Top Banner
32

What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Mar 29, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.
Page 2: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

What you will find in this presentation◦ What is computer forensics?◦ The four “A”s◦ How disk storage works in your case

How files live on disk Where evidence might reside

What is slack space? What is unallocated space?

◦ Hex & Ascii representation◦ Tools◦ Steganography, recovering hidden data

Requirements Glossary

Page 3: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Digital version of “CSI” Finds evidence of incidents on digital

equipment◦ Computers & drives◦ PDA’s◦ iPods◦ Cell phones◦ Digital camera & flash cards◦ Network equipment

Evidence must stand up in court

Page 4: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Acquire Archive Analyze Attest

Page 5: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Crime Scene Considerations Identify and acquire the evidence Safeguard and process physically

◦ Prints and trace evidence Handling of Magnetic media (drives and floppies, etc)

◦ Keep away from magnets, machinery which generate magnetic fields and static electricity (no plastic evidence bags to generate static electricity)

Note where found, under what circumstances Nature of material expands where it might be hidden

◦ Between pages of a book◦ Inside a device

Locate material which may assist◦ User manuals, lists, password which might be written down

Page 6: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Identify sources of information◦ hard drives◦ disks (floppy, CD, DVD)◦ other devices

Digital cameras Cell phones PDA’s

Technician must understand technology required to ‘archive’ information

Once seized as evidence, the technician will then create a bit-for-bit forensic image and make it available to the analyst

Page 7: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Image is a ‘bit-for-bit’ snapshot of the disk◦ This image is used by the analyst◦ The image contains everything on the disk

Files, deleted files, “dead space” on disk, etc… Can’t read it directly

The forensic software ‘interprets’ the image and “sees” all the files on the disk

NEVER use the original media unless no other alternative… always use the bit-for-bit image if possible◦ If you ever need to use the original material, document

it along with the reason 2008 CSI Challenge

◦ Teams will be provided a ‘bit-for-bit image’ for analysis◦ Your team will not have to create this image

Page 8: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Examination of your evidence In Forensic Toolkit (FTK)

◦ Create a New or Open an Existing case◦ Add evidence to the case

Drive (hard disk, floppy, USB flash drive, etc) Previously acquired bit-image

2008 CSI Challenge teams will use this option A Folder and its contents Individual files

Page 9: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Find the evidence◦ Examine the structure of the disk itself

hidden data◦ Suspicious files

Renamed, altered or deleted◦ Search for ‘strings’

◦ ( a string is a group of characters, such as a name, credit card number, or even a fragment of a word)

in files in deleted files in ‘dead space’ (slack or unallocated, explained

later)

Page 10: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Look for ‘stuff’ in plain sight◦ Files, emails, etc

Look for hidden evidence◦ Files renamed to appear as different file types

Word document renamed as a ‘jpg’ image file Stego’d file (see later)◦ Encrypted files

Password required Locate password

In existing evidence At crime scene

Guess password (important dates, names, etc) Might require personal knowledge about suspect’s

background ‘Crack’ the password using a computer program

(not an option for 2008 CSI Challenge… not enough time)

Page 11: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

File anomalies (irregularities)◦ File name does not match the file type

An internal “signature” in the file indicates the type of file Signatures are also called “magic numbers”

“JFIF” inside a file might mean it’s really a JPG image file and not a text file or whatever the filename indicates

◦ File times are inconsistent MAC times (Modification-Access-Creation)

It’s possible for creation time to be post-modification time, depending on OS and how file copied, etc..

Compressed files (zip or other format)◦ May be passworded, contain many files bundled into one

file◦ You should know how to “unzip” a file if it’s compressed

or “zipped” File ends in ‘.zip’

Page 12: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Critical thinking: the investigative part!◦ incriminating evidence

(or exculpatory… excluding a suspect)◦ discovering new avenues of inquiries

Emails Recently used documents visited websites Snippets or fragments of information

Including slack space…

Page 13: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Saving the evidence for future use once you’re done with the case◦ In case you need to review your work

Page 14: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Reporting of analysis results◦ written competency

Testimony◦ expert witness◦ verbal and non-verbal skills

Any reporting of results by 2008 CSI Challenge teams should be clear, legible, using whole sentences to state your findings

Page 15: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

This is a basic explanation of how information is stored on a computer’s disk◦ Byte

The basic unit of storage Roughly equivalent to a ‘character’

1,000,000 byte =1 Megabyte (1 Mb) Holds about a million typewritten characters

◦ Sector How bytes are organized on disk 512 bytes per sector

◦ Cluster A group of sectors

Floppy disk: 1 sector per cluster Hard drive: depends on system

Page 16: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Sectors are grouped into ‘clusters’ a cluster can be

◦ 1 sector/cluster (512 bytes)◦ 2 sectors/cluster (1024 bytes)◦ 4 sectors/cluster (2048 bytes)◦ 8 sectors/cluster (4096 bytes)

on a floppy, we use one sector / cluster when we need space for a file, the system

gives us a cluster (not just a sector)

