Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation
|
|
|
- Sydney Richard
- 10 years ago
- Views:
Transcription
1 Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation Przemyslaw Pajek and Elias Pimenidis School of Computing IT and Engineering, University of East London, United Kingdom Abstract. Electronic crime is very difficult to investigate and prosecute, mainly due to the fact that investigators have to build their cases based on artefacts left on computer systems. Nowadays, computer criminals are aware of computer forensics methods and techniques and try to use countermeasure techniques to efficiently impede the investigation processes. In many cases investigation with such countermeasure techniques in place appears to be too expensive, or too time consuming to carry out. Often a case can end up being abandoned and investigators are left with a sense of personal defeat. The methodologies used against the computer forensics processes are collectively called Anti-Forensics. This paper explores the anti forensics problem in various stages of computer forensic investigation from both a theoretical and practical point of view. Keywords: Computer Forensics Investigation, Computer Forensics Tools, Computer Anti-forensics Methods. 1 Introduction Locard s principle states that when a crime is committed, there is a cross-transfer of evidence between the scene and perpetrator [1]. In the digital world, evidence resides mainly on computer hard drives in the shape of files, logs, or any other artefacts depicting pertinent activity. Projecting Locard s principle into the cyber world an understanding of the correlation between such types of evidence, the times when particular events took place and the users who committed those actions can be reached. The main task of computer forensic investigators is to reveal and connect these three facts into one coherent statement revealing the whole nature of the particular action. On the contrary, the main aim of computer anti-forensics is to hide or alter electronic evidence so that it cannot be used in legal proceedings or it is too costly and time consuming to retrieve and examine. Computer anti-forensics methodologies vary and can be applied so they can contaminate any stage of the computer investigation process. Whilst most of the techniques are used directly against computer forensic tools, some of these methodologies can be used for quite legitimate reasons. Encryption for example can be used to protect company assets; digital watermarking can be used to prevent copyright infringement in H. Jahankhani, A.G. Hessami, and F. Hsu (Eds.): ICGS3 2009, CCIS 45, pp , Springer-Verlag Berlin Heidelberg 2009
2 146 P. Pajek and E. Pimenidis digital imaging. Conversely, these techniques, if applied against computer forensics, could potentially hide crucial data from investigators. Many authors have discussed computer anti-forensic techniques and have hailed them as very efficient ones. However, very little practical work has been done in this area in terms of testing those techniques and practically evaluating their efficiency and effectiveness. The main aim of this research is to identify the most known computer anti-forensic techniques and test practically them against computer forensic software. The key question to be addressed is whether computer anti-forensics can hinder the investigation process and prevent real artefacts being discovered and being admissible in the legal process? The work presented here is based on the experimental part of the first author s MSc dissertation. 2 Computer Forensics Methodologies versus Anti-forensics To efficiently test those techniques, it is necessary to identify the stages of computer forensic processes where investigators follow clear and well defined procedures [2]. At every stage different computer forensic methodologies have been used and various anti-forensic techniques have been applied against these methodologies. 2.1 Stage One Elimination of Source Preservation of data process relies on the securing of all data found on an inspected drive irrespective of its pertinence to an investigation. At this stage the main task is to only acquire an identical image of the analysed media. One of the main methods which could be applied in this task is to prevent pertinent data being preserved. One of the easiest and most efficient methods would be to block the access to the media; however when investigators have permission to investigate it, such a move is not possible. Therefore the next sensible option is the elimination of a source [3]. Like most of counter-forensic techniques these methodologies can be applied only before image acquisition. The easiest method of elimination of a source is simply a disabling tool responsible for creation of source. This could be, for example, done by various modifications of computer settings and registry. Operating system will stop logging users activity and so. If a user performed a particular action, this would be automatically hindered. An example of this can be the editing of an operating system group policy, in this way the system will not log a visited website in the browser s history [4]. The next method of elimination of a source is log and disk wiping. This method relies on the deletion process, where special tools need to be applied in order to safely delete traces of data from any places on the hard drive. This should include all entries on HDD incl. all MFT entries and its attributes, orphan files and so forth. Previous research in this area has revealed that not all programs claimed to be anti-forensic can efficiently delete all traces of data [5]. Similar experiment was used to check whether a new set of tools available in 2008 were more efficient than those applied in 2005.
