SlideShare a Scribd company logo
SQL Forensics
SQL Server Forensics
In recent years, data security breaches have been a common theme in the news.
SQL Server forensics can be used to aid in the qualification and investigation of data security
breaches and to help a forensic investigator prove or disprove whether a suspected digital
intrusion has occurred.
If one did occur, the practice of SQL Server forensics can help determine whether it included
data protected by regulations/legislation and possibly prevent an organization from
incorrectly disclosing the occurrence of a digital intrusion involving this protected data.
It focuses directly on the identification, preservation, and analysis of the database data
suitable for presentation in a court of law.
It enables an investigator to better qualify, assess, and investigate intrusions involving SQL
Server data.
SQL Server Forensics
The application of SQL Server forensics during a digital investigation or
electronic discovery initiative can achieve the following goals:
• Prove or disprove the occurrence of a data security breach
• Determine the scope of a database intrusion
• Retrace user DML and DDL operations
• Identify data pre- and post-transactions
• Recover previously deleted data
Investigation Trigger
Almost all SQL Server forensic investigations you perform will be
undertaken in response to a specific digital event (or trigger).
Numerous triggers can initiate a database forensic investigation,
including these common events:
• Suspected unauthorized database usage
• A need to assess the scope of a digital intrusion involving
devices with logical access to a SQL Server
• Electronic discovery initiatives involving SQL Server data
SQL Server Forensics vs Traditional
Windows Forensics
A traditional Windows forensic investigation focuses on volatile and nonvolatile operating
system and selected application data. Applications such as Internet Explorer, the Microsoft
Office suite, and various instant messaging (IM) applications are typically targeted by
traditional digital forensic investigations. These investigations often neglect the database.
However, when the database is ignored, it is obviously difficult—and in some cases
impossible—for investigators to determine whether a database was compromised during
an attack.
SQL Server forensics picks up where traditional investigations end by focusing on the
database.
Acquisition Methods
Live Acquisition
Dead Acquisition
Hybrid
Acquisition
Acquisit
ion
Method
s
Live Acquisition
Live SQL Server acquisition is conducted using the resources and binaries of the target database
server. Live acquisition can be used to acquire both volatile and nonvolatile SQL Server data.
Because of the ever-increasing size of computer storage, live analysis is becoming more practical.
During a live investigation, all of the actions that you perform will alter the state of the server.
Whether you are interactively logging on to a database server to perform a live analysis or connecting
to a database server remotely, you will inevitably change data on the target system.
The following principles will help minimize the intrusiveness of an investigation based on live analysis:
• Include nonpersistent (volatile) data that would be lost if the server was shut down or SQL Server
services were restarted.
• Employ sound artifact collection methods to ensure that the integrity of collected artifacts are
maintained.
• Artifact collection should adhere to order of volatility principles
• All actions should be logged when possible to track investigator activity, and investigators should
be aware of the changes that their actions will introduce in relation to the target.
Connecting to a Live SQL Server
Interactive Connection: An investigator using an interactive
connection would interactively log on to a live SQL Server and use
incident response tools to acquire data. This interactive logon can
be performed by an investigator physically logging on to a server or
logically logging on using remote system administration software
such as Remote Desktop Protocol (RDP). Interactive connections
support the widest range of SQL Server protocols.
Remote Connection: When using a remote connection, an
investigator will use a separate networked computer to connect to
a live SQL Server and acquire data. Because this approach is
performed over the network, the SQL native client on the remote
computer and the target SQL Server will need to be configured to
support at least one common network-based SQL Server protocol
so that they can communicate.
Dead Acquisition
o Dead SQL Server acquisition is performed on a dormant SQL Server that is not
operational.
o Ideally, the SQL Server should be shut down using a “dirty” shutdown, commonly
accomplished by disconnecting the power cord(s) of a server. The obvious
downside to this approach is that all volatile data is lost when the system is
powered down.
o Once the SQL Server has been shut down, the system can be booted using a
floppy disk or boot media (e.g., CD), which will enable you to run a trusted data
acquisition application and acquire data.
o Dead analysis is deemed by many as the most reliable way to acquire digital data
from a target system. It is also typically faster than live analysis when imaging disks.
o A benefit to dead analysis is that its results can be easily reproduced because you
are dealing with static data images.
Hybrid Acquisition
o Hybrid acquisition can be viewed as a typical dead acquisition that is
performed after the live acquisition of volatile data.
o Live analysis doesn’t have to stop at volatile data.
o In some cases, it’s much easier to acquire selected nonvolatile data
using a live acquisition as opposed to extracting it from a dormant
system.
o Hybrid analysis allows you to control the ratio of live versus dead
acquisition to suit your needs.
SQL Server Forensic Methodology
02
Investigation
Preparedness
Incident
Verification
Artifact
Collection
Artifact
Analysis
Investigation Preparedness
● Investigation preparedness involves preparing the hardware and software
needed for an investigation.
● Steps to perform before a SQL Server Investigation:
1. Create a SQL Server incident response toolkit, which will ensure that the
tools required during future phases of the investigation are verified and
available upon request.
2. Prepare a forensic workstation for a SQL Server investigation.
3. Collect pre-developed SQL incident response scripts, which will
automate artifact preservation and reduce the time needed to preserve
key artifacts.
● Proper investigation preparedness can significantly increase the chances
of a successful outcome from the investigation.
Incident Verification
o Some organizations will not allow a database server to be removed from a
network to conduct a database forensic investigation without adequate
justification.
o During the incident verification phase, limited artifact collection and analysis is
performed to produce preliminary findings, with the goal of identifying digital
events that will justify the need for a full SQL Server forensic investigation.
o A third party, application, or system administrator may perform satisfactory
incident verification.
o In some scenarios, an organization may not have a say in the matter. In these
cases, the incident verification stage can be skipped and you can proceed
directly to artifact collection.
Artifact Collection
o Data collection involves the acquisition and preservation of data
targeted in the previous phase.
o During data collection, all database files and query outputs should be
preserved to ensure that their integrity was not compromised or
corrupted.
o Typically, data preservation is performed by generating digital hashes
using a trusted hashing algorithm such as MD5 or SHA-1.
o Data collection is a critical step in a database investigation, because
if your findings are selected for submission as evidence within a court
of law, you will need to prove the integrity of the data on which your
findings are based.
Artifact Analysis
SQL Forensic
Tools
Thank
You

