Top Banner
91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu
41

91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

Jan 17, 2016

Download

Documents

Ashlynn James
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

91.460.201 & 91.530.202

Selected Topics: Digital Forensics

Part I: Computer Forensics

Chapter 2Understanding Computer

Investigation

Xinwen Fu

Page 2: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 2

Outline Prepare a case Conduct an investigation Complete a case Critique a case

Page 3: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 3

Course Outline

Incident occurs: Point-in-Time or Ongoing

pre-incidentpreparation

pre-incidentpreparation

Detectionof

Incidents

Detectionof

Incidents

Initial Response

Initial Response

FormulateResponseStrategy

FormulateResponseStrategy

DataCollection

DataCollection

DataAnalysis

DataAnalysis ReportingReporting

Investigate the incident

ResolutionRecovery

Implement Security Measures

ResolutionRecovery

Implement Security Measures

CSIRT:ComputerSecurityIncident

ResponseTeam

Page 4: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 4

Preparing a Computer Investigation Role of a computer forensics professional

Gather evidence to prove if a suspect committed a crime or violated a company policy

Maintain valid evidence that can be offered in court or at a corporate inquiry

Follow an accepted scientific procedure to prepare a case

Page 5: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 5

Things to Do while Preparing a Case1. Assessing the case2. Planning the investigation3. Securing evidence

Page 6: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 6

1. Assessing the Case Systematically outline the case details:

Nature of the case: public/private Type of evidence Location of evidence

Based on case details, you can determine the case requirements: Computer forensics tools Special OSs

Page 7: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 7

2. Planning your Investigation - Steps

1. Acquire the evidence2. Complete an evidence form and establish a

chain of custody The route the evidence takes from the time you

find it until the case is closed or goes to court Prison break the video tape case: Michael

Scofield and Lincoln Burrows Lincoln Burrows is lured to kill somebody Lincoln pulled out of the gun in a garage, the victim is

already dead All is taped The tape is manipulated: it seems that Lincoln fires

Page 8: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 8

Single-Evidence Form

Page 9: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 9

2. Planning your Investigation (Cont.)3. Secure evidence in an approved secure

container4. Transport evidence to a computer forensics lab5. Prepare a forensics workstation6. Obtain the evidence from the secure container7. Make a forensic copy of the evidence8. Return the evidence to the secure container9. Process the copied evidence with computer

forensics tools

Page 10: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 10

3. Securing your Evidence Use evidence bags to secure and catalog the

evidence Use computer safe products

Antistatic bags/pads Use well-padded containers Use evidence tape to seal all openings

Floppy disk or CD drives Power supply electrical cord

Write your initials on tape to prove that evidence has not been tampered

Consider computer-specific temperature and humidity ranges

Page 11: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 11

Objectives Prepare a case Conduct an investigation

Overview Preserving data on floppy disks Preserving data on hard disks Collecting data remotely FTK for disk imaging and analysis

Complete a case Critique a case

Page 12: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 12

Setting Up Specific Workstation for Collecting Evidence Why is DOS needed sometimes for

acquiring data? Windows may contaminate files during

maintenance Set up Windows 98 workstation to boot

into MS-DOS (P. 44) Display a Startup menu Modify Msdos.sys file using any text editor

Install a computer forensics tool DriveSpy and Image

Page 13: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 13

Conducting an Investigation Begin by copying the evidence using a

variety of methods Recall that no single method retrieves all data The more methods you use, the better

Page 14: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 14

Gathering the Evidence Take all necessary measures to avoid

damaging the evidence Place the evidence in a secure container

Complete the evidence custody form Transport the evidence to the computer

forensics lab Create forensics copies (if possible) Secure evidence by locking the container

Page 15: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 15

Understanding Data-Recovery Workstations and Software

Investigations are conducted on a computer forensics lab (or data-recovery lab) Computer forensics and

data-recovery are related but different

Computer forensics workstation Specially configured

personal computer To avoid altering the

evidence, use: Write-blockers devices Forensics boot floppy disk

https://www.digitalintelligence.com/cart/html/FRED-M-System.html

FRED-M System

Page 16: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 16

Objectives Prepare a case Conduct an investigation

Overview Preserving data on floppy disks Preserving data on hard disks Collecting data remotely FTK for disk imaging and analysis

Complete a case Critique a case

Page 17: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 17

Understanding Bit-stream Copies Bit-by-bit copy of the original storage

medium Exact copy of the original disk Different from a simple backup copy

Backup software only copy known files Backup software cannot copy deleted files or e-

mail messages, or recover file fragments

Page 18: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 18

Understanding Bit-stream Copies (Cont.) A bit-stream image file contains the bit-

stream copy of all data on a disk or partition

Preferable to copy the image file to a target disk that matches the original disk’s manufacturer, size, and model

Page 19: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 19

Understanding Bit-stream Copies (Cont.)

