Beyond files forensic OWADE cloud based forensic



Similar documents
Passcape Software. DPAPI flaw. Vulnerability of DPAPI data protection in Win2K, Win2K3, Windows Server 2008, and Windows Server 2012

give me the password and I'll rule the world dpapi, what else?

Windows passwords security

RemotelyAnywhere Getting Started Guide

Install and End User Reference Guide for Direct Access to Citrix Applications

Criteria for web application security check. Version

Manual for Android 1.5

BlackBerry Business Cloud Services. Administration Guide

Remote Desktop Web Access. Using Remote Desktop Web Access

Flexible Identity Federation

Dashlane Security Whitepaper

SENSE Security overview 2014

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

ipad in Business Security

How to Configure Captive Portal

LBSEC.

1. Scope of Service. 1.1 About Boxcryptor Classic

Cain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist

Key & Data Storage on Mobile Devices

Full version is >>> HERE <<<

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Facebook Smart Card FB _1800

Getting Started with PRTG Network Monitor 2012 Paessler AG

Security Architecture Whitepaper

Deploying EFS: Part 1

Chapter 7 Transport-Level Security

iphone in Business Security Overview

Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client.

Web Conferencing Version 8.3 Troubleshooting Guide

SSL BEST PRACTICES OVERVIEW

CLOUD STORAGE FORENSICS MATTIA EPIFANI SANS EUROPEAN DIGITAL FORENSICS SUMMIT PRAGUE, 7 OCTOBER 2013

System Administration Training Guide. S100 Installation and Site Management

Access Your Cisco Smart Storage Remotely Via WebDAV

Citrix Access on SonicWALL SSL VPN

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Advanced Install & Configuration Guide

SAML-Based SSO Solution

Sync Security and Privacy Brief

VPN Web Portal Usage Guide

Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014

Fairsail REST API: Guide for Developers

Configuring Authentication for Microsoft Windows

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

An identity management solution. TELUS AD Sync

Web-Based Data Backup Solutions

Paxera Uploader Basic Troubleshooting

How To Encrypt Data With Encryption

A Guide For Reviewers. A Guide For Reviewers

Getting Started Guide

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

Installation Guide Version 3.0

Digital Forensic Analyses of Web Browser Records

More details >>> HERE <<<

2X Cloud Portal v10.5

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Reading an sent with Voltage Secur . Using the Voltage Secur Zero Download Messenger (ZDM)

Retrieving Internet chat history with the same ease as a squirrel cracks nuts

Additional details >>> HERE <<<

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Crypho Security Whitepaper

DroboAccess User Manual

Additional information >>> HERE <<<

How To Set Up A Xerox Econcierge Powered By Xerx Account

Information Rights Management in SharePoint. by André Vala

Salesforce1 Mobile Security Guide

Copyright: WhosOnLocation Limited

Deploying iphone and ipad Security Overview

Using Voltage Secur

E21 Mobile Users Guide

Attacking NTLM with Precomputed Hashtables

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Using the owncloud Android App

The increasing popularity of mobile devices is rapidly changing how and where we

Uncovering the Covered Tracks: Finding What s Left Behind JAD SALIBA FOUNDER & CTO

From Delphi to the cloud

Forensic analysis of iphone backups

Installing the Citrix Online Plug-In

Unified Meeting 5 User guide for MAC

User Guide FOR TOSHIBA STORAGE PLACE

FileCloud Security FAQ

High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Security for mobile apps

Enterprise Remote Control 5.6 Manual

Remote Access Services Apple Macintosh - Installation Guide

RMFT Web Client User Guide

User Guide. Version R91. English

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Remote Access End User Reference Guide for SHC Portal Access

UMMS SSL VPN Instructions

Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS)

User Guide. WS_FTP Server

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

2007 Microsoft Office System Document Encryption

Xerox DocuShare Security Features. Security White Paper

Transcription:

Beyond files forensic OWADE cloud based forensic Elie Bursztein Stanford University Ivan Fontarensky Cassidian Matthieu Martin Stanford University Jean Michel Picod Cassidian 1

The world is moving to the cloud E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 2

2.7 millions photos are uploaded to Facebook every 20 minutes E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 3

100 millions new files are saved on Dropbox every day E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 4

Data are moving to multiple services Hard drive emails contacts photos Cloud Hotmail LinkedIn Facebook E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 5

Impact on the forensic field There are more data which are harder to reach Dealing with cloud data force us to reinvent forensic E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 6

Let s do cloud forensics E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 7

