enabledphysicalmemory

physicalmemory  时间:2021-05-19  阅读:()
Chapter14ACOMPILEDMEMORYANALYSISTOOLJamesOkolicaandGilbertPetersonAbstractTheanalysisofcomputermemoryisbecomingincreasinglyimportantindigitalforensicinvestigations.
Volatilememoryanalysiscanpro-videvaluableindicatorsonwhattosearchforonaharddrive,helprecoverpasswordstoencryptedharddrivesandpossiblyrefutedefenseclaimsthatcriminalactivitywastheresultofamalwareinfection.
His-torically,digitalforensicinvestigatorshaveperformedliveresponsebyexecutingmultipleutilities.
However,usingasingletooltocaptureandanalyzecomputermemoryismoreecientandhaslessimpactonthesystemstate(potentialevidence).
ThispaperdescribesCMAT,aself-containedtoolthatextractsforensicinformationfromamemorydumpandpresentsitinaformatthatissuitableforfurtheranalysis.
AcomparisonoftheresultsobtainedwithutilitiesthatarecommonlyemployedinliveresponsedemonstratesthatCMATprovidessimilarinformationandidentiesmalwarethatismissedbytheutilities.
Keywords:Liveresponse,memoryanalysis,rootkitdetection1.
IntroductionWhenalargeenterpriserespondstoacybersecurityincident,itmaynotbefeasibletoperformtherecommendeddisconnectionandimagingprocesstogatherforensicevidence[13],especiallyinthecaseofserversthatarecriticaltobusinessoperations.
AccordingtoCNET[19],Ama-zonlost$29,000inrevenueperminuteduringitsJune2008outage.
Inaddition,therehavebeenseveralrecentcaseswheredefendantswerefoundinnocentorguiltybasedontheliveresponseinformationretrievedatthetimeoftheincident[2].
Clearly,toolsthatcantakequicksnap-shotsofaectedcomputerswhileminimizingtheimpactonbusinessoperationsandpreservingevidencearevitaltodigitalforensicinves-tigations.
Sincemanyoftheitemsofinterestinaliveresponsearemaintainedincomputermemoryratherthantheharddrive,amini-K.
-P.
Chow,S.
Shenoi(Eds.
):AdvancesinDigitalForensicsVI,IFIPAICT337,pp.
195–204,2010.
cIFIPInternationalFederationforInformationProcessing2010196ADVANCESINDIGITALFORENSICSVImallyintrusiveliveresponsewouldinvolvetheanalysisofalivememorycapture.
Threestepsareinvolvedindevelopingaminimallyintrusivestan-daloneforensictoolformemory:(i)afront-endmemorydumproutinethatdirectlyaccessesphysicalmemory;(ii)amemoryanalysistoolthatextractsenvironmentalandactivityinformationfromthememorydump;and(iii)asynthesistoolthatcorrelatestheenvironmentalinformationtoprovideahuman-understandablenarrativeofwhatoccurredonthemachine.
Thispaperfocusesonthesecondstep:developingacompiledmemoryanalysistool(CMAT)thatextractsenvironmentalandactivityinforma-tionfromamemorydump.
CMATparsesamemorydumptondactive,inactiveandhiddenprocessesaswellassystemregistryinformation.
Itthencompilesliveresponseforensicinformationfromtheseprocessesandregistrylesandassemblesitintoaformatsuitablefordatacorrelation.
CMATistestedagainstseveralutilitiesthatextractforensicinformationfromalivesystem.
ExperimentalresultsindicatethatCMATprovidescomparableinformationastraditionalliveresponseutilities,andalsouncoversmalwarethatthesetoolsmiss.
2.
BackgroundPerformingaliveresponseallowsthecaptureofforensicinformationthatdisappearsafterthecomputeristurnedo.
Thebenetsofaliveresponseinclude:gatheringcluestobetterfocusasearchoftheharddrive[24];retrievingdecryption/encryptionkeysforanencryptedharddrive[24];anddefeatingtheTrojanhorsedefenseof"Ididn'tdoit,itwasthemalwareinstalledonmymachine"[2].
