Linux in Law Enforcement



Similar documents
Open Source Data Recovery

Introduction to The Sleuth Kit (TSK) By Chris Marko. Rev1 September, Introduction to The Sleuth Kit (TSK) 1

Forensic Investigator. Module XI Linux Forensics

Hands on Post Mortem Forensics Analysis in SUSE Linux Enterprise Servers Technical Tutorial Session Length - 1 hour

GNU/LINUX Forensic Case Study (ubuntu 10.04)

Where is computer forensics used?

Disk and File System Analysis

Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics

Open Source and Incident Response

Lab III: Unix File Recovery Data Unit Level

Unix/Linux Forensics 1

Open Source Digital Forensics Tools

Using Open Source Digital Forensics Software for Digital Archives Workshop

MSc Computer Security and Forensics. Examinations for / Semester 1

Design and Implementation of a Live-analysis Digital Forensic System

Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+)

Digital Forensics For Unix. The SANS Institute

Computer Forensic Tools. Stefan Hager

CCE Certification Competencies

Recover Data Like a Forensics Expert Using an Ubuntu Live CD

A Day in the Life of a Cyber Tool Developer

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

Dr Michael Cohen. This talk does not represent my Employer. April 2005

Capturing a Forensic Image. By Justin C. Klein Keane <jukeane@sas.upenn.edu> 12 February, 2013

Guide to Computer Forensics and Investigations, Second Edition

Comparing and Contrasting Windows and Linux Forensics. Zlatko Jovanovic. International Academy of Design and Technology

A Short Introduction to Digital and File System Forensics

Computing forensics: a live analysis

Lab V: File Recovery: Data Layer Revisited

What is Digital Forensics?

Computer Forensics using Open Source Tools

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Barracuda Yosemite Server Backup

EC-Council Ethical Hacking and Countermeasures

CDFE Certified Digital Forensics Examiner (CFED Replacement)

Computer Forensics Today

Digital Forensic Techniques

Restoring a Suse Linux Enterprise Server 9 64 Bit on Dissimilar Hardware with CBMR for Linux 1.02

NIST CFTT: Testing Disk Imaging Tools

Forensic Acquisition and Analysis of VMware Virtual Hard Disks

Digital Forensics Tutorials Acquiring an Image with FTK Imager

TUXERA NTFS for Mac USER GUIDE 2/13. Index

Information Technologies and Fraud

USB 2.0 Flash Drive User Manual

CSI Crime Scene Investigations

Software Requirements Specification. GParted. for. Requirements for Version Prepared by Bill Karatzidis

Mac Marshal: A Tool for Mac OS X Operating System and Application Forensics

information security and its Describe what drives the need for information security.

Technical Note TN_146. Creating Android Images for Application Development

Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test. Reports; The Computer Forensics Tool Catalog Website: Connecting

CYBER FORENSICS (W/LAB) Course Syllabus

Recovering Data from Windows Systems by Using Linux

A Practitioner's Guide to Linux as a Computer Forensic Platform

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd

CS197U: A Hands on Introduction to Unix

Digital Forensics & e-discovery Services

Acronis True Image 9.1 Pro/Light for Linux

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

System deployment and bare metal recovery by Clonezilla

PARALLELS SERVER 4 BARE METAL README

Incident Response and Computer Forensics

CASE STUDY Open Source Digital Forensics

Is the Open Way a Better Way? Digital Forensics using Open Source Tools

Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC

Lukas Limacher Department of Computer Science, ETH. Computer Forensics. September 25, 2014

Guide to Computer Forensics and Investigations, Second Edition

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

Linux Overview. The Senator Patrick Leahy Center for Digital Investigation. Champlain College. Written by: Josh Lowery

Enterprise-Class Virtualization with Open Source Technologies

iphone Forensics with F/OSS A HOWTO for iphone Forensics with free and/or open source tools

Linux System Administration on Red Hat

FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres

Forensic Analysis of a Sony Play Station 3 Gaming Console

Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A. DEMO Version

EnCase Portable Demo P A G E 0

Automating the Computer Forensic Triage Process With MantaRay

PORTABLE OPERATING SYSTEMS AND INFORMAITON SECURITY RISKS

Incident Response and Forensics

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

Installing OCFA on Ubuntu. Practical installation procedures, Installing The Open Computer Forensics Architecture on Ubuntu

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Recovering Data from Windows Systems by Using Linux

Ubuntu Professional Training Course Overview (E-learning, Ubuntu LTS)

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

SIRIS. Bare Metal Restore Guide

FALSE ALARM? Incident Management Case Study. Carlos Villalba

EnCase 7 - Basic + Intermediate Topics

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

COEN 152 / 252 Lab Exercise 1. Imaging, Hex Editors & File Types

USB Bare Metal Restore: Getting Started

EnCase Endpoint Investigator Fundamentals 5/25/2016

Guide to Computer Forensics and Investigations, Second Edition

Platform as a Service and Container Clouds

Transcription:

Linux in Law Enforcement It's all about CONTROL Barry J. Grundy CALUG MEETING JUNE 2008

!! Disclaimer!! This presentation is not sponsored by any organization of the US Government I am here representing only myself The opinions stated in this presentation are my own and do NOT represent any official position of the US Government or any Government agency

Linux in Law Enforcement Agenda Who is this guy? What is a computer crime? What is computer forensics? Why use Linux and Open Source? Technical Arguments Legal Arguments What Linux and Open Source tools are available? Okay...so how is it done under Linux?

What is Computer Crime When is a Crime a Computer Crime? When... A computer (computer services or intellectual property) is the TARGET of a crime. A computer is a principal INSTRUMENTALITY of a crime. Or... A computer is INCIDENTAL to a crime.

