Home > Articles > Security > Network Security

This chapter is from the book

Analyzing Nonvolatile Data

We would like to obtain several key pieces of information while the machine is still running. The type of data we will discuss in this section is nonvolatile. This means we could also retrieve this information from a forensic duplication if we so desired, but that option may be difficult or impossible. Some of the information we would like to acquire is this:

  • System Version and Patch Level

  • File System Time and Date Stamps

  • Registry Data

  • The Auditing Policy

  • A History of Logins

  • System Event Logs

  • User Accounts

  • IIS Logs

  • Suspicious Files

We will address each set of data in its own subsection and analyze the evidence collected from JBRWWW.

System Version and Patch Level

If you have not figured it out by now, an investigation can be tedious, and sometimes it is difficult to know where to start. One of the important facts we can learn about JBRWWW is its operating system version level and which security patches have been installed. Knowing which patches have been applied to the server will enable us to narrow our initial investigation to areas of high probability. This is not to say that an intruder would not try to install a patch to cover the means of attack, keep his access to the machine, and deter other intruders. A program in our toolkit called PsInfo, distributed from the PsTools suite at http://www.sysinternals.com, will enable us to query JBRWWW for its system information. The system information that PsInfo produces will enable us to see the patches that have been applied. PsInfo is run with the following command, where -h is used to show installed hotfixes, -s is used to show installed software, and -d is used to show disk volume information:

psinfo –h –s -d

PsInfo provides the following results. We have bolded the important pieces of information:

PsInfo 1.34 - local and remote system information viewer
Copyright (C) 2001-2002 Mark Russinovich
Sysinternals - http://www.sysinternals.com


Querying information for JBRHTTP://WWW...
                                       
System information for \\JBRWWW:
Uptime:                   39 days, 6 hours, 27 minutes, 42 seconds
Kernel version:           Microsoft Windows 2000, Uniprocessor Free
Product type:             Professional
Product version:          5.0
Service pack:             0
Kernel build number:      2195
Registered organization:  JBR Bank
Registered owner:         JBR Bank
Install date:             8/23/2003, 12:46:00 PM
IE version:               5.0100
System root:              C:\WINNT
Processors:               1
Processor speed:          435 MHz
Processor type:           Intel Pentium II or Celeron
Physical memory:          126 MB
Volume Type      Format   Label           Size     Free  Free
    A: Removable                                           0%
    C: Fixed     NTFS                   4.0 GB   3.2 GB   80%
    D: CD-ROM    CDFS     CDROM       272.8 MB             0%
OS Hot Fix  Installed
Q147222     8/23/2003
Applications:
 WebFldrs 9.00.3501

We see that only one hotfix (Q147222) has been applied. The named hotfix addresses the Exchange server, the mail server for Microsoft Windows. Doing a little research on http://www.securityfocus.com, we see that JBRWWW is vulnerable to a multitude of attacks, including the "Unicode" (Bugtraq ID #1806) and "Double Decode" (Bugtraq ID #2708) attacks. Because these are both Web server attacks and JBRWWW is running a Web server (as we saw in the netstat and FPort output), we need to acquire the Web server logs to see whether the intruder gained access through the Web server. We will discuss the commands to do this in a later section in this chapter.

File System Time and Date Stamps

Most investigators will use the dir command to capture the file time and date stamps, but we recommend a better tool. The standard dir command produces output that is cumbersome and that cannot easily be imported into a spreadsheet so that we may sort on different attributes of the data. In the UnxUtils package, available from unxutils.sourceforge.net, you will find a command called find. If you are already familiar with Cygwin, you can also use the find utility from that tool set (this is what we used in our response). This command will print, one line for each file, any of the file’s attributes we desire. Therefore, with the following command, we can print the file permissions, last access date, last access time, modification date, modification time, created date, created time, user ownership, group ownership, file size, and the full path of every file on the C: drive:

find c:\ -printf "%m;%Ax;%AT;%Tx;%TT;%Cx;%CT;%U;%G;%s;%p\n"

Notice that with the find command, we are delimiting each of the attributes with a semicolon. This will enable us to import it into our favorite spreadsheet. After we import this data, we can perform sorts for file pathname. Because we already know that C:\WINNT\sytem32\os2\dll is a path where the attacker left his tools, we will examine that directory in Table 1-1:

