SECAU - Security Research Centre, Edith Cowan University
Faculty of Computing, Health and Science
School of Computer and Security Science / Security Research Centre (secAU)
In 2010 the number of threats targeting ADSL routers is continually increasing. New and emergent threats have been developed to bypass authentication processes and obtain admin privileges directly to the device. As a result many malicious attempts are being made to alter the configuration data and make the device subsequently vulnerable. This paper discusses the non-invasive digital forensics approach into extracting evidence from ADSL routers. Specifically it validates an identified digital forensic process of acquisition. The paper then discusses how the approach may be utilised to extract configuration data ever after a device has been compromised to the point where a lock-out state has been initiated.
This is an Author's Accepted Manuscript of: Szewczyk, P. S. (2010). The ADSL Router Forensics Process. Journal of Network Forensics, 2(1), 4-13.