Solved

How can you tell if a user boots to a cd or flash drive instead of windows on the harddrive?

Posted on 2008-06-24
8
200 Views
Last Modified: 2010-04-26
I need to be able to log when one of my machines is booted into something other than Windows XP.
It is a Dell box OptiPlex 755.
thanks
0
Comment
Question by:IT20701
  • 4
  • 4
8 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 21857034
You'd have to monitor the bios, or have some sort of hardware device that could log such things. You could get a hardware keylogger to see if you can locate someone typing something you did not type maybe? That's kind of a tough one... you can try, it's an easy bypass especially on a Dell workstation, to set the bios boot password, but if the case locked, using a common pad-lock or key lock, the bios can't be bypassed. Typically all you do is remove a jumper on the motherboard to bypass bios passwords or other bios features, but if the case is locked, they can't do that, and if the password to boot is set, they can't boot even off CD-Rom/USB.
-rich
0
 
LVL 2

Author Comment

by:IT20701
ID: 21857222
Hi RichRumble,

I'm trying to give this user as much rope as possible so I can see where he goes. I'd like to be able to log the boots. I have no idea how to do that or if it is possible. I don't want to password protect - again, because I want to see what this guy is up to.

thanks
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 21857376
Hardware keylogger, or traffic sniffer, perhaps both. You will need a hub or a switch that is able to "mirror" one port to another if you want to sniff the traffic. You would then need a second PC to sniff the traffic that is mirrored from your dell network port (or from the hub) and run the program wireshark(aka ethereal) and sniff all the traffic from that PC.
-rich
0
 
LVL 2

Author Comment

by:IT20701
ID: 21857533
I was hoping there was something simpler. The problem is, understanding what the sniffer is really saying. I'm a "Jack of all trades, master of none"
Oh well, something new for my resume...
thanks
0
New My Cloud Pro Series - organize everything!

With space to keep virtually everything, the My Cloud Pro Series offers your team the network storage to edit, save and share production files from anywhere with an internet connection. Compatible with both Mac and PC, you're able to protect your content regardless of OS.

 
LVL 38

Expert Comment

by:Rich Rumble
ID: 21858044
Keylogger is the simplest thing, you could see the majority of what was going on, but a sniffer is the only other option I can think of. unless you want to pay big $$ for a hardware based sniffer, it's the best bet. WireShark is actually quite a good packet capture program, and it summarizes what each packet was trying to do, as well as provide lots of other detail.
http://images.snapfiles.com/screenfiles/wireshark.gif
http://www.cyberciti.biz/tips/wp-content/uploads/2007/01/wireshark.jpg

Since this person is using a "live cd" and really only using your PC's processor and memory, these are the only options. Nothing is being written to your HD and you have no way to load a program into memory when a live Cd is used, so you have to monitor activity going in (keylogger) and activity going out(sniffer)
-rich


0
 
LVL 2

Author Comment

by:IT20701
ID: 21858111
ok, I've downloaded and installed WireShark on my machine so have a vague feel for how it works - quite an interesting little program. But it doesn't allow me to redirect it to monitor a different interface - is this possible with this program or do I need to buy something? If I run it on the machine in question, I know it will be noticed.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 21859133
Well if they are booting off of a "live cd" then they are running an OS from the CD, and literally only using the proc, memory, NIC, keyboard, and mouse. Wireshark is installed on your OS, if they are running their own, by turning your PC of, placing a CD into the cd drive (or using a flash USB device) then wireshark isn't running.
This is where a hub or a switch with port mirroring abilities comes in. In a hub, everything one port sends/receives, is sent to all other ports as well. The reason this is able to work, is because of Mac address of the network cards. The OS sees all the packets, but only looks for the packets with the proper mac address to reply to. When you use wireshark, it ignores mac address's and records everything it sees.
So if you had a second PC, you would run wireshark on that pc, release the ip (ipconfig -release) then fire up wireshark, lock the PC screen and wait. The second PC would recieve all the same traffic that the 1st PC, the opti-plex, sees or sends.

If they have installed another OS on your HD, you could perhaps load a root-kit on that OS and have it log keystrokes etc... but if they are booting off of media you cannot access, the sniffing and hardware logging are the only options I see.
-rich
0
 
LVL 2

Author Closing Comment

by:IT20701
ID: 31470193
Thanks, I'll see what I can whip up tomorrow.
0

Featured Post

Network it in WD Red

There's an industry-leading WD Red drive for every compatible NAS system to help fulfill your data storage needs. With drives up to 8TB, WD Red offers a wide array of solutions for customers looking to build the biggest, best-performing NAS storage solution.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
You may have a outside contractor who comes in once a week or seasonal to do some work in your office but you only want to give him access to the programs and files he needs and keep privet all other documents and programs, can you do this on a loca…
The viewer will learn how to successfully download and install the SARDU utility on Windows 8, without downloading adware.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now