SlideShare a Scribd company logo
1 of 18
SQL Forensics
SQL Server Forensics
In recent years, data security breaches have been a common theme in the news.
SQL Server forensics can be used to aid in the qualification and investigation of data security
breaches and to help a forensic investigator prove or disprove whether a suspected digital
intrusion has occurred.
If one did occur, the practice of SQL Server forensics can help determine whether it included
data protected by regulations/legislation and possibly prevent an organization from
incorrectly disclosing the occurrence of a digital intrusion involving this protected data.
It focuses directly on the identification, preservation, and analysis of the database data
suitable for presentation in a court of law.
It enables an investigator to better qualify, assess, and investigate intrusions involving SQL
Server data.
SQL Server Forensics
The application of SQL Server forensics during a digital investigation or
electronic discovery initiative can achieve the following goals:
• Prove or disprove the occurrence of a data security breach
• Determine the scope of a database intrusion
• Retrace user DML and DDL operations
• Identify data pre- and post-transactions
• Recover previously deleted data
Investigation Trigger
Almost all SQL Server forensic investigations you perform will be
undertaken in response to a specific digital event (or trigger).
Numerous triggers can initiate a database forensic investigation,
including these common events:
• Suspected unauthorized database usage
• A need to assess the scope of a digital intrusion involving
devices with logical access to a SQL Server
• Electronic discovery initiatives involving SQL Server data
SQL Server Forensics vs Traditional
Windows Forensics
A traditional Windows forensic investigation focuses on volatile and nonvolatile operating
system and selected application data. Applications such as Internet Explorer, the Microsoft
Office suite, and various instant messaging (IM) applications are typically targeted by
traditional digital forensic investigations. These investigations often neglect the database.
However, when the database is ignored, it is obviously difficult—and in some cases
impossible—for investigators to determine whether a database was compromised during
an attack.
SQL Server forensics picks up where traditional investigations end by focusing on the
database.
Acquisition Methods
Live Acquisition
Dead Acquisition
Hybrid
Acquisition
Acquisit
ion
Method
s
Live Acquisition
Live SQL Server acquisition is conducted using the resources and binaries of the target database
server. Live acquisition can be used to acquire both volatile and nonvolatile SQL Server data.
Because of the ever-increasing size of computer storage, live analysis is becoming more practical.
During a live investigation, all of the actions that you perform will alter the state of the server.
Whether you are interactively logging on to a database server to perform a live analysis or connecting
to a database server remotely, you will inevitably change data on the target system.
The following principles will help minimize the intrusiveness of an investigation based on live analysis:
• Include nonpersistent (volatile) data that would be lost if the server was shut down or SQL Server
services were restarted.
• Employ sound artifact collection methods to ensure that the integrity of collected artifacts are
maintained.
• Artifact collection should adhere to order of volatility principles
• All actions should be logged when possible to track investigator activity, and investigators should
be aware of the changes that their actions will introduce in relation to the target.
Connecting to a Live SQL Server
Interactive Connection: An investigator using an interactive
connection would interactively log on to a live SQL Server and use
incident response tools to acquire data. This interactive logon can
be performed by an investigator physically logging on to a server or
logically logging on using remote system administration software
such as Remote Desktop Protocol (RDP). Interactive connections
support the widest range of SQL Server protocols.
Remote Connection: When using a remote connection, an
investigator will use a separate networked computer to connect to
a live SQL Server and acquire data. Because this approach is
performed over the network, the SQL native client on the remote
computer and the target SQL Server will need to be configured to
support at least one common network-based SQL Server protocol
so that they can communicate.
Dead Acquisition
o Dead SQL Server acquisition is performed on a dormant SQL Server that is not
operational.
o Ideally, the SQL Server should be shut down using a “dirty” shutdown, commonly
accomplished by disconnecting the power cord(s) of a server. The obvious
downside to this approach is that all volatile data is lost when the system is
powered down.
o Once the SQL Server has been shut down, the system can be booted using a
floppy disk or boot media (e.g., CD), which will enable you to run a trusted data
acquisition application and acquire data.
o Dead analysis is deemed by many as the most reliable way to acquire digital data
from a target system. It is also typically faster than live analysis when imaging disks.
o A benefit to dead analysis is that its results can be easily reproduced because you
are dealing with static data images.
Hybrid Acquisition
o Hybrid acquisition can be viewed as a typical dead acquisition that is
performed after the live acquisition of volatile data.
o Live analysis doesn’t have to stop at volatile data.
o In some cases, it’s much easier to acquire selected nonvolatile data
using a live acquisition as opposed to extracting it from a dormant
system.
o Hybrid analysis allows you to control the ratio of live versus dead
acquisition to suit your needs.
SQL Server Forensic Methodology
02
Investigation
Preparedness
Incident
Verification
Artifact
Collection
Artifact
Analysis
Investigation Preparedness
● Investigation preparedness involves preparing the hardware and software
needed for an investigation.
● Steps to perform before a SQL Server Investigation:
1. Create a SQL Server incident response toolkit, which will ensure that the
tools required during future phases of the investigation are verified and
available upon request.
2. Prepare a forensic workstation for a SQL Server investigation.
3. Collect pre-developed SQL incident response scripts, which will
automate artifact preservation and reduce the time needed to preserve
key artifacts.
● Proper investigation preparedness can significantly increase the chances
of a successful outcome from the investigation.
Incident Verification
o Some organizations will not allow a database server to be removed from a
network to conduct a database forensic investigation without adequate
justification.
o During the incident verification phase, limited artifact collection and analysis is
performed to produce preliminary findings, with the goal of identifying digital
events that will justify the need for a full SQL Server forensic investigation.
o A third party, application, or system administrator may perform satisfactory
incident verification.
o In some scenarios, an organization may not have a say in the matter. In these
cases, the incident verification stage can be skipped and you can proceed
directly to artifact collection.
Artifact Collection
o Data collection involves the acquisition and preservation of data
targeted in the previous phase.
o During data collection, all database files and query outputs should be
preserved to ensure that their integrity was not compromised or
corrupted.
o Typically, data preservation is performed by generating digital hashes
using a trusted hashing algorithm such as MD5 or SHA-1.
o Data collection is a critical step in a database investigation, because
if your findings are selected for submission as evidence within a court
of law, you will need to prove the integrity of the data on which your
findings are based.
Artifact Analysis
SQL Forensic
Tools
Thank
You