Computer Forensics?

What is Computer Forensics? Forensics (Webster s Abridged) The application of scientific knowledge and procedures to legal problems; especially : scientific analysis of evidence (as from a crime scene)

What is Computer Forensics? Computer Forensics has branched : Classic Computer Forensics Data Recovery Pull the plug Computer Intrusion analysis Lots of Correlation Volatile data (no plug pulling!) Electronic Discovery ( E-Discovery ) Civil Litigation (IP, etc.) Drives the industry

What is Computer Forensics? At its Core regardless of case: Acquisition collection of evidence. Drive imaging... Volatile data recovery, log recovery, etc. Acquisition is the heart of computer forensics. A plausible case derives from this step.

What is Computer Forensics? At its Core regardless of case: Analysis Multiple layers Physical through Application Looking for: Inculpatory Evidence Exculpatory Evidence Tampering Data recovery, temporal analysis, etc.

What is Computer Forensics? At its Core regardless of case: Reporting and Testimony Driven largely by jurisdiction. Can be automated by the forensic tools used. Level of detail and format depends on the audience or customer. This is DIFFERENT than Documentation.

Why Linux for Forensic Examinations? It's Free! (Which is why I started using it...)

Why Linux for Forensic Examinations? But really it's because of... Total Control

Why Linux for Forensic Examinations? Direct control of all attached hardware. Control of all device (and FS) permissions. Read/Write/Execute (mount options) Built in disk image and analysis capabilities Many ported and native forensic utilities available.

Why Linux for Forensic Examinations? Support for multiple file systems Ext2 / Ext3, etc. (Linux Native) Fat 16 (msdos) Fat 32 (vfat) NTFS (ntfs-3g) XFS UFS HFS Many more... (most are native to kernel)

Why Linux for Forensic Examinations? Maximum Flexibility. Vmware Wine/Cygwin/CoLinux (AndLinux) Legacy hardware support. Endless support base. USENET Web LUGS

Why Linux for Forensic Examinations? Provides an alternative platform for crossverification and validation Open source tools (legal argument) Different set of issues than Windows Notice the word different Testing environment for hardware and software.

Why Linux for Forensic Examinations? How about: Just Plain Powerful? Power of CLI! Speed (vs. GUI...really!) Log parsing (grep/sed/awk vs. Notepad...) Granular command control More intuitive scripting it's just BASH.

Superman? Linux will NOT solve all your forensic woes... Steep learning curve (for new users). Mainstream software availability. Linux assumes you know what you are doing. (Age old danger of root ). Starting to lose some control with Desktop orientation...see Fedora/Ubuntu.

Open Source Legal Argument http://www.digital-evidence.org/papers/opensrc_legal.pdf Admissibility of Evidence: Previously based on Frye Test Peer review and Journal published Now based on Daubert Test Not every forensic discipline had access to a peer reviewed scientific journal Offered additional quality tests

Open Source Legal Argument Daubert Test addresses: Testing (false negatives/positives) Error Rate Publication Acceptance generally accepted relevant scientific community Digital evidence can also be seen as testimony under the Federal Rules of Evidence

Open Source Legal Argument Open source programs address these issues: Access to code improves testing in code review Error rates can be reported through open bug tracking or code diffs in releases. Bug tracking is not driven by revenue. Published abstraction techniques allow the analyst to decide on the veracity of findings NTFS file name analysis, for example. What is this tool doing?

Linux for Forensic Examinations How is it done?

Forensic Utilities Included in Linux Acquisition Tools: dd disk imaging, carving, splicing md5sum and sha1sum hashing tools Analysis Tools: fdisk and sfdisk disk geometry find and grep - search tools xxd hex editor file magic! Tons of other stuff...

Forensic Utilities available for Linux Acquisition Tools: dcfldd/dc3dd DoD version of dd with logging and hash window functions. ddrescue/dd_rescue error handling dd. ewfacquire libewf project to work with EWF images (EnCase). aimage Advanced Forensic Format (afflib). Air/Adepto/GRAB GUI frontends to dd/dcfldd md5deep recursive hashing tool. SMART not open source, but important for Linux...

Forensic Utilities available for Linux Analysis Tools: The SleuthKit (TSK) the big daddy of open source computer forensics. Provides a suite of CLI tools for all layers of analysis (short of application). Carving Tools: Scalpel / Foremost / Photorec More at : http://www.opensourceforensics.org SMART not open source, but important for Linux...

Forensic Utilities available for Linux Analysis Tools: The SleuthKit (TSK) Disk: disk_stat, disk_sreset Media Mgmt: mmls, mmstat File System: fsstat, ffind, fls istat, ifind, ils, icat dstat, dls, dcat, dcalc jls, jcat Other tools: hfind, sorter, mactime

Forensic Linux Boot Disks Bootable CD's for Forensics: Helix: http://www.e-fense.com/helix/ Based on Knoppix Forensic adjustments Forensic software, including TSK Has a real nice Windows side for live acquisitions Free, and a good starting point for forensic exploration.

Forensic Linux Boot Disks Bootable CD's for Forensics: SMART for Linux http://www.asrdata2.com/ Slackware and Ubuntu versions Forensically optimized Forensic software, including TSK Evaluation version SMART Free CD, But SMART app is $$ Also see the FBCD: http://www.forensicbootcd.com/

Demo of Forensics? What next? Your Choice! Image recovery from NTFS (TSK) File sorter (TSK) Carving (Photorec or Foremost) Boot Disk Demo? SMART on Virtual Box Helix on Virtual Box or just Questions?

It's all about Control