Using RDP for forensics?

Discussion in 'malware problems & news' started by Jordan Waller, Jul 16, 2020.

  1. Jordan Waller

    Jordan Waller Registered Member

    Joined:
    Jul 16, 2020
    Posts:
    1
    Location:
    Texas
    Does anyone know if it is safe to investigate a PC identified as having malware by connecting to it through RDP?
     
  2. Matthew Ferrante

    Matthew Ferrante Registered Member

    Joined:
    Oct 5, 2021
    Posts:
    1
    Location:
    Morris Plains
    Not really sure why you would connect it via RDP - I do not recommend that method; you should forensically image the target computer's memory first while the box is live without a reboot (minimize the forensic application's footprint that runs in live memory because the larger the footprint the more it overwrites what is in memory), do a live forensic physical acquisition of the box's hard drive(s), insert a wiped flash drive, check active sessions, items running in memory, connections, etc. any phone home activity, and pipe and/or document box's state and activity to the clean flash drive. Once completed, assume the flash device is infected, as well as the physical acquisition of the box's hard drive. So, be mindful of exports or opening up items in forensics software. Also, take precautions to sandbox the system and/or forensic image appropriately to scan, decompile, and analyze the malware.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.