More Related Content

Similar to SQL Forensics.pptx

RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)Olesya Shelestova
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilityNandini Chandran
 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).pptVarioTechnology
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunk
 
13-Essential-Data-Validation-Checks.pdf
13-Essential-Data-Validation-Checks.pdf13-Essential-Data-Validation-Checks.pdf
13-Essential-Data-Validation-Checks.pdfarifulislam946965
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Estimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics PlatformEstimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics PlatformDATAVERSITY
 
Proactive ops for container orchestration environments
Proactive ops for container orchestration environmentsProactive ops for container orchestration environments
Proactive ops for container orchestration environmentsDocker, Inc.
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePvrtechnologies Nellore
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysisCARMEN ALCIVAR
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...chennaijp
 
SHOWDOWN: Threat Stack vs. Red Hat AuditD
SHOWDOWN: Threat Stack vs. Red Hat AuditDSHOWDOWN: Threat Stack vs. Red Hat AuditD
SHOWDOWN: Threat Stack vs. Red Hat AuditDThreat Stack
 
Building a Security Operations Center
Building a Security Operations CenterBuilding a Security Operations Center
Building a Security Operations CenterLymanAlphaBlob
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptAzim191210
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsIJTET Journal
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLElasticsearch
 
trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...swathi78
 

Similar to SQL Forensics.pptx (20)

RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSA
 
13-Essential-Data-Validation-Checks.pdf
13-Essential-Data-Validation-Checks.pdf13-Essential-Data-Validation-Checks.pdf
13-Essential-Data-Validation-Checks.pdf
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Estimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics PlatformEstimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics Platform
 
Proactive ops for container orchestration environments
Proactive ops for container orchestration environmentsProactive ops for container orchestration environments
Proactive ops for container orchestration environments
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysis
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
 
SHOWDOWN: Threat Stack vs. Red Hat AuditD
SHOWDOWN: Threat Stack vs. Red Hat AuditDSHOWDOWN: Threat Stack vs. Red Hat AuditD
SHOWDOWN: Threat Stack vs. Red Hat AuditD
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
 
Building a Security Operations Center
Building a Security Operations CenterBuilding a Security Operations Center
Building a Security Operations Center
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARL
 
trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...
 