Page 17: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

When we write a file using a cluster◦ We have “left over” room in the cluster

This is called “slack space” Information can reside in slack space

Cannot say that the person who wrote the file in that cluster also put that slack information into that cluster

Clusters can be reused once a file is deletedThey’re put back into a pool of unallocated clusters

◦ (they don’t belong to any file)◦ If these clusters haven’t been used for writing a

new file, it’s possible to recover this ‘deleted’ file

Page 18: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Cluster (512 bytes) we write about 100 bytes

◦ the rest is ‘slack’

This is an example of a cluster containing information….blah blah blah…Dear Sir; We have read your proposal, and … no thanks

Page 19: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

No, for the 2008 CSI Challenge you might see hexadecimal notation of the disk’s data, along with the “English” readable data◦ This is presented so that you’ll recognize it when

you see it while using FTK (see the next screen)◦ You will not be responsible for knowing “hex”◦ Computers really only know “numbers”

Certain numbers (values) are associated with letters of the alphabet For example a value of “44” in hexadecimal is a capital

“D”, and a hex “20” is a space, a “64” value is a small “d” This is called the ASCII code

Page 20: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Upper Case “D”

Page 21: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Software such as FTK (which you will be using) contain tools that allow you to:◦ Acquire an evidence image◦ Identify deleted files

Possibly recover a deleted file◦ Search the bit image

◦ Search for string of text (last name, etc) Identify files containing the string Identify that area as belonging to a file, or in slack space

◦ Examine attributes of files Hidden Deleted File times Mismatch between file name and actual file type

‘bad signature’ (txt file might actually be a ‘jpg’ file) Show thumbnails of picture type files

◦ Export files (or fragments) (collect them in one spot)◦ Bookmark critical findings (highlight relevant findings)◦ Document case for report (times, investigator, etc)

Page 22: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Existing software◦ Word, Adobe, etc

Open files of that format◦ Analyst must know how the application software

works PKZIP, WinZip, WinRAR

◦ Extract compressed files Steganograhpy (S-Tools)

◦ Extract files from a “stego’d” file◦ S-Tools will use BMP, GIF or WAV files as

‘containers’ to hide other files◦ Can be used to reveal and extract hidden files

Page 23: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Forensic ToolKit (AccessData) Demo version allows examination of cases

with a max of 5000 files◦ Add your evidence image file◦ Analyze it◦ Document your results

You will use FTK to add your evidence to a new case and analyze it

Page 24: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Hidden information inside a file A file inside a file (container file and message file) Can be passworded / encrypted

The “container” (stego’d) file is either a “bmp” or “gif” image type◦ Can also be an ‘audio’ file

On a hard drive, or on someone’s iPod, etc… Files can be included in a Word (or other

document), such as webpages or be a “standalone” file on someone’s hard drive

S-Tools can be downloaded to reveal stego’d evidence

Page 25: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Laptop◦ CD / ROM drive◦ Software

Windows XP or Vista Microsoft Office (2003 or better) Access Data’s Forensic ToolKit (FTK) S-tools WinZip or capability to unzip files on your drive

Should already be built into Windows when you right-click on a zipped filename

Tutorials (including this) can be found on the website

Page 26: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

ASCII◦ Computers only know numbers. ASCII is a ‘code’

that associates numbers with letters or characters of the alphabet.

Bit◦ Binary digit; a ‘one’ or a ‘zero’

Byte◦ Grouping of eight bits, representing a numerical

value from 0 to 255◦ Can also represent a “character” or letter of the

alphabet

Page 27: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Bit-for-bit image◦ Also known as a bitstream image◦ A “snapshot” of a piece of evidence, taken in a

forensically sound manner (no alteration of original evidence)

Bitstream image◦ See bit-for-bit image

Page 28: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Cluster◦ A group of sectors. Files are written by the system

using clusters Floppy clusters are 1 sector per cluster Hard drives vary (common to find 8 sectors / cluster)

Compression (of files)◦ a method of making a large file smaller, by

eliminating repetitive sequences of characters See “zip” files

Page 29: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Encryption◦ Used to make information unreadable unless you

have a password Evidence

◦ Something that provides proof Could be a hard drive, floppy, USB device, paper

notes or anything containing information Hexadecimal

◦ Numerical representation used by computer scientists. See ASCII code

Page 30: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Password◦ A mechanism which prevents a person from accessing a

file unless a user provides the correct password or passphrase.

Slack or slack space◦ That area of a cluster belonging to a file, which is “left

over.” Information can be contained in slack space. Steganography

◦ “Hidden writing.” The process of hiding information inside a container file. The container picture typically looks no different after having hidden data inside it. Software such as S-Tools is used both to hide as well as reveal information.

Page 31: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Zip file◦ A compressed file. A zip can contain a single file,

or many files. The zip file can contain a directory (folder) structure, along with all the files in that folder. Zip files can also be passworded.

Page 32: What you will find in this presentation What is computer forensics? The four As How disk storage works in your case How files live on disk Where evidence.

Good luck to all contestants

End of PowerPoint presentation