Valuableliveresponseinformationthatresidesinmemoryincludes[4,5,10,24]:SystemdateandtimeLoggedinusersandtheirauthorizationcredentialsNetworkinformation,connectionsandstatusProcessinformation,memoryandprocess-to-portmappingsClipboardcontentsCommandhistoryServicesanddriverinformationOpenles,registrykeysandharddiskimagesOkolica&Peterson197Oneoftheargumentsagainstliveresponseisthattheevidencecap-tureprocessmodiesthemachinestate.
Severaltechniqueshavebeenproposedtoaddressthisissue[1,3,9,22].
Thesetechniquesattempttocaptureallthememoryinsteadofspecicpiecesofforensicinformation.
Thishelpsanswertheimmediateforensicquestionsandalsoprovidesameanstoansweradditionalquestionsthatmaycomeuplaterintheinvestigation.
Thealternativesincludehardware-basedmemoryacquisi-tion[1,3],virtualmachines,hibernationles[22]andoperatingsystempatches[9].
Hardware-basedmemoryacquisitiontechniquescircumventthere-lianceontheoperatingsystembyusinghardwarethatinteractsdirectlywithmemory.
Thesetechniquesinvolvetheuseofcustomhardware[3]ortheFireWireinterface[1]fordirectmemoryaccess.
Butthetwotechniquessuerfromthe"northbridgeexploit"[16].
Sinceallperiph-eraldevicesusethenorthbridgetointerfacewiththeCPUandmainmemory,malwarecanbeloadedontothenorthbridgetosubvertmem-oryaccessbyaperipheralwhileleavingtheCPUandoperatingsystemuntouched.
Thisenablesthemalwaretoremainundetected.
ThenorthbridgeexploitcanbecontainedbyconstrainingmemorycapturetechniquestotheCPUandoperatingsystem.
Virtualmachinesprovideaneasymethodfordumpingmemory.
Whenanincidentoccurs,aforensicinvestigatortakescontroloftheactualmachine,suspendsthevirtualmachine,andthendumpsthememoryinthevirtualmachine.
However,oneproblemwiththismethodisthatimplementingsuchapolicywithinalargeorganizationincurshighcostsintermsoftimeandmoney.
Moreover,softwarevirtualizationcanslowtheperceivedresponsivenessofacomputerbecauseeverycommandhastogothroughanadditionallevelofabstraction.
Hibernationlesoeranalternativememorycapturemethodthatre-liesontheoperatingsystem[22].
Theprocessofanalyzinghibernationlesrequiresplacingthesysteminthehibernationmode,copyingthehibernationlesandextractingtheircontents.
However,whilethehi-bernationfunctionisenabledonmanylaptops,itisdisabledbydefaultonmostdesktops.
Desktopscanbereconguredtoenablethehiberna-tionmode,butthismustbedoneinadvance.
Otherdicultiesincludethelackofpublisheddescriptionsofhibernationleformatsandthefactthatnoteverythinginmemorymaybestored.
LibsterandKornblum[9]haveproposedanalternativemethodforacquiringapristinecopyofmemory.
Themethodinvolvesmodifyingtheoperatingsystemkernelsothatauser-denedfunctionkeywouldcausetheoperatingsystemtoimmediatelysuspend,generateamemorydumpthatitsendsoveranetworktoasecuremachine,andthenresume198ADVANCESINDIGITALFORENSICSVIexecution.
Thedicultywiththismethodistoensurethatitisdeployedforallthedisparatesystemsofalargeenterprisepriortoanincident.
Whileapre-installedoperatingsystempatchappearstobeanidealsolutionincaseswhereprioraccessisnotpossible,theonlyoptionavail-ableistoinitiateanewprocesstodumpsystemmemory.
Tominimizetheimpact,theapplicationshouldlimitapplicationprograminterfaces(APIs)thatinterfacewiththeoperatingsystemandtheuseofagraphi-caluserinterface(GUI).
Unfortunately,whilemanyavailabletools(e.
g.
,[12,23])arerunfromthecommandline,mostuseoperatingsystemAPIstodumpmemory.