Microsoft SQL Family and GDPR
Microsoft SQL Family and GDPRMicrosoft SQL Family and GDPR
Microsoft SQL Family and GDPR
 

More from mrcopyxerox

j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfk
j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfkj;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfk
j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfkmrcopyxerox
 
CHANNELD PDF FILE FOR THE DOWNLOAD OF THE
CHANNELD PDF FILE FOR THE DOWNLOAD  OF THECHANNELD PDF FILE FOR THE DOWNLOAD  OF THE
CHANNELD PDF FILE FOR THE DOWNLOAD OF THEmrcopyxerox
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdfmrcopyxerox
 
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptx
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptxSEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptx
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptxmrcopyxerox
 
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdf
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdfభారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdf
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdfmrcopyxerox
 
Drug Transport and drug target.pptx
Drug Transport and drug target.pptxDrug Transport and drug target.pptx
Drug Transport and drug target.pptxmrcopyxerox
 

More from mrcopyxerox (9)

j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfk
j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfkj;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfk
j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfk
 
CHANNELD PDF FILE FOR THE DOWNLOAD OF THE
CHANNELD PDF FILE FOR THE DOWNLOAD  OF THECHANNELD PDF FILE FOR THE DOWNLOAD  OF THE
CHANNELD PDF FILE FOR THE DOWNLOAD OF THE
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
LSCM (5).pptx
LSCM (5).pptxLSCM (5).pptx
LSCM (5).pptx
 
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptx
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptxSEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptx
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptx
 
Ch23S.ppt
Ch23S.pptCh23S.ppt
Ch23S.ppt
 
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdf
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdfభారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdf
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdf
 
Drug Transport and drug target.pptx
Drug Transport and drug target.pptxDrug Transport and drug target.pptx
Drug Transport and drug target.pptx
 
Hero honda
Hero hondaHero honda
Hero honda
 

Recently uploaded

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 

Recently uploaded (20)