Table 1-1 Suspicious Files Discovered on JBRWWW

Created Date

Created Time

File Size

File Name

08\23\2003

8:14:18

0

c:\WINNT\system32\os2

08\23\2003

8:14:18

8192

c:\WINNT\system32\os2\dll

10\01\2003

19:25:07

13929

c:\WINNT\system32\os2\dll\Configure

10\01\2003

19:25:07

15427

c:\WINNT\system32\os2\dll\COPYING

10\01\2003

19:25:07

68016

c:\WINNT\system32\os2\dll\cygregex.dll

10\01\2003

19:25:07

971080

c:\WINNT\system32\os2\dll\cygwin1.dll

12\07\1999

7:00:00

12646

c:\WINNT\system32\os2\dll\doscalls.dll

10\01\2003

19:25:08

902

c:\WINNT\system32\os2\dll\iroffer.cron

10\01\2003

19:25:08

213300

c:\WINNT\system32\os2\dll\iroffer.exe

10\01\2003

19:25:09

2924

c:\WINNT\system32\os2\dll\Makefile.config

10\01\2003

19:25:09

0

c:\WINNT\system32\os2\dll\mybot.ignl

10\01\2003

19:25:09

0

c:\WINNT\system32\os2\dll\mybot.ignl.bkup

10\01\2003

19:25:09

4

c:\WINNT\system32\os2\dll\mybot.ignl.tmp

10\01\2003

19:25:09

25774

c:\WINNT\system32\os2\dll\mybot.log

10\01\2003

19:25:09

168

c:\WINNT\system32\os2\dll\mybot.msg

10\01\2003

19:25:09

5

c:\WINNT\system32\os2\dll\mybot.pid

10\01\2003

22:26:23

49

c:\WINNT\system32\os2\dll\mybot.xdcc

10\01\2003

21:56:22

49

c:\WINNT\system32\os2\dll\mybot.xdcc.bkup

10\01\2003

22:26:23

233

c:\WINNT\system32\os2\dll\mybot.xdcc.txt

10\01\2003

19:25:09

19792

c:\WINNT\system32\os2\dll\myconfig

10\01\2003

19:24:37

120320

c:\WINNT\system32\os2\dll\nc.exe

12\07\1999

7:00:00

247860

c:\WINNT\system32\os2\dll\netapi.dll

10\01\2003

19:25:09

5080

c:\WINNT\system32\os2\dll\README

10\01\2003

19:55:51

36864

c:\WINNT\system32\os2\dll\samdump.dll

10\01\2003

19:25:09

19767

c:\WINNT\system32\os2\dll\sample.config

10\01\2003

19:55:42

32768

c:\WINNT\system32\os2\dll\setup.exe

10\01\2003

19:58:38

342

c:\WINNT\system32\os2\dll\temp.txt

10\01\2003

19:52:44

122880

c:\WINNT\system32\os2\dll\update.exe

10\01\2003

19:25:10

16735

c:\WINNT\system32\os2\dll\WHATSNEW

12\07\1999

7:00:00

108095

c:\WINNT\system32\os2\oso001.009


We see that most of the tools were created during the evening of 10\01\2003. If we do a sort on the file metadata by creation time and date stamps, we see that all these files were created approximately at the same time, as in Table 1-2:

