Digital Forensic Techniques



Similar documents
Information Technologies and Fraud

EC-Council Ethical Hacking and Countermeasures

PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference

Hands-On How-To Computer Forensics Training

Incident Response and Computer Forensics

State of the art of Digital Forensic Techniques

Overview of Computer Forensics

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Where is computer forensics used?

Computer Forensic Capabilities

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Detection of Data Hiding in Computer Forensics. About Your Presenter

Impact of Digital Forensics Training on Computer Incident Response Techniques

Computer Hacking Forensic Investigator v8

Technical Procedure for Evidence Search

Computer Forensics. Securing and Analysing Digital Information

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/ Fax: 802/

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

Streamlined Malware Incident Response with EnCase

Legal Notices. AccessData Corp.

MSc Computer Security and Forensics. Examinations for / Semester 1

Digital Forensics for Attorneys - Part 2

Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics

Digital Forensics & e-discovery Services

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.

FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Why The Security You Bought Yesterday, Won t Save You Today

e-discovery Forensics Incident Response

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Computer Forensics as an Integral Component of the Information Security Enterprise

Open Source Digital Forensics Tools

Concepts of digital forensics

Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

InfoSec Academy Forensics Track

COMPUTER FORENSIC Ibrahim Khoury, Eralda Caushaj

How To Be A Computer Forensics Examiner

Digital Forensic Analyses of Web Browser Records

Certified Digital Forensics Examiner

Getting Ahead of Malware

About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics

Modern Digital Forensics!!

Digital Forensic Tools

WHITE PAPER: THREAT INTELLIGENCE RANKING

Unified Security, ATP and more

How To Customize An Orgsync App On Anorus Mobile Security Suite On A Microsoft Ipad Oracle 2.5 (Ios) On A Pc Orca 2.2 (Iphone) On An Android Orca2 (Ip

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

How To Do Digital Forensics

GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION

Scene of the Cybercrime Second Edition. Michael Cross

Endpoint Threat Detection without the Pain

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

Advanced Registry Forensics with Registry Decoder. Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference /03/2012

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Guidelines on Digital Forensic Procedures for OLAF Staff

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Digital Forensics. Module 4 CS 996

CERTIFIED DIGITAL FORENSICS EXAMINER

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

Evolving Threat Landscape

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

Practical Threat Intelligence. with Bromium LAVA

Acronis Backup & Recovery 11

Digital Forensics, ediscovery and Electronic Evidence

High End Information Security Services

Securing the endpoint and your data

Recovering Digital Evidence in a Cloud Computing Paradigm. Jad Saliba Founder and CTO

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

Certified Secure Computer User

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

Cyber Analysis Tools:

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

To Catch a Thief: Computer Forensics in the Classroom

A Short Introduction to Digital and File System Forensics

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

Practice Exercise March 7, 2016

Forensic Acquisition and Analysis of VMware Virtual Hard Disks

Framework for Live Digital Forensics using Data Mining

SECURITY BEGINS AT THE ENDPOINT

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

Transcription:

Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA

AGENDA Computer Forensics vs. Digital Forensics Digital Forensics Process Digital Forensic Approaches Digital Forensic Techniques Case Studies Questions CRISC CGEIT CISM CISA 9/21/2013 2

Computer Forensics vs. Digital Forensics CRISC CGEIT CISM CISA 9/21/2013 3

Computer Forensics vs Digital Forensics Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law Computer forensics is the science of locating, extracting, and analyzing types of data from difference devices, which specialists then interpret to serve as legal evidence 4

Digital Forensic Process CRISC CGEIT CISM CISA 9/21/2013 5

Digital Forensic Process Preparation Retention Identification Preservation Collection Examination Analysis Closure Presentation /Reporting Events Alerts Complaints Chain of Custody Forensic Acquisition Management Approved and Storage Hardware and Software Validation Filters Tools, Techniques and Scripts Data Mining Timeline Relationship Among Events Reports Supporting Files Testimonies Documentation 6

Digital Forensic Approaches CRISC CGEIT CISM CISA 9/21/2013 7

Digital Forensic Approaches Three main approaches Media Analysis OS, USBs, PDAs, Cell Phones, GPAs, Imaging, Time Line, Slack Space Code Analysis Malicious Code Review, Reverse Engineering Network Analysis Communication Traffic Patterns, Log, Path Tracing 8

Digital Forensics Techniques CRISC CGEIT CISM CISA 9/21/2013 9

Digital Forensic Techniques Acquisition Phase Chain of Custody Forensic Duplication Analysis Phase Recover Deleted Items Compressed files Signature Analysis Internet History Registry Analysis Hash Analysis Keyword Searching 10

Acquisition Phase Chain of Custody Why Layer of protection on a piece of evidence To proof in the court of law that evidence has not been tampered How Physical document that goes with the evidence 5 W (What, When, Why, Where, and Who) and an H (How) 11

