Top Banner
8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander [email protected]
90

8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander [email protected].

Dec 22, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 1Scott L. Ksander

Computer Forensics in the Campus Environment

Scott L. [email protected]

Page 2: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 2Scott L. Ksander

Things That Will Be Covered On The Final

• Computer evidence is not just about computer crime or incident response

• Know and use established forensics principles• Mindset and technique are more important than

tools• Establishing relationships is the key to success• How to start building your forensic toolkit• Things to expect in the campus environment• Challenges and expected defenses• References

Page 3: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 3Scott L. Ksander

Some Background

• The Dean of Students at Purdue University estimates that 25% of all disciplinary cases involve some sort of computer evidence

• The Director of the FBI now expects 50% of all cases handled by the FBI to involve at least one computer forensic examination

• Local law enforcement agencies and prosecutors expect 20-40% of all cases will require information forensics

Page 4: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 4Scott L. Ksander

Things That Will Be Covered On The Final

• Computer evidence is not just about computer crime or incident response

• Know and use established forensics principles• Mindset and technique are more important than

tools• Establishing relationships is the key to success• How to start building your forensic toolkit• Things to expect in the campus environment• Challenges and expected defenses• References

Page 5: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 5Scott L. Ksander

Incident Response Methodology (PDCAERF)

Preparation Detection Containment Analysis Eradication Recovery Follow-up

Feed Back

Digital Forensics/Evidence ManagementDigital Forensics/Evidence Management

Page 6: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 6Scott L. Ksander

Page 7: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 7Scott L. Ksander

Context of Computer Forensics

•Homeland Security

•Information Security

•Corporate Espionage

•White Collar Crime

•Child Pornography

•Traditional Crime

•Incident Response

•Employee Monitoring

•Privacy Issues

•????

Digital ForensicsComputer Forensics

Page 8: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 8Scott L. Ksander

History & Development

Francis Galton (1822-1911)– First definitive study of fingerprints

Sir Arthur Conan Doyle (1887)– Sherlock Holmes mysteries

Leone Lattes (1887-1954)– Discovered blood groupings (A,B,AB, & 0)

Calvin Goddard (1891-1955)– Firearms and bullet comparison

Albert Osborn (1858-1946)– Developed principles of document examination

Hans Gross (1847-1915)– First treatise on using scientific disciplines in criminal

investigations.

Page 9: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 9Scott L. Ksander

Communities

There at least 3 distinct communities within Digital Forensics– Law Enforcement– Military– Business & Industry

• Possibly a 4th – Academia

Page 10: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 10Scott L. Ksander

The Process

The primary activities of DFS are investigative in nature.The investigative process encompasses

– Identification– Preservation– Collection– Examination– Analysis – Presentation– Decision

Page 11: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 11Scott L. Ksander

Computer Forensic Activities

Computer forensics activities commonly include:

– the secure collection of computer data – the identification of suspect data– the examination of suspect data to determine

details such as origin and content – the presentation of computer-based information – the application of a country's laws to computer

practice.

Page 12: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 12Scott L. Ksander

The 3 As

The basic methodology consists of the 3 As:

– Acquire the evidence without altering or damaging the original

– Authenticate the image– Analyze the data without modifying it

Page 13: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 13Scott L. Ksander

“The Computer”

Computer as Target of the incident– Get to instructor’s test preparation– Access someone else’s homework– Access/Change a grade– Access financial information– “Denial of Service”

Computer as Tool of the incident– Word processing used to create plagiarized work– E-mail sent as threat or harassment– Printing used to create counterfeit material

Computer as Incidental to the incident– E-mail/file access used to establish date/timelines– Stored names and addresses of contacts or others

potentially involved in the incident

Page 14: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 14Scott L. Ksander

General Types of Digital Forensics“Network” Analysis

– Communication analysis– Log analysis– Path tracing

Media Analysis– Disk imaging– MAC time analysis (Modify, Access, Create)– Content analysis– Slack space analysis– Steganography

Code Analysis– Reverse engineering– Malicious code review– Exploit Review

The “puzzle” is a combination of all the above pieces

Page 15: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 15Scott L. Ksander

Things That Will Be Covered On The Final

• Computer evidence is not just about computer crime or incident response

• Know and use established forensics principles• Mindset and technique are more important than

tools• Establishing relationships is the key to success• How to start building your forensic toolkit• Things to expect in the campus environment• Challenges and expected defenses• References

Page 16: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 16Scott L. Ksander

Principle of Exchange

“..when a person commits a crime something is always left at the scene of the crime that was not present when the person arrived.”