3 Computer Anti-forensics Methods Stage Two Hiding the Data In the second stage of the computer forensic process, usually investigators identify and extract the information which can be pertinent to the investigation. At this stage counter forensic tools have the greatest use. In contrary to the previous stage, they do not delete relevant data but hide it in a way that it is very difficult to find and examine. Research about these methods has distinguished some ways of how data can be hidden on digital media. Unusual directories and manipulation of file headers - in this method, information is hidden in unusual places. For example, the file system and deep nested directories. This gives a greater likelihood that hidden files will be overseen during the harvesting process. Another method which would inhibit investigators is the manipulation of file extensions and file headers. Whereas simple manipulation of extension does not make any difference for forensic software, manipulation of file headers and footers may potentially misled forensic software. Hiding data in slack space On media like hard drives, the data is saved in clusters divided by sectors. Currently the most popular files system in use is NTFS. Main information about files such as file name, size, time stamps and the number of clusters is stored on the hard drive [6]. However, actual data is stored in other place. In many cases saved data does not use all sectors in a dedicated cluster, some of them remain unused. Counter forensic tools can use those places to store data. Tools like Slacker can scrap and spread data into those places. The only way to retrieve it is to use slacker again by special reversible algorithm. Stenography This is a technique of hiding data within other data where the presence is not revealed. In many cases it is used for legitimate reasons by inserting digital watermarks in the image, so the owners can easily protect themselves from copy right infringement. Simultaneously, instead of watermarks, any other data can be inserted. Investigators using forensic software may easily bypass data hidden in that way, as many forensic packages are not especially dedicated to reveal steganography. Every innocent family picture may be in fact a well camouflaged collection of very important data [7]. Encryption in many cases it is used to protect information from unauthorized access but it can be applied against the computer forensic investigation process. Using encryption, the presence of data is not concealed, but it is extremely difficult to examine encrypted media using forensic software. The process may become too time consuming and too cost full to implement. 2.3 Stage Three Direct Attacks against Computer Forensic Software One of the main ways to carry an attack against computer forensics software is to exploit and use its vulnerabilities against it. Computer forensics software, like any other computer program, was created by software vendors. If the credibility of forensics software is put to question during the legal process, any evidence found, may be dismissed due to the unreliability of the software. Currently there are two main ways as to how the reliability of forensic software may be compromised.
4 148 P. Pajek and E. Pimenidis Time Stamp Modification Every file on removable media has four values called M.A.C.E. Those values are responsible for recording Modification, Access, Creation time stamps of that file. Computer forensics packages reading those values, give indications to examiners about time and date issues of any updates and changes to the contents of a file. However those values can be manipulated and real time and date stamps may not be displayed correctly in computer forensics software. Knowing this, a legal defence process may put to question the reliability of computer forensic software. Hash Collision Hash function is an algorithm used to create a unique fixed value string from any amount of data. This process is irreversible. In computer forensics it guarantees that digital evidence has not been changed during the investigation process. However in 2005 a student from China created a hash collision from two different inputs of data. The student managed to create the same hash outputs from the two different sets of inputs [8]. Having this ability, any user could efficiently undermine the credibility of digital evidence. During this research, this method was only considered from the theoretical perspective in potential in threatening the credibility of computer forensics software [9]. 3 Experimenting with Anti-forensics Techniques For the experimental part of this work all the techniques discussed here were tested on new hard drives. The criteria used to evaluate the various techniques applied in this experiment were drawn from professional reports on previous research in this area. Based on these, the following test structure was followed during the experimental phase of the work which was split into three stages. Stage one for wiping / safe deletion tools Test whether traces of previously deleted data can be revealed Test whether actual data can be recovered Stage two hiding data techniques Amount of potential data that can be safely hidden Technique applied Test whether presence of hidden data can be revealed Test whether actual data can be read Stage three undermining credibility of the software Test whether time stomp modifications can be revealed Test whether original time stomp values can be recovered In determining the counter-forensics tools and methodologies used for experiment the only two criteria applied were those of availability and popularity in the most popular search engines. In most cases counter-forensics methodologies are available through internet search engines. Therefore the assumption that the more popular a tool is in search engines; the likelihood of this tool being applied increases is a plausible one.
5 Computer Anti-forensics Methods 149 Table 1. Tools utilised in the first experiment Tool Name Manufacturer Version Release Date License Downloadable URL Eraser Heidi Computers Ltd node/6 Flex TK Express Flexense com/downloads.html Free Wipe Wizard Wizard Recovery.com 1.5 No older than wizardrecovery.com/ free_wipe/free_wipe_ wizard.php R-Wipe and Clean R-Tools Technology Inc. 8.1b_ Free 15 days trial r-wipe.com/ Disk_Cleaning_ Download.shtml The hard drives were divided into the same 4 sectors which were the same for all tools. Various sets of documents were saved on them and subsequently erased by those tools. Next every partition was forensically imaged and put into analysis. For the second experiment, i.e. hiding the data, only one tool was applied for each of the techniques mentioned above: Table 2. Tools and Techniques for experiment 2 Technique Tool Name Manufacturer Ver. Release Date License Downloadable URL Manipulation of files signatures Hiding data in Slack space Manual technique / tool used for editing files: Hex Workshop Slacker Metasploit Run time disk Explorer/ Manual Trial com/hex-workshop/ _ html com/research/projects/ antiforensics Trial data-recovery-downloads. htm Stenography Invisible Secrets Neobyte Solutions Day free trial neobytesolutions.com/ invisiblesecrets/ True Crypt Encryption Truecrypt 6.1 a org/downloads
6 150 P. Pajek and E. Pimenidis In this experiment various files of different types were manipulated, data in various files were also hidden by steganography. One partition was completely encrypted. However the Slacker tool did not work when it came to hiding data on the external partition. Sets of errors when reading the master file table on the external partition and lack of relevant documentation about the Slacker software made it impossible to use the Slacker tool for the experiment. Therefore further experiments were carried with manual hiding of data in slack space. For experiment three hiding manipulation of time stamps, 4 different packages were used in 4 different partitions, various sets of files were put into these partitions, and subsequently different time stomps were manipulated. Four separate forensic images were created and put into analysis. Table 3. Tools used for experiment 3 Tool name Manufacturer Version License Downloadable URL Attribute Changer Romain Petages 6.10.a petges.lu/ Attribute Manager Milksoft days Trial miklsoft.com/ downloads.html Time Stomp Metasploit metasploit.com/ research/projects/ antiforensics/ File Properties Changer Segobit Software segobit.com/ fpc.htm Similarly to the previous experiment, the tool Time Stomp was excluded from the experiment as it failed to change most of the MACE values. All images were forensically analyzed using the following computer forensics software tools: Forensic Toolkit-FTK Version 1.71 build (Demo version) FTK fully. 3.1 Experimental Results Experiment one Using Wiping tools: Forensic analysis proved that most of the tools applied for wiping data did not efficiently delete all traces of it. From the four tools used, only the fourth one managed to
7 Computer Anti-forensics Methods 151 efficiently erase all traces of data and meet the target of effectively hiding data from forensics tools. The rest of the anti-forensics tools employed in this experiment left many traces that made it possible to prove that the data was previously saved on an analysed hard drive. Table 4 below summarises the outcome of this experiment and shows where traces of data were found following the wiping operation, for each tool utilised. Table 4. Results of Stage 1 of the experimental work Tool / Deleted area Presence of deleted data revealed/ if yes where? MFT Entry Actual Data/If yes from where? Forensic tool used Eraser v Yes, NTFS\$LogFile, NTFS\$I30 No FTK Yes, NTFS\$LogFile, NTFS\$I30 No FTK fully Flex TK Express V Yes, Orphan files, NTFS\$LogFile,, $MFT, $I30 No FTK Yes, Orphan files, NTFS\$LogFile,, $MFT, $I30 No FTK fully Free Wipe Wizard 1.5 () Yes, NTFS\$LogFile, $MFT, $I30 + List of deleted files Yes, 60% of data, by data carving FTK Yes, NTFS\$LogFile, $MFT, $I30, change log file+ List of deleted files Yes, 60 % Data, method not defined FTK fully Tool 4 R-Wipe and Clean v 8.1b_1462 No No FTK 1.71 No No FTK fully