What is cloud forensics? E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 8

Facebook credentials as a use case Syskey Windows User Password DPAPI blob-key credentials Registry SAM (hash) DPAPI master-key IE DPAPI Blob Facebook Getting Facebook credentials require to bypass 4 layer of encryption E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 9

Focus of this talk xw Show you how to bypass the encryption layers and get the data you want E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 10

Introducing OWADE Dedicated to cloud forensics Decrypt / recovers DPAPI secrets Browsers history and websites credentials Instant messaging creds Wifi data Free and open-source E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 11

OWADE Overview E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 12

Outline File base forensics refresher The Windows crypto eco-system Wifi data and Geo-location Recovering browser data Recovering instant messaging data Acquiring cloud-data Demo E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 13

File based forensic refresher E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 14

Not all files are born equal Type of file Standard In the trash Deleted how to recover it copy undelete utility file carving Wiped call the NSA :) E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 15

Windows registry Hardware information Softwares installed with version and serials Windows credentials (encrypted) E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 16

Windows crypto E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 17

Many software use Windows Crypto APIs E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 18

The Windows crypto eco-system Crypto API DPAPI Credential Manager SAM E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 19

Windows Crypto API Basic cryptographic blocks Cipher: 3DES, AES Hash functions: SHA-1 SHA256, HMAC PKI: public keys and certificates (X.509) E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 20

The Security Account Manager (SAM) Store Windows user credentials located in the registry Encrypted with the SYSKEY Password are hashed E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 21

Windows Password Hashing functions Two hash functions used LM hash function (NT, 2K, XP, VISTA) weak NTLM (XP, Vista, 7) Password are not salted E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 22

LM hash weakness Use only upper-case Hash password in chunk of 7 characters mypassword LMHash(mypassw) + LMHash(ord) Password key-space: 69^7 (at most) E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 23

Rainbow Tables Pre-compute all the possible passwords Time-Memory trade-off Rainbow tables of all the LM hash are available E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 24

How OWADE Works Extract Usernames and password hashes LM hashes available? use John/Rainbow tables to get the pass in uppercase use NTLM hashes to find the password cases Try to crack the NTLM using John/Rainbow table E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 25

What if we can t crack the NTLM hash :( (need a sad baby face here) If the password is too strong we can t recover it E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 26

Everything is not lost because of how DPAPI works (smilling baby face) but we can still decrypt DPAPI secret (sometime) E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 27

The Data Protection API Ensure that encrypted data can t be decrypted without knowing the user Windows password Blackbox crypto API for developers: Encrypt data DPAPI blob Decrypt DPAPI blob data E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 28

DPAPI derivation scheme SHA1(password) pre-key User master-key blob key blob key blob key DPAPI blob DPAPI blob DPAPI blob E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 29

Master-key GUID DPAPI blob Master key Cipher + key pre-key SHA1(password) User IV + Salt Master key blob key Additional entropy Software E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 30

Bypassing the user password cracking If we can t crack the password we need its SHA1 This SHA1 is stored in the hibernate file OWADE use Moonsol to recover it E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 31

Bypassing the user password cracking If we can t crack the password we need its SHA1 This SHA1 is stored in the hibernate file OWADE use Moonsol to recover it There is an OWADE plugin for that! E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 31

DPAPI additional entropy Software can supply an additional entropy Act as a key (need for decryption) Force us to understand how it is generate for each software Can be used to tie data to a specific machine (i.e Netbios name) E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 32

Credential Manager Built on top of DPAPI Handle transparently the encryption and storage of sensitive data Used by Windows, Live Messenger, Remote desktop... E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 33

Credstore type of credentials Type of credential Encryption Example of application Generic password DPAPI + fixed string Live messenger HTTP auth (IE) Domain password in clear Netbios Domain certificate hash of certificate Certificate Domain visible password DPAPI + fixed string Remote access.net passport E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 34

WiFi data E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 35

Wifi data Info stored for each access point Mac address (BSSID) Password (encrypted) Last time of access Wifi data are stored in Registry (XP) XML file and Registry (Vista/7) E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 36

Decrypting WiFi password Encrypted with DPAPI Access point shared among users Encrypted with the System account But the system account has no password... What is my DPAPI key??? E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 37

Decrypting WiFi password Use a LSASecret as DPAPI key Recovered with Windows Credentials E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 38

Where are you? We ve recovered access point keys but where are they? Also found by Sami Kemvar E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 39

Where are you? We ve recovered access point keys but where are they? There is an app for that! Also found by Sami Kemvar E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 39

