Top Banner
Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics Charleston, SC / Long Island, NY (866) 301-5331 * www.AbramsForensics.com SCALI Annual Seminar May 8, 2004
21

Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Dec 18, 2015

Download

Documents

Julius Reynolds
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Computer Forensics 101

Essential Knowledge for 21st Century Investigators

with Case StudiesPresented by Steve Abrams, M.S.

Abrams Computer ForensicsCharleston, SC / Long Island, NY

(866) 301-5331 * www.AbramsForensics.com

SCALI Annual Seminar

May 8, 2004

Page 2: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

What is Computer Forensics ?

What is Computer Forensics ?

The search for, and the collection of, evidence from computer systems in a standardized and well-documented manner to maintain its admissibility and probative value in a legal proceeding.

Page 3: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Computer Forensics is not “Hacking”

Never use “Spy-ware”Never use “Spy-ware”Never “hack” a passwordNever “hack” a password

Never login to an account unauthorized Never login to an account unauthorized ((without a warrant or court orderwithout a warrant or court order))Keystroke loggers no longer legalKeystroke loggers no longer legal

All of these violations are now All of these violations are now (usually)(usually) a a felony.felony. The The law is in flux, beware!law is in flux, beware!

Page 4: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Computer Forensics is not “Hacking”

Stick to the evidence left on the hard Stick to the evidence left on the hard drive, and you should be on safe legal drive, and you should be on safe legal ground. Provided you have proper ground. Provided you have proper consent to search the hard drive.consent to search the hard drive.

Page 5: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Component Steps of Computer ForensicsComponent Steps of Computer Forensics

1. Make a Forensic Image2. Create Indexes and setup “case”3. Look for evidence within the image4. Generate Report (CD-ROM / Written)

Page 6: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Component Steps of Computer ForensicsComponent Steps of Computer Forensics

Make a Forensic ImageMake a Forensic Image Requires Extensive Knowledge of Computer

Hardware and Software, Especially Operating Systems and File Systems.

Requires Special “Forensics” Hardware and Software

Requires Knowledge of Proper Evidence Handling.

In Most States Requires a P.I. License, and Consent to Search the Computer.

Page 7: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Consent Consent

Who Can Consent to a SearchWho Can Consent to a Search(Spouse, Parent, Business Owner)

Get it in WritingGet it in Writing(Boilerplate Affidavits)

Page 8: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

STATE OF SOUTH CAROLINA )

)

COUNTY OF _______________ )

Affidavit of _______________________

Consent given to search a personal computer.

 

  PERSONALLY appeared before me the undersigned who duly sworn and says as follows:

 

1.     My Name is _______________________________________. I reside

at _____________________________________________________

 

2.  I have hired Steven M. Abrams, M.S., P.I., to conduct a computer forensics examination of a hard drive from a personal computer, which is in my possession.

 

3.     I have consented to a search by Mr. Abrams of all data contained on the hard drive.

 

4.     I attest that the computer hard drive which I have consented to have searched is marital property; to which I have had unfettered access.

 

5.     I acknowledge that I have been informed that state and federal law requires Mr. Abrams to notify law enforcement authorities of any suspected child pornography or evidence of criminal activity found on a computer during his examination.

Page 9: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Component Steps of Computer ForensicsComponent Steps of Computer Forensics

Make a Forensic ImageMake a Forensic ImageRule #1 – Never Alter the Evidence Rule #1 – Never Alter the Evidence Media in the Process of making a Media in the Process of making a Forensic Image.Forensic Image.

This necessitates special hardware and software.

Page 10: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Component Steps of Computer ForensicsComponent Steps of Computer Forensics

Create Indexes and setup “case”Create Indexes and setup “case”Access Data Forensic Toolkit (FTK)

Based on the dtSearch EnginedtSearch Engine, requires an index step which can take several hours or days to complete. After which keyword / expression searches are instantaneous.

Page 11: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Component Steps of Computer ForensicsComponent Steps of Computer Forensics

Create Indexes and setup “case”Create Indexes and setup “case”Access Data Forensic Toolkit (FTK) Implements “Hashing” which allows standard

system software and duplicate files to be safely ignored, and dangerous files (e.g. Child Porn) to be identified automatically.

FTK Hashing is Based on the Known File Filter (KFF) Engine.

Page 12: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

HashingHashingHashingHashing

A hash value (or simply hash), also called a message digest, is a number generated from a string of text. The hash is substantially smaller than the text itself, and is generated by a formula in such a way that it is extremely unlikely that some other text will produce the same hash value. In Computer Forensics, hashes are used to uniquely identify a specific file. The hash value generated from a file becomes its “digital fingerprint”. MD5 and SHA are the two most common hash algorithms used in computer forensics.

Page 13: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

HashingHashingHashingHashing

Hash codes can be used to quickly match files found during your investigations to lists of “Known Files” maintained by the Federal Government and Federal Law Enforcement Agencies.

These “Known Files” can include innocent files, such as components of MS Windows and “off the shelf” application software, that can safely be ignored by your investigations.

These “Known Files” can also include contraband files, such as child pornography and hacker tools, that should be highlighted by your investigations.

Page 14: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Component Steps of Computer ForensicsComponent Steps of Computer Forensics

Look for evidence within the imageLook for evidence within the image View Graphics, Emails, Documents, etc. Keyword Searches Bookmark relevant material for inclusion into report Good investigation skills needed, must interview the

client to get background material needed to focus the CF investigation.

Page 15: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Component Steps of Computer ForensicsComponent Steps of Computer Forensics

Generate CF ReportGenerate CF Report Usually in HTML format Can be printed or on CD-ROM Basis for Investigation Report, Affidavits,

Deposition and Testimony. CF Report often supplemented with other

investigation methods (Online Databases, Email / Phone Interviews)

Page 16: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Live FTK Demo

Demonstrate Steps of a Computer Forensics Examination

Page 17: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Case HistoriesCase HistoriesCase HistoriesCase Histories

Page 18: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Case HistoriesCase HistoriesDomestic RelationsDomestic Relations

Case HistoriesCase HistoriesDomestic RelationsDomestic Relations

Page 19: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Case HistoriesCase HistoriesDomestic RelationsDomestic Relations

Case HistoriesCase HistoriesDomestic RelationsDomestic Relations

PornographyPornographyAdulteryAdulteryFinancial AssetsFinancial Assets

Page 20: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Case HistoriesCase HistoriesWiretap / E.C.P.A.Wiretap / E.C.P.A.

Case HistoriesCase HistoriesWiretap / E.C.P.A.Wiretap / E.C.P.A.

Page 21: Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Case HistoriesCase HistoriesFinancial CrimesFinancial CrimesCase HistoriesCase Histories

Financial CrimesFinancial Crimes