Top Banner
Computer Computer Forensics Forensics Yogesh E. Sonawane [email protected]
63
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer  forensics

Computer Computer ForensicsForensics

Yogesh E. Sonawane

[email protected]

Page 2: Computer  forensics

CYBER CRIMES

Page 3: Computer  forensics

REAL-WORLD & VIRTUAL- WORLD

Current approaches evolved to deal with real-world crime

Cybercrime occurs in a virtual-world and therefore presents different issues

Page 4: Computer  forensics

EXAMPLE : THEFT

Real-world theft: Possession of property shifts completely

from A to B, i.e., A had it now B has it

Theft in Virtual-world (Cyber-theft): Property is copied, so A “has” it and so does B

Page 5: Computer  forensics

Think before Think before

you Clickyou Click

Page 6: Computer  forensics

What is Computer Crime

“Unlawful acts wherein the computer is either a

tool or a target or both".

Two aspects:

•Computer as a tool to commit crime

Child porn, Threatening email, identity

theft, sexual harassment, defamation,

phishing.

•Computer itself becomes target of crime

Viruses, worms, software piracy, hacking.

Page 7: Computer  forensics

TYPES OF COMPUTER CRIME

HACKINGHacking in simple terms means illegal

intrusion into a computer system without the permission of the computer owner/user.

SOFTWARE PIRACYAn unauthorized copying of software.

PORNOGRAPHYComputer pornography covers pornographic

websites, pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos.

Page 8: Computer  forensics

FORGED DOCUMENTSTo create fake documents such as, fake

academic certificates, mark sheets etc.

CREDIT CARD FRAUDCredit card fraud is a wide-ranging term for

theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction.

Computer STALKINGUse of the e-mail, Internet to harass or

threaten an individual.

CONT… TYPES OF COMPUTER CRIME

Page 9: Computer  forensics

PHISHINGIn the field of computer security, phishing is the

criminally fraudulent process of attempting to acquire sensitive

information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Computer DEFAMATIONThis occurs when defamation takes place with the help of

computers and / or the Internet.e.g. Mr. X publishes defamatory matter about Ms. Y on a

website or sends e-mails containing defamatory information to Ms. Y’s friends.

CONT… TYPES OF COMPUTER CRIME

Page 10: Computer  forensics

WHAT IS DIGITAL EVIDENCE?

Digital Evidence is any information of

probative value that is either stored or

transmitted in a binary form.

Digital Evidence includes computer evidence,

digital audio recorder, digital video recorder,

mobile phones, pen drives, CD, DVD etc.

Page 11: Computer  forensics

ELECTRONIC RECORD

Electronic record - is that which is generated,

stored, sent or received by electronic means and

includes data, image or sound.

Page 12: Computer  forensics

CHALLENGES FOR INVESTIGATING AGENCIES

Difficulty in collection of evidence

Fragility of Computer data

Fear of destruction of vital data

Vast volume to be examined

Diversity of hardware & Software.

Admissibility in the courts.

Page 13: Computer  forensics

COMPUTER FORENSICS

Definition:

Identification, Extraction, Documentation, and

Preservation of computer media for

evidentiary and/or root cause analysis using

well-defined methodologies and procedures.

Page 14: Computer  forensics

COMPUTER FORENSICS

Methodology:

Acquire the evidence without altering or

damaging the original.

Authenticate that the recovered evidence is the

same as the original seized.

Analyze the data without modifying it.

Page 15: Computer  forensics

COMPUTER FORENSICS-STEPS

Identification

Seizure

Authentication

Acquisition

Analysis

Presentation

Preservation

Scene of Crime

Forensics Lab

Page 16: Computer  forensics

What to carry?

Camera Note or Sketch Pads

– Blank CDs, DVDs, Pen Drives, Hash Calculator, Write-Blocker, Cross-Over cable etc.

Sealing Material – Labels, Pens, Markers

Storage Containers – Anti Static Bags, Plastic Bubble Wrap

Software / Hardware for onsite virtual data retrieval and imaging

Page 17: Computer  forensics

How to secure the crime scene?