8 152 P. Pajek and E. Pimenidis Experiment two Hiding the data: Using the trial version of the FTK1.71 computer forensics package, 50% of the manipulated signatures were efficiently recognized by forensics software. Manually hidden data in the file slack space were fully revealed and completely readable in forensics software. In terms of steganography computer forensics software did not reveal the data, but an entropy test [10] raised suspicion. Encryption has also managed to hide the data so that forensics software did not recover actual data but is at also raised suspicion. Detailed results can be found in the table 5 below. Table 5. Experimental results stage two Techniques applied /Areas of hard drive Presence of hidden data revealed Actual Data recovered Recovery technique applied Forensic tool used Manipulation of file Extensions and Signatures Yes 50% of tested files Yes - 50% of tested files General Forensic Software FTK 1.71 Yes- 75 % of tested files Yes - 75% of tested files General Forensic Software plus hex editing and checking for extension. FTK fully Stenography in single image files No, but raised suspicion No General Forensic Software + Entropy tests FTK 1.71 No No FTK fully FTK Encryption of Volume No, but raised suspicion No General Forensic Software + Entropy tests FTK 1.71 Manual Hiding in File Slack Space No No General Forensic Software Yes Yes General Forensic Software Yes Yes General Forensic Software FTK FTK 1.71 FTK
9 Computer Anti-forensics Methods 153 It is possible that further tests utilizing programs such as Outguess or Stegdetect would have revealed hidden data by stenography or encryption, but forensics software on its own was unable to do it. Experiment three- Time Stamp Modification: All three packages measured against computer forensic software succeeded the in value created, however in values for Accessed package the version succeeded at Table 6. Experimental Results Stage 3 Tool used Time Stamp - value Created Time Stamp - value Modified Time Stamp - value Last Accessed Time stamp - value Entry Modified Forensic tool used Manipulation revealed in % Original. Time stamp recovered in % Manipulation revealed in % Original. Time stamp recovered Manipulation revealed in % Original. Time stamp recovered in % Not Analysed Tool 1 - Tool 2 10 Days Trial No - 0% No - 0% Yes 25% FTK 1.71 Yes- 100% Yes 100 % Yes 100 % FTK No - 0% Yes- 33% Yes -25 % FTK 1.71 Yes- 100% Yes- 100% Yes- 100% FTK Tool 3- Time Stomp - Tool Failed to work Tool Failed to work Tool Failed to work FTK 1.71 Tool 4 Trial No 0% No 0% Yes - 50% FTK 1.71 Yes- 100% Yes- 100% Yes- 100% FTK
10 154 P. Pajek and E. Pimenidis 100 % in value created, while for Values Modified and Last Accessed the success rates averaged 33%. In a full version of forensic software, where an experienced external examiner analysed the image, results were more disadvantageous for packages. Detection rate was 100% in all three packages. 4 Discussion Conclusions The conducted experiments proved that not all counter-forensics techniques are efficient when compared against forensics software. In many cases tools failed to hide or delete important data. It is highly likely that the detection rate achieved by forensics software depends on the sophistication of the counter-forensics technique applied. This is clearly visible in the encryption and steganography examples where processes and algorithms are much more complex compared to other used in these experiments. The main aim of this research was to test whether current known counter-forensics technology can efficiently interfere with computer forensics processes. The results displayed in the tables in section 3 above clearly indicate that only two of the tested techniques have quite high success rates. The results obtained for other techniques vary amongst them but the average rate is not as high as in those for encryption in steganography. In analysing the results it is very important to take into account the experience of the analyst and the software package applied in the experiment. A more experienced investigator with a fully package could have had a better