1 / 41

CS 491 -Digital Forensics

Explore the world of digital forensics and learn the tools and techniques used to recover and examine digital evidence. Discover how to identify and preserve evidence, extract hidden data, and cope with large quantities of digital data.

albertruiz
Download Presentation

CS 491 -Digital Forensics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS 491 -Digital Forensics URL: http://www.cs.uwec.edu/~tan/priv/www-docs/cs491

  2. Presentation Topics • Electronic security, information security systems, systems and network security • Vulnerability research, ethical hacking, zero day attack, attack pattern recognition • Computational immunology, authentication authorizations • Security in mobile platforms, mobile agents/artificial intelligence • Security: security policies/procedures, strategic approaches, requirements engineering • Identity: theft, management systems, access management systems • Open source intelligence, criminal data mining/network analysis/intelligence • Phishing/pharming/spearphishing, cyber war, cybercrime detection/analysis • Digital cities, GSM-solicited crime • Computer/mobile device/network/software forensics, anti-forensics • Digital forensics tools/techniques/standardization, testing/approvals for forensic tools • Crime scene/search and seizure processes, criminal investigation of mobile devices • Investigative techniques, judicial processes, legal/ethical issues, cyber crime legislations • Digital and physical surveillance, digital image manipulation • Cryptographic algorithms/protocols, steganography, hidden data

  3. Digital Forensics Definition: “Tools and techniques to recover, preserve, and examine digital evidence on or transmitted by digital devices.” Devices include computers, tablets, cellular phones, videogame consoles…

  4. Examples of Digital Evidence • Computers increasingly involved in criminal and corporate investigations • Digital evidence may play a supporting role or be the “smoking gun” • Email • Harassment or threats • Blackmail • Illegal transmission of internal corporate documents

  5. Examples of Digital Evidence • Meeting points/times for drug deals • Suicide letters • Technical data for bomb making • Image or digital video files (esp., child pornography) • Evidence of inappropriate use of computer resources or attacks • Use of a machine as a spam email generator • Use of a machine to distribute illegally copied software

  6. Major Issues • Identification of potential digital evidence • Where might the evidence be? Which devices did the suspect use? • Preservation of evidence • On the crime scene… • First, stabilize evidence…prevent loss and contamination • If possible, make identical copies of evidence for examination • Careful extraction and examination of evidence

  7. Major Issues • Presentation • “The FAT was fubared, but using a hex editor I changed the first byte of directory entry 13 from 0xEF to 0x08 to restore ‘HITLIST.DOC’…” • “The suspect attempted to hide the Microsoft Word document ‘HITLIST.DOC’ but I was able to recover it without tampering with the file contents.” • Legal: Investigatory needs meet privacy

  8. “Dear Susan, It’s not your fault… wireless connection Basement/closet Preservation of Evidence: Hardly trivial… tick…tick…tick… Just pull the plug? Move the mouse for a quick peek? Tripwires Remove battery Shut down? Volatile computing Living room

  9. Preservation: Imaging • When making copies of media to be investigated, must prevent accidental modification or destruction of evidence! • Write blockers: Use them. Always. • dd under Linux • DOS boot floppies • Proprietary imaging solutions Drivelock write blocker

  10. Extraction and Examination Know where evidence can be found Understand techniques used to hide or “destroy” digital data Toolbox of techniques to discover hidden data and recover “destroyed” data Cope with HUGE quantities of digital data… Ignore the irrelevant and target the relevant

  11. Where’s the evidence? • Undeleted files, expect some names to be incorrect • Deleted files • Windows registry • Print spool files • Hibernation files (Windows: compressed hyberfil.sys) • Temp files (all those .TMP files!) • Slack space (unused space between files) • Swap files • Browser caches • Alternate partitions • On a variety of removable media: • Really antiquated floppies • ZIP drives • Flash drives • Hard Drives • Cloud

  12. Fallacy vs. Fact in Digital Forensics Many digital forensics tools and techniques are quite complex… To illustrate investigative procedures for digital forensics, a fact vs. fallacy approach Fallacy: User attempting to hide evidence believes one thing… Fact: But in fact…

  13. Fallacy: File was deleted, it’s gone! Users often mistake normal deletion of files for “secure” deletion Deleted files recoverable using forensics tools Why? Filesystem makes a small change in its bookkeeping info to mark a file as deleted

  14. Fallacy: File was deleted, it’s gone! Data associated with file is NOT erased Example: FAT32 (Windows), first character of filename is changed to 0xEF in directory entry to “delete” file Forensics software changes one character in directory entry, file reappears To prevent recovery, must perform secure overwrite of the file or physically destroy the media

  15. Fallacy: I renamed the file, I’m safe! • “childporn.jpg”  “winword.exe” • Renaming files is an ineffective defense against digital forensics investigation • Technique # 1: • Most file types (e.g., JPEG image) have a structure that can be recognized directly, regardless of the filename a user chooses • e.g., JPEG files contain 0x4a464946 or 0x45786966 in the first block of the file

  16. Fallacy: I renamed the file, I’m safe! • Technique # 2: • Cryptographic hashing provides a mechanism for “fingerprinting” files • File contents is matched quickly, regardless of name • Hashes equivalent, file contents equivalent • Think: fingerprints don’t care about hair color…

  17. Hashing Typical algorithms: SHA-1, MD5 Example: $ md5sum foo.jpg b28f08b004a7251a418e089ef3bb7409 *foo.jpg $ mv foo.jpg bar.exe $ md5sum bar.exe b28f08b004a7251a418e089ef3bb7409 *bar.exe Can automate checking of hashes Huge dictionaries exist with hashes for known files: http://www.nsrl.nist.gov …and known child pornography files Can quickly disregard known files and target the interesting stuff

