| Cisco IOS Forensic | 
             
             
              
		 
		Incident 
		If you think, your Cisco Device is hacked or missued, its nessasary, to collect all relevant informations and datas. 
		But before starting to do "anything". it's inportend, that you slow down your heart rate, maybe drink a coffee, count slowy to 10 and now make a short list, what you want to do!  
		Next Step is, to prepare your enviroment, to collect data and informations.! 
		Importent:  
		make sure, that all command you enter and any output of the commands ist logged in a file!! 
		(turn on Logging on your terminal/console programm) 
		write down in an Log file , what you are doing. (with time, etc..) see other Forensic Hints on the internet 
		  	
		Connect: 
		find out, how you can connect to the Device, first try to connect to the "Console" Port, thi is the best way, next is 
		SSH or Telnet.  
		If there is no way to connect to the Device, you can scan the Device, and find out, what is still going . (is the Router still routing, make traceroute to some targets). and then is the time come, to restart the Device.Make a Logfile from the boot sequence.  
		  
		If your Login with your Accounts/Password doesn't work, make a password reset/recovery, but Never overwrite the configs !! 
		  
		And now , if you have Level 15 Access, its time to execute some show commands 
		  
		Users and Configurations 
	show clock detail
	show version 
	show startup-config 
	show running-config
	show reload
	show kron schedule
	show users {all / all / summary }
	show who
		Local logs, process , memmory 
	show log 
	show debug
	show stacks
	show tech-support password 
	show processes {cpu/memory/history}
	show buffers
	show memory
	show environment /all
		Network and Rouing Infos 
	show ip route 
	show ip ospf {summary / neighbors / ...}
	show ip bgp summary
	show cdp neighbors
	show ip arp 
	show interfaces
	show ip interfaces
	show tcp brief all
	show ip sockets
	show control-plane host open-ports
	show connection detail
	show ip inspect session detail
	show control-plane host open-ports
	show ip nat transaltions verbose
	show ip cache flow :
	show ip cef 
	show snmp {user/group/sessions/chassis/view}	
	show vlans
		IPV6
	show ipv6 route
	show ipv6 ospf {summary / neighbors / ...}
	show ipv6 interface
	show ipv6 cef 
	show ipv6 inspect sessions detail	
	
		and if you have VRF's  
	show ip vrf VRFNAME route
	show ip vrf .... 
 
		File System 
	show flash:
	show file descriptors
	show file information "filename"
	show file systems 	
	dir /recursive all-filesystems 
 
		Hardware 
	show interfaces  {status/summary}
	show mac-adress-table
	show hardware
	show inventory
	
		ACL's 
	show access-lists
 		
		ACE and other Boards 
		If you have additional Board, like ACE, you must change to every contex and collect all datas.
		  
		Final Jobs 	
		Copy all files from Flash to a secure place (incl. IOS) 
		And now, you must collect all informations from the external Logserver. TACACS Server,... 
		  
		Now, you can make a analysis of the colleced data.But remember, never work with the orginal files! 
		Tips and hints 	
		watch out for following informations: 
		- GRE Tunnels 
		- TCL Scripts 
		- Route Maps 
		- additinals users 
		- terminal length 0  -> for faster Display on the console
		
               | 
             
          
          |