(Edmund Locard, 1910)

Page 17: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 17Scott L. Ksander

Forensic Principles

1. When dealing with digital evidence, all of the general forensic and procedural principles must be applied.

2. Upon seizing digital evidence, actions taken should not change that evidence.

3. When it is necessary for a person to access original digital evidence, that person should be trained for the purpose.

4. All activity relating to the seizure, access, storage or transfer of digital evidence must be fully documented, preserved and available for review.

5. An Individual is responsible for all actions taken with respect to digital evidence while the digital evidence is in their possession.

6. Any agency, which is responsible for seizing, accessing, storing or transferring digital evidence is responsible for compliance with these principles.

Page 18: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 18Scott L. Ksander

General Evidence Dos & Don’ts

1. Minimize Handling/Corruption of Original Data 2. Account for Any Changes and Keep Detailed Logs of Your Actions 3. Comply with the Five Rules of Evidence 4. Do Not Exceed Your Knowledge 5. Follow Your Local Security Policy and Obtain Written Permission 6. Capture as Accurate an Image of the System as Possible 7. Be Prepared to Testify 8. Ensure Your Actions are Repeatable 9. Work Fast 10. Proceed From Volatile to Persistent Evidence 11. Don't Run Any Programs on the Affected System 12. Document Document Document!!!!

Source: AusCERT 2003 (www.auscert.org)

Page 19: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 19Scott L. Ksander

5 Rules of Evidence

AdmissibleMust be able to be used in court or elsewhere

AuthenticEvidence relates to incident in relevant way

Complete (no tunnel vision)Exculpatory evidence for alternative suspects

ReliableNo question about authenticity & veracity

BelievableClear, easy to understand, and believable by a jury

Page 20: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 20Scott L. Ksander

Evidence Life Cycle

Collection & identification

Storage, preservation, and transportation

Presentation

Return to production, owner, or court

Page 21: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 21Scott L. Ksander

Chain of Custody

Protects integrity of the evidenceEffective process of documenting the complete

journey of the evidence during the life of the caseAllows you to answer the following questions:

– Who collected it?– How & where?– Who took possession of it?– How was it stored & protected in

storage?– Who took it out of storage & why?

Page 22: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 22Scott L. Ksander

Things That Will Be Covered On The Final

• Computer evidence is not just about computer crime or incident response

• Know and use established forensics principles• Mindset and technique are more important than

tools• Establishing relationships is the key to success• How to start building your forensic toolkit• Things to expect in the campus environment• Challenges and expected defenses• References

Page 23: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 23Scott L. Ksander

Forensic Mindset

Digital Forensic Mindset – Condensed Definition:

– Using your skills to determine what has occurred or,

– What most likely occurred as opposed to what is possible

– You do NOT work for anyone but the TRUTH!

Page 24: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 24Scott L. Ksander

Forensic Mindset

The tools used are not nearly as important as the person using them!

The examination should not occur in a vacuum.

Find out all you can about what is already known.

Page 25: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 25Scott L. Ksander

Organizing the Investigation

Use your knowledge to examine the system to answer; could it have happened that way or not?

Don’t make it more complicated than it has to be – start with the obvious!

Examples:– Check for programs that will cause you

aggravation – encryption (PGP, Magic Folders, File Vault, EFS, etc.)

Page 26: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 26Scott L. Ksander

Organizing the Investigation

MAC information – what was happening on the system during the time frame you are interested in?

What was being “written”, “changed” or “accessed”?

Page 27: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 27Scott L. Ksander

Why use images

In keeping with the second IOCE principle, care must be taken not to change the evidence.

Most media are “magnetic based” and the data is volatile:– Registers & Cache– Process tables, ARP Cache, Kernel stats– Contents of system memory– Temporary File systems– Data on the disk

Examining a live file system changes the state of the evidence (MAC times)

The computer/media is the “crime scene”Protecting the crime scene is paramount as once evidence is

contaminated it cannot be decontaminated.Really only one chance to do it right!

Page 28: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 28Scott L. Ksander

A file copy does not recover all data areas of the device for examination

Working from a duplicate image – Preserves the original evidence– Prevents inadvertent alteration of original

evidence during examination– Allows recreation of the duplicate image if

necessary

Why Create a Duplicate Image?

Page 29: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 29Scott L. Ksander

Why Create a Duplicate Image?

Digital evidence can be duplicated with no degradation from copy to copy

– This is not the case with most other forms of evidence

Page 30: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 30Scott L. Ksander

Bitstream vs. Backups

Are backups sufficient?– Ideally NO!– Practically it may be the only method available

Most O/Ses only pay attention to the live filesystem structure– Slack, residue, deleted, etc. are not indexed

Backups generally do not capture this data and they also modify the timestamps of data, contaminating the timeline.

Page 31: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 31Scott L. Ksander

Bitstream vs. Backups

Forensic Copies (Bitstream)– Bit for Bit copying captures all the data on the

copied media including hidden and residual data (e.g., slack space, swap, residue, unused space, deleted files etc.)

Often the “smoking gun” is found in the residual data.

Logical vs. physical image

Page 32: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 32Scott L. Ksander

Disk Imaging Tools Requirements

The tool shall make a bit-stream duplicate or an image of an original disk or partition.

The tool shall not alter the original disk.

The tool shall be able to verify the integrity of a disk image file.

The tool shall log I/O errors.

The tool’s documentation shall be correct.

Page 33: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 33Scott L. Ksander

MAC Times

• Time attributes (Modified, Accessed, Changed).• Allow an investigator to develop a time line or

Chronology of the incident• The time line is vital when examining logs, & event files• Improperly accessing or searching a system can alter

the time lines destroying evidence or erasing trails.

Page 34: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 34Scott L. Ksander

Drive Imaging Tools

SafeBack (www.forensics-intl.com)

Ghost (www.symantec.com)– Newest version of Ghost has a forensic “switch”

now

DD (standard unix/linux utility)– #dd if=device of=device bs=blocksize

Encase (www.encase.com)

Mareware

FTK (www.accessdata.com)

Page 35: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 35Scott L. Ksander

Drive Imaging Hardware

Forensic mobile field system (MFS)

– Laptop with NIC– Portable workstation

Page 36: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 36Scott L. Ksander

Rules of Thumb

Make 2 copies of the original media– 1 copy becomes the working copy– 1 copy is a library/control copy– Verify the integrity of the copies to the original

The working copy is used for the analysisThe library copy is stored for disclosure purposes or in the

event that the working copy becomes corruptedIf performing a drive to drive imaging (not an image file) use

clean media to copy to!– Shrink wrapped new drives– Next best, zero another drive

Verify the integrity of all images!

Page 37: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 37Scott L. Ksander

Disk Write Blockers

Prevent data been written to the suspect drive

Ensure the integrity of the suspect drive

Software Write Blockers v. Hardware

Page 38: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 38Scott L. Ksander

Hardware Write Block

A hardware write blocker (HWB) is a hardware device that attaches to a computer system with the primary purpose of intercepting and preventing (or ‘blocking’) any modifying commands from ever reaching the storage device.

Physically, the device is connected between the computer and a storage device.

Some of its functions include monitoring and filtering any activity that is transmitted or received between its interface connections to the computer and the storage device.

Page 39: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 39Scott L. Ksander

Forensic Boot Disk

General principles:– Used to boot suspect systems safely– Contains a filesystem and statically linked

utilities (e.g., ls, fdisk, ps, nc, dd, ifconfig, etc.)

