Top Banner
Computer Forensics Mike Sforza Computer Forensics Consultant How I stopped worrying and learned to love Incident Handling. Some useful things to know.
48

Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Mar 12, 2018

Download

Documents

phamnhan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Computer Forensics

Mike Sforza

Computer Forensics ConsultantHow I stopped worrying and learned to love Incident Handling.

Some useful things to know.

Page 2: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Welcome

• Intro

• Computer Forensics – What about it?

• Principles

• Methods

• Equipment / Tools

• Incident Handling

• Anti-Forensics

• Questions

Page 3: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

What is Computer Forensics?

•Wikipedia: is a branch of digital forensic science pertaining to legal evidence found in computers* and digital storage media.

*Any electronic device• Cellphone / Smartphone• Gaming platform• GPS• DVR / PVR• Voice recorders• Cameras• Automotive On-board systems

Page 4: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

What is Computer Forensics?

Page 5: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Goal of Computer Forensics

Indentify

Collect

Preserve

Analyze

Present

Using sound forensic methodology that will allow for it to be admissible in a court of law.

Page 6: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Fundamentals

• Acquire evidence without altering it or damaging the original.

• Authenticate that your recovered evidence is the same as the originally seized data.

• Analyze the data without modifying it.

Page 7: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Fundamentals

• Always use rigorous, forensically sound procedures - repeatable.

• Adhere to the Best Evidence Rule : need to satisfy proof of the integrity of the electronic data by which it was recorded and stored.

• Always maintain the chain of custody.

• Ruthless record keeping (notes).

Page 8: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Goal?

Discover the Evidence!

Page 9: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Types of DataTypes of Data

E-mail

Encrypted

Deleted

Hidden

Documents

Images

Registry Data

File Metadata

Online Activity

Databases

Config files

Print Spool logs

Spreadsheets

Software installed

Contact

Multimedia

Chat logs

Recently usedLNK filesUser profile

Page 10: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Explosion of Data and Devices

Page 11: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Volume of Data Today

E-mail - Yearly

2000: 7 Trillion e-mails*

2012: 107 Trillion e-mails**

E-mail – Daily (2012)

145** to 294*** Billion e-mails per day

61% Business

* Atlanta Business Chronicle

** Radicati Group

*** Royal.Pingdom.com

E-mail – Daily (2012)

145** to 294*** Billion e-mails per day

61% Business

Page 12: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Before You Pull the Plug!

Determine the kind of acquisition to be carried out.

Page 13: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition Strategies

• Backup files (least forensically sound)

• Logical Acquisition

– System is on

– Targeted or File System copy

– No deleted or slack space

• Physical Acquisition (most forensically sound)

– System is off

– Bit level copy (mirror image)

– Deleted and slack space copied

Page 14: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition Strategies

Live Acquisition

System is still running - Live

Capture running processes, RAM, network connections and remote sessions,

Access online (Cloud) storage

Encrypted data, Pagefile (which can be wiped on shutdown)

Tools such as Cofee, Helix, MacLockPick, Command line/terminal (netstat, arp, ifconfig), Wiebetech Hot Plug

Page 15: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition Strategies

Live Acquisition

Not for the faint of heartPurists vs. Pragmatists

It does make changes to the system being analyzed RAM has become too large to ignore Encryption (software and hardware) improved

and more common– Live may be your only chance.

Caught “In flagrante delicto”

Page 16: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition Tools

Physical Device built-in write-blocking Tableau, Image Masster

Software EnCase, FTK, Sleuth Kit, Volatility, Linux DD and DCFLDD Use with a write-blocker (when possible). Network capture

Page 17: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Physical Acquisition Tools

Page 18: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Physical Acquisition Tools – The Kit

• Allows examiners to do on-site acquisitions.

• Acquisition of various types of electronic data –Laptops, Desktops, Servers, Thumb Drives, Digital Cameras, Cell Phones, etc...

Page 19: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition – Software - EnCase

Page 20: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition – Software - FTK

Page 21: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition – Hard Drive

Once the system is powered down and the drive is removed.

Page 22: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition - Mac

Firewire Acquisition – Target mode

Page 23: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition - Network

Through the use of an agent, remotely acquire the data through the network.

Page 24: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition - Mobile

The fastest growing, hotly contested area of computer forensics.

Very dynamic!