The entire work area, office, or cubicle is a

potential crime scene, not just the

computer itself.

No one should be allowed to touch the

computer, to include shutting the computer

down or exiting from any programs/files in

use at the time or remove anything from

the scene.

Page 18: Computer  forensics

How to secure the crime scene?

Continued….

Disconnect the power supply. Else there

can be a loss of files to hard drive crash.

If required access system to take backup of

volatile data

Page 19: Computer  forensics

Computer Forensic Steps - Scene of Crime

Backup Volatile data in RAM / Router etc.

Photograph / Video the scene of incidence /

crime

Identifying Digital storage media

Draw Network Topology

Page 20: Computer  forensics

Questions to be asked the

Scene of crime• Login Details : User Name/s and Password/s

• Encryption

• Files of interest

• E-mail accounts

• Internet service provider(s)

• Off site storage

• Hidden storage devices

Page 21: Computer  forensics

WHY PRECAUTIONS REQUIRED ?

The integrity of data is essential for making it

presentable in court of law with in acceptable

limits of law.

The active data recovered can give us vital links.

The deleted data too can be recovered and used

for reconstruction of events.

Certain damaged media too can be read/viewed.

Page 22: Computer  forensics

Computer Forensic Steps - Scene of Crime

Identification

Seizure

Acquisition

Page 23: Computer  forensics

Exhibits Seized

Page 24: Computer  forensics

Identification

Page 25: Computer  forensics

Identification

Front Side ofCPU Cabinet orCase or Chasis

Back Side ofCPU Cabinet orCase or Chasis

The CPU

Page 26: Computer  forensics

Identification Continued….

Internal Hard Disk

Page 27: Computer  forensics

Identification Continued….

External Hard Disk

Page 28: Computer  forensics

Identification Continued….

FloppyCD/DVD

Page 29: Computer  forensics

Identification Continued….

Mobile Phones

SIM Card Memory Cards

Page 30: Computer  forensics

Identification Continued….

Skimmer Credit Cards

Page 31: Computer  forensics

Identification Continued….

Dongle and Pen Drives

Page 32: Computer  forensics

Identification Continued….

Page 33: Computer  forensics

Identification Continued….

Page 34: Computer  forensics

Identification Continued….

Page 35: Computer  forensics

Seizure

Page 36: Computer  forensics

What is Seizure?

Definition :-

Seizure is the process of capturing the

suspect computer or storage media for

evidence collection.

Page 37: Computer  forensics

The case related reference documents should also be seized from the crime scene.

For Example - In case of Economical Crime look for Account Book Details, Passbook details, Bank Transaction Details, ATM Credit/Debit Card Details.

In case of Forged Documents look for reference documents such as, Academic Certificates, Bill Receipts, Passport, Legal Property Papers etc.

If video files or picture image files of a particular person are to traced, then provide the photographs of the same for identification.

Seizure

Page 38: Computer  forensics

Labeling

Page 39: Computer  forensics

Labeling

Page 40: Computer  forensics

Labeling

Page 41: Computer  forensics

Labeling

Page 42: Computer  forensics

Labeling

Page 43: Computer  forensics

Packaging and Transportation

Properly document and label the evidence before packaging.

Use anti-static wrap or bubble wrap for magnetic media.

Avoid folding, bending or scratching the computer media such as diskettes, CDs, removable media etc.

Page 44: Computer  forensics

Labeling

Page 45: Computer  forensics

Packaging and Transportation

While transporting, place the computer securely on the floor of the vehicle where the ride is smooth.

Avoid radio transmissions, electromagnetic emissions, moisture

in the vicinity of digital evidence.

Page 46: Computer  forensics

Dealing with the Suspected Mobile Phone• At the time of seizing mobile phone, its

components like Battery, SIM card(s),

Memory card(s) should be removed.

• The User Manuals

should also be seized

from the scene,

if present.

