CLOUD STORAGE FORENSICS MATTIA EPIFANI SANS EUROPEAN DIGITAL FORENSICS SUMMIT PRAGUE, 7 OCTOBER 2013



Similar documents
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013

Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform

Cloud Storage Client Application Evidence Analysis on UNIX/Linux

DIGITAL FORENSIC INVESTIGATION OF CLOUD STORAGE SERVICES

Recovering Digital Evidence in a Cloud Computing Paradigm. Jad Saliba Founder and CTO

Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/ Fax: 802/

Introduction to Cloud Storage GOOGLE DRIVE

Cloud Computing for Education Workshop

Retrieving Internet chat history with the same ease as a squirrel cracks nuts

Qsync Install Qsync utility Login the NAS The address is :8080 bfsteelinc.info:8080

Backing up your digital image collection provides it with essential protection.

Manual for Android 1.5

Personal Cloud. Support Guide for Mac Computers. Storing and sharing your content 2

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2

Cloud based Storage Drive Forensics

Cloud Hosted Data in Digital Forensics

Features of AnyShare

IceBreak FileShare. Quick Guide. File sharing with workflow management

Discovering Computers

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

WatchDox for Mac User Guide

OneDrive for Business FAQ s Updated 6/19/14

Computer Forensics. Securing and Analysing Digital Information

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

ShareSync Get Started Guide

Forensic analysis of iphone backups

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

activecho Driving Secure Enterprise File Sharing and Syncing

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

owncloud Configuration and Usage Guide

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version

Frequently Asked Questions

1. Scope of Service. 1.1 About Boxcryptor Classic

Chapter 4. Operating Systems and File Management

Performance Analysis of Client Side Encryption Tools

PolyU Connect. OneDrive for Business. User Guide

Novell Filr. Windows Client

ShareSync Get Started Guide

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

insync Installation Guide

NEC CLOUD STORAGE. Demo Guide

Cloudifile Getting Started

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts

Remote Configuration for FileBrowser

ShareSync Get Started Guide

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

USER MANUAL. v Windows Client January

Enterprise Remote Control 5.6 Manual

Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete

The Genealogy Cloud: Which Online Storage Program is Right For You Page , copyright High-Definition Genealogy. All rights reserved.

Office 365 Cheat Sheet OneDrive for Business

Full version is >>> HERE <<<

cbox YOUR FILES GO MOBILE! FOR MAC OSX CLIENT USER MANUAL

Mobile Iron User Guide

BlackBerry Link for Windows. Version: User Guide

HW 07: Ch 12 Investigating Windows

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

Windows 10 Forensics. 175 Lakeside Ave, Room 300A Phone: (802) Fax: (802)

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Document OwnCloud Collaboration Server (DOCS) User Manual. How to Access Document Storage

Additional information >>> HERE <<<

OneDrive in Office 365

Last modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version

2013 USER GROUP CONFERENCE

BioHPC Cloud Storage. portal.biohpc.swmed.edu Updated for

OneDrive for Business User Guide

USER GUIDE CLOUDME FOR WD SENTINEL

Detection of Data Hiding in Computer Forensics. About Your Presenter

CTERA Agent for Linux

Qbox User Manual. Version 7.0

Amazon WorkMail. User Guide Version 1.0

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

Cloudifile: Frequently Asked Questions

InstaFile. Complete Document management System

BlackBerry Link for Windows. Version: User Guide

When enterprise mobility strategies are discussed, security is usually one of the first topics

Personal Cloud. Support Guide for Mobile Apple Devices

Web-Based Data Backup Solutions

Anchor End-User Guide

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Soonr Workplace Enterprise Plan Overview

Novell Filr 1.0.x Mobile App Quick Start

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

Jetico Central Manager. Administrator Guide

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

RecoverIt Frequently Asked Questions

Incident Response and Computer Forensics

Prerequisites and Configuration Guide

Administering Jive Mobile Apps

Access All Your Files on All Your Devices

1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work.

Android App User Guide

VMware Horizon Workspace Security Features WHITE PAPER

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Transcription:

CLOUD STORAGE FORENSICS MATTIA EPIFANI SANS EUROPEAN DIGITAL FORENSICS SUMMIT PRAGUE, 7 OCTOBER 2013

SUMMARY Cloud Storage services Testing environment and methodology Forensics artifacts left by Cloud Storage services on Windows OS Installation Usage by software Usage by browser RAM Analysis Uninstall Forensics artifacts left by Cloud Storage software on ios devices

CLOUD STORAGE With Cloud Storage services it is easier for us to access our data and share it with other people We can access the files by using a computer, a smartphone or a tablet device We can choose between free and commercial solutions We obviously have a great problem with the security of the files stored on Cloud Storage servers E.g. If we loose the credentials everyone can access our file on the cloud and on our devices? We made different tests to verify the artifacts left by the usage of the most popular Cloud Storage services on personal computers and mobile devices Dropbox Google Drive SkyDrive icloud

TESTING ENVIRONMENT Windows 7 64 bit Operating System Mozilla Firefox and Internet Explorer browsers DiskPulse tool to track the disk usage (created, modified and deleