniques for Improving the
HP FutureSmart Firmware Device Hard Disk Security
HP FutureSmart Firmware Device Hard Disk Security Summary: This document discusses hard disk security for HP FutureSmart Firmware printing devices. Contents: Overview... 2 Secure Erase Commands... 2 1.
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
Lab III: Unix File Recovery Data Unit Level
New Mexico Tech Digital Forensics Fall 2006 Lab III: Unix File Recovery Data Unit Level Objectives - Review of unallocated space and extracting with dls - Interpret the file system information from the
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Lab - Dual Boot - Vista & Windows XP
Lab - Dual Boot - Vista & Windows XP Brought to you by RMRoberts.com After completing this lab activity, you will be able to: Install and configure a dual boot Windows XP and Vista operating systems. Explain
Forensic Analysis of Internet Explorer Activity Files
Forensic Analysis of Internet Explorer Activity Files by Keith J. Jones [email protected] 3/19/03 Table of Contents 1. Introduction 4 2. The Index.dat File Header 6 3. The HASH Table 10 4. The
Recover My Files v5.2.1. Test Results for Video File Carving Tool
Recover My Files v5.2.1 Test Results for Video File Carving Tool October 22, 2014 This report w as prepared for the Department of Homeland Security Science and Technology Directorate Cyber Security Division
Digital Forensic Tool for Decision Making in Computer Security Domain
Digital Forensic Tool for Decision Making in Computer Security Domain S. K. Khode 1,V. N. Pahune 2 and M. R. Sayankar 3 1, 2, 3 Computer Engineering Department of Bapurao Deshmukh College of Engineering,
AD Image Encryption. Format Version 1.2
AD Image Encryption Format Version 1.2 17 May 2010 Table of Contents Introduction... 3 Overview... 3 Image Formats... 4 Keys... 4 Credentials... 4 Certificates... 4 Image Key encryption... 5 Appendix A
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory p.1/11
FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory DFRWS 2006: Work in Progress (WIP) Aug 16, 2006 AAron Walters 4TΦ Research Nick L. Petroni Jr. University
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
VMware vsphere Data Protection 6.1
VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data
Configuring and Integrating Oracle
Configuring and Integrating Oracle The Basics of Oracle 3 Configuring SAM to Monitor an Oracle Database Server 4 This document includes basic information about Oracle and its role with SolarWinds SAM Adding
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
RAID installation guide for Silicon Image SiI3114
RAID installation guide for Silicon Image SiI3114 Contents Contents 2 1 Introduction 4 1.1 About this Guide 4 1.2 The Basics 4 1.2.1 What is RAID? 4 1.2.2 Advantages of RAID 4 1.2.3 Disadvantages of RAID
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
new Business Online Technical Troubleshooting Guide
new Business Online Technical Troubleshooting Guide TABLE OF CONTENTS How to install Java 1.6 Page 3 How to install Java 1.6 without ActiveX control Page 6 How to uninstall Java Runtime Environment Page
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Significance of Hash Value Generation in Digital Forensic: A Case Study
International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 2, Issue 5 (July 2012), PP. 64-70 Significance of Hash Value Generation in Digital
Fuzzy Hashing for Digital Forensic Investigators Dustin Hurlbut - AccessData January 9, 2009
Fuzzy Hashing for Digital Forensic Investigators Dustin Hurlbut - AccessData January 9, 2009 Abstract Fuzzy hashing allows the investigator to focus on potentially incriminating documents that may not
SMART Classroom Suite 2011
SMART Classroom Suite 2011 Windows operating systems System administrator s guide Trademark notice SMART Board, SMART Classroom Suite, SMART Notebook, SMART Response, SMART Sync, SMART Document Camera,
Win the race against time to stay ahead of cybercriminals
IBM Software Win the race against time to stay ahead of cybercriminals Get to the root cause of attacks fast with IBM Security QRadar Incident Forensics Highlights Help reduce the time required to determine
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
SPAMfighter Mail Gateway
SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4
Keywords: VoIP calls, packet extraction, packet analysis
Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
NetWrix Password Manager. Quick Start Guide
NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...
Note: A WebFOCUS Developer Studio license is required for each developer.
WebFOCUS FAQ s Q. What is WebFOCUS? A. WebFOCUS was developed by Information Builders Incorporated and is a comprehensive and fully integrated enterprise business intelligence system. The WebFOCUShttp://www.informationbuilders.com/products/webfocus/architecture.html
Attix5 Pro Storage Platform
Attix5 Pro Storage Platform V6.0 User Manual Cover for Microsoft Windows Your guide to configuring the Attix5 Pro Storage Platform. SERVER EDITION V6.0 for MICROSOFT WINDOWS Copyright Notice and Proprietary
CLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
Architecting the Future of Big Data
Hive ODBC Driver User Guide Revised: July 22, 2014 2012-2014 Hortonworks Inc. All Rights Reserved. Parts of this Program and Documentation include proprietary software and content that is copyrighted and
Forensic Decryption of FAT BitLocker Volumes
Forensic Decryption of FAT BitLocker Volumes P. Shabana Subair, C. Balan (&), S. Dija, and K.L. Thomas Centre for Development of Advanced Computing, PO Box 6520, Vellayambalam, Thiruvananthapuram 695033,
Embarcadero DB Change Manager 6.0 and DB Change Manager XE2
Product Documentation Embarcadero DB Change Manager 6.0 and DB Change Manager XE2 User Guide Versions 6.0, XE2 Last Revised April 15, 2011 2011 Embarcadero Technologies, Inc. Embarcadero, the Embarcadero
VMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
Techniques and Tools for Recovering and Analyzing Data from Volatile Memory
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Techniques
Feedback Ferret. Security Incident Response Plan
Feedback Ferret Security Incident Response Plan Document Reference Feedback Ferret Security Incident Response Plan Version 3.0 Date Created June 2013 Effective From 20 June 2013 Issued By Feedback Ferret
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Architecting the Future of Big Data
Hive ODBC Driver User Guide Revised: July 22, 2013 2012-2013 Hortonworks Inc. All Rights Reserved. Parts of this Program and Documentation include proprietary software and content that is copyrighted and
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
System Center 2012 R2 SP1 Configuration Manager & Microsoft Intune
2015 System Center 2012 R2 SP1 Configuration Manager & Microsoft Intune DEPLOYING MICROSOFT OFFICE 365 PROFESSIONAL PLUS RONNI PEDERSEN & HANS CHRISTIAN ANDERSEN RONNIPEDERSEN.COM Microsoft MVP: Enterprise
Impact+OCR 1.1 Readme
April 22, 2016 Impact+OCR 1.1 Readme Welcome to the Impact+OCR (Optical Character Recognition) application, a complete software and hardware application to solve your machine vision OCR needs. This is