Table 1-2 Files Created During the Attack on JBRWWW

Created Date

Created Time

File Size

File Name

10\01\2003

19:16:30

61440

c:\WINNT\system32\PSEXESVC.EXE

10\01\2003

19:24:37

120320

c:\WINNT\system32\os2\dll\nc.exe

10\01\2003

19:25:07

13929

c:\WINNT\system32\os2\dll\Configure

10\01\2003

19:25:07

15427

c:\WINNT\system32\os2\dll\COPYING

10\01\2003

19:25:07

68016

c:\WINNT\system32\os2\dll\cygregex.dll

10\01\2003

19:25:07

971080

c:\WINNT\system32\os2\dll\cygwin1.dll

10\01\2003

19:25:08

902

c:\WINNT\system32\os2\dll\iroffer.cron

10\01\2003

19:25:08

213300

c:\WINNT\system32\os2\dll\iroffer.exe

10\01\2003

19:25:09

2924

c:\WINNT\system32\os2\dll\Makefile.config

10\01\2003

19:25:09

0

c:\WINNT\system32\os2\dll\mybot.ignl

10\01\2003

19:25:09

0

c:\WINNT\system32\os2\dll\mybot.ignl.bkup

10\01\2003

19:25:09

4

c:\WINNT\system32\os2\dll\mybot.ignl.tmp

10\01\2003

19:25:09

25774

c:\WINNT\system32\os2\dll\mybot.log

10\01\2003

19:25:09

168

c:\WINNT\system32\os2\dll\mybot.msg

10\01\2003

19:25:09

5

c:\WINNT\system32\os2\dll\mybot.pid

10\01\2003

19:25:09

19792

c:\WINNT\system32\os2\dll\myconfig

10\01\2003

19:25:09

5080

c:\WINNT\system32\os2\dll\README

10\01\2003

19:25:09

19767

c:\WINNT\system32\os2\dll\sample.config

10\01\2003

19:25:10

16735

c:\WINNT\system32\os2\dll\WHATSNEW

10\01\2003

19:48:44

0

c:\update.exe

10\01\2003

19:52:44

122880

c:\WINNT\system32\os2\dll\update.exe

10\01\2003

19:55:42

32768

c:\WINNT\system32\os2\dll\setup.exe

10\01\2003

19:55:51

36864

c:\WINNT\system32\os2\dll\samdump.dll

10\01\2003

19:58:38

342

c:\WINNT\system32\os2\dll\temp.txt

10\01\2003

21:56:22

49

c:\WINNT\system32\os2\dll\mybot.xdcc.bkup

10\01\2003

22:22:59

16384

c:\Documents and Settings\Administrator\Application Data\Microsoft\Internet Explorer\MSIMGSIZ.DAT

10\01\2003

22:26:23

49

c:\WINNT\system32\os2\dll\mybot.xdcc

10\01\2003

22:26:23

233

c:\WINNT\system32\os2\dll\mybot.xdcc.txt


We obviously know that iroffer was installed on the system from earlier steps in our investigation. We also saw that the attacker, along with PsExec, established a backdoor with netcat. The files we did not know about are bolded in Table 1-2. All of the files in Table 1-2 are of interest to us, and it would behoove us to copy these files to our forensic workstation to perform additional tool analysis. We will describe the process for acquisition a little later in this chapter so that we may perform tool analysis later.

We could obviously perform a sort on modified and access times and review the files that may have been altered or run around the time of the suspicious files listed in Table 1-2. We will save you that step, however, because there are no interesting results from that investigative action.

Registry Data

There are two main investigative leads we can discover in the registry dump. Although the result of dumping the registry is large (in the case of JBRWWW, it was more than 7 MB long), we can quickly search for the following leads:

  • Programs executed on bootup

  • Entries created by the intruder’s tools

We are able to capture the complete registry, in a rather cryptic format, by using RegDmp without command-line options. The output is ASCII-formatted such that Microsoft’s registry tools can alter the contents. Because we are interested in only a few lines, we will do our analysis with a standard text editor. After we obtain the output with the regdmp command, we see that the key \HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion contains three sub-keys that are of interest to us: Run, RunOnce, and RunOnceEx. Any values in the Run keys signify programs that will be executed when the system starts up. JBRWWW had the following information in this area of the registry:

Run
  Synchronization Manager = mobsync.exe /logon
RunOnce
RunOnceEx

mobsync.exe is a system binary, so we do not see tools the intruder intended to execute at system startup. If the attacker was savvy, he could have placed the following command in the registry to automatically open a backdoor:

nc –d –L –p 10000 –e C:\winnt\system32\cmd.exe

Another thing we may want to look for in the registry is any suspicious artifact from the intruder’s tool. This may sound daunting, but it really isn’t. Most of the time we know the names of the tools because of the entries in the file system. Therefore, in the case of JBRWWW, we may search for "PsExec", "iroffer", or other relevant file names. Searching for these names yielded nothing for JBRWWW.

This step becomes more important when you have a rack of servers and you know one is compromised. After you do a thorough investigation and find the remnants in the registry from an intruder’s tools, you can quickly do a search on other servers to determine whether they were compromised also.

The Auditing Policy

The next series of tools we will be running will depend on JBRWWW's auditing policy. Without proper auditing (and that is the default for Windows NT and 2000, by the way), we will not have security-related logs. The command to determine the auditing policy is auditpol. Auditpol is distributed with Microsoft's resource kits. The following information is returned when we run auditpol without command-line arguments on JBRWWW:

Running ...


