Top Banner
Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011
16

Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

Dec 23, 2015

Download

Documents

Abigail Horn
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

Applying Digital Forensic techniques to AIM

Gareth Knight, FIDO Project Manager

Anatomy Theatre & Museum, King’s College London

15th August 2011

Page 2: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

Data handling workflow

Acquire

Analyse

Appraise

Archive

Obtain data from depositor / donor

Examine the acquired data to locate user generated content

Appraise data to select data of potential value to the institution

Transfer selected data into digital repository for curation &

preservation

Page 3: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

Acquisition

Page 4: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

Data Acquisition Methods

Act of obtaining copy of digital data from depositor media and transferring into a managed environment for subsequent analysis:

1. File copy: Files are copied/moved from the donor’s media to AIM-owned storage, e.g. FTP, DVD-R, hard disk

2. Disk clone: Bit copy of files on source disk copied to mirror disk

3. Disk image: Bit copy of disk is created and stored as a file on other media.

Different HardwareDifferent Media

Page 5: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

Is the disk installed in a computer?

Locate media reader &

create disk image

No Other

No

Does the machine possess appropriate

ports (e.g. USB/Firewire) to allow connection of an

external HD?

Yes

ATA/IDE or SATA

What type of connectors does it

have?

Install into portable disk

enclosure

Are you able to perform a network

capture?

Boot from media & perform imaging

Yes

Obtain appropriate

reader device

Are you able to boot from disk/optical media

& perform capture?

No Yes

Do you have permission to remove the disk from

the machine & is it physically possible ?

Perform capture via host system

Capture disk image

using network capture

No Yes

No Yes

Copy files to disk. Notify

donor that some content may be

missed

What type of media do you wish to image?

Removable media(e.g. floppy, CD-ROM, USB stick,

etc.)

Hard diskDecision tree for choosing capture

method

Page 6: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

Analysis

Page 7: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

7

Data held on a digital media

Content held on digital media serves many purposes:• Operating system files, e.g. Windows has 30,000+ after fresh install• Software: Applications, utilities, games, etc.• Log data: Windows Registry, browser cache, cookies, temp files• User-generated content: Documents, images, sound, emails, etc.

Different data layers available:1. Active data: Information readily available as normally seen by an

OS

2. Inactive/residual data: Information that has been deleted or modified• Deleted files located in unallocated space that have yet to be overwritten

(retrieved using undelete application)• Data fragments that contains information from a partially deleted file

(retrieved through carving)

Inactive data useful, but need to consider ethical issues

Page 8: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

1. Analysis techniques foractive data

Common techniques:• Navigate directory structure to get a ‘feel’ for data

files held on disk• Search by:

• File name, e.g. *report*• File type, e.g. *.doc, *.pdf, etc.• Creation/modification date• Content type, e.g. word usage• File size

• Additional parameters configurable

Windows search easy to perform, but does not identify everything – investigation process can leave artefacts, e.g. thumbs.db behind

Page 9: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

1. OSForensic Search UI for active filesSort by:

•Name,

•Folder,

•Size

•Type,

•Creation date,

•Modification date,

•Hash set,

•Foreground colour,

•Background colour

Page 10: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

10

2. Recovering deleted files

Data files deleted by user continue to exist on disk!• filename is changed and occupied space is

simply labelled as ‘unallocated’, i.e. available for use.• May be recovered if the space has not been reallocated to new data.

However, likelihood of retrieving entire file decreases with usage of disk.

Recovering partial/complete files

Recoverable using Undelete\File recovery software to search unallocated space and relabel found files as available.

Recovering Data Fragments

Fragments of files may be recovered using Data carving technique - raw bits of disk analysed to identify recognisable patterns that may indicate a data file, e.g. header/footer, semantic information.

• Carving software designed to take a linear approach to locating data files – ineffective on fragmented disks

• Creates Franken-Files! – incomplete files, large files containing info from multiple sources, extracts embedded images from Powerpoints, etc

Img source: http://www.flickr.com/photos/jwthompson2/160835456/

Page 11: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

2. OSForensic Deleted File UI

99-50% complete content

Data carving identifies data fragments, but frequently wrong about file type

Page 12: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

3. Keyword Search

Scan the content of a disk, including all emails, documents and other

text content, to locate a particular search term.

•Commonly used by police to identify illegal content, e.g. bank numbers, telephone numbers, drug references, etc.

Archival use:•Does the disk contain reference to topic X?•What trends may be identified in use of concept – when did term appear and disappear?

Page 13: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

4. Analysis of research behaviour

Hard disk contain large amount

of other information:• Web sites

visited/bookmarked for research

• Chat logs indicating discussion with colleagues

• Other digital media that may have been used to store data

This may be useful for

understanding researcher work

process, but be wary of the

ethical issues

Page 14: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

What type of information do you

wish to locate on the drive?

Do you know what keywords should be

used?

Examine event logs for devices connected/

disconnected

What level of analysis are you permitted to

perform?

Contact/research donor

Perform search of active & inactive

(deleted) files

Do you have any additional criteria for

user content?Create & search index

Perform file search of specific file types

Data created/modifed before/after/between

a set dateSpecific objecttypes/formatsNone

Perform file search of common file types

Perform file search with additional date

parameters

Full searchIncluding active,

Deleted &fragments

Only readily available files (active files)

Available & deleted files

Specific information on a

topic User created

data files

Information about othermedia on which data

may be stored

YesNo

Decision tree for choosing

appropriate analysis method

Page 15: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

Forensic Hardware

1) Desktop PC

Intel Pentium Dual Core E5800 CPU (3.20Ghz)

2GB DDR

500GB HD

Super multi DVD-RW

(2) USB Write Blocker

Prevents OS writing to connected devices

(4) Kryoflux USB

Floppy disk controller to enable attachment of disparate disk devices & forensic imaging

(3) Drive enclosure

Enables connection of internal ATA/SATA disks via USB

Page 16: Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

16

Thank You!

Gareth KnightCentre for e-Research, King’s College London

[email protected] @gknight2000020 7848 1979

http://fido.cerch.kcl.ac.uk/ @jiscfido

Questions