Page 25: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition - Mobile

•Acquisition of digital evidence from mobile devices: smart phones, tablets, music & video players, portable game devices, GPS, etc.

•NAND & NOR memory as well as SIM cards.

Page 26: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Acquisition - Mobile

•Not without it’s problems.

• Don’t forget the RF / Faraday bag.

•Tin foil (lots of it) works in a pinch.

Page 27: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Data Verification

•Hashing

Digital fingerprint that proves 2 data sets are identical.

• MD5 – 128 bit

• SHA1 – 160 bit

• SHA 256 – 256 bit

Key to a successful analysis.

Page 28: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Data Verification - Hash

Page 29: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Data Verification - HashMD5 = 14c7d774e7477bebe1cab06bf3200c15

SHA1 = aaf1d37dc5c58fd2adb7c8bc300787b8188a7d67

SHA256 = c278d0698b1f0eae810bfb7646f72da848047788d76d7e52205e2445250ff50d

Page 30: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

There’s Gold in them Hills!

Page 31: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Discovery Tools

• EnCase https://www.guidancesoftware.com/

• FTK http://www.accessdata.com/

• NUIX http://www.nuix.com/

•Relativity http://kcura.com/relativity/

•IPRO http://iprotech.com/

•Summation http://www.accessdata.com/

Page 32: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Discovery Tools

•Allow you to sift through vast quantities of data in a structured environment.

Page 33: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Discovery Tools

This is usable.

Page 34: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Discovery Tools

This is better!

Page 35: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Responding to the Incident• Ideally, digital forensic analysis should be an integral

part of your organization's Incident Handling process.

• Should be carried out any time a device is used, associated with or the target of improper, prohibited, or illegal activity.

Page 36: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Responding to the Incident

– Hacking

– Denial of Service

– Intellectual property theft / espionage

– Sabotage

– Internal Investigation

– Fraud

– Misuse of company equipment / policy violations• Pornography

• E-mail

• Improper Web browsing

• Illicit storage

Page 37: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Responding to the Incident

• Get the authority (buy in from management)

• Have a guideline / investigative policy ready

• Identify your response team (ensure their expertise is up-to-date)

• Be equipped (hardware, software, locale, budget)

• Approach every incident as if you’ll have to go to court

Page 38: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Responding to the Incident

•Forensic analysis needs to be carried out as soon as possible in order to maintain the integrity of the data.

– Data overwritten

– Equipment can fail

– Equipment can go missing

– Contamination of data

Page 39: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Responding to the IncidentDon’t

•Think that the problem will go away.

•Become combative.

•Forget that the Internet is global and instantaneous.

•Forget to ask for assistance.

•Think it is going to be easy.

Page 40: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Anti-Forensics

Aims to hinder investigations on digital media thereby making it too expensive or troublesome to carry out.

Data hiding• Encryption• Steganography• Alternate Data Streams• Slack space• HPA• Root kits

•Artifact wiping• File Wiping • Physical destruction

Page 41: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Anti-Forensics

Aims to hinder investigations on digital media thereby making it too expensive or troublesome to carry out.

• Trail obfuscation• File header• Time stamp / metadata• Log cleaners• File extension

• Attacks against computer forensics processes and tools.• Hash attack

• Hashclash• Change the hash – get off black lists

Page 42: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Anti-Forensics

Easy to use tools

Metasploit Anti-Forensics Project

Defiler’sToolkit

Timestomp

TOR

I2P

Page 43: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Using a Forensic Professional

• The proof is always there. The challenge is finding it.

• Not always easy.

• Technology constantly evolving becoming more complicated and inter-connected.

• At the same time, computer crime techniques becoming more sophisticated and better coordinated (organized crime becoming entrenched)

• The evidence collection needs to be done correctly especially if it will be going to court.

Page 44: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Using a Forensic Professional

• Offer latest technology and techniques

• Timely response

• Identify and obtain all relevant facts

• Corroborate sources of information

• Provide expert interpretation of electronic data recovered

• Substantiate or refute allegations

• Differentiate between guessing and knowing what occurred with a degree of certainty

• BEST EVIDENCE practice

Page 45: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Be wary!

Page 46: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Be Prepared!

Page 47: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques
Page 48: Computer Forensics - Colloque RSI | · PDF file · 2014-05-21Computer Forensics Mike Sforza Computer Forensics Consultant ... •Always use rigorous, ... computer crime techniques

Thank you.

Mike Sforza

[email protected]