(0) Audit Disabled
       
System                   = No
Logon                    = No
Object Access            = No
Privilege Use            = No
Process Tracking         = No
Policy Change            = No
Account Management       = No
Directory Service Access = No
Account Logon            = No

This is disturbing! There are no events generated from logins or other security-related events. Our system event logs will not be a good source of information for us because of the conservative auditing policy. Believe it or not, we see this during a majority of our investigations.

A History of Logins

A history of logins can be obtained with the NTLast command, distributed by http://www.foundstone.com. NTLast can be run in a myriad of ways, but we are interested in all of the logins, so we will not use command-line arguments when we run it on JBRWWW:

- No Records - Check to see if auditing is on

Yikes! This tool depends on the auditing policy to determine the login history. As you can see, it is very important to enable auditing.

System Event Logs

Typically, there are three types of event logs on a Windows machine:

  • Security

  • Application

  • System

The command PsLogList within the PsTools suite distributed at http://www.sysinternals.com will extract these logs into a nice, easy-to-read text format. The following command will dump the Security Event Logs a comma-delimited format suitable for your favorite spreadsheet program:

psloglist –s –x security

The -s switch tells psloglist to dump each event on a single line so that the output is suitable for analysis with a spreadsheet. The -x switch tells psloglist to dump the extended information for each event. You can also replace security with application or system if you want to acquire the other logs on the victim system.

The Security Event Log contains all of the information generated by our auditing policy, discussed in a previous section. Most importantly, we would be interested in the information regarding logons/logoffs and any objects audited on the system. Of course, as we would expect, JBRWWW reports no events in the logs.

The application event log contains data generated from the installed applications. Some events are informational, whereas others indicate application failures. As we peruse JBRWWW’s application logs, all we see are messages created from the installation of standard programs on the system beginning August 23, 2003.

The system event log, as you may have guessed, contains the messages from system services. The system log is the log where you would see device driver failures, IP address conflicts, and other information. As we browse JBRWWW’s system logs, we see only messages created from standard use of the system. It seems that the event logs, in this investigation, do not give us valid leads.

User Accounts

The easiest type of backdoor for an intruder to use is one that will blend into the normal traffic patterns for the victim machine. Therefore, it would make sense for the attacker to create a new user so that he could log into the same services that valid users utilize. It is simple for us to dump the user accounts using the popular pwdump utility, which is well known by administrators and attackers alike. By typing pwdump on JBRWWW, we receive the following information:

Administrator:500:9DCFD05D3688BBBFAAD3B435B51404EE:CB8C5705F92DE9D8D11642948ECCAB72:::
Guest:501:NO PASSWORD*********************:NO PASSWORD*********************:::
IUSR_JBRWWW:1000:B936986BA1C5636B0F28D0549F4A7C10:137C045C1CACAE4B07C6C3B88BF0CE6D:::
IWAM_JBRWWW:1001:DA3DF28964893179378B2EB9047FBA87:A2C8D0EC209C60A48DB9365A51565DC4:::

There are four users for JBRWWW: Administrator, Guest, IUSR_JBRWWW, and IWAM_JBRWWW. Administrator is the super user account (RID 500) that every system must have. Guest is a disabled account that also exists on all Windows systems. IUSER_JBRWWW and IWAM_JBRWWW are normal user accounts that processes, such as the IIS Web server, use to run. These accounts are on the machine to limit the damage an attacker could cause the system through a Web-based attack because he would only have a lowly user account rather than Administrator-level access right away. We see that there are no other accounts on JBRWWW of interest.

IIS Logs

Most attacks in the modern era happen over TCP port 80 (HTTP). Why? you may ask. Because there are literally millions of Web servers running, and incoming port 80 traffic is rarely blocked at the victim’s network boundaries. You cannot block what you must allow in. Because we have not seen the initial method of intrusion, we can only guess at this point that it may have been the IIS Web server.

The IIS Web server writes any activity to logs in the C:\winnt\system32\logfiles directory by default. In this directory, there is another directory named W3SVCn, where n is the unique ID of the Web server. Usually this ID starts at one, but because one Web server can host numerous domains, each W3SVC directory must be analyzed. JBRWWW only hosted one domain, so the directory of interest is W3SVC1.