TheonlyexceptionappearstobeMemoryze[11].
Memoryanalysistoolsextractdierentamountsandtypesofliveresponsedatafromamemorydump.
TheVolatilitytool[25]extractsthedateandtime,runningprocesses,openports,process-portmappings,strings-processmappings,process-lemappings,processdynamiclinklibraries(DLLs)andopenconnections.
Additionalplug-insareavailabletoenhancethefunctionalityofVolatility,includingtheabilitytoextractregistryinformation.
However,VolatilitysuersfromthelimitationthatitdoesnotextractportinformationforallWindowsoperatingsystemservicepackandpatchcongurations.
Comprehensiveopensourcememoryanalysistoolswrittenincom-piledlanguagessuchasC/C++arenotavailableforWindowsXPsys-tems.
Betz[21]hasdevelopedatoolthatndsprocessesandthreadsinmemoryandextractssomeinformation,butitislimitedtoWindows2000systemsanddoesnotsupporttheanalysisofregistryles,net-workactivityandprocesscreators.
PTnder[17]alsosearchesthroughmemoryforprocessesandthreads,andhandlesmemorycapturesfromWindowsXPsystems.
However,likeBetz'stool,itdoesnotsupporttheanalysisofregistryles[7],networkactivityandprocesscreators[8].
3.
CompiledMemoryAnalysisToolThecompiledmemoryanalysistool(CMAT)isaC++commandlineutilitythatrunsonLinuxandWindowsoperatingsystems.
ItparsesaWindowsXPmemorydumptoobtaininformationonuseraccounts,theWindowsregistryandrunningprocesses.
CMATprovidessystem,pro-cess,registry,openportsanduserinformationinastandalonetoolthatrunswithoutAPIcallsorhigh-levellanguageinterpreters.
CMATop-eratesintwopasses.
Duringtherstpass,CMATsearchesthememorydumpleforprocesses,threadsandregistryhives.
Inthesecondpass,CMATorganizestheprocess,threadandregistryentriesithasfoundOkolica&Peterson199andproducesoutputinaformatsimilartothatproducedbycommonliveresponsetools.
TheWindowskernelincorporatesdatastructuresneededfortheop-eratingsystemtofunction.
Thesedatastructuresareusefulforex-tractingliveresponseinformation.
Forexample,processesarestoredinmemoryasEPROCESSstructures.
PotentialprocessstructurescanbefoundbysearchingforstringsformattedasaDISPATCHHEADERofaKPROCESS.
InthecaseofWindowsXPSP2,thiscorrespondstoaDISPATCHHEADERof0x03andaKPROCESSsizeof0x1b.
Afteralikelyprocessisfound,itisdouble-checkedtoensurethatthepagedirectorytablebaseisavalidvirtualmemorylocation[15,18].
Ifthepagedirectorytabledoesnotpointtoavalidlocation,thenwhathasbeenfoundisaprocessexecutableorprocessdata,notaprocessheader.
Thismethodndsallprocesses,includingnormalactiveprocesses,hid-denactiveprocesses(e.
g.
,processeshiddenbyarootkitlikeFUTo[20]),defunctprocessesandprocessesfrompreviousbootsthathavenotbeenremovedfrommemory.
Inaddition,becausetheEPROCESSstructurealsocontainsadoubly-linkedlistofallactiveprocesses,processesthatweremissedduringthestringsearchcanstillbefoundbytraversingthelinkedlist.
Thescanofthelinkedlistalsoassistsinidentifyingprocessthathavebeendisconnectedfromthelist(whichishowFUTohidesprocesses).
CMATthensearchesthroughthememorydumpforregistryhives.
Inamannersimilartohowitsearchesforprocesses,CMATlooksforCMHIVEstructureswithasignatureinWindowsXPof0xbee0bee0[7].
Justasaprocessmusthaveavalidmemoryaddressforitspagedirec-torytablebase,aregistryhivemusthaveavalidmemoryaddressforitsbaseblock.
CMATalsotakesadvantageofthedoubly-linkedCMHIVEstructurestoensurethatalltheregistriesarefound.