detection rate than a trainee with trial version only. It is also important to remember that in every forensic case the objectives are different, as are the techniques applied to prevent achieving them. To achieve more accurate results and to be able to develop a fuller picture as to the current status of counter forensic methodologies, research should be continued in this field. It is recommended that more specific research should be carried about each individual technique against a range of different forensic tools. Also, the various antiforensics techniques should be evaluated against packages specifically designed for detection of those techniques in order to develop a much clearer opinion as to whether it is possible to beat counter forensics. It is important to note that research on antiforensics are also a great source of information for those who want to harness systems against those techniques that aim to hide malicious activity and to other interested groups such as software vendors. Knowing, whether counter forensics posses a real threat to computer forensics can be vital in many cases in the future and to the development and shaping of electronic transactions and possibly to the future of the whole digital world. References 1. Harris, R.: Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. Journal of Digital Investigation 3(suppl. 1), (2006) 2. Warren, G., et al.: Computer Forensics, Incident Response Essentials, p. 4. Addison- Wesley, London (2002) 3. Sartin, B.: Anti-forensics, distorting the evidence. Journal of Computer Fraud and Security (5), 4 6 (2006)
11 Computer Anti-forensics Methods Kubrispick: How to Disable Delete Browser History in Internet Explorer, How+Disable+Delete+Browser+History+Internet (accessed March 26, 2009) 5. Geiger, M.: Evaluating Commercial Counter-Forensic Tools. Carnegie Mellon University, Pittsburgh (2005) 6. Carrier, B.: File System Forensic Analysis, p Addison Wesley, London (2005) 7. Frith, D.: Stenography approaches, options and implications. International Journal of Network Security (4), 4 6 (2007) 8. Mironov, I.: Hash Functions, Theory Attack and Applications (2005), (accessed May 15, 2009) 9. DRWS, Hash Challenge (2008), (Accessed December 19, 2008) 10. AccessData Corporation, FTK manual v 1.71 Entropy test User Guide (2007), FTK1UsersGuide.pdf
(b) slack file space.
Hidden Files A Computer Forensics Case Study Question Paper 1. Outline the meaning of the following terms: (a) cookie, [2 marks] A cookie is data stored locally that is used by some websites for data that
Detection of Data Hiding in Computer Forensics. About Your Presenter
Detection of Data Hiding in Computer Forensics NEbraskaCERT Conference August 22nd, 2008 James E. Martin CISSP, JD About Your Presenter 2008-Present: Security Engineer, West Corporation 2004-2008: Senior
introducing COMPUTER ANTI FORENSIC TECHNIQUES
introducing COMPUTER ANTI FORENSIC TECHNIQUES COMPUTER FORENSIC DATA RECOVERY TECHNIQUES AND SOLUTIONS WORKSHOP Executive Summary Computer Forensics, a term that precisely identifies the discipline that
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
State of the art of Digital Forensic Techniques
State of the art of Digital Forensic Techniques Enos K. Mabuto 1, H. S Venter 2 Department of Computer Science University of Pretoria, Pretoria, 0002, South Africa Tel: +27 12 420 3654 Email: [email protected]
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
Term Report. Forensics for IT
Term Report Forensics for IT Trisia Yung ACC 626 Professor Malik Datardina June 28, 2012 Introduction Technology has enhanced the operational aspects of today s businesses by improving productivity and
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS K.K. Arthur 1 H.S. Venter 2 Information and Computer Security Architectures (ICSA) Research Group University of Pretoria Pretoria Department of Computer Science
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Ten Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS
Chapter 5 EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS Harry Velupillai and Pontjho Mokhonoana Abstract Shredder programs attempt to overcome Window s inherent inability to erase data completely.