Inside the W3SVC1 directory there are two files: ex030923.log and ex031001.log. Each of these logs contains the activity for the Web server for a whole day. The file name distinguishes the day:

ffyymmdd.log

. . . where ff is the format, yy is the year, mm is the month, and dd is the day. IIS can log three different types of formats: W3C Extended (ff would be ex in this case), NCSA common (ff would be nc in this case), and Microsoft IIS native format (ff would be in in this case). JBRWWW is using the default extended log formatting and contains activity for the days of September 9, 2003 and October 1, 2003.

The next problem we must overcome is how to transfer the relevant logs to our forensic workstation. We do not want to FTP them or to perform any other intrusive command that would greatly change the state of JBRWWW because we will be performing a forensic duplication in the future. Instead, if you refer to the introduction in this chapter, we presented a method of transferring data from one machine to another. Instead of using command like we initially presented, we will use type file.txt to transfer file.txt from the victim machine to the forensic workstation. Therefore, first execute this command on the forensic workstation:

nc –v –l –p 2222 > ex030923.log

Next, type the following command on JBRWWW to transfer the file named ex030923.log to our forensic workstation:

type c:\winnt\system32\logfiles\w3svc1\ex030923.log | nc __forensic_workstation_ip_address 2222

Press CTRL-C when the file is finished transferring. This can be confirmed with a simple network monitoring session (described in a later chapter). We also performed the same series of commands to transfer ex031001.log to the forensic workstation.

When we open ex030923.log, we see the following header:

#Software: Microsoft Internet Information Services 5.0
#Version: 1.0
#Date: 2003-09-23 22:50:59
#Fields: time c-ip cs-method cs-uri-stem sc-status 

The date and time, the first bolded line, are actually reported in GMT, not EDT (JBRWWW’s local time zone). Keep this in mind because it can trip you up when correlating this information to other auditing material (such as file system time and date stamps). The second bolded line lists the recorded fields. These are the default fields that are recorded by the IIS server, but there are many more available if the Administrator enables them. A good reference for these fields exists at

http://www.microsoft.com/technet/prodtechnol/windowsserver2003/proddocs/standard/ref_we_logging.asp

As we begin to skim the first few lines, we notice something very interesting. First, the accesses happen very quickly, and the source IP address is 95.16.3.79. The speed of the Web accesses is much faster than one person can type. Second, the fourth request has an interesting keyword embedded in it:

22:51:17 95.16.3.79 GET /Nikto-1.30-Y7hUN21Duija.htm 404

Nikto is a well-known Web server vulnerability scanning tool available from http://www.cirt.net/code/nikto.shtml. It would make sense that a Web vulnerability scanning tool would access JBRWWW repeatedly in a short amount of time. Another telltale sign is the status code (the last number 404). Any time this number is in the 400s, the access was unsuccessful. If the status code was in the 200s, the access was successful. Web vulnerability scanners generate numerous result codes in the 400s. Other result codes can be compared to the chart at http://www.iisfaq.com/default.aspx?View=A145&P=230. Upon reviewing the log for September 9, we see that all the activity came from one IP address in less than one minute. JBRWWW was the victim of an HTTP vulnerability scan on that day.

On October 1, 2003, we see the following activity:

#Software: Microsoft Internet Information Services 5.0
#Version: 1.0
#Date: 2003-10-01 22:58:53
#Fields: time c-ip cs-method cs-uri-stem sc-status 
22:58:53 95.208.123.64 GET /NULL.printer 404
23:00:55 95.208.123.64 HEAD /iisstart.asp 200
23:01:18 95.16.3.79 GET /iisstart.asp 200
23:01:18 95.16.3.79 GET /pagerror.gif 200
23:01:18 95.16.3.79 GET /favicon.ico 404
23:03:23 95.208.123.64 GET /NULL.printer 404
23:08:45 95.16.3.79 GET /NULL.printer 404
23:15:09 95.208.123.64 OPTIONS / 200
23:16:30 95.208.123.64 OPTIONS / 200
23:16:30 95.208.123.64 PROPFIND /ADMIN$ 404
23:17:04 95.16.3.79 GET /scripts/../../../../winnt/system32/cmd.exe 200
23:17:54 95.16.3.79 GET /scripts/../../../../winnt/system32/cmd.exe 502
23:20:19 95.16.3.79 GET /scripts/..%5c..%5c..%5c../winnt/system32/cmd.exe 200
23:32:43 95.208.123.64 OPTIONS / 200
23:32:43 95.208.123.64 PROPFIND /ADMIN$ 404
23:33:52 95.208.123.64 PROPFIND /ADMIN$ 404
23:58:16 95.208.123.64 OPTIONS / 200
23:58:16 95.208.123.64 PROPFIND /ADMIN$ 404