CMATthenmovesthroughthedefaultuserregistrytondrelationshipsbetweensessionIDsandusernames.
InWindowsXP,itndstheProleListkeyunder\USER\MICROSOFT\WindowsNT\CurrentVersionandthenmakesarecordofthesessionIDsandtheirassociatedProleImagePaths,pro-vidinghuman-understandablenamesfortheusersthatwereloggedin.
Asapartofitsprocessing,CMATtranslatesthevirtualaddressesstoredinWindowskerneldatastructuresintophysicalmemoryloca-tions.
WindowsXPhastwolevelsofindirectionwhenitisrunona32-bitmachine;thisisachievedbysplittingavirtualaddressintoapagedirectoryindex,apagetableindexandanoset.
However,iflarge(4MB)pagesareused,thereisonelevelofindirection;ifphysicaladdressextensionsareused,therearethreelevelsofindirection.
WhileCMATcandetectiflargepagesarebeingused,itrequiresuserassistanceinthe200ADVANCESINDIGITALFORENSICSVIformofaparametervaluetodiscernifphysicaladdressextensionsareinuse.
Onemethodtoavoidthisistotryalternativevirtual-to-physicalmappingsuntilthecorrectmappingisfound[25].
Anothermethodistolocatethekernelsystemvariablesthatstorethisinformation[6].
Aftertheprocessentriesandregistryhivesarefound,CMATeitherinteractivelyorinthebatchmodeprovidesforensicinformationofin-terest.
Thisincludesgeneralsysteminformation(operatingsystemandnumberofprocesses)andprocessinformation,whichincludestheuserwhocreatedtheprocess,fullpathoftheexecutable,commandlineusedtoinitiatetheprocess,fullpathsofloadedDLLs,andthelesandreg-istrykeysaccessedbytheprocess.
4.
TestMethodologyTheCMAToutputwascomparedwiththeoutputsofveSysinternalsutilities:psinfo,pslist,logonsessions,handlesandlistdlls[14].
Systeminformationthatwasexaminedincludedtheoperatingsystemversion,numberofprocessorsandnumberofprocesses.
Theprocessinformationexaminedincludedtheprocesscreator,lesopened,registrykeysaccessedandmodulesloaded.
Theonlytypeofvolatileinformationnotexaminedwasnetworkinformation,includingtheportsandsocketsopenedbyprocesses.
Also,acomparisonwasmadeofthenumberofdistinctDLLsusedbyManTech'sphysicalmemorydump(mdd)utilitycomparedwiththenumberofdistinctDLLsusedbytheSysinternalsutilities.
AWindowsXPSP3systemwith2,038MBRAMwasusedinthetests.
SeveralapplicationprogramswerelaunchedonthemachineincludingInternetExplorer,Word,PowerPoint,VisualStudio,Calculator,KernelDebuggerandtwocommandlineshells.
OneofthecommandlineshellswashiddenbytheFUTorootkit[20].
ThememorydumpwascollectedusingManTech'smddutility(version1.
3),whichrequired67seconds.
5.
TestResultsThetestresultsinTable1demonstratethatCMATprovidesthesameorequivalentinformationastheSysinternalsutilities.
Inaddition,CMATfoundtheprocesshiddenbyFUTowhiletheSysinternalsutilitiesdidnot.
TheSysinternalsutilitiesfailedtoassociateseveralprocesseswiththeusersthatstartedthem.
ExceptfortheinabilityofCMATtoprovidenetworkinformation,CMAT'sperformanceinthetestswasexemplary.
SystemInformation:CMATandpsinfoprovidetheoperat-ingsystemversion,majorandminorversion,servicepacknumberOkolica&Peterson201Table1.
CMATvs.
Sysinternalsutilities.
InformationResultCorrelationOperatingSystemVersionWindowsXPSP3v5.
1Build2600100%ProcessorCount2100%ProcessCount56of5897%UserIDs50of5788%LoadedModules57of57100%Files57of57100%RegistryKeys57of57100%DLLsUsed15(CMAT)vs.
