Firewall
Firewall
In this artifact, we examine the firewall rules within the car's software, located at [root]\lge\
app_ro\network which provides DF investigators with valuable insight into how network traffic
is managed and secured within the car's software environment, aiding in the detection of
anomalies, security vulnerabilities, and reconstruction of network activities during forensic
investigations.
Block SSH Localhost:
Rule: -A INPUT -i lo -p tcp --dport 22 -j DROP
Investigator's Use: Detect unauthorized access attempts or potential security breaches via SSH.
Interface Rules:
Rules:
-A INPUT -i lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
Investigator's Use: Verify normal operation by ensuring unrestricted local communication within the
car's system.
Investigator's Use: Analyze ICMP traffic separately to reveal diagnostic or communication patterns.
Purpose: Isolates Android device with IP 192.168.0.99 with specific filtering rules.
Investigator's Use: Investigate traffic to/from the Android device, identifying suspicious behavior or
misconfigurations.
Purpose: Defines permissions for TCP and UDP ports for various applications.
Investigator's Use: Identify open ports for specific applications, detecting unauthorized access attempts
or legitimate communication patterns.
Forwarding Rules:
Rules:
Investigator's Use: Investigate packet routing between interfaces, revealing network topology or
facilitating traffic analysis.
Base Policies:
Policies:
Purpose: Sets default action for incoming, outgoing, and forwarded traffic to DROP.
Investigator's Use: Identify traffic not matching specific rules, potentially indicating unauthorized or
malicious activity.