Acquisition Phase Forensic Duplication Why How Avoid Spoliation; Guarantee the integrity of the evidence Plain copies of files and folders or ghost copy does not provide the data stored in Windows swap file, unallocated space and file slack. Use of write blockers SANS Investigative Forensics Toolkit SIFT, Encase, FTK, Sleuth Kit, X-Way Forensics 12

Analysis Phase - Recover Deleted Items Why Users often attempt to cover their tracks by deleting folders/files that are of interest How Using tools such as Encase, FTK to recover deleted files Open source tools such as Sleuth Kit or Autopsy(GUI); run on Unix platforms 13

Recover Deleted Items - Example 14

Analysis Phase - Compressed Files Why How Archive of information for easier transport Contents often ignored during scanning Use of forensic tools to mount the compressed files Export compressed files to physical drive and de compress; tedious; risky, sandbox environment, not on network 15

Analysis Phase - Signature Analysis Why How Tactic to hide data by changing the file extensions Sleuth Kit and Perl scripts to compare the contents of a file to a standard file containing headers and footers Forensic Tools such as Encase, loaded with predefined signatures. Report matching, mismatch and bad signatures http://www.garykessler.net/library/file_ sigs.html 16

File Signature - Example Name File Ext File Type File Category Signature Description letter.doc doc Word Document Document * JPEG Image Standard File, Archive EDRM-2-792.jpg jpg JPEG Picture Match File, Archive Vulnerability Report.pdf pdf Adobe PDF Document Match File DoNotIPs.xlsx xlsx MS Excel Spreadsheet Document\Spreadsheet Match File, Archive LogedLog.txt txt Text Document Match File, Archive Examples Unknown Folder 17

Why Analysis Phase - Internet History Web browsing history, cookies and temporary internet files How Location: Windows 7 - C:\Users\<username>\AppData\Local\M icrosoft\windows\temporary Internet Files Index.dat database for web URLs, search queries and recently opened files; index.dat analyzer to open Encase, FTK, Browser History 18

Internet History - Example 19

Analysis Phase - Registry Analysis Why References from windows event logs, application logs User behavior, most recent visited websites, most recent documents, installed software and much more Malware behavior How FTK Registry Viewer, Encase EnScripts Open source tools such as RegRipper 20

Registry Analysis - Example 21

Analysis Phase - Hash Analysis Why How Increases efficiency. Where to stop? Exclude files such as operating system files, program files not relevant to the case Facilitates de-duplication Identify potential malicious files Scripts The Sleuth Kit Hash set using Encase 22

Analysis Phase - Keyword Searching Why How To review particular data of interest within file, deleted files and slack space Dangerous; False positives Encase and FTK s Search Feature DtSearch Desktop PTK Forensics 23

Other Forensic Techniques Timeline Analysis Chronological system events Email and Instant Messaging Artifacts Memory Analysis Live forensics, open connections, running programs, temporal information Handheld Devices Acquisition and Analysis ios, Blackberry, Androids Malware Analysis Static and Dynamic Analysis Data Mining and Behavior Analysis Analyze from different perspectives Social Media Engineering use of trusted pretext to obtain information 24

Summary Digital Forensic Model Identify, Preserve, Collect, Examine, Analyze, Report Different Approaches Media, Code and Network Techniques File signatures, Hashing, Keyword Searching, Registry Analysis, Web Browsing activities GOAL High Integrity and Streamline Process 25

Case Studies CRISC CGEIT CISM CISA 9/21/2013 26

Case Study 1 Case Type Intellectual Property Theft Description - AMD accused four of its former employees for taking IP with them to NVIDIA. Which approach/techniques can be used in the investigation? Registry Files Email Artifacts Keyword Search Recover Deleted Files 27

Case Study 2 Case Type Misuse of Company s Resources Description IT team notices employee visiting illicit websites Which approach/techniques can be used in the investigation? Internet History for Visited Websites Keyword Searching File Signature Analysis 28

Case Study 3 Case Type Hacked System Description Stanford University Computer System Hacked Which approach/techniques can be used in the investigation? Internet History for Temporary Internet Files Timeline Analysis for Chronology of Events Registry Analysis to Analyze Events Keyword Search for Possible Data Breach Hashing and Malware Analysis for APT 29

References A Road Map for Digital Forensic Research. 2001 http://www.dfrws.org/2001/dfrws-rm-final.pdf Computer Forensics: An Overview by Frederick Gallegos, 2005, http://www.isaca.org/journal/past-issues/2005/volume- 6/Documents/jpdf0506-Computer-Forensics-An.pdf Cyber Crime Investigations by Anthony Reyes et al. Syngress Publishing, 2007 Access Data Guidance Software The Sleuth Kit http://regripper.wordpress.com/ http://www.dfresponse.com/computer-forensic-software.html http://en.wikipedia.org/wiki/list_of_digital_forensics_tools 30

QUESTIONS? CRISC CGEIT CISM CISA 9/21/2013 31