The problem comes from someone cluefull enough to wipe cookies/history and not keep incriminating files. The best best answer is a proxy server that logs all access and an email server that keeps a record of all mail. Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA Information Security Engineer DP Solutions cpurdyat_private 936.637.7977 ext. 121 ---------------------------------------- If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked. -- White House cybersecurity adviser Richard Clarke -----Original Message----- From: JJ [mailto:jjhorner@SAFe-mail.net] Sent: Monday, July 21, 2003 11:29 AM To: forensicsat_private Subject: Waste, Fraud, Abuse I'm in the process of updating our WFA analysis procedures. If any of you have defined (or mostly defined) procedures for investigation WFA, please send them my way. So far, we do the normal: 1. extract browser history 2. extract browser cache 3. extract all known information formats (pictures, word processing files, mp3s, wavs, etc) 4. extract cookies 5. extract activity as captured by NIDS Anything I need to add here? Anyone got any good (sanitized) final WFA reports? I'd also like to see if our format needs updating. I understand that a lot of this is based on company HR policy, but I'd like to see industry best practices, if I could. Thanks, JJ --------------------- J. J. Horner CISSP,CCNA,CHSS,CHP ----------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com ----------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Wed Jul 23 2003 - 04:59:35 PDT