enabledphysicalmemory

physicalmemory  时间:2021-05-19  阅读:()
Chapter14ACOMPILEDMEMORYANALYSISTOOLJamesOkolicaandGilbertPetersonAbstractTheanalysisofcomputermemoryisbecomingincreasinglyimportantindigitalforensicinvestigations.
Volatilememoryanalysiscanpro-videvaluableindicatorsonwhattosearchforonaharddrive,helprecoverpasswordstoencryptedharddrivesandpossiblyrefutedefenseclaimsthatcriminalactivitywastheresultofamalwareinfection.
His-torically,digitalforensicinvestigatorshaveperformedliveresponsebyexecutingmultipleutilities.
However,usingasingletooltocaptureandanalyzecomputermemoryismoreecientandhaslessimpactonthesystemstate(potentialevidence).
ThispaperdescribesCMAT,aself-containedtoolthatextractsforensicinformationfromamemorydumpandpresentsitinaformatthatissuitableforfurtheranalysis.
AcomparisonoftheresultsobtainedwithutilitiesthatarecommonlyemployedinliveresponsedemonstratesthatCMATprovidessimilarinformationandidentiesmalwarethatismissedbytheutilities.
Keywords:Liveresponse,memoryanalysis,rootkitdetection1.
IntroductionWhenalargeenterpriserespondstoacybersecurityincident,itmaynotbefeasibletoperformtherecommendeddisconnectionandimagingprocesstogatherforensicevidence[13],especiallyinthecaseofserversthatarecriticaltobusinessoperations.
AccordingtoCNET[19],Ama-zonlost$29,000inrevenueperminuteduringitsJune2008outage.
Inaddition,therehavebeenseveralrecentcaseswheredefendantswerefoundinnocentorguiltybasedontheliveresponseinformationretrievedatthetimeoftheincident[2].
Clearly,toolsthatcantakequicksnap-shotsofaectedcomputerswhileminimizingtheimpactonbusinessoperationsandpreservingevidencearevitaltodigitalforensicinves-tigations.
Sincemanyoftheitemsofinterestinaliveresponsearemaintainedincomputermemoryratherthantheharddrive,amini-K.
-P.
Chow,S.
Shenoi(Eds.
):AdvancesinDigitalForensicsVI,IFIPAICT337,pp.
195–204,2010.
cIFIPInternationalFederationforInformationProcessing2010196ADVANCESINDIGITALFORENSICSVImallyintrusiveliveresponsewouldinvolvetheanalysisofalivememorycapture.
Threestepsareinvolvedindevelopingaminimallyintrusivestan-daloneforensictoolformemory:(i)afront-endmemorydumproutinethatdirectlyaccessesphysicalmemory;(ii)amemoryanalysistoolthatextractsenvironmentalandactivityinformationfromthememorydump;and(iii)asynthesistoolthatcorrelatestheenvironmentalinformationtoprovideahuman-understandablenarrativeofwhatoccurredonthemachine.
Thispaperfocusesonthesecondstep:developingacompiledmemoryanalysistool(CMAT)thatextractsenvironmentalandactivityinforma-tionfromamemorydump.
CMATparsesamemorydumptondactive,inactiveandhiddenprocessesaswellassystemregistryinformation.
Itthencompilesliveresponseforensicinformationfromtheseprocessesandregistrylesandassemblesitintoaformatsuitablefordatacorrelation.
CMATistestedagainstseveralutilitiesthatextractforensicinformationfromalivesystem.
ExperimentalresultsindicatethatCMATprovidescomparableinformationastraditionalliveresponseutilities,andalsouncoversmalwarethatthesetoolsmiss.
2.
BackgroundPerformingaliveresponseallowsthecaptureofforensicinformationthatdisappearsafterthecomputeristurnedo.
Thebenetsofaliveresponseinclude:gatheringcluestobetterfocusasearchoftheharddrive[24];retrievingdecryption/encryptionkeysforanencryptedharddrive[24];anddefeatingtheTrojanhorsedefenseof"Ididn'tdoit,itwasthemalwareinstalledonmymachine"[2].