48(Sysinternals)andbuildnumber.
Also,theybothprovidethenumberofpro-cessors.
Thepsinfoutilityalsoprovidestheprocessortypeandspeedalongwiththevideodriverused.
However,thisinformationappearstohavelimitedforensicuse;therefore,thisfeaturewasnotimplementedinCMAT.
Theoneadditionalpieceofinforma-tionprovidedbypsinfocomparedwithCMATisifaphysicaladdressextensionisused(asdescribedabove,thisinformationispassedtoCMATasaparameter).
AfutureversionofCMATwilladdressthisshortcoming.
Processes:CMATreported58activeprocesseswhilepslistre-ported57processes;56oftheprocessesmatched(97%equality).
TheprogrammissingfromtheCMATresultswaspslist,whichwasnotrunningwhenthememorywasdumped.
Similarly,thepro-grammdd1.
3wasmissingfromthepslistresult,whichmakessensebecausethememorywasalreadydumpedwhenpslistwasexecuted.
Theotherprogrammissingfromthepslistresultwascmd.
exe,whichwashiddenbytheFUTorootkit;thisdemon-stratesthataprogramintentionallyhiddenbymalwarecanstillbefoundbyCMAT.
WhileCMATprovidesasingleprocesslistingthatincludestheuserwhocreatedtheprocess,Sysinternalsusesaseparateutility(logonsessions)forthispurpose.
Compari-sonoftheCMATandlogonsessionsresultsshowedthatnineprocesseswerenotlistedbylogonsessions,includingallthepro-cessesownedbyLocalServiceandNetworkService,andfourpro-cessesownedbySystemProle(includingthesystemandidlepro-cesses).
Identifyingallthesystemprocessesisvitaltodetectingifmaliciousserviceswereexecutingonthemachine.
LoadedModules:CMATandtheSysinternalslistdllutilityprovidedidenticallistsofloadedmodules(100%equality).
202ADVANCESINDIGITALFORENSICSVIFilesandRegistryKeys:Thelistsoflesandregistrykeyspro-videdbyCMATandtheSysinternalshandle.
exeutilitymatched,exceptforthetemporarylesthatwereopenedandclosedbetweenthememorydumpandtheexecutionofhandle.
exe.
Theseleswerelistedashaving[RWD]access.
CMATidentiedlehan-dlesthatwereactuallydevicehandles(e.
g.
,\Device\KsecDD),butwasunabletoprintthenamesofthedevices.
Similarly,whilehandle.
exesummarizedthelongcodeforthecurrentuserwithasuccinctHKU,CMATdisplayedtheentireregistrykey.
DynamicLinkLibraries:Asmentionedabove,minimizingthenumberofloadedmodules(DLLs)usedwhenperformingaliveresponseisdesirablebecauselessevidenceontheharddriveismodied.
ThistestcomparedthenumbersofDLLsusedbyMan-Tech'smddmemorycapturetoolandtheveSysinternalsutilities.
Tocollectthedata,mddwasexecutedduringthetimethateachoftheveSysinternalsutilitieswasrunning.
TheDLLlistsasso-ciatedwiththeveSysinternalsutilitieswereextractedfromthememorydumpsusingCMAT;duplicateDLLsamongtheveutil-itieswereremovedandtheresultswerethentallied.
Theresultsshowthatperformingamemorycaptureinsteadofaliveresponsesignicantlyreducestheimpactontheevidence.
Inparticular,thememorycaptureused15DLLswhiletheveSysinternalsutilitiesintotalused48dierentDLLs,correspondingtoa69%reductioninsystemimpact.
6.
ConclusionsTheCMATliveresponsetoolprovidescomparableinformationfromamemorydumpandproducesa69%lessimpactonsystemstate(poten-tialevidence)thanthepopularSysinternalsutilities.
However,CMATisunabletoextractseveralpiecesofusefulforensicinformation,includingthemappingofportsandsocketstoprocesses(providedbytheSysin-ternalsportmonutility).
ThedicultyarisesbecausethisinformationisstoredinthedatasectionoftheTCP/IPmodule.
