ADSL Router Forensics Part 2: Acquiring Evidence
نویسنده
چکیده
The demand for high-speed Internet access is escalating high sales of ADSL routers. In-turn this has prompted individuals to attack and exploit the vulnerabilities in these devices. To respond to these threats, methods of acquisition and analysis are needed. The configuration data provides a wealth of information into the current state of the device. Hence, this data may be used to identify and interpret unlawful ways in which the device was used. This paper is centres around an empirical learning approach identifying techniques to address the device’s acquirable limitations taking into consideration that the owner may not willingly present login credentials to directly access the device. This paper demonstrates a procedural method of obtaining data of interest from ADSL routers. It further elaborates on the methods by detailing how to extract and understand this configuration data.
منابع مشابه
ADSL Router Forensics Part 1: An introduction to a new source of electronic evidence
Currently there appears to be a lack of research in the area of developing tools, testing methodologies, and creating standards for ADSL router forensics. The paper examines a wide range of literature and introduces the concept of ADSL router forensics as a new and potential field of research for digital forensics investigators. It begins by examining why there is a need for router forensics by...
متن کاملAnalysis of Data Remaining on Second Hand ADSL Routers
In theory, an ADSL router can provide an additional layer of security to a wired and wireless network through; access control, wireless encryption, firewall rule sets, and network event logging. An ADSL router may also contain the users’ usage habits and broadband account credentials. However, end-users may be unaware of the intricacies of the security measures available and the potentially con...
متن کاملInsecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective
Because of prevalent threats to SoHo based ADSL Routers, many more devices are compromised. Whilst an end-user may be at fault for not applying the appropriate security mechanisms to counter these threats, vendors should equally share the blame. This paper reveals that the lack of security related content and poor overall design could impact on end-users’ interpretation and willingness to imple...
متن کاملSpectral Compatibility of ADSL and VDSL, Part 2: The Impact of ADSL on VDSL Performance
This contribution examines the effect of ADSL on VDSL when both reside in a single binder group. The potential loss in VDSL bit rate due to the presence of ADSL is qualified using channel capacity arguments. Of particular interest is the impact of the ADSL PSD beyond 1.104 MHz on VDSL performance, as high-level ADSL energy in this region can substantially impair achievable VDSL bit rates. The c...
متن کاملBluepipe: A Scalable Architecture for On-the-Spot Digital Forensics
Traditional digital forensics methods are based on the in-depth examination of computer systems in a lab setting. Such methods are standard practice in acquiring digital evidence and are indispensable as an investigative approach. However, they are also relatively heavyweight and expensive and require significant expertise on part of the investigator. Thus, they cannot be applied on a wider sca...
متن کامل