Valuableliveresponseinformationthatresidesinmemoryincludes[4,5,10,24]:SystemdateandtimeLoggedinusersandtheirauthorizationcredentialsNetworkinformation,connectionsandstatusProcessinformation,memoryandprocess-to-portmappingsClipboardcontentsCommandhistoryServicesanddriverinformationOpenles,registrykeysandharddiskimagesOkolica&Peterson197Oneoftheargumentsagainstliveresponseisthattheevidencecap-tureprocessmodiesthemachinestate.
Severaltechniqueshavebeenproposedtoaddressthisissue[1,3,9,22].
Thesetechniquesattempttocaptureallthememoryinsteadofspecicpiecesofforensicinformation.
Thishelpsanswertheimmediateforensicquestionsandalsoprovidesameanstoansweradditionalquestionsthatmaycomeuplaterintheinvestigation.
Thealternativesincludehardware-basedmemoryacquisi-tion[1,3],virtualmachines,hibernationles[22]andoperatingsystempatches[9].
Hardware-basedmemoryacquisitiontechniquescircumventthere-lianceontheoperatingsystembyusinghardwarethatinteractsdirectlywithmemory.
Thesetechniquesinvolvetheuseofcustomhardware[3]ortheFireWireinterface[1]fordirectmemoryaccess.
Butthetwotechniquessuerfromthe"northbridgeexploit"[16].
Sinceallperiph-eraldevicesusethenorthbridgetointerfacewiththeCPUandmainmemory,malwarecanbeloadedontothenorthbridgetosubvertmem-oryaccessbyaperipheralwhileleavingtheCPUandoperatingsystemuntouched.
Thisenablesthemalwaretoremainundetected.
ThenorthbridgeexploitcanbecontainedbyconstrainingmemorycapturetechniquestotheCPUandoperatingsystem.
Virtualmachinesprovideaneasymethodfordumpingmemory.
Whenanincidentoccurs,aforensicinvestigatortakescontroloftheactualmachine,suspendsthevirtualmachine,andthendumpsthememoryinthevirtualmachine.
However,oneproblemwiththismethodisthatimplementingsuchapolicywithinalargeorganizationincurshighcostsintermsoftimeandmoney.
Moreover,softwarevirtualizationcanslowtheperceivedresponsivenessofacomputerbecauseeverycommandhastogothroughanadditionallevelofabstraction.
Hibernationlesoeranalternativememorycapturemethodthatre-liesontheoperatingsystem[22].
Theprocessofanalyzinghibernationlesrequiresplacingthesysteminthehibernationmode,copyingthehibernationlesandextractingtheircontents.
However,whilethehi-bernationfunctionisenabledonmanylaptops,itisdisabledbydefaultonmostdesktops.
Desktopscanbereconguredtoenablethehiberna-tionmode,butthismustbedoneinadvance.
Otherdicultiesincludethelackofpublisheddescriptionsofhibernationleformatsandthefactthatnoteverythinginmemorymaybestored.
LibsterandKornblum[9]haveproposedanalternativemethodforacquiringapristinecopyofmemory.
Themethodinvolvesmodifyingtheoperatingsystemkernelsothatauser-denedfunctionkeywouldcausetheoperatingsystemtoimmediatelysuspend,generateamemorydumpthatitsendsoveranetworktoasecuremachine,andthenresume198ADVANCESINDIGITALFORENSICSVIexecution.
Thedicultywiththismethodistoensurethatitisdeployedforallthedisparatesystemsofalargeenterprisepriortoanincident.
Whileapre-installedoperatingsystempatchappearstobeanidealsolutionincaseswhereprioraccessisnotpossible,theonlyoptionavail-ableistoinitiateanewprocesstodumpsystemmemory.
Tominimizetheimpact,theapplicationshouldlimitapplicationprograminterfaces(APIs)thatinterfacewiththeoperatingsystemandtheuseofagraphi-caluserinterface(GUI).
Unfortunately,whilemanyavailabletools(e.
g.