– Recognizes large partitions (+2 or + 8 Gb)– Places the suspect media in a locked or

read-only state– Does not swap any data to the suspect

media

Page 40: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 40Scott L. Ksander

Forensic Boot Disk

Open source bootable images:

– Helix (http://www.e-fense.com/helix/)

– Trinux(http://trinux.sourceforge.net/)

– BartPE(http://www.nu2.nu/pebuilder/)

Page 41: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 41Scott L. Ksander

Things That Will Be Covered On The Final

• Computer evidence is not just about computer crime or incident response

• Know and use established forensics principles• Mindset and technique are more important than

tools• Establishing relationships is the key to success• How to start building your forensic toolkit• Things to expect in the campus environment• Challenges and expected defenses• References

Page 42: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 42Scott L. Ksander

Computer People are from Mars

Law Enforcement is from Venus

Page 43: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 43Scott L. Ksander

Advantage of Computer People

Natural curiosity

“Obsessed” with detail

Problem/puzzle solving in their profession/passion

Intuitive thinkers

Look for “creative” solutions

Page 44: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 44Scott L. Ksander

Advantage of Law Enforcement

Trained investigators

Interviewing skills and creativity

Fact-finding is their life

Understanding the criminal psyche

Access to additional resources

Can tie things to other incidents

Broad data collection reach

Page 45: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 45Scott L. Ksander

Things That Will Be Covered On The Final

• Computer evidence is not just about computer crime or incident response

• Know and use established forensics principles• Mindset and technique are more important than

tools• Establishing relationships is the key to success• How to start building your forensic toolkit• Things to expect in the campus environment• Challenges and expected defenses• References

Page 46: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 46Scott L. Ksander

Page 47: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 47Scott L. Ksander

Page 48: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 48Scott L. Ksander

Page 49: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 49Scott L. Ksander

Page 50: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 50Scott L. Ksander

Page 51: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 51Scott L. Ksander

Page 52: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 52Scott L. Ksander

Forensic Field kits

Documentation Tools– Cable tags.– Indelible felt tip markers.– Stick-on labels.

Disassembly and Removal Tools– A variety of nonmagnetic sizes and types of:– Flat-blade and Philips-type screwdrivers.– Anti-static Straps– Hex-nut drivers.– Needle-nose pliers.– Secure-bit drivers.– Small tweezers.– Specialized screwdrivers (manufacturer-specific, e.g., Compaq,– Macintosh).– Standard pliers.– Star-type nut drivers.– Wire cutters.

Page 53: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 53Scott L. Ksander

Forensic Field kits

Package and Transport Supplies– Antistatic bags.– Antistatic bubble wrap.– Cable ties.– Evidence bags.– Evidence tape.– Packing materials (avoid materials that can

produce static such as Styrofoam or Styrofoam peanuts).

– Packing tape.– Sturdy boxes of various sizes.

Page 54: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 54Scott L. Ksander

Forensic Field kits

Items that also should be included within a kit are:– Rubber Gloves****– Hand truck.– Large rubber bands.– List of contact telephone numbers for assistance.– Magnifying glass.– Printer paper.– Seizure disk.– Small flashlight.– Unused removable media (CD, DVD, etc)– Blank & Zeroed Hard Drives

Page 55: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 55Scott L. Ksander

Page 56: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 56Scott L. Ksander

Page 57: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 57Scott L. Ksander

Page 58: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 58Scott L. Ksander

Page 59: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 59Scott L. Ksander

Page 60: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 60Scott L. Ksander

Page 61: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 61Scott L. Ksander

Page 62: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 62Scott L. Ksander

Page 63: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 63Scott L. Ksander

Page 64: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 64Scott L. Ksander

Page 65: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 65Scott L. Ksander

Page 66: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 66Scott L. Ksander

Page 67: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 67Scott L. Ksander

Page 68: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 68Scott L. Ksander

Page 69: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 69Scott L. Ksander

Page 70: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 70Scott L. Ksander

Page 71: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 71Scott L. Ksander

Software Toolkit

Directory Snoop (http://www.briggsoft.com)

ThumbsPlus (http://www.cerious.com)

WinHex (http://www.winhex.com)

Mount Image (http://www.mountimage.com)

