Top Banner
Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H
66

Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Mar 29, 2015

Download

Documents

Walker Tulip
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Intro to MIS – MGS351 Computer Crime and Forensics

Extended Learning Module H

Page 2: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Chapter Overview

• Computer Crime

• Digital Forensics– Acquiring, Authenticating and Analyzing Evidence

• Digital Forensic Challenges– Passwords, Encryption, Steganography, Mobile

Devices, Solid State Drives, Live Acquisitions

• Business Implications– Disposing of Old Computers

Page 3: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

DOJ Definition of Computer Crime

"any violation of criminal law that involves a knowledge of computer technology for their perpetration, investigation, or prosecution."

Simply stated, computer crimes are crimes that

require knowledge of computers to commit.

Page 4: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Organizations must protect against these computer crimes

Page 5: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Key Legislation

USA PATRIOTS ActDept of Homeland Security monitors the

Internet for "state-sponsored information warfare."

HIPAA (protects healthcare info)Sarbanes-Oxley (SOX) of 2002 Computer Fraud and Abuse Act (CFAA) (Title 18

of U.S. Code § 1030)Digital Millennium Copyright Act (DMCA)Gramm-Leach-Bliley Act (GLB)

Page 6: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Why are Security Incidents Increasing?

Sophistication of Hacker Tools

Packet Forging/ Spoofing

19901980

Password Guessing

Self Replicating Code

Password Cracking

Exploiting Known Vulnerabilities

Back Doors

Sweepers

Sniffers

Stealth Diagnostics

Technical Knowledge Required

High

Low 2000

DDOS

-from Cisco Systems

Disabling Audits

Page 7: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

• Financial fraud cost on avg nearly $500,000

• Dealing with “bot” computers cost on average

nearly $350,000.

• Virus incidents were most common, occurring

in almost half of the organizations.2008 CSI Computer Crime and Security Survey

CSI/FBI Computer Crime and Security Survey

Page 8: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Digital Forensic Science (DFS)

• “The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.”

Source: (2001). Digital Forensic Research Workshop (DFRWS)

Page 9: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Public versus Private Investigations

Page 10: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Computer Forensics

• “The collection, authentication, preservation, and examination of electronic information for presentation in court.”– Media Analysis

• Examining physical media for evidence – Code Analysis

• Review of software for malicious signatures– Network Analysis

• Scrutinize network traffic and logs to identify and locate evidence

Page 11: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Digital Forensics

• Acquire the evidence without altering or

damaging the original

• Authenticate the image (copy)

• Analyze the data without modifying it

The chain of custody of the original evidence

needs to be preserved throughout the entire

investigation

Page 12: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Places to Look for Electronic Evidence

• Floppy Disks• CDs• DVDs• Zip Disks• Backup Tapes• USB Storage• PDAs

• Flash memory• Voice mail• Electronic Calendars• Scanner• Photocopier• Fax/Phone/Cellular• IPods

Page 13: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Acquire the Evidence

• If possible, hard disk is removed without turning computer on

• Hardware write blockers are used to ensure that nothing is written to drive

• Other techniques can be used to acquire volatile data (RAM, registers, etc.)

• Forensic image copy – an exact copy or snapshot of all stored information

Page 14: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Imaging programs• Which of the following do you usually use for imaging evidence?

Source: Forensicfocus.com Poll

EnCase

Forensic Toolkit

SafeBack

dd

Ghost

Other

Page 15: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Authentication

• Authentication process necessary for ensuring that no evidence was planted or destroyed

• MD5 hash value – mathematically generated string of 32 letters and is unique for an individual storage medium at a specific point in time– Probability of two storage media having same

MD5 hash value is 1 in 1038, or • 1 in

100,000,000,000,000,000,000,000,000,000,000,000,000

Page 16: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Authentication

• This is the MD5 hash of this sentence

• 4b05c61d476b4e1059dbcf188d990441

• Files, drives and images of drives can also be hashed to create a digital fingerprint.

• Other hashing algorithms can be used too (SHA-1)

Page 17: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Analysis

• Interpretation of information uncovered• Can pinpoint files location on disk, its creator,

the creation date and many other facts about the file

• Always work from an image of the evidence and never from the original– Make two backups of the evidence in most cases.

• Analyze everything, you may need clues from something seemingly unrelated

Page 18: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

File Hash Analysis

• “De-Nisting” - Using database of known file hashes from NIST (1.2 GB), Encase can compare known systems files and programs and eliminate them from evidence.

• Also used by law enforcement to find files of “interest”.