,[12,23])arerunfromthecommandline,mostuseoperatingsystemAPIstodumpmemory.
TheonlyexceptionappearstobeMemoryze[11].
Memoryanalysistoolsextractdierentamountsandtypesofliveresponsedatafromamemorydump.
TheVolatilitytool[25]extractsthedateandtime,runningprocesses,openports,process-portmappings,strings-processmappings,process-lemappings,processdynamiclinklibraries(DLLs)andopenconnections.
Additionalplug-insareavailabletoenhancethefunctionalityofVolatility,includingtheabilitytoextractregistryinformation.
However,VolatilitysuersfromthelimitationthatitdoesnotextractportinformationforallWindowsoperatingsystemservicepackandpatchcongurations.
Comprehensiveopensourcememoryanalysistoolswrittenincom-piledlanguagessuchasC/C++arenotavailableforWindowsXPsys-tems.
Betz[21]hasdevelopedatoolthatndsprocessesandthreadsinmemoryandextractssomeinformation,butitislimitedtoWindows2000systemsanddoesnotsupporttheanalysisofregistryles,net-workactivityandprocesscreators.
PTnder[17]alsosearchesthroughmemoryforprocessesandthreads,andhandlesmemorycapturesfromWindowsXPsystems.
However,likeBetz'stool,itdoesnotsupporttheanalysisofregistryles[7],networkactivityandprocesscreators[8].
3.
CompiledMemoryAnalysisToolThecompiledmemoryanalysistool(CMAT)isaC++commandlineutilitythatrunsonLinuxandWindowsoperatingsystems.
ItparsesaWindowsXPmemorydumptoobtaininformationonuseraccounts,theWindowsregistryandrunningprocesses.
CMATprovidessystem,pro-cess,registry,openportsanduserinformationinastandalonetoolthatrunswithoutAPIcallsorhigh-levellanguageinterpreters.
CMATop-eratesintwopasses.
Duringtherstpass,CMATsearchesthememorydumpleforprocesses,threadsandregistryhives.
Inthesecondpass,CMATorganizestheprocess,threadandregistryentriesithasfoundOkolica&Peterson199andproducesoutputinaformatsimilartothatproducedbycommonliveresponsetools.
TheWindowskernelincorporatesdatastructuresneededfortheop-eratingsystemtofunction.
Thesedatastructuresareusefulforex-tractingliveresponseinformation.
Forexample,processesarestoredinmemoryasEPROCESSstructures.
PotentialprocessstructurescanbefoundbysearchingforstringsformattedasaDISPATCHHEADERofaKPROCESS.
InthecaseofWindowsXPSP2,thiscorrespondstoaDISPATCHHEADERof0x03andaKPROCESSsizeof0x1b.
Afteralikelyprocessisfound,itisdouble-checkedtoensurethatthepagedirectorytablebaseisavalidvirtualmemorylocation[15,18].
Ifthepagedirectorytabledoesnotpointtoavalidlocation,thenwhathasbeenfoundisaprocessexecutableorprocessdata,notaprocessheader.
Thismethodndsallprocesses,includingnormalactiveprocesses,hid-denactiveprocesses(e.
g.
,processeshiddenbyarootkitlikeFUTo[20]),defunctprocessesandprocessesfrompreviousbootsthathavenotbeenremovedfrommemory.
Inaddition,becausetheEPROCESSstructurealsocontainsadoubly-linkedlistofallactiveprocesses,processesthatweremissedduringthestringsearchcanstillbefoundbytraversingthelinkedlist.
Thescanofthelinkedlistalsoassistsinidentifyingprocessthathavebeendisconnectedfromthelist(whichishowFUTohidesprocesses).
CMATthensearchesthroughthememorydumpforregistryhives.
Inamannersimilartohowitsearchesforprocesses,CMATlooksforCMHIVEstructureswithasignatureinWindowsXPof0xbee0bee0[7].
Justasaprocessmusthaveavalidmemoryaddressforitspagedirec-torytablebase,aregistryhivemusthaveavalidmemoryaddressforitsbaseblock.
