Document Type
Journal Article
Publisher
SECAU - Security Research Centre, Edith Cowan University
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Security Science / Security Research Centre (secAU)
RAS ID
10305
Abstract
In 2010 the number of threats targeting ADSL routers is continually increasing. New and emergent threats have been developed to bypass authentication processes and obtain admin privileges directly to the device. As a result many malicious attempts are being made to alter the configuration data and make the device subsequently vulnerable. This paper discusses the non-invasive digital forensics approach into extracting evidence from ADSL routers. Specifically it validates an identified digital forensic process of acquisition. The paper then discusses how the approach may be utilised to extract configuration data ever after a device has been compromised to the point where a lock-out state has been initiated.
Access Rights
free_to_read
Comments
This is an Author's Accepted Manuscript of: Szewczyk, P. S. (2010). The ADSL Router Forensics Process. Journal of Network Forensics, 2(1), 4-13.