Page 19: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Files Can Be Recovered from…

• Email messages (deleted ones also)

• Office files• Deleted files of all kinds• Files hidden in image and

music files• Encrypted Files• Compressed Files• Temp Files• Spool Files• Registry

• Web history-index.dat• Cache files• Cookies• Network Server files:

– Backup e-mail files– Other backup and

archived files– System history files– Web log files

• Unallocated Space• Slack Space

Page 20: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Excerpts from NASA E-Mail

“…something could get screwed up enough…and then you are in a world of hurt…”

“I can only hope the folks…are listening…”

Pertaining to the Columbia Shuttle disaster

Page 21: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

E-Mail from Arresting Officer in Rodney King Beating

“oops I haven’t beaten anyone so bad in a long time….”

Page 22: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

E-Mail from Bill Gates

“…do we have a clear plan on what we want Apple to do to undermine Sun…?”

From Bill Gates in an intraoffice e-mail about a competitor in the MS antitrust action

Page 23: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

E-Mail between Enron and Andersen Consulting

Page 24: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

E-Mail from Monica Lewinsky to Linda Tripp

Page 25: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

What does this mean?

Deleted data really isn’t deleted!

Page 26: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Data Storage

• Tracks - Concentric rings• Sectors - Tracks divided radially into parts• Files storage

– The minimum space occupied by any file is one sector.– Unused space in the sectors is known as slack space.

Track 0 Track n

Sector 1

Sector 0

Page 27: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Storage Media Basics

• Sector: 512 Bytes

• Cluster (Block): 2 or more clusters (up to 64)

0 1 2 3 4 5 511…

0 1 2 3 4 5 511 0 1 2 3 4 5 511

Page 28: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Slack Space

• File Slack: Last cluster of file isn’t filled up completely, so data from the last use of that cluster isn’t overwritten.

• File Slack = Disk Slack + RAM Slack

0 1 2 3 4 5 511 0 1 2 3 4 5 511

EOF

Disk SlackRAM Slack

File Slack

Page 29: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Digital Forensic Challenges

• “Hidden” files

• Password protected files

• Encryption

• Steganography

• Mobile Devices

• Solid State Drives

Page 30: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Ways of Hiding Information• Rename the file or change file extension• Disk manipulation

– Hidden partitions– Bad clusters

• Set hidden property on file• Use Windows to hide files (ADS)

• Most will be detected by forensic software

Page 31: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Changing file extensions

Page 32: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Recovering Passwords

• Dictionary attack• Brute-force attack• Password guessing based on suspect’s

profile• Tools

– PRTK– Advanced Password Recovery Software Toolkit– @stake’s LC5 (L0phtCrack)

Page 33: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Examining Encrypted Files/Drives

• Recovering data is difficult without password– Cracking password– Persuade suspect to reveal password

– "I can tell you from the Department of Justice perspective, if that drive is encrypted, you're done. When conducting criminal investigations, if you pull the power on a drive that is whole-disk encrypted you have lost any chance of recovering that data. "

• Ovie Carroll, Director of the cyber-crime lab at the Computer Crime and Intellectual Property Section in the Department of Justice

Page 34: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Steganography

• Means “covered writing” or “hidden writing”

• Hiding data in plain sight!

• Invisible Ink is one example

• Other types are letter, word and digital steganography.

Page 35: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Steganography Example

• PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY.

Page 36: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Letter Steganography Example

• PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY.

PERSHING SAILS FROM NY JUNE I

Page 37: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Steganography ExampleDear George,Greetings to all at Oxford. Many thanks for yourletter and for the summer examination package.All entry forms and fees forms should be readyfor final dispatch to the syndicate by Friday20th or at the latest I am told by the 21st.Admin has improved here though there is roomfor improvement still; just give us all two or threemore years and we will really show you! Pleasedon’t let these wretched 16+ proposals destroyyour basic O and A pattern. Certainly thissort of change, if implemented immediately, would bring chaos.

Sincerely yours,

Page 38: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Word Steganography ExampleDear George,Greetings to all at Oxford. Many thanks for yourletter and for the summer examination package.All entry forms and fees forms should be readyfor final dispatch to the syndicate by Friday20th or at the latest I am told by the 21st.Admin has improved here though there is roomfor improvement still; just give us all two or threemore years and we will really show you! Pleasedon’t let these wretched 16+ proposals destroyyour basic O and A pattern. Certainly thissort of change, if implemented immediately, would bring chaos.

Sincerely yours,

Page 39: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Other Steganography Approaches

• Delliberate misspelling to mark words in the mesage

• Use of small changes in spacing to indicate significant letters or words in a hidden message

• Use of a slightly different font in a typeset message to indicate the hidden message

Page 40: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Digital Steganography

• Message can be hidden inside of almost any type of file (image, audio, video).

• Let’s see an example!

Page 41: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Which has the hidden data?

Page 42: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Which has the hidden data?

Page 43: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Hexadecimal file comparison

Page 44: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Steganography with Bitmapped image

• Steganography is the mechanism to hide relatively small amount of data in other data files that are significantly larger.

• Bitmap image (raster image) is representation of a digital image as a matrix of picture elements (pixels).– The color of each pixel is individually defined as

images in the RGB color space, for instance, often consist of colored pixels defined by three bytes—one byte each for red, green and blue.

