![]() This section describes the traces that are created during usage of the AIS tool and more specifically, the Windows registry keys that are being created. Forensic tracesĪIS leaves traces on a host system when it is executed. The fact that there is a portable version of Advanced IP Scanner, that it has a GUI and that the tool supports a variety of ways to interact with identified systems probably contributes to it popularity. If enabled, this provides the user with functionality to remotely boot a system. (Re)boot/ Wake-On-Lan : the user can boot / reboot a system if the user is authorized to do so, or can send Wake-On-Lan (WOL) packages to a system. ![]() Remote connections : connect to the corresponding IP address via HTTP, HTTPS, FTP, RDP, or RADMIN (only works if RADMIN is installed). ![]()
0 Comments
Leave a Reply. |