Digital Forensic Tool for Decision Making in Computer Security Domain
Digital Forensic Tool for Decision Making in Computer Security Domain S. K. Khode 1,V. N. Pahune 2 and M. R. Sayankar 3 1, 2, 3 Computer Engineering Department of Bapurao Deshmukh College of Engineering,
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Course Title: Computer Forensic Specialist: Data and Image Files
Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute
An overview of IT Security Forensics
An overview of IT Security Forensics Manu Malek, Ph.D. Stevens Institute of Technology [email protected] www.cs.stevens.edu/~mmalek April 2008 IEEE Calif. 1 Outline Growing Threats/Attacks Need for Security
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES KEVIN MANSELL CONTROL-F LTD. [email protected] DARREN LOLE & FIONA LITCHFIELD SERVICE
Data Hiding Techniques
Data Hiding Techniques You can run, but you can t hide for ever 2014/2015 Dr. Ali Hadi [email protected] # whoami University professor @PSUT by day, DFIR researcher by night! PhD research was in Network
Framework for Live Digital Forensics using Data Mining
Framework for Live Digital Forensics using Data Mining Prof Sonal Honale #1, Jayshree Borkar *2 Computer Science and Engineering Department, Aabha Gaikwad College of Engineering, Nagpur, India Abstract
Forensic Acquisition and Analysis of VMware Virtual Hard Disks
Forensic Acquisition and Analysis of VMware Virtual Hard Disks Manish Hirwani, Yin Pan, Bill Stackpole and Daryl Johnson Networking, Security and Systems Administration Rochester Institute of Technology
Significance of Hash Value Generation in Digital Forensic: A Case Study
International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 2, Issue 5 (July 2012), PP. 64-70 Significance of Hash Value Generation in Digital
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.
CYBER FORENSICS KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad. 11 DIGITAL EVIDENCE? Cyber crimes Digital evidence Digital evidence is any information of
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE Jesús Alexander García Luis Alejandro Franco Juan David Urrea Carlos Alfonso Torres Manuel Fernando Gutiérrez UPB 2012 Content INTRODUCTION... 3 OBJECTIVE 4 EVIDENCE
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Cyber Security Response to Physical Security Breaches
Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically
Digital Forensics. General Terms Cyber Crime, forensics models, Investigation, Analysis, digital devices.
Digital Forensics Ravneet Kaur, Amandeep Kaur Assistant Professor in Computer Science SDSPM College for Women, Rayya (Asr) Guru Nanak Dev University, India International Journal of Computer Applications
Forensics on the Windows Platform, Part Two
1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in
Forensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Microsoft Vista: Serious Challenges for Digital Investigations
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2008 Microsoft Vista: Serious Challenges for Digital Investigations Darren R. Hayes and Shareq Qureshi Seidenberg School of
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
CDFE Certified Digital Forensics Examiner (CFED Replacement)
Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics
DoD Cyber Crime Center
DoD Cyber Crime Center (DC3) Digital Forensics Challenge 2013 Team Northrop Grumman April 30, 2014 Jesse Mayer Northrop Grumman Cyber Security Operations Center DC3 Digital Forensics Challenge Annual Competition
A Short Introduction to Digital and File System Forensics
Antonio Barili Lab Dept. of Industrial and Information Engineering University of Pavia (Italy) [email protected] Every contact leaves a trace Culprit Scene Victim Edmond Locard (1877-1966) 2015 -
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
Open Source Digital Forensics Tools
The Legal Argument 1 [email protected] Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
To Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
COMPUTER FORENSICS IN THE BUSINESS ENVIRONMENT
COMPUTER FORENSICS IN THE BUSINESS ENVIRONMENT Neven Bratranek, Boris Bereček Teched Consulting Services Radnička cesta 80/VII, 10000 Zagreb, Croatia {nevenb, borisb}@teched.hr Robert Kopal Visoka poslovna
Journal of Digital Forensic Practice
Journal of Digital Forensic Practice Journal of Digital Forensic Practice, 2:57 61, 2008 Copyright Taylor & Francis Group, LLC ISSN: 1556-7281 print / 1556-7346 online DOI: 10.1080/15567280801958464 UDFP
Digital Forensics and Cyber Crime Datamining
Journal of Information Security, 2012, 3, 196-201 http://dx.doi.org/10.4236/jis.2012.33024 Published Online July 2012 (http://www.scirp.org/journal/jis) Digital Forensics and Cyber Crime Datamining K.