WhiletheportandsocketdataresideinspeciclocationsfordierentWindowsoperatingsystemversions,servicepacksandpatchcongurations,theirlocationscanchangewhennewpatchesareinstalled.
AfutureversionofCMATwilltargetMicrosoftWindowsXPoperat-ingsystems.
OnedicultyistocorrectlymapthekerneldatastructuresfordierentWindowsversions(e.
g.
,VistaandWindows7).
Thisdif-cultycanbeaddressedbyretrievingtheoperatingsystemdatastruc-turesdynamicallyaftertheoperatingsystemisidentieduponparsingOkolica&Peterson203thememorydump.
Microsofthasrecognizedtheneedforsuchexibilitybyprovidingthedatastructures(symboltables)fordownloadinrealtimetosupportitskerneldebugger.
CMATwillattempttomakeuseofthesesymboltablestofacilitatememoryanalysisfordierentversionsoftheWindowsoperatingsystem.
References[1]A.
Boileau,Hitbyabus:PhysicalaccessattackswithFireWire(www.
storm.
net.
nz/static/les/abrewirerux2k6-nal.
pdf),2006.
[2]S.
Brenner,B.
CarrierandJ.
Henninger,TheTrojanHorseDefenseinCybercrimeCases,CERIASTechReport2005-15,CenterforEducationandResearchinInformationAssuranceandSecurity,PurdueUniversity,WestLafayette,Indiana,2005.
[3]B.
Carrier,FileSystemForensicAnalysis,Pearson,UpperSaddleRiver,NewJersey,2005.
[4]B.
CarrierandJ.
Grand,Ahardware-basedmemoryacquisitionprocedurefordigitalinvestigations,DigitalInvestigation,vol.
1(1),pp.
50–60,2004.
[5]H.
Carvey,WindowsForensicAnalysis,Syngress,Burlington,Mas-sachusetts,2007.
[6]B.
Dolan-Gavitt,FindingkernelglobalvariablesinWindows(moyix.
blogspot.
com/2008/04/nding-kernel-global-variables-in.
html),April16,2008.
[7]B.
Dolan-Gavitt,ForensicanalysisoftheWindowsregistryinmem-ory,DigitalInvestigation,vol.
5(S),pp.
S26–S32,2008.
[8]B.
Dolan-Gavitt,Linkingprocessestousers(moyix.
blogspot.
com/2008/08/linking-processes-to-users.
html),August16,2008.
[9]E.
LibsterandJ.
Kornblum,Aproposalforanintegratedmemoryacquisitionmechanism,ACMSIGOPSOperatingSystemsReview,vol.
42(3),pp.
14–20,2008.
[10]K.
Mandia,C.
ProsiseandM.
Pepe,IncidentResponseandComputerForensics,McGraw-Hill/Osborne,Emeryville,Califor-nia,2003.
[11]Mandiant,Memoryze,Washington,DC(www.
mandiant.
com/software/memoryze.
htm).
[12]ManTech,MemoryDD,Vienna,Virginia(cybersolutions.
mantech.
com/products.
htm).
204ADVANCESINDIGITALFORENSICSVI[13]NationalInstititeofJustice,ElectronicCrimeSceneInvestigation:AnOn-the-SceneReferenceforFirstResponders,U.
S.
DepartmentofJustice,Washington,DC,2009.
[14]M.
Russinovich,SysinternalsSuite,MicrosoftCorporation,Red-mond,Washington(technet.
microsoft.
com/en-us/sysinternals/bb842062.
aspx).
[15]M.
RussinovichandD.
Solomon,MicrosoftWindowsInternals,Mi-crosoftPress,Redmond,Washington,2005.
[16]J.
Rutkowska,BeyondtheCPU:Defeatinghardware-basedRAMacquisition(PartI:AMDcase),presentedattheBlackHatDC2007Conference(www.
rst.
org/conference/2007/papers/rutkowska-joanna-slides.
pdf),2007.
[17]A.
Schuster,PTnder(version0.
2.
00),Bonn,Germany(computer.
forensikblog.
de/en/2006/03/ptnder0200.
html),2006.