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 

SQL Forensics.pptx

  • 2. SQL Server Forensics In recent years, data security breaches have been a common theme in the news. SQL Server forensics can be used to aid in the qualification and investigation of data security breaches and to help a forensic investigator prove or disprove whether a suspected digital intrusion has occurred. If one did occur, the practice of SQL Server forensics can help determine whether it included data protected by regulations/legislation and possibly prevent an organization from incorrectly disclosing the occurrence of a digital intrusion involving this protected data. It focuses directly on the identification, preservation, and analysis of the database data suitable for presentation in a court of law. It enables an investigator to better qualify, assess, and investigate intrusions involving SQL Server data.
  • 3. SQL Server Forensics The application of SQL Server forensics during a digital investigation or electronic discovery initiative can achieve the following goals: • Prove or disprove the occurrence of a data security breach • Determine the scope of a database intrusion • Retrace user DML and DDL operations • Identify data pre- and post-transactions • Recover previously deleted data
  • 4. Investigation Trigger Almost all SQL Server forensic investigations you perform will be undertaken in response to a specific digital event (or trigger). Numerous triggers can initiate a database forensic investigation, including these common events: • Suspected unauthorized database usage • A need to assess the scope of a digital intrusion involving devices with logical access to a SQL Server • Electronic discovery initiatives involving SQL Server data
  • 5. SQL Server Forensics vs Traditional Windows Forensics A traditional Windows forensic investigation focuses on volatile and nonvolatile operating system and selected application data. Applications such as Internet Explorer, the Microsoft Office suite, and various instant messaging (IM) applications are typically targeted by traditional digital forensic investigations. These investigations often neglect the database. However, when the database is ignored, it is obviously difficult—and in some cases impossible—for investigators to determine whether a database was compromised during an attack. SQL Server forensics picks up where traditional investigations end by focusing on the database.
  • 6.
  • 7. Acquisition Methods Live Acquisition Dead Acquisition Hybrid Acquisition Acquisit ion Method s
  • 8. Live Acquisition Live SQL Server acquisition is conducted using the resources and binaries of the target database server. Live acquisition can be used to acquire both volatile and nonvolatile SQL Server data. Because of the ever-increasing size of computer storage, live analysis is becoming more practical. During a live investigation, all of the actions that you perform will alter the state of the server. Whether you are interactively logging on to a database server to perform a live analysis or connecting to a database server remotely, you will inevitably change data on the target system. The following principles will help minimize the intrusiveness of an investigation based on live analysis: • Include nonpersistent (volatile) data that would be lost if the server was shut down or SQL Server services were restarted. • Employ sound artifact collection methods to ensure that the integrity of collected artifacts are maintained. • Artifact collection should adhere to order of volatility principles • All actions should be logged when possible to track investigator activity, and investigators should be aware of the changes that their actions will introduce in relation to the target.
  • 9. Connecting to a Live SQL Server Interactive Connection: An investigator using an interactive connection would interactively log on to a live SQL Server and use incident response tools to acquire data. This interactive logon can be performed by an investigator physically logging on to a server or logically logging on using remote system administration software such as Remote Desktop Protocol (RDP). Interactive connections support the widest range of SQL Server protocols. Remote Connection: When using a remote connection, an investigator will use a separate networked computer to connect to a live SQL Server and acquire data. Because this approach is performed over the network, the SQL native client on the remote computer and the target SQL Server will need to be configured to support at least one common network-based SQL Server protocol so that they can communicate.
  • 10. Dead Acquisition o Dead SQL Server acquisition is performed on a dormant SQL Server that is not operational. o Ideally, the SQL Server should be shut down using a “dirty” shutdown, commonly accomplished by disconnecting the power cord(s) of a server. The obvious downside to this approach is that all volatile data is lost when the system is powered down. o Once the SQL Server has been shut down, the system can be booted using a floppy disk or boot media (e.g., CD), which will enable you to run a trusted data acquisition application and acquire data. o Dead analysis is deemed by many as the most reliable way to acquire digital data from a target system. It is also typically faster than live analysis when imaging disks. o A benefit to dead analysis is that its results can be easily reproduced because you are dealing with static data images.
  • 11. Hybrid Acquisition o Hybrid acquisition can be viewed as a typical dead acquisition that is performed after the live acquisition of volatile data. o Live analysis doesn’t have to stop at volatile data. o In some cases, it’s much easier to acquire selected nonvolatile data using a live acquisition as opposed to extracting it from a dormant system. o Hybrid analysis allows you to control the ratio of live versus dead acquisition to suit your needs.
  • 12. SQL Server Forensic Methodology 02 Investigation Preparedness Incident Verification Artifact Collection Artifact Analysis
  • 13. Investigation Preparedness ● Investigation preparedness involves preparing the hardware and software needed for an investigation. ● Steps to perform before a SQL Server Investigation: 1. Create a SQL Server incident response toolkit, which will ensure that the tools required during future phases of the investigation are verified and available upon request. 2. Prepare a forensic workstation for a SQL Server investigation. 3. Collect pre-developed SQL incident response scripts, which will automate artifact preservation and reduce the time needed to preserve key artifacts. ● Proper investigation preparedness can significantly increase the chances of a successful outcome from the investigation.
  • 14. Incident Verification o Some organizations will not allow a database server to be removed from a network to conduct a database forensic investigation without adequate justification. o During the incident verification phase, limited artifact collection and analysis is performed to produce preliminary findings, with the goal of identifying digital events that will justify the need for a full SQL Server forensic investigation. o A third party, application, or system administrator may perform satisfactory incident verification. o In some scenarios, an organization may not have a say in the matter. In these cases, the incident verification stage can be skipped and you can proceed directly to artifact collection.
  • 15. Artifact Collection o Data collection involves the acquisition and preservation of data targeted in the previous phase. o During data collection, all database files and query outputs should be preserved to ensure that their integrity was not compromised or corrupted. o Typically, data preservation is performed by generating digital hashes using a trusted hashing algorithm such as MD5 or SHA-1. o Data collection is a critical step in a database investigation, because if your findings are selected for submission as evidence within a court of law, you will need to prove the integrity of the data on which your findings are based.