CMATalsotakesadvantageofthedoubly-linkedCMHIVEstructurestoensurethatalltheregistriesarefound.
CMATthenmovesthroughthedefaultuserregistrytondrelationshipsbetweensessionIDsandusernames.
InWindowsXP,itndstheProleListkeyunder\USER\MICROSOFT\WindowsNT\CurrentVersionandthenmakesarecordofthesessionIDsandtheirassociatedProleImagePaths,pro-vidinghuman-understandablenamesfortheusersthatwereloggedin.
Asapartofitsprocessing,CMATtranslatesthevirtualaddressesstoredinWindowskerneldatastructuresintophysicalmemoryloca-tions.
WindowsXPhastwolevelsofindirectionwhenitisrunona32-bitmachine;thisisachievedbysplittingavirtualaddressintoapagedirectoryindex,apagetableindexandanoset.
However,iflarge(4MB)pagesareused,thereisonelevelofindirection;ifphysicaladdressextensionsareused,therearethreelevelsofindirection.
WhileCMATcandetectiflargepagesarebeingused,itrequiresuserassistanceinthe200ADVANCESINDIGITALFORENSICSVIformofaparametervaluetodiscernifphysicaladdressextensionsareinuse.
Onemethodtoavoidthisistotryalternativevirtual-to-physicalmappingsuntilthecorrectmappingisfound[25].
Anothermethodistolocatethekernelsystemvariablesthatstorethisinformation[6].
Aftertheprocessentriesandregistryhivesarefound,CMATeitherinteractivelyorinthebatchmodeprovidesforensicinformationofin-terest.
Thisincludesgeneralsysteminformation(operatingsystemandnumberofprocesses)andprocessinformation,whichincludestheuserwhocreatedtheprocess,fullpathoftheexecutable,commandlineusedtoinitiatetheprocess,fullpathsofloadedDLLs,andthelesandreg-istrykeysaccessedbytheprocess.
4.
TestMethodologyTheCMAToutputwascomparedwiththeoutputsofveSysinternalsutilities:psinfo,pslist,logonsessions,handlesandlistdlls[14].
Systeminformationthatwasexaminedincludedtheoperatingsystemversion,numberofprocessorsandnumberofprocesses.
Theprocessinformationexaminedincludedtheprocesscreator,lesopened,registrykeysaccessedandmodulesloaded.
Theonlytypeofvolatileinformationnotexaminedwasnetworkinformation,includingtheportsandsocketsopenedbyprocesses.
Also,acomparisonwasmadeofthenumberofdistinctDLLsusedbyManTech'sphysicalmemorydump(mdd)utilitycomparedwiththenumberofdistinctDLLsusedbytheSysinternalsutilities.
AWindowsXPSP3systemwith2,038MBRAMwasusedinthetests.
SeveralapplicationprogramswerelaunchedonthemachineincludingInternetExplorer,Word,PowerPoint,VisualStudio,Calculator,KernelDebuggerandtwocommandlineshells.
OneofthecommandlineshellswashiddenbytheFUTorootkit[20].
ThememorydumpwascollectedusingManTech'smddutility(version1.
3),whichrequired67seconds.
5.
TestResultsThetestresultsinTable1demonstratethatCMATprovidesthesameorequivalentinformationastheSysinternalsutilities.
Inaddition,CMATfoundtheprocesshiddenbyFUTowhiletheSysinternalsutilitiesdidnot.
TheSysinternalsutilitiesfailedtoassociateseveralprocesseswiththeusersthatstartedthem.
ExceptfortheinabilityofCMATtoprovidenetworkinformation,CMAT'sperformanceinthetestswasexemplary.
SystemInformation:CMATandpsinfoprovidetheoperat-ingsystemversion,majorandminorversion,servicepacknumberOkolica&Peterson201Table1.
CMATvs.
Sysinternalsutilities.
InformationResultCorrelationOperatingSystemVersionWindowsXPSP3v5.
1Build2600100%ProcessorCount2100%ProcessCount56of5897%UserIDs50of5788%LoadedModules57of57100%Files57of57100%RegistryKeys57of57100%DLLsUsed15(CMAT)vs.