More Related Content

Similar to SQL Forensics.pptx

RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)
Olesya Shelestova
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilityNandini Chandran
 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt
VarioTechnology
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSA
Splunk
 
13-Essential-Data-Validation-Checks.pdf
13-Essential-Data-Validation-Checks.pdf13-Essential-Data-Validation-Checks.pdf
13-Essential-Data-Validation-Checks.pdf
arifulislam946965
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
redpel dot com
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
 
Estimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics PlatformEstimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics Platform
DATAVERSITY
 
Proactive ops for container orchestration environments
Proactive ops for container orchestration environmentsProactive ops for container orchestration environments
Proactive ops for container orchestration environments
Docker, Inc.
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
Pvrtechnologies Nellore
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysisCARMEN ALCIVAR
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
chennaijp
 
SHOWDOWN: Threat Stack vs. Red Hat AuditD
SHOWDOWN: Threat Stack vs. Red Hat AuditDSHOWDOWN: Threat Stack vs. Red Hat AuditD
SHOWDOWN: Threat Stack vs. Red Hat AuditD
Threat Stack
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
Azim191210
 
Building a Security Operations Center
Building a Security Operations CenterBuilding a Security Operations Center
Building a Security Operations Center
LymanAlphaBlob
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
EthioTelecom_Getahun Biratu
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
IJTET Journal
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARL
Elasticsearch
 
trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...
swathi78
 
Microsoft SQL Family and GDPR
Microsoft SQL Family and GDPRMicrosoft SQL Family and GDPR
Microsoft SQL Family and GDPR
Antonios Chatzipavlis
 

Similar to SQL Forensics.pptx (20)

RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSA
 
13-Essential-Data-Validation-Checks.pdf
13-Essential-Data-Validation-Checks.pdf13-Essential-Data-Validation-Checks.pdf
13-Essential-Data-Validation-Checks.pdf
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Estimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics PlatformEstimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics Platform
 
Proactive ops for container orchestration environments
Proactive ops for container orchestration environmentsProactive ops for container orchestration environments
Proactive ops for container orchestration environments
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysis
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
 
SHOWDOWN: Threat Stack vs. Red Hat AuditD
SHOWDOWN: Threat Stack vs. Red Hat AuditDSHOWDOWN: Threat Stack vs. Red Hat AuditD
SHOWDOWN: Threat Stack vs. Red Hat AuditD
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
 
Building a Security Operations Center
Building a Security Operations CenterBuilding a Security Operations Center
Building a Security Operations Center
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARL
 
trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...trusted db a trusted hardware-based database with privacy and data confidenti...
trusted db a trusted hardware-based database with privacy and data confidenti...
 
