Digital Forensics. Tom Pigg Executive Director Tennessee CSEC



Similar documents
Guide to Computer Forensics and Investigations, Second Edition

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

Incident Response and Computer Forensics

Developing Computer Forensics Solutions for Terabyte Investigations

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Course Title: Computer Forensic Specialist: Data and Image Files

Digital Forensics Tutorials Acquiring an Image with FTK Imager

EC-Council Ethical Hacking and Countermeasures

CYBER FORENSICS (W/LAB) Course Syllabus

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

CTC 328: Computer Forensics

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

Digital Forensics. Module 4 CS 996

winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR

AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS

COEN 152 / 252 Lab Exercise 1. Imaging, Hex Editors & File Types

Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics

Forensic Acquisition and Analysis of VMware Virtual Hard Disks

ACE STUDY GUIDE. 3. Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2? - Properties Pane

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Where is computer forensics used?

Comparing and Contrasting Windows and Linux Forensics. Zlatko Jovanovic. International Academy of Design and Technology

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

Technical Procedure for Evidence Search

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/ Fax: 802/

Lab III: Unix File Recovery Data Unit Level

Impact of Digital Forensics Training on Computer Incident Response Techniques

CCE Certification Competencies

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Significance of Hash Value Generation in Digital Forensic: A Case Study

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

Computer Hacking Forensic Investigator v8

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Determining VHD s in Windows 7 Dustin Hurlbut

State of the art of Digital Forensic Techniques

Forensically Determining the Presence and Use of Virtual Machines in Windows 7

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

Design and Implementation of Digital Forensics Labs:

Guide to Computer Forensics and Investigations, Second Edition

FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

What s new in 6.1. Veeam Backup & Replication

Microsoft Vista: Serious Challenges for Digital Investigations

Virtualization Forensics: Acquisition and analysis of a clustered VMware ESXi servers

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Forensics on the Windows Platform, Part Two

Maintaining a Microsoft Windows Server 2003 Environment

Computer Forensics. Securing and Analysing Digital Information

Legal Notices. AccessData Corp.

Practice Exercise March 7, 2016

Design and Implementation of a Live-analysis Digital Forensic System

Computer Forensic Capabilities

VANGUARD ONLINE BACKUP

COMPREHENSIVE STUDY OF DIGITAL FORENSICS

PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120

VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.

Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS)

Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374

STELLAR PHOENIX for Novell NetWare Data Recovery Software User Manual

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Computer Forensics as an Integral Component of the Information Security Enterprise

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

Digital Forensics & e-discovery Services

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide

The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities

MS 50292: Administering and Maintaining Windows 7

User Manual. Published: 12-Mar-15 at 09:36:51

Digital Evidence Search Kit

Live System Forensics

EnCase 7 - Basic + Intermediate Topics

Lab 7. Answer. Figure 1

National District Attorneys Association National Center for Prosecution of Child Abuse. Computer Forensics for Prosecutors

Minnesota State Community and Technical College Detroit Lakes Campus

How To Get A Computer Hacking Program

A STUDY OF FORENSIC IMAGING IN THE ABSENCE OF WRITE-BLOCKERS

Out of Harms Reach -A Whitepaper on Online Backup

Introduction to Computer Forensics ITP 499 (3 Units)

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Incident Response and Forensics

Web-Based Data Backup Solutions

MSc Computer Security and Forensics. Examinations for / Semester 1

NIST CFTT: Testing Disk Imaging Tools

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

An overview of IT Security Forensics

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Maintaining a Microsoft Windows Server 2003 Environment

Enterprise Backup Overview Protecting Your Most Important Asset

Transcription:

Digital Forensics Tom Pigg Executive Director Tennessee CSEC

Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze /investigates data that can be retrieved from a computer s hard disk or other storage media Yields information about how a perpetrator or an attacker gained access to a network

Definitions Data recovery Recovering information that was deleted by mistake or lost during a power surge or server crash Uses computer forensics techniques to retrieve information that was lost Recover data that was intentionally deleted

Computer Investigations Computer investigations and forensics falls into two distinct categories Public investigations Private or corporate investigations Public investigations Involve government agencies responsible for criminal investigations and prosecution Organizations must observe legal guidelines

Computer Investigations Private or corporate investigations Deal with private companies, Aren t governed directly by criminal law Governed by internal policies that define expected employee behavior and conduct in the workplace Investigations are usually conducted in civil cases

Digital Forensics Role of digital forensics professionals is to gather evidence to prove that a suspect committed a crime or violated a company policy

Investigation Plan Prepare a forensics workstation Obtain the evidence Make a forensic copy of the evidence Return the evidence to a secure container Process the copied evidence with computer forensics tools

A workstation Digital Forensics Lab A write-blocker device Setup Computer forensics acquisition tool Computer forensics analysis tool Target drive to receive the source or suspect disk data

Acquiring the Image First rule of Digital forensics Preserve the original evidence Conduct your analysis only on a copy of the data

Analyzing the Image Recover data from: Deleted files File fragments Complete files Slack Unpartitioned Space Voids between partitions Deleted files linger on the disk until new data is saved on the same physical location

Analyzing the Image Search for keywords of interest in the case Export the data important to the case Generate a report of your activities

Validating Data Most critical aspect of computer forensics Requires using a hashing algorithms Validation techniques CRC-32, MD5, and SHA-1 to SHA-512

Hash Algorithms Cyclic Redundancy Check (CRC) Mathematical algorithm that determines whether a file s contents have changed Not considered a forensic hashing algorithm Message Digest 5 (MD5) Mathematical formula that translates a file into a hexadecimal code value, or a hash value If a bit or byte in the file changes, it alters the digital hash

Hash Algorithms Three rules for forensic hashes: You can t predict the hash value of a file or device No two hash values can be the same If anything changes in the file or device, the hash value must change

Understanding File Systems File system gives OS a road map to data on a disk Type of file system an OS uses determines how data is stored on the disk When you need to access a suspect s computer to acquire or inspect data you should be familiar with the computer s platform

Understanding File Systems In Microsoft file structures, sectors are grouped to form clusters Storage allocation units of one or more sectors Clusters are typically 512, 1024, 2048, 4096, or more bytes each Hidden partitions or voids are large unused gaps between partitions on a disk Partition gap is unused space between partitions

Understanding File Systems Microsoft OSs allocate disk space for files by clusters, which can results in drive slack Unused space in a cluster between the end of an active file and the end of the cluster Can examine a partition s physical level with a disk editor: Norton DiskEdit, WinHex, or Hex Workshop

Compression NTFS provides compression Under NTFS, files, folders, or entire volumes can be compressed Most computer forensics tools can uncompress and analyze compressed Windows data

Encryption Encrypting File System (EFS) Implements a public key and private key method of encrypting files, folders, or disk volumes When EFS is used a recovery certificate is generated and sent to the local Windows administrator account except for MS Server 2008 Users can apply EFS to files stored on their local workstations or a remote server

Registry Registry A database that stores hardware and software configuration information, network connections, user preferences, and setup information For investigative purposes, the Registry can contain valuable evidence To view the registry you can use Regedit/Regedt32 or a forensics registry viewer

Virtual Machines Virtual machine Allows you to create a representation of another computer on an existing physical computer Many of the new digital forensics software will recognize VMs

Digital Forensics Tools EnCase FTK ProDiscover Helix Autopsy SleuthKit

Contact Information Dr. Thomas L. Pigg Professor of Computer Information Systems Jackson State Community College 2046 N. Parkway Jackson, TN 38305 (731) 424-3520 Ext. 201 tpigg@jscc.edu