2-4

Page 20: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 20

Objectives Prepare a case Conduct an investigation

Overview Preserving data on floppy disks Preserving data on hard disks Collecting data remotely FTK for disk imaging and analysis

Complete a case Critique a case

Page 21: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 21

Creating a Forensic Boot Floppy Disk Goal is not to alter the original data on a disk

A computer access files during startup. So what? Preferred way to preserve the original data is to

never examine it Make forensic copies Create a special boot floppy disk that prevents OS from

altering the data when the computer starts up Windows 9x can also alter other files, especially if

DriveSpace is implemented on a file allocation table (FAT) 16 disk

Page 22: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 22

Assembling the Tools for a Forensic Boot Floppy Disk Tools:

Disk editor such as Norton Disk Edit or Hex Workshop

Floppy disk MS-DOS OS Computer that can boot to a true MS-DOS level Forensics acquisition tool Write-block tool

Page 23: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 23

Assembling the Tools for a Forensic Boot Floppy Disk (Cont.) Steps:

Make the floppy disk bootable Update OS files to remove any reference to the

hard disk (using Hex Workshop or Norton Disk Edit) - in order to prevent the access of c:\

Modify the command.com file on the floppy disk Modify the Io.sys file on the floppy disk to disable

Drivespace Add computer forensic tools Test your floppy disk Create several backup copies

Page 24: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 24

Objectives Prepare a case Conduct an investigation

Overview Preserving data on floppy disks Preserving data on hard disks Collecting data remotely FTK for disk imaging and analysis

Complete a case Critique a case

Page 25: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 25

Retrieving Evidence Data Using a Remote Network Connection Bit-stream image copies can also be

retrieved from a workstation’s network connection

Software: SnapBack EnCase R-Tools

Can be a time-consuming process even with a 1000-Mb connection

It takes less using a NIC-to-NIC connection

Page 26: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 26

Objectives Prepare a case Conduct an investigation

Overview Preserving data on floppy disks Preserving data on hard disks Collecting data remotely FTK for disk imaging and analysis

Complete a case Critique a case

Page 27: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 27

Copying the Evidence Disk Recall a forensic copy is an exact duplicate

of the original data Create a forensic copy using:

MS-DOS Specialized tool such as Digital Intelligence’s

Imager First, create a bit-stream image Then, copy the image to a target disk

Page 28: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 28

Creating a Bit-stream Image with FTK Imager

Functions Create the image of a physical drive Extract the image from a bit-stream image file Analyze the image

Forensic Software Downloads, link Forensic Toolkit®(FTK™) version  FTK Imager version or FTK Imager Lite

version 1 Known File Filter Library File version (not

necessary)

Page 29: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 29

Creating a Bit-stream Image with FTK Imager (Cont.) Start Forensic Toolkit (FTK) Imager by double-

clicking the icon on your desktop Click File, Image Drive from the menu; insert

floppy disk labeled “Domain Name working copy #2”

In the dialog box that opens, click the A: drive to select a local drive, then click OK

A wizard walks you through the steps Accept all the defaults Specify the destination folder If necessary, create a folder called Forensics Files Name the file Bootimage.1

Page 30: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 30

FTK Imager: Create Image

Page 31: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 31

FTK Imager: Read Image

Page 32: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 32

Analyzing Your Digital Evidence by Forensic Toolkit®(FTK™) Your job is to recover data from:

Deleted files File fragments Complete files

Deleted files linger on the disk until new data is saved on the same physical location

Tools: Digital Intelligence’s DriveSpy AccessData’s FTK

Page 33: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 33

Analyzing Your Digital Evidence (Cont.)

Page 34: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 34

Page 35: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 35

Objectives Prepare a case Conduct an investigation Complete a case Critique a case

Page 36: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 36

Completing the Case You need to produce a final report

State what you did and what you found You can even include logs from the

forensic tools you used If required, use a report template The report should show conclusive

evidence that the suspect did or did not commit a crime or violate a company policy

Page 37: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 37

Objectives Prepare a case Conduct an investigation Complete a case Critique a case

Page 38: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 38

Critiquing the Case Ask yourself the following questions:

How could you improve your participation in the case?

Did you expect the results you found? Did the case develop in ways you did not

expect? Was the documentation as thorough as it could

have been?

Page 39: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 39

Critiquing the Case (Cont.) Questions continued:

What feedback has been received from the requesting source?

Did you discover any new problems? What are they?

Did you use new techniques during the case or during research?

Page 40: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSU

Backup

Dr. Xinwen Fu 40

Page 41: 91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

BIS@DSUDr. Xinwen Fu 41

In-Class Exercise1. Form the group2. Check the checksums (MD5 and SHA1) of

the downloaded gpg4win-1.1.3.exe by using WinPT within gpg4win

3. Play with FTK and search around the image