Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)



Similar documents
Unix/Linux Forensics 1

MSc Computer Security and Forensics. Examinations for / Semester 1

Incident Response and Computer Forensics

Open Source and Incident Response

Computer Forensics using Open Source Tools

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Computer Forensic Tools. Stefan Hager

Design and Implementation of a Live-analysis Digital Forensic System

Where is computer forensics used?

Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

Computer Forensics Tracking the Cyber vandals

Digital Forensic Techniques

Israel Aladejebi Computer Forensics Century College Information Technology Department

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

EC-Council Ethical Hacking and Countermeasures

PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference

Comparing and Contrasting Windows and Linux Forensics. Zlatko Jovanovic. International Academy of Design and Technology

Operating Systems Forensics

Digital Forensics Tutorials Acquiring an Image with FTK Imager

CRYPTUS DIPLOMA IN IT SECURITY

EnCase 7 - Basic + Intermediate Topics

information security and its Describe what drives the need for information security.

Digital forensic techniques for static analysis of NTFS images

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Open Source Security Tool Overview

Introduction to The Sleuth Kit (TSK) By Chris Marko. Rev1 September, Introduction to The Sleuth Kit (TSK) 1

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Security Incident Investigation

System Security Policy Management: Advanced Audit Tasks

What is Digital Forensics?

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

Incident Response. Six Best Practices for Managing Cyber Breaches.

EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE

Digital Forensics. Larry Daniel

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

DoD Cyber Crime Center

Getting Physical with the Digital Investigation Process

Computing forensics: a live analysis

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

CHAD TILBURY.

Computer Forensic Specialist. Course Title: Computer Forensic Specialist: Storage Device & Operating Systems

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Practice Exercise March 7, 2016

Snare System Version Release Notes

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection

AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS

Incident Response and Forensics

Computer Forensics as an Integral Component of the Information Security Enterprise

Vulnerability Assessment Lab

Penetration Testing with Kali Linux

Computer Forensics introduction part A

CERIAS Tech Report GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford

Penetration Testing Workshop

Course Title: Computer Forensic Specialist: Data and Image Files

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

Issues in Computer Forensics. Sonia Bui Michelle Enyeart Jenghuei Luong

Concepts of digital forensics

Digital Evidence Search Kit

Linux Overview. The Senator Patrick Leahy Center for Digital Investigation. Champlain College. Written by: Josh Lowery

Guide to Computer Forensics and Investigations, Second Edition

Windows 7: Current Events in the World of Windows Forensics

Computer Forensics Principles and Practices

ANTI-HACKER TOOL KIT. ourth Edition

FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres

June 2014 WMLUG Meeting Kali Linux

Detection of Data Hiding in Computer Forensics. About Your Presenter

FORENSIC ANALYSIS Aleš Padrta

Windows Operating Systems. Basic Security

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

That Point of Sale is a PoS

Digital Forensic Tool for Decision Making in Computer Security Domain

How To Fix A Snare Server On A Linux Server On An Ubuntu (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking

Computer Forensics Basics, First Responder, Collection of Evidence

Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics

Acronis Backup & Recovery 10 Server for Linux. Command Line Reference

Overview of Computer Forensics

INFORMATION SECURITY TRAINING CATALOG (2015)

Vulnerability analysis

A Day in the Life of a Cyber Tool Developer

Codes of Connection for Devices Connected to Newcastle University ICT Network

Open Source Digital Forensics Tools

4. Getting started: Performing an audit

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Scene of the Cybercrime Second Edition. Michael Cross

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Transcription:

s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

s Unix Has a criminal offense taken place? You need to know what exactly happened (was it just a defacement or something more?) You need proof that something took place. (was John Doe using his computer at home as he was saying, or was he out robbing the bank)

s Unix What to do before touching a system Why do we think is necessary here? (Hacked, Stolen data, Illegal content or activities) What is the purpose of the system? (Web/database/file-server etc.) What OS? What services should normally be running?

s Unix There are three important A s in computer :

s Unix the without altering or damaging the original Pull the plug (freezes the system, but might loose information) Impossible on important running server? Beware of changed binary files Make complete copy of drive (Unix: dd, preserves everything) Alternatives 1 Examine using software on the suspected system 2 Verify software 3 Use CD with software 4 Boot with CD 5 Pull the plug, then use work station, working on write protected disk/disk image

s Unix the Chain of Custody Who collected it, how, where How stored Who took it out of storage Documentation (very important) Create hash of entire drive and of files. Use both MD5 and SHA

s Unix the data without modifying it work on a copy calculate hash before analysis documentation Network analysis and network logs are very important

s Unix It is almost impossible to completely delete the contents of a hard disk completely fill disk with random zeros and ones several times Even then, it might be possible to retrieve the original data

s Unix Footprints from unusual activity not only stand out, they are likely to stand out for a long time because most information on a system is rarely touched.

s Unix MAC-times: Modify, Access, Change/Create Unix filesystems(stat): Modify, last time the file content was changed Access, last time the file was accessed Change, last time meta-data of the file changed FAT and NTFS: Modify, last time the file content was changed Access, last time the file was accessed Create, creation time of the file

s Unix Example from a computer: A man had downloaded and forwarded child pornography Claimed he had never looked at the pictures Access times where several days older than the creation times for the pictures He confessed that he had looked at them.

s Unix Extract the partitions File system timeline (mac-robber and mactime) From timeline study, create a list of interesting words Make a strings file from your image(s) and search for your interesting words Extract unallocated datablocks and slack-space Search unallocated/slack-space for interesting words too

s Unix Can give you important clues So we need to study it closely Timeline can also be made from application logs! Merge all into one picture - log2timeline

s Unix Some important spots to look for MFT (NTFS Master File Table) Recycle bin (hidden INFO-file) Index.dat (IE cache) Registry Log files (as for any OS)

s Unix ifconfig, ps, netstat /proc (Linux only) lsmod (shows Linux kernel modules) strings (text in binary files) logfiles Unix

s Unix The Coroner s Toolkit graverobber, collects file info, processes, system info. Option: -c corpse... mactime,mac-robber (gives chronological order, timeline) unrm (copies free space to file) Lazarus, identifies contents of a block TASK, tool built on top of TCT utilities and TCT. Knows both Unix and Widows filesystems. Autopsy, aka the Sleuth Kit, HTML-based interface for TASK Foremost, recover files, (US Air Force)

s Unix tests will audit remotely a given network and determine whether bad guys may break into it, or misuse it in some way. nmap, network mapper, commercial vulnerability scanner OpenVAS, vulnerability scanner and manager Metasploit, penetration, performs actual exploits scan reports can be loaded by Metasploit and used as configuration for a penetration test

s Unix vulnerability scanner Tests systems, networks and applications for weaknesses Checks patching and configuration Detects malware and potentially unwanted and unmanaged software 79239 plugins, covering 33411 unique CVE(Common Vulnerabilities and Exposures) IDs and 23311 unique Bugtraq IDs