The first bolded line is a telltale sign of the ".printer" Microsoft Windows 2000 buffer overflow (Securityfocus.com Bugtraq ID 2674) from IP address 95.208.123.64. Because we are seeing the attack in our logs, we know it was unsuccessful. Typically, when this buffer overflow is used against a vulnerable server, it causes the Web server to crash, so the activity is not logged in the IIS log. The next four lines not bolded are attributed to users at 95.208.123.64 and 95.16.3.79 accessing the default Web page, perhaps checking whether the Web server is available. The second set of bolded lines represents unsuccessful attempts from 95.208.123.64 and 95.16.3.79 using the same ".printer" buffer overflow. Seeing two IP addresses tells us that they may be the same person or more than one person working together.

The third set of bolded lines shows a successful (due to the result codes being 200 and 502) attack. If we dissect the attack, we see that someone accessed the C:\winnt\ system32\cmd.exe executable. The Web server should never access the cmd.exe command shell. In short, 95.208.123.64 was able to run commands on JBRWWW in the context of IUSR_JBRWWW (not Administrator). The first two bolded lines of this set show what is known as the Unicode attack. The last line shows the Double Decode attack (also referenced earlier in this chapter). Both attacks are a directory traversal attack in which the attacker escapes the directory to which the Web server is restricted to run arbitrary programs on the victim machine. To quickly locate similar attacks on other machines, we could easily search for cmd.exe in the IIS logs and see whether the result code was 200. Because JBRWWW did not enable more fields in the W3C extended logs, we cannot see what the attacker ran with the command shell.

Suspicious Files

If we were not acquiring a forensic duplication of JBRWWW, we could transfer any suspicious file with our "Poor Man’s FTP" using netcat. The syntax for the command to run on the forensic workstation is as follows:

nc –v –l –p 2222 > filename

Now, type the following command on JBRWWW to transfer the file named filename to our forensic workstation. Remember that the file named filename does not have to contain ASCII text. You can also transfer binary files on the victim machine in this manner.

type filename | nc forensic_workstation_ip_address 2222

The binaries that were flagged by our file system analysis because they were created during the intrusion include the following, in Table 1-3:

Table 1-3 The Suspicious Binaries Transferred from JBRWWW

File Name

c:\WINNT\system32\PSEXESVC.EXE

c:\WINNT\system32\os2\dll\nc.exe

c:\WINNT\system32\os2\dll\Configure

c:\WINNT\system32\os2\dll\COPYING

c:\WINNT\system32\os2\dll\cygregex.dll

c:\WINNT\system32\os2\dll\cygwin1.dll

c:\WINNT\system32\os2\dll\iroffer.cron

c:\WINNT\system32\os2\dll\iroffer.exe

c:\WINNT\system32\os2\dll\Makefile.config

c:\WINNT\system32\os2\dll\mybot.ignl

c:\WINNT\system32\os2\dll\mybot.ignl.bkup

c:\WINNT\system32\os2\dll\mybot.ignl.tmp

c:\WINNT\system32\os2\dll\mybot.log

c:\WINNT\system32\os2\dll\mybot.msg

c:\WINNT\system32\os2\dll\mybot.pid

c:\WINNT\system32\os2\dll\myconfig

c:\WINNT\system32\os2\dll\README

c:\WINNT\system32\os2\dll\sample.config

c:\WINNT\system32\os2\dll\WHATSNEW

c:\update.exe

c:\WINNT\system32\os2\dll\update.exe

c:\WINNT\system32\os2\dll\setup.exe

c:\WINNT\system32\os2\dll\samdump.dll

c:\WINNT\system32\os2\dll\temp.txt

c:\WINNT\system32\os2\dll\mybot.xdcc.bkup

c:\WINNT\system32\os2\dll\mybot.xdcc

c:\WINNT\system32\os2\dll\mybot.xdcc.txt


We transferred these files to our forensic workstation and they are included on your DVD for further analysis.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020