Microsoft SQL Family and GDPR
Microsoft SQL Family and GDPRMicrosoft SQL Family and GDPR
Microsoft SQL Family and GDPR
 

More from mrcopyxerox

j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfk
j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfkj;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfk
j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfk
mrcopyxerox
 
CHANNELD PDF FILE FOR THE DOWNLOAD OF THE
CHANNELD PDF FILE FOR THE DOWNLOAD  OF THECHANNELD PDF FILE FOR THE DOWNLOAD  OF THE
CHANNELD PDF FILE FOR THE DOWNLOAD OF THE
mrcopyxerox
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
mrcopyxerox
 
LSCM (5).pptx
LSCM (5).pptxLSCM (5).pptx
LSCM (5).pptx
mrcopyxerox
 
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptx
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptxSEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptx
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptx
mrcopyxerox
 
Ch23S.ppt
Ch23S.pptCh23S.ppt
Ch23S.ppt
mrcopyxerox
 
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdf
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdfభారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdf
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdf
mrcopyxerox
 
Drug Transport and drug target.pptx
Drug Transport and drug target.pptxDrug Transport and drug target.pptx
Drug Transport and drug target.pptx
mrcopyxerox
 
Hero honda
Hero hondaHero honda
Hero honda
mrcopyxerox
 

More from mrcopyxerox (9)

j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfk
j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfkj;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfk
j;asdahsjdslajf';asjdf;ha;;ijdflaf;sahf;hsandfk
 
CHANNELD PDF FILE FOR THE DOWNLOAD OF THE
CHANNELD PDF FILE FOR THE DOWNLOAD  OF THECHANNELD PDF FILE FOR THE DOWNLOAD  OF THE
CHANNELD PDF FILE FOR THE DOWNLOAD OF THE
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
LSCM (5).pptx
LSCM (5).pptxLSCM (5).pptx
LSCM (5).pptx
 
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptx
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptxSEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptx
SEMINAR PRESENTATION ON RHEUMATOID ARTHRITIS.pptx
 
Ch23S.ppt
Ch23S.pptCh23S.ppt
Ch23S.ppt
 
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdf
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdfభారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdf
భారత రాజకీయ వ్యవస్థ-3_9065974_2023_06_15_18_36.pdf
 
Drug Transport and drug target.pptx
Drug Transport and drug target.pptxDrug Transport and drug target.pptx
Drug Transport and drug target.pptx
 
Hero honda
Hero hondaHero honda
Hero honda
 

Recently uploaded

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 

Recently uploaded (20)

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 

SQL Forensics.pptx

  • 2. SQL Server Forensics In recent years, data security breaches have been a common theme in the news. SQL Server forensics can be used to aid in the qualification and investigation of data security breaches and to help a forensic investigator prove or disprove whether a suspected digital intrusion has occurred. If one did occur, the practice of SQL Server forensics can help determine whether it included data protected by regulations/legislation and possibly prevent an organization from incorrectly disclosing the occurrence of a digital intrusion involving this protected data. It focuses directly on the identification, preservation, and analysis of the database data suitable for presentation in a court of law. It enables an investigator to better qualify, assess, and investigate intrusions involving SQL Server data.
  • 3. SQL Server Forensics The application of SQL Server forensics during a digital investigation or electronic discovery initiative can achieve the following goals: • Prove or disprove the occurrence of a data security breach • Determine the scope of a database intrusion • Retrace user DML and DDL operations • Identify data pre- and post-transactions • Recover previously deleted data
  • 4. Investigation Trigger Almost all SQL Server forensic investigations you perform will be undertaken in response to a specific digital event (or trigger). Numerous triggers can initiate a database forensic investigation, including these common events: • Suspected unauthorized database usage • A need to assess the scope of a digital intrusion involving devices with logical access to a SQL Server • Electronic discovery initiatives involving SQL Server data
  • 5. SQL Server Forensics vs Traditional Windows Forensics A traditional Windows forensic investigation focuses on volatile and nonvolatile operating system and selected application data. Applications such as Internet Explorer, the Microsoft Office suite, and various instant messaging (IM) applications are typically targeted by traditional digital forensic investigations. These investigations often neglect the database. However, when the database is ignored, it is obviously difficult—and in some cases impossible—for investigators to determine whether a database was compromised during an attack. SQL Server forensics picks up where traditional investigations end by focusing on the database.
  • 6.
  • 7. Acquisition Methods Live Acquisition Dead Acquisition Hybrid Acquisition Acquisit ion Method s
  • 8. Live Acquisition Live SQL Server acquisition is conducted using the resources and binaries of the target database server. Live acquisition can be used to acquire both volatile and nonvolatile SQL Server data. Because of the ever-increasing size of computer storage, live analysis is becoming more practical. During a live investigation, all of the actions that you perform will alter the state of the server. Whether you are interactively logging on to a database server to perform a live analysis or connecting to a database server remotely, you will inevitably change data on the target system. The following principles will help minimize the intrusiveness of an investigation based on live analysis: • Include nonpersistent (volatile) data that would be lost if the server was shut down or SQL Server services were restarted. • Employ sound artifact collection methods to ensure that the integrity of collected artifacts are maintained. • Artifact collection should adhere to order of volatility principles • All actions should be logged when possible to track investigator activity, and investigators should be aware of the changes that their actions will introduce in relation to the target.
  • 9. Connecting to a Live SQL Server Interactive Connection: An investigator using an interactive connection would interactively log on to a live SQL Server and use incident response tools to acquire data. This interactive logon can be performed by an investigator physically logging on to a server or logically logging on using remote system administration software such as Remote Desktop Protocol (RDP). Interactive connections support the widest range of SQL Server protocols. Remote Connection: When using a remote connection, an investigator will use a separate networked computer to connect to a live SQL Server and acquire data. Because this approach is performed over the network, the SQL native client on the remote computer and the target SQL Server will need to be configured to support at least one common network-based SQL Server protocol so that they can communicate.
  • 10. Dead Acquisition o Dead SQL Server acquisition is performed on a dormant SQL Server that is not operational. o Ideally, the SQL Server should be shut down using a “dirty” shutdown, commonly accomplished by disconnecting the power cord(s) of a server. The obvious downside to this approach is that all volatile data is lost when the system is powered down. o Once the SQL Server has been shut down, the system can be booted using a floppy disk or boot media (e.g., CD), which will enable you to run a trusted data acquisition application and acquire data. o Dead analysis is deemed by many as the most reliable way to acquire digital data from a target system. It is also typically faster than live analysis when imaging disks. o A benefit to dead analysis is that its results can be easily reproduced because you are dealing with static data images.
  • 11. Hybrid Acquisition o Hybrid acquisition can be viewed as a typical dead acquisition that is performed after the live acquisition of volatile data. o Live analysis doesn’t have to stop at volatile data. o In some cases, it’s much easier to acquire selected nonvolatile data using a live acquisition as opposed to extracting it from a dormant system. o Hybrid analysis allows you to control the ratio of live versus dead acquisition to suit your needs.
  • 12. SQL Server Forensic Methodology 02 Investigation Preparedness Incident Verification Artifact Collection Artifact Analysis
  • 13. Investigation Preparedness ● Investigation preparedness involves preparing the hardware and software needed for an investigation. ● Steps to perform before a SQL Server Investigation: 1. Create a SQL Server incident response toolkit, which will ensure that the tools required during future phases of the investigation are verified and available upon request. 2. Prepare a forensic workstation for a SQL Server investigation. 3. Collect pre-developed SQL incident response scripts, which will automate artifact preservation and reduce the time needed to preserve key artifacts. ● Proper investigation preparedness can significantly increase the chances of a successful outcome from the investigation.
  • 14. Incident Verification o Some organizations will not allow a database server to be removed from a network to conduct a database forensic investigation without adequate justification. o During the incident verification phase, limited artifact collection and analysis is performed to produce preliminary findings, with the goal of identifying digital events that will justify the need for a full SQL Server forensic investigation. o A third party, application, or system administrator may perform satisfactory incident verification. o In some scenarios, an organization may not have a say in the matter. In these cases, the incident verification stage can be skipped and you can proceed directly to artifact collection.
  • 15. Artifact Collection o Data collection involves the acquisition and preservation of data targeted in the previous phase. o During data collection, all database files and query outputs should be preserved to ensure that their integrity was not compromised or corrupted. o Typically, data preservation is performed by generating digital hashes using a trusted hashing algorithm such as MD5 or SHA-1. o Data collection is a critical step in a database investigation, because if your findings are selected for submission as evidence within a court of law, you will need to prove the integrity of the data on which your findings are based.