48(Sysinternals)andbuildnumber.
Also,theybothprovidethenumberofpro-cessors.
Thepsinfoutilityalsoprovidestheprocessortypeandspeedalongwiththevideodriverused.
However,thisinformationappearstohavelimitedforensicuse;therefore,thisfeaturewasnotimplementedinCMAT.
Theoneadditionalpieceofinforma-tionprovidedbypsinfocomparedwithCMATisifaphysicaladdressextensionisused(asdescribedabove,thisinformationispassedtoCMATasaparameter).
AfutureversionofCMATwilladdressthisshortcoming.
Processes:CMATreported58activeprocesseswhilepslistre-ported57processes;56oftheprocessesmatched(97%equality).
TheprogrammissingfromtheCMATresultswaspslist,whichwasnotrunningwhenthememorywasdumped.
Similarly,thepro-grammdd1.
3wasmissingfromthepslistresult,whichmakessensebecausethememorywasalreadydumpedwhenpslistwasexecuted.
Theotherprogrammissingfromthepslistresultwascmd.
exe,whichwashiddenbytheFUTorootkit;thisdemon-stratesthataprogramintentionallyhiddenbymalwarecanstillbefoundbyCMAT.
WhileCMATprovidesasingleprocesslistingthatincludestheuserwhocreatedtheprocess,Sysinternalsusesaseparateutility(logonsessions)forthispurpose.
Compari-sonoftheCMATandlogonsessionsresultsshowedthatnineprocesseswerenotlistedbylogonsessions,includingallthepro-cessesownedbyLocalServiceandNetworkService,andfourpro-cessesownedbySystemProle(includingthesystemandidlepro-cesses).
Identifyingallthesystemprocessesisvitaltodetectingifmaliciousserviceswereexecutingonthemachine.
LoadedModules:CMATandtheSysinternalslistdllutilityprovidedidenticallistsofloadedmodules(100%equality).
202ADVANCESINDIGITALFORENSICSVIFilesandRegistryKeys:Thelistsoflesandregistrykeyspro-videdbyCMATandtheSysinternalshandle.
exeutilitymatched,exceptforthetemporarylesthatwereopenedandclosedbetweenthememorydumpandtheexecutionofhandle.
exe.
Theseleswerelistedashaving[RWD]access.
CMATidentiedlehan-dlesthatwereactuallydevicehandles(e.
g.
,\Device\KsecDD),butwasunabletoprintthenamesofthedevices.
Similarly,whilehandle.
exesummarizedthelongcodeforthecurrentuserwithasuccinctHKU,CMATdisplayedtheentireregistrykey.
DynamicLinkLibraries:Asmentionedabove,minimizingthenumberofloadedmodules(DLLs)usedwhenperformingaliveresponseisdesirablebecauselessevidenceontheharddriveismodied.
ThistestcomparedthenumbersofDLLsusedbyMan-Tech'smddmemorycapturetoolandtheveSysinternalsutilities.
Tocollectthedata,mddwasexecutedduringthetimethateachoftheveSysinternalsutilitieswasrunning.
TheDLLlistsasso-ciatedwiththeveSysinternalsutilitieswereextractedfromthememorydumpsusingCMAT;duplicateDLLsamongtheveutil-itieswereremovedandtheresultswerethentallied.
Theresultsshowthatperformingamemorycaptureinsteadofaliveresponsesignicantlyreducestheimpactontheevidence.
Inparticular,thememorycaptureused15DLLswhiletheveSysinternalsutilitiesintotalused48dierentDLLs,correspondingtoa69%reductioninsystemimpact.
6.
ConclusionsTheCMATliveresponsetoolprovidescomparableinformationfromamemorydumpandproducesa69%lessimpactonsystemstate(poten-tialevidence)thanthepopularSysinternalsutilities.
However,CMATisunabletoextractseveralpiecesofusefulforensicinformation,includingthemappingofportsandsocketstoprocesses(providedbytheSysin-ternalsportmonutility).
