Chad had an excellent post recently regarding geolocation data; besides mobile devices, Windows systems can potentially contain two sources of geolocation information. One is the WiFi MAC addresses that you can retrieve from the Registry...once you do, you can use tools like macl.pl to plot the location of the WAP on a map. Second, some users back up their smartphones to their desktop, using iTunes or the BlackBerry Desktop Manager...you may be able to pull geolocation information from these backups, as well. Check out the FOSS page for some tools that may help you extract that information.
Interviews
Like most analysts, I like to see or hear what other analysts are seeing, and how they're addressing what they're seeing.

I remember a discussion I had with members of the IBM ISS X-Force a while ago regarding an Excel exploit that allowed them access to a system. I asked about artifacts, and was told that there were none. I asked explicitly that if the exploit included sending a malicious Excel file and having the user open it, wouldn't the Excel spreadsheet be an "artifact"? After all, many a forensicator has nailed down a phishing attack by locating the malicious PDF file in the email attachment archive.
Interestingly, Ryan also mentions digital "pocket litter", which isn't something that many folks who try to hide their activities are really aware of...

Another cool thing about the interview is that you get to see Chris's office, and hear his cell phone ring tone!
1 comment:
I was just thinking today about the same thing Ryan Washington seems to be talking about.
The choice of evading one method of detection usually opens them up to another method of detection. Whether it's overlapping fragments to evade an IDS, packing malware to evade AV software, putting DLLs in the Windows/Fonts folder with a .fon file extension. Unlinking a process from the doubly linked list, etc.
It's like playing a game of Whack-A-Mole. As soon as they evade one form of detection, they have to deal with another. Their evasion is only effective until someone looks at the right data in the right way, at which point they stick out like a sore thumb.
Post a Comment