ADSL Router Forensics Part 2: Acquiring Evidence

Document Type

Conference Proceeding

Publisher

SECAU - Security Research Centre, Edith Cowan University

Faculty

Faculty of Computing, Health and Science

School

School of Computer and Security Science / Centre for Security Research

RAS ID

8384

Comments

Szewczyk, P. S. (2009). ADSL Router Forensics Part 2: Acquiring Evidence. Proceedings of 7th Australian Digital Forensics Conference. (pp. 109-117). Perth, WA. SECAU - Security Research Centre. Available here

Abstract

The demand for high-speed Internet access is escalating high sales of ADSL routers. In-turn this has prompted individuals to attack and exploit the vulnerabilities in these devices. To respond to these threats, methods of acquisition and analysis are needed. The configuration data provides a wealth of information into the current state of the device. Hence, this data may be used to identify and interpret unlawful ways in which the device was used. This paper is centres around an empirical learning approach identifying techniques to address the device’s acquirable limitations taking into consideration that the owner may not willingly present login credentials to directly access the device. This paper demonstrates a procedural method of obtaining data of interest from ADSL routers. It further elaborates on the methods by detailing how to extract and understand this configuration data.

Access Rights

free_to_read

Share

 
COinS