ThedicultyarisesbecausethisinformationisstoredinthedatasectionoftheTCP/IPmodule.
WhiletheportandsocketdataresideinspeciclocationsfordierentWindowsoperatingsystemversions,servicepacksandpatchcongurations,theirlocationscanchangewhennewpatchesareinstalled.
AfutureversionofCMATwilltargetMicrosoftWindowsXPoperat-ingsystems.
OnedicultyistocorrectlymapthekerneldatastructuresfordierentWindowsversions(e.
g.
,VistaandWindows7).
Thisdif-cultycanbeaddressedbyretrievingtheoperatingsystemdatastruc-turesdynamicallyaftertheoperatingsystemisidentieduponparsingOkolica&Peterson203thememorydump.
Microsofthasrecognizedtheneedforsuchexibilitybyprovidingthedatastructures(symboltables)fordownloadinrealtimetosupportitskerneldebugger.
CMATwillattempttomakeuseofthesesymboltablestofacilitatememoryanalysisfordierentversionsoftheWindowsoperatingsystem.
References[1]A.
Boileau,Hitbyabus:PhysicalaccessattackswithFireWire(www.
storm.
net.
nz/static/les/abrewirerux2k6-nal.
pdf),2006.
[2]S.
Brenner,B.
CarrierandJ.
Henninger,TheTrojanHorseDefenseinCybercrimeCases,CERIASTechReport2005-15,CenterforEducationandResearchinInformationAssuranceandSecurity,PurdueUniversity,WestLafayette,Indiana,2005.
[3]B.
Carrier,FileSystemForensicAnalysis,Pearson,UpperSaddleRiver,NewJersey,2005.
[4]B.
CarrierandJ.
Grand,Ahardware-basedmemoryacquisitionprocedurefordigitalinvestigations,DigitalInvestigation,vol.
1(1),pp.
50–60,2004.
[5]H.
Carvey,WindowsForensicAnalysis,Syngress,Burlington,Mas-sachusetts,2007.
[6]B.
Dolan-Gavitt,FindingkernelglobalvariablesinWindows(moyix.
blogspot.
com/2008/04/nding-kernel-global-variables-in.
html),April16,2008.
[7]B.
Dolan-Gavitt,ForensicanalysisoftheWindowsregistryinmem-ory,DigitalInvestigation,vol.
5(S),pp.
S26–S32,2008.
[8]B.
Dolan-Gavitt,Linkingprocessestousers(moyix.
blogspot.
com/2008/08/linking-processes-to-users.
html),August16,2008.
[9]E.
LibsterandJ.
Kornblum,Aproposalforanintegratedmemoryacquisitionmechanism,ACMSIGOPSOperatingSystemsReview,vol.
42(3),pp.
14–20,2008.
[10]K.
Mandia,C.
ProsiseandM.
Pepe,IncidentResponseandComputerForensics,McGraw-Hill/Osborne,Emeryville,Califor-nia,2003.
[11]Mandiant,Memoryze,Washington,DC(www.
mandiant.
com/software/memoryze.
htm).
[12]ManTech,MemoryDD,Vienna,Virginia(cybersolutions.
mantech.
com/products.
htm).
204ADVANCESINDIGITALFORENSICSVI[13]NationalInstititeofJustice,ElectronicCrimeSceneInvestigation:AnOn-the-SceneReferenceforFirstResponders,U.
S.
DepartmentofJustice,Washington,DC,2009.
[14]M.
Russinovich,SysinternalsSuite,MicrosoftCorporation,Red-mond,Washington(technet.
microsoft.
com/en-us/sysinternals/bb842062.
aspx).
[15]M.
RussinovichandD.
Solomon,MicrosoftWindowsInternals,Mi-crosoftPress,Redmond,Washington,2005.
[16]J.
Rutkowska,BeyondtheCPU:Defeatinghardware-basedRAMacquisition(PartI:AMDcase),presentedattheBlackHatDC2007Conference(www.
rst.
org/conference/2007/papers/rutkowska-joanna-slides.
pdf),2007.
[17]A.
Schuster,PTnder(version0.
2.