Page 47: Computer  forensics

Guidelines from Forensics Continued….

If CPU Cabinet is seized from the crime scene,

bring only hard disks for analysis. Not to bring CPU

cabinet.

Printer, Scanner, Monitor, Keyboard, Mouse etc.

should not be seized

Only digital storage media like Hard Disk, Pen

Drive, Floppies, CDs, DVDs, Mobile Phone etc. are

analyzed.

If an exhibit is a hard disk then needs to provide a

blank hard disk with more(double) capacity.

Page 48: Computer  forensics

Acquisition

&

Authentication

Page 49: Computer  forensics

Precautions while Acquisition

• Use of Write Blocker devices:

Thumbscrew

FAST BLOC

Tablue

• Need of Write Blocker

Page 50: Computer  forensics

Acquisition & Authentication

Making Forensic Duplicate copy of the Suspect

Storage

media is Acquisition.

A Forensic Duplicate is a file that contains every

bit of

information from the source disk.

Two Ways

Using Software

Using Hardware

Page 51: Computer  forensics

Acquisition & Authentication

Using Software Tool requires a hardware

write blocker at source end e.g. FASTBloc FE /

Tablue and Software EnCase, FTK Imager used to

for Acquisition

Using Hardware Tool has inbuilt write

blocker and gives better speed for acquisition

e.g. TD2, Talon, SOLO, Dossier by LogiCube etc.

Page 52: Computer  forensics

Laboratory Work

Authentication

Analysis

Presentation

Preservation

Page 53: Computer  forensics

Authentication : Hash Value

How to verify the integrity of Forensic

Duplicate?

It is also known as, “Message Digest” or

“Fingerprint”, is basically a digital signature.

The checksum is created by applying algorithm to

the file. The checksum for each file is unique to

that file.

E.g.

4a24e1e50622c52122406b77e8438c5a

(MD5)

Page 54: Computer  forensics

Analysis

Page 55: Computer  forensics

Current and Emerging Cyber Forensic Tools of Law Enforcement

Page 56: Computer  forensics

Analysis Process

The Process of searching for crime relevant data and extract it.

The analyst has to search data inDeleted Files Slack Space

Unallocated Space Free Space

Log Entries Registry Entries

System Files Printer Spool Files

Cookies Keywords

Page 57: Computer  forensics

Analysis Process Continued….

Why is Slack Space Important?

Unallocated Space(New Drive)

Allocated Space

Unallocated Space(After File deletion)

Allocated Space(Reallocated, new file)

Slack SpaceWhy isn’t this also slack space?

Page 58: Computer  forensics

Analysis Process Continued….

• “Keyword Search” is one of the most

important

steps of analysis.

• The keywords should be listed for getting

better

and sorted search results. These

keywords

should be case-relevant.

Page 59: Computer  forensics

Documentation & Preservation

• Report writing & preparation of notes

• Store the Magnetic Storage Media in a secure area.– Cool– Dry– Away from:

GeneratorsMagnets

Page 60: Computer  forensics

Prevention Of Computer Crime

Safe Computing Tips

Do not reveal personal information to unknown

people or websites.

Create hard to guess passwords and keep them

private & change them regularly.

Use anti-virus and update them regularly.

Back up your important files regularly.

Never reveal your true identity while chatting.

Page 61: Computer  forensics

Safe Online Banking

Keep your passwords/PIN codes safe and memorize them.

Check that the online banking website is secure.

Logout immediately after you have completed your transaction.

Do not respond to emails asking for your personal information. When in doubt, call the institution that claims to have sent this email.

Read privacy and policy statements before any transaction.

Check your account statements to ensure that no unauthorized transaction has taken place.

Page 62: Computer  forensics

Tips for Safe Social Networking

Don’t reveal too much information about yourself online.

Add people as friends to your site only if you know them personally.

Delete inappropriate messages from your profile.

Do not post information about your friends as you may put them at risk. What you post online is not private. It can be seen by everyone.

Page 63: Computer  forensics