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
Determining VHD s in Windows 7 Dustin Hurlbut
Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for
Alternate Data Streams in Forensic Investigations of File Systems Backups
Alternate Data Streams in Forensic Investigations of File Systems Backups Derek Bem and Ewa Z. Huebner School of Computing and Mathematics University of Western Sydney [email protected] and [email protected]
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
The Importance of Data Retention
Section 2 Information Systems Security & Web Technologies and Security Abstract Information Security Leakage: A Forensic Analysis of USB Storage Disks A.Adam and N.L.Clarke Centre for Information Security
Master of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)
s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
OS KERNEL MALWARE DETECTION USING KERNEL CRIME DATA MINING
OS KERNEL MALWARE DETECTION USING KERNEL CRIME DATA MINING MONISHA.T #1 and Mrs.UMA.S *2 # ME,PG Scholar,Department of CSE, SKR Engineering College,Poonamallee,Chennai,TamilNadu * ME,Assist.professor,
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
FORENSIC ANALYSIS Aleš Padrta
FORENSIC ANALYSIS Aleš Padrta CESNET, CESNET-CERTS, FLAB CESNET Czech NREN operator CESNET-CERTS 2004 Established 2008 Accredited CSIRT FLAB Forensic LABoratory Established 6/2011 Support team for CESNET-CERTS
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
ThreatSpike Dome: A New Approach To Security Monitoring
ThreatSpike Dome: A New Approach To Security Monitoring 2015 ThreatSpike Labs Limited The problem with SIEM Hacking, insider and advanced persistent threats can be difficult to detect with existing product
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics
Introduction to Network Security Comptia Security+ Exam Domain 5 Computer Forensics Computer Forensics Forensics relates to the application of scientific knowledge and method to legal problems Investigating
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics
Digital Forensics Lecture 3 Hard Disk Drive (HDD) Media Forensics Current, Relevant Topics defendants should not use disk-cleaning utilities to wipe portions of their hard drives before turning them over
Analysis and Evaluation of the Windows Event Log for Forensic Purposes
Analysis and Evaluation of the Windows Event Log for Forensic Purposes CO42019 Honour Project UNDERGRADUATE PROJECT DISSERTATION Submitted in partial fulfilment of the requirements of Napier University
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
What you can do prevent virus infections on your computer
What you can do prevent virus infections on your computer A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily
Practical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
The Impact of U3 Devices on Forensic Analysis
The Impact of U3 Devices on Forensic Analysis R. Tank and P.A.H Williams School of Computer and Information Science Edith Cowan University Perth, Western Australia Abstract Flash and USB portable drives
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
Digital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
Compliance Guide: ASD ISM OVERVIEW
Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework
Modern Digital Forensics!!
ISA 785 Research in Digital Forensics Modern Digital Forensics!! ISA 785! Angelos Stavrou, George Mason University! Modern Digital Forensics What s New 2! New Intellectual property concerns! IP/Brand related
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