[18]A.
Schuster,SearchingforprocessesandthreadsinMicrosoftWin-dowsmemorydumps,DigitalInvestigation,vol.
3(S),pp.
S10–S16,2006.
[19]S.
Shankland,AmazonsuersU.
S.
outageonFriday,CNET,SanFrancisco,California(news.
cnet.
com/8301-107843-9962010-7.
html),June6,2008.
[20]P.
Silberman,FUTo,Uninformed,vol.
3(www.
uninformed.
org/v=3&a=7&t=sumry),January2006.
[21]SourceForge.
net,Memparser(sourceforge.
net/projects/memparser),2006.
[22]M.
Suiche,SandmanProject(sandman.
msuiche.
net/docs/SandManProject.
pdf),2008.
[23]M.
Suiche,win32dd(win32dd.
msuiche.
net).
[24]I.
Sutherland,J.
Evans,T.
TryfonasandA.
Blyth,Acquiringvolatileoperatingsystemdata:Toolsandtechniques,ACMSIGOPSOperatingSystemsReview,vol.
42(3),pp.
65–73,2008.
[25]A.
WaltersandN.
Petroni,Volatools:Integratingvolatilememoryforensicsintothedigitalinvestigationprocess,presentedatBlackhatHatDC2007Conference(www.
blackhat.
com/presentations/bh-dc-07/Walters/Paper/bh-dc-07-Walters-WP.
pdf),2007.

SugarHosts糖果主机,(67元/年)云服务器/虚拟主机低至半价

SugarHosts 糖果主机商也算是比较老牌的主机商,从2009年开始推出虚拟主机以来,目前当然还是以虚拟主机为主,也有新增云服务器和独立服务器。早年很多网友也比较争议他们家是不是国人商家,其实这些不是特别重要,我们很多国人商家或者国外商家主要还是看重的是品质和服务。一晃十二年过去,有看到SugarHosts糖果主机商12周年的促销活动。如果我们有需要香港、美国、德国虚拟主机的可以选择,他们家的...

妮妮云(30元),美国300G防御 2核4G 107.6元,美国高速建站 2核2G

妮妮云的来历妮妮云是 789 陈总 张总 三方共同投资建立的网站 本着“良心 便宜 稳定”的初衷 为小白用户避免被坑妮妮云的市场定位妮妮云主要代理市场稳定速度的云服务器产品,避免新手购买云服务器的时候众多商家不知道如何选择,妮妮云就帮你选择好了产品,无需承担购买风险,不用担心出现被跑路 被诈骗的情况。妮妮云的售后保证妮妮云退款 通过于合作商的友好协商,云服务器提供2天内全额退款,超过2天不退款 物...

德阳电信高防物理机 16核16G 50M 260元/月 达州创梦网络

达州创梦网络怎么样,达州创梦网络公司位于四川省达州市,属于四川本地企业,资质齐全,IDC/ISP均有,从创梦网络这边租的服务器均可以备案,属于一手资源,高防机柜、大带宽、高防IP业务,一手整C IP段,四川电信,一手四川托管服务商,成都优化线路,机柜租用、服务器云服务器租用,适合建站做游戏,不须要在套CDN,全国访问快,直连省骨干,大网封UDP,无视UDP攻击,机房集群高达1.2TB,单机可提供1...

physicalmemory为你推荐
招标文件采购方式:公开招标请仔细阅读在本报告尾部的重要法律声明游戏iosrealgooglefunctionscss支持ipad请务必阅读正文之后的免责条款部分ipadwifiIPAD连上了WIFI,但是无法上网,急!!iexplore.exe应用程序错误iexplore.exe - 应用程序错误怎么办阿??????win10445端口windows server2008怎么开放4443端口
动态域名 域名注册使用godaddy vps交流 鲁诺vps ix主机 BWH isatap 坐公交投2700元 699美元 速度云 nerds 服务器合租 免费dns解析 万网主机管理 万网空间管理 秒杀品 免费蓝钻 主机返佣 supercache 购买空间 更多