HTML5 Geo-location protocol E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 40

HTML5 Geo-location protocol E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 40

HTML5 Geo-location protocol E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 40

Behind the curtain E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 41

Nothing is ever easy Google started to restrict queries in June :( Fortunately for us there are other API :) E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 42

Geo-location API restrictions Requires 2 MAC close from each other The MAC and IP location need to be close None see http://elie.im/blog/ for more information E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 43

Browsers E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 44

Firefox > 3.4 Passwords location: signons.sqlite encryption: 3DES + Master password History URLs: places.sqlite Forms fields: formhistory.sqlite E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 45

Decrypting Firefox password pass salt User user key: HMAC-SHA1(salt, pass) key3.db encrypted key master key: 3DES(userkey, enckey) encrypted pass Site password: 3DES (master key, enc pass) signon.sqlite E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 46

Shopping at Amazon? E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 47

How about a nice kindle? E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 48

How about a nice kindle? E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 48

Every form field is recorded E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 49

Configuring a Linksys? E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 50

Again the key is recorded E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 51

Form history leak a lot of information Shipping address Wifi key Credit card information Email Search history E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 52

Preventing field recording To tell the browser to not record a field use the tag autocomplete= off E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 53

Passwords location: registry encryption: DPAPI + URL as salt History Internet Explorer URLs: Index.dat Forms fields: E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 54

Decrypting Internet Explorer passwords SHA1(URL) URL Registry SHA1(URL) URL (dpapi entropy) URL List DPAPI Blob Site password Registry E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 55

Passwords location: login data (sqlite) Chrome encryption: DPAPI History URLs: History (sqlite) Forms fields: Web data (sqlite) E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 56

Passwords location: keychain.plist Safari encryption: DPAPI + fixed string as entropy History URLs: History.plist (Property list format) Forms fields: Form Value.plist E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 57

Browsers takeaway Internet Explorer is the most secure. If you don t know the URL you can t recover the pass Firefox is the worst Passwords encryption not tied to the Windows pass Login are encrypted in signons.sqlite not in formhistory.sqlite E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 58

Private mode Most bugs are fixed Requires to be creative SSL OCSP requests File carving Potential techniques Analyze the hibernate file See: http://ly.tl/p16 for more information on private mode E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 59

Instant messaging E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 60

Skype Encryption custom Difficulty extreme Location registry + config.xml E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 61

Decrypting Skype passwords DPAPI Blob Registry pre-key AES key: SHA1(pre-key) encrypted credential Login pass cracking MD5(login\nskyper\npassword) config.xml E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 62

Google Talk Encryption DPAPI + custom (salt) Difficulty Hard Location registry E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 63

Salt derivation algorithm overview String: 0xBA0DA71D Windows account name Registry computer Netbios name Registry DPAPI Blob Registry E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 64

Microsoft Messenger Encryption DPAPI or Credstore Difficulty Medium Location version dependent E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 65

Windows Messenger by version Version Storage encryption 5 Registry Base64 encoded 6 Credstore Credstore 7 Registry x2 DPAPI x 2 Live Credstore Credstore E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 66

amsn Encryption DES key: substr(login. dummykey, 8) Difficulty easy Location config.xml E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 67

9talk Encryption XOR key: 9 Difficulty trivial Location user.config E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 68

Trillian Encryption Base 64 +XOR key: fixed string Difficulty trivial Location user.config E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 69

Pidgin Encryption Clear aka encryt-what? Difficulty none Location account.xml E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 70

Paltalk Encryption Custom Difficulty difficult (offline) Location registry E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 71

Paltalk encryption algorithm VolumeSerial Number Paltalk account name 01234567 myusername m0y1u2s3e4r5n6a7me x 3 Registry encrypted password ci: yyyzi - asciicode(s-boxn-i) yyyz yyyz yyyz yyyz Registry E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 72

Messenger take away If the Skype password is strong you can t recover it Gtalk and Paltalk are the only ones to use computer information 3rd party software are the least secure E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 73

Conclusion People moving to the cloud means more data that is harder to get Forensics needs to evolve to cope with this OWADE is the first tool dedicated to cloud forensic Decrypt the 4 major browsers data Decrypt Instant messaging credentials Open-source E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 74

Download OWADE Follow-us on Twitter @elie, @owade Donate to OWADE to support it! E. Bursztein, I. Fontarensky, J.M. Picod, M. Martin Beyond files recovery: OWADE cloud based forensic 75