1 1111111 1 1101100 0 0101101

1 0111111 1 0101100 0 1001101RED = 255

RED = 255GREEN = 155

GREEN = 155BLUE = 90

BLUE = 90

RED = 254RED = 254

GREEN = 154GREEN = 154

BLUE = 89BLUE = 89

Page 45: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Forensic Challenges

• Mobile Devices– “There are a lot of issues when it comes to

extracting data from iOS devices. We have had many civil cases we have not been able to process ... for discovery because of encryption blocking us.“

• Amber Schroader, CEO of Paraben

• Solid State Drives• Live Acquisitions

Page 46: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Other Forensic Evidence Examples

• EXIF Data• USB Registry Entries• Photocopiers• VM Analysis of Forensic Images

Page 47: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Business Implications

• Internal Investigations• Incident Response• Establishing Policies

Page 48: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Internal Corporate Investigations

• Business must continue with minimal interruption from your investigation

• Corporate computer crimes: – E-mail harassment, Falsification of data, Gender

and age discrimination, Embezzlement, Sabotage and Industrial espionage

• Encouraged by Sarbanes-Oxley Act as a way to promptly investigate allegations

• Regulatory & Compliance driven monitoring and response

Page 49: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Fit with Incident Response

• Computer Forensics is part of the incident response (IR) capability

• Forensic “friendly” procedures & processes• Proper evidence management and handling• IR is an integral part of IA

Page 50: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Establishing Company Policies

• Company policies may help avoid litigation– No expectation of privacy

• Rules for using company computers and networks

• Line of authority for internal investigations • Data retention and disposal guidelines

Page 51: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Disposing of Old Computers

What happens to your old computers?

Specifically, what happens to the data on your old computers?

Page 52: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

“Remembrance of Data Passed Study”

• Researcher Simson Garfinkel purchased 235 used hard drives between November 2000 and January 2003– eBay, Computer stores, Swap fests

• Spending less than $1000 and working part time, he was able to collect:– Thousands of credit card numbers– Detailed financial records on hundreds of people– Confidential corporate files

Page 53: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Disk #6: Biotech Startup

• Memos & Documents from 1996• Business was acquired Nov. 2000• Company shut down; PCs disposed of without

thought to contents.

Page 54: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Disk #7: Major ElectronicManufacturer

• Company had a policy to clear data• Policy apparently implemented with the

FORMAT command• New policy specifies DoD standard

Page 55: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Disk #44: Bay Area Computer Magazine

• Personal email and internal documents• Many machines stripped and sold after a 70%

reduction in force in summer 2000• No formal policy in place for sanitizing disks

Page 56: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Disk #54: Woman in Kirkland

• Personal correspondence, financial records, Last Will and Testament

• Computer had been taken to PC Recycle in Belleview by woman’s son

• PC Recycle charged $10 to “recycle” drive and resold it for $5

Page 57: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Disks #73, #74, #75, #77 Community College (WA)

• Exams, student grades, correspondence, etc.• Protected information under Family

Educational Rights and Privacy Act!• School did not have a procedure in place for

wiping information from systems before sale, “but we have one now!”

Page 58: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Disk #134: Chicago Bank

• Drive removed from an ATM machine.• One year’s worth of transactions; 3000+ card

numbers• Bank hired contractor to upgrade machines;

contractor had hired a subcontractor.• Bank and contractor assumed disks would be

properly sanitized, but procedures were not specified in the contract.

Page 59: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Main Sources of Failure

• Failing or Defunct Companies• Nobody charged with data destruction• Trade-ins and PC upgrades• Assumed that service provider would sanitize• Failure to supervise contract employees• Sanitization was never verified

Page 60: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

How can we sanitize hard disks?

• Disk scrubbing– Overwriting the entire drive with zeroes and

random characters• Degaussing• Physical Destruction

– Disintegration, Incineration, Pulverizing, Shredding or Melting

FORMAT and FDISK do NOT WORK

Page 61: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Free Hard Disk Scrubbers

• Active@Kill Disk – bootable floppy– http://www.killdisk.com/

• Darik’s Boot and Nuke – bootable CD, DVD, floppy or USB– http://dban.sourceforge.net/

Page 62: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

$3,000 - $10,000 (and up)Degaussing Solution

Drive will not work after degaussing

Page 63: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

$60,000 Disk Shredder Solution

Page 64: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Disk Shredder Solution

Page 65: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

Good luck recovering from this!

Page 66: Intro to MIS – MGS351 Computer Crime and Forensics Extended Learning Module H.

A Computer Forensics Expert must

• Know a lot about computers and how they work (hardware, software, OS, file systems, storage media, etc.)

• Always keep learning• Have infinite patience

– “No such thing as point and click forensics.”• Be detail-oriented• Be good at explaining how computers work