  18. Fallacy: I format-ed the drive, whew! Formatting a drive does not prevent recovery of digital evidence In fact, format typically overwrites less than 1% of drive contents Why does it take so long? Format is reading disk blocks to determine if bad blocks exist

  19. Fallacy: I format-ed the drive, whew! Format wipes out directories, so names of files are lost A lot of the data can still be recovered by sifting through data that remains after the format operation For example, file carving tools reconstruct files by examining the initial and terminal bytes of the file See digital forensics Technique # 1 under file renaming fallacy

  20. Fallacy: Media mutilation == Miller time! # 1: Cutting a floppy into pieces # 2: Opening a hard drive, removing the platters, throwing them into the trash #3: Burn it #4: Soak in diluted hydrochloric acid #5: Drill holes

  21. Media mutilation Even strong magnetic fields are insufficient… Older “military grade” degausser for erasing hard drives was so strong that it bent the platters inside the drive Your bulk tape eraser isn’t going to do the job To destroy data: multiple overwrites (software) or complete destruction of hardware

  22. Fallacy: Media mutilation == Miller time! Unless the damage is extreme, mutilation of magnetic media is insufficient to prevent recovery Media can be reassembled and partial recovery performed Remove platter and sand grind (overkill) Thermite destruction (over overkill) http://www.youtube.com/watch?feature=player_embedded&v=k-ckechIqW0#! Degauss with neodymium magnets (cheap) Place platter between two magnets.

  23. That’s One Big Degausser!

  24. Fallacy: I used Web-based email… Fallacy: Use of web-based email rather than storing email messages directly on a computer is safer (in terms of thwarting recovery attempts) It’s not. Even if you never download the email and immediately delete all messages on the server! Recently viewed web pages are stored in web browser’s cache Cache is often in a hard-to-find place…

  25. Fallacy: I used Web-based email… Internet Explorer  Tools  Internet Options  Delete Files clears the cache in IE Files stored in browser cache are not securely deleted when the cache is cleared Browser cache mining tools bring recently viewed web pages, including web-based email messages, back to life in a flash

  26. Fallacy: Application uninstalls are easy… Illegal application installed… Fear ensues… Application is uninstalled… (Am I safe?) …application files can still be undeleted, proving application was installed Further steps to obscure installation: Securely overwrite application files

  27. Fallacy: Application uninstalls are easy… Now am I safe? Nope. Remnants of installation can likely still be found in the Windows registry Basically, if a user installs software and wants to permanently eradicate any traces, must securely erase the entire drive or destroy the hardware

  28. Fallacy: I encrypted my files… On encrypted file systems, if file is ever printed and spool directory isn’t encrypted, fragments may be left behind On Window systems (e.g., Windows 2000), a “recovery agent” is able to read all encrypted files Thus just need to break administrator password Problem: keys for truly secure encryption schemes are long

  29. Fallacy: I encrypted my files… Search for slips of paper Search for unencrypted password lists Search PDAs, phones, and organizers for passwords and encryption keys Software or hardware keystroke loggers Van Eck radiation If the file can’t be decrypted, the name of the file may still be useful in prosecution

  30. Beowulf, Slayer of Poorly Chosen Passwords… How good are your passwords?

  31. Steganography • “Techniques for hiding information within other information” • Historical • Tattoos • Text on wood under wax layer on a wax tablet • “Invisible” ink (e.g., writing with lemon juice) • Modern • Much more sophisticated • Employ powerful encryption techniques • Hide documents w/in an image, video, or audio file • Hidden documents can be harmless, or child pornography, bomb plans, …

  32. Stego (2)

  33. Stego (3)

  34. Stego (4) Statistical analysis by “stegdetect” guesses correctly that something is hidden. However, jphide uses Blowfish to scramble the order of embedded data, so successful extraction is very unlikely unless the password is known.

  35. Stego (5) Igniter Core This “bomb” diagram, however, is not detected inside the cactus picture…

  36. Bluepipe: A Scalable Architecture for On-the-Spot Digital Forensics 1. Plug in a USB dongle to enable wireless communication with the target computer 2. Boot the target computer using a Bluepipe boot CD 3. Launch the Bluepipe application on a PDA or lap-top. Must ensure that the target computer boots from the Bluepipe boot CD

  37. Legal Issues • Investigative needs vs. the right to privacy • Search warrant laws, e.g., Fourth Amendment to the U.S. Constitution • Wiretap laws • Chain of custody

  38. Legal Issues • Admissibility of evidence in court: • Daubert standard: Has theory or technique in question been tested? Is error rate known? Widespread acceptance within a relevant scientific community? • Patriot Act • Greatly expands governmental powers in terms of searching, wiretap w/o prior notification

  39. The Other Side: Privacy We’ve concentrated on the cool technology, but… The existence of sophisticated digital forensics techniques is a great enabler for fascism Actively fight laws that don’t appropriately balance privacy with need for investigation Secure file deletion software

  40. The Other Side: Privacy • Overwriting files with zeros is good enough unless a tunneling electron microscope is available… • Volatile computing • Physical destruction of media • Grind the media into powder • Vats of acid or molten steel

  41. Resources • Books • Digital Evidence and Computer Crime (E. Casey, Academic Press) • Computer Forensics and Privacy (M. Caloyannides, Artech House) • Websites • http://www.dfrws.org • Lots of references related to digital forensics, including a link to an interesting e-journal… • http://www.ijde.org/ (International Journal of Digital Evidence) • http://vip.poly.edu/kulesh/forensics/list.htm • tons of stuff, including a bunch of online papers • http://www.tucofs.com/tucofs/tucofs.asp?mode=mainmenu • Huge collection of forensics-related software • Commercial digital forensics software • Encase • FTK (Forensics Tool Kit) • ILook (law enforcement only) • WinHex

More Related