...
首页> 外文期刊>Journal of Mobile, Embedded and Distributed Systems >Live Forensics – Extracting Credentials on Windows and Linux Systems
【24h】

Live Forensics – Extracting Credentials on Windows and Linux Systems

机译:实时取证–在Windows和Linux系统上提取凭证

获取原文

摘要

’Post-mortem’ analysis of a system can be greatly simplified if the correct information is gathered in the live analysis stage. In this paper I’ve described Windows’ data protection APIs available for developers, some simplified versions of the API (LSA Secrets, Protected Storage), different methods used by applications to store their passwords safely and comparisons between them. As an example, I’ve built tools to dump passwords saved by browsers (Chrome, IE, Firefox) and an extractor of the login password (if available) from the registry. The basic concepts of how passwords may be stored apply to majority of applications that run on Windows and store passwords (protected or not) and understanding this makes possible recovery of other credentials also (messaging software, mail clients ...). On the Linux side, I’ve analyzed a general method of storing passwords – keyrings , and the methods adopted by Chrome browser, and built extraction command line tools for both of them, in the form of a python script and a C++ application.
机译:如果在实时分析阶段收集了正确的信息,则可以大大简化系统的“事后分析”。在本文中,我描述了可供开发人员使用的Windows数据保护API,API的某些简化版本(LSA机密,受保护的存储),应用程序用于安全存储密码的不同方法以及它们之间的比较。举例来说,我构建了一些工具来转储浏览器(Chrome,IE,Firefox)保存的密码以及注册表中登录密码的提取器(如果有)。密码存储方式的基本概念适用于大多数在Windows上运行并存储密码(受保护或不受保护)的应用程序,了解这一点还可以恢复其他凭据(消息软件,邮件客户端等)。在Linux方面,我分析了一种通用的密码存储方法-密钥环,以及Chrome浏览器采用的方法,并以python脚本和C ++应用程序的形式为二者构建了提取命令行工具。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号