Autopsy Forensic Browser

FTK

Page 72: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 72Scott L. Ksander

Things That Will Be Covered On The Final

Computer evidence is not just about computer crime or incident response

Know and use established forensics principles

Mindset and technique are more important than tools

Establishing relationships is the key to success

How to start building your forensic toolkit

Things to expect in the campus environment

Challenges and expected defenses

References

Page 73: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 73Scott L. Ksander

Just saying “Hi”

“Thought you might be interested”

Notify potential victims

Page 74: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 74Scott L. Ksander

18 USC 2703(f)

“Preservation letter”

Preserve for 90 days

ONLY retrospectively

Page 75: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 75Scott L. Ksander

18 USC 2703(f)

“… without notice … nor … any disruption in service”

Page 76: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 76Scott L. Ksander

Subpoena often follows

“… requested not to disclose the existence of this subpoena”

Page 77: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 77Scott L. Ksander

Subpoena

“Provide all records, documents, logs, and subscriber information”

Page 78: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 78Scott L. Ksander

Search Warrant

Sometimes “Sealed”

Page 79: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 79Scott L. Ksander

Operational plan for Search Warrants

“No warning shots.”

Page 80: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 80Scott L. Ksander

Things That Will Be Covered On The Final

• Computer evidence is not just about computer crime or incident response

• Know and use established forensics principles• Mindset and technique are more important than

tools• Establishing relationships is the key to success• How to start building your forensic toolkit• Things to expect in the campus environment• Challenges and expected defenses• References

Page 81: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 81Scott L. Ksander

Challenges

NIJ 2001 Study• There is near-term window of opportunity for law

enforcement to gain a foothold in containing electronic crimes.

• Most State and local law enforcement agencies report that they lack adequate training, equipment and staff to meet their present and future needs to combat electronic crime.

• Greater awareness of electronic crime should be promoted for all stakeholders, including prosecutors, judges, academia, industry, and the general public.

Page 82: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 82Scott L. Ksander

General Challenges

Computer forensics is in its infancyDifferent from other forensic sciences as the media that is

examined and the tools/techniques for the examiner are products of a market-driven private sector

No real basic theoretical background upon which to conduct empirical hypothesis testing

No true professional designationsProper trainingAt least 3 different “communities” with different demandsStill more of a “folk art” than a true science

Page 83: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 83Scott L. Ksander

Specific Challenges

No International Definitions of Computer CrimeNo International agreements on extraditionsMultitude of OS platforms and filesystemsIncredibly large storage capacity

– 100 Gig Plus– Terabytes– SANs

Small footprint storage devices– Compact flash– Memory sticks– Thumb drives– Secure digital

Networked environmentsRAID systemsGrid computingEmbedded processors

Page 84: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 84Scott L. Ksander

Specific Challenges

Where is the “crime scene?”

Perpetrator’s

System

Victim’s

System

Electronic Crime

Scene

Cyberspace

Page 85: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 85Scott L. Ksander

General Defense Strategies

Not Me Defense (aka SODDI, TODDI)

Mind-Numbing Detail Defense

Indict the Examiner Defense (aka Dennis Fung Defense)

Page 86: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 86Scott L. Ksander

Things That Will Be Covered On The Final

• Computer evidence is not just about computer crime or incident response

• Know and use established forensics principles• Mindset and technique are more important than

tools• Establishing relationships is the key to success• How to start building your forensic toolkit• Things to expect in the campus environment• Challenges and expected defenses• References

Page 87: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 87Scott L. Ksander

NHTCU

National Hi-Tech Crime Unit (UK)

The ACPO Good Practice Guide for Computer based Electronic Evidence (2003)

http://www.nhtcu.org

Page 88: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 88Scott L. Ksander

DOJ - CCIPS

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations

http://www.cybercrime.gov/s&smanual2002.htm

Page 89: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 89Scott L. Ksander

NIJ Guide

Electronic Crime Scene Investigation: A Guide for First Responders

http://www.ncjrs.org/pdffiles1/nij/187736.pdf

Page 90: 8/23/06 | Slide 1 Scott L. Ksander Computer Forensics in the Campus Environment Scott L. Ksander ksander@purdue.edu.

8/23/06 | Slide 90Scott L. Ksander

Questions Before Elvis Leaves The Building?