00),Bonn,Germany(computer.
forensikblog.
de/en/2006/03/ptnder0200.
html),2006.
[18]A.
Schuster,SearchingforprocessesandthreadsinMicrosoftWin-dowsmemorydumps,DigitalInvestigation,vol.
3(S),pp.
S10–S16,2006.
[19]S.
Shankland,AmazonsuersU.
S.
outageonFriday,CNET,SanFrancisco,California(news.
cnet.
com/8301-107843-9962010-7.
html),June6,2008.
[20]P.
Silberman,FUTo,Uninformed,vol.
3(www.
uninformed.
org/v=3&a=7&t=sumry),January2006.
[21]SourceForge.
net,Memparser(sourceforge.
net/projects/memparser),2006.
[22]M.
Suiche,SandmanProject(sandman.
msuiche.
net/docs/SandManProject.
pdf),2008.
[23]M.
Suiche,win32dd(win32dd.
msuiche.
net).
[24]I.
Sutherland,J.
Evans,T.
TryfonasandA.
Blyth,Acquiringvolatileoperatingsystemdata:Toolsandtechniques,ACMSIGOPSOperatingSystemsReview,vol.
42(3),pp.
65–73,2008.
[25]A.
WaltersandN.
Petroni,Volatools:Integratingvolatilememoryforensicsintothedigitalinvestigationprocess,presentedatBlackhatHatDC2007Conference(www.
blackhat.
com/presentations/bh-dc-07/Walters/Paper/bh-dc-07-Walters-WP.
pdf),2007.

PIGYun中秋特惠:香港/韩国VPS月付14元起

PIGYun发布了九月份及中秋节特惠活动,提供8折优惠码,本月商家主推中国香港和韩国机房,优惠后最低韩国每月14元/中国香港每月19元起。这是一家成立于2019年的国人商家,提供中国香港、韩国和美国等地区机房VPS主机,基于KVM架构,采用SSD硬盘,CN2+BGP线路(美国为CUVIP-AS9929、GIA等)。下面列出两款主机配置信息。机房:中国香港CPU:1core内存:1GB硬盘:10GB...

云如故枣庄高防(49元)大内存2H2G49元8H8G109元

云如故是一家成立于2018年的国内企业IDC服务商,由山东云如故网络科技有限公司运营,IDC ICP ISP CDN VPN IRCS等证件齐全!合法运营销售,主要从事自营高防独立服务器、物理机、VPS、云服务器,虚拟主机等产品销售,适合高防稳定等需求的用户,可用于建站、游戏、商城、steam、APP、小程序、软件、资料存储等等各种个人及企业级用途。机房可封UDP 海外 支持策略定制 双层硬件(傲...

BuyVM新设立的迈阿密机房速度怎么样?简单的测评速度性能

BuyVM商家算是一家比较老牌的海外主机商,公司设立在加拿大,曾经是低价便宜VPS主机的代表,目前为止有提供纽约、拉斯维加斯、卢森堡机房,以及新增加的美国迈阿密机房。如果我们有需要选择BuyVM商家的机器需要注意的是注册信息的时候一定要规范,否则很容易出现欺诈订单,甚至你开通后都有可能被禁止账户,也是这个原因,曾经被很多人吐槽的。这里我们简单的对于BuyVM商家新增加的迈阿密机房进行简单的测评。如...

physicalmemory为你推荐
回收卡巴斯基债券127legraph支持ipad支持ipad支持ipadoutput_buffering飞飞的官方网站是啥ipad如何上网如何用手机流量在IPAD上上网iphone连不上wifi我的苹果手机连不上无线,其它手机能,怎么回事?只是家里的连不上tcpip上的netbiostcp 协议里的 netbios . 在哪,找不到
顶级域名 西安域名注册 双线服务器租用 企业域名备案 smartvps 独享100m pw域名 好看的留言 监控宝 京东商城0元抢购 有益网络 韩国名字大全 中国电信测网速 共享主机 免费美国空间 网通服务器托管 免费cdn 酷番云 网游服务器 吉林铁通 更多