Product SiteDocumentation Site

11.4. 科学捜査

If you wish to gather more information, the tct (The Coroner's Toolkit from Dan Farmer and Wietse Venema) package contains utilities which perform a post mortem analysis of a system. tct allows the user to collect information about deleted files, running processes and more. See the included documentation for more information. These same utilities and some others can be found in http://www.sleuthkit.org/ by Brian Carrier, which provides a web front-end for forensic analysis of disk images. In Debian you can find both sleuthkit (the tools) and autopsy (the graphical front-end).
科学捜査は常にデータのバックアップコピーに対して行うべきです。データ そのものに対して行ってはいけません。なぜならデータが解析中に 変更されるかも (そして失われるかも) しれないからです。
You will find more information on forensic analysis in Dan Farmer's and Wietse Venema's http://www.porcupine.org/forensics/forensic-discovery/ book (available online), as well as in their http://www.porcupine.org/forensics/column.html and their http://www.porcupine.org/forensics/handouts.html. Brian Carrier's newsletter http://www.sleuthkit.org/informer/index.php is also a very good resource on forensic analysis tips. Finally, the http://www.honeynet.org/misc/chall.html are an excellent way to hone your forensic analysis skills as they include real attacks against honeypot systems and provide challenges that vary from forensic analysis of disks to firewall logs and packet captures. For information about available forensics packages in Debian visit http://forensics.alioth.debian.org/
FIXME。この段落には将来の Debian システムでの科学捜査についての情報を もっと提供できたらと思う。
FIXME: CD 上の md5sum に対して、そして別のパーティションに復旧された ファイルシステムに対して安定版システム上で debsums をどう使うか述べる。
FIXME: Add pointers to forensic analysis papers (like the Honeynet's reverse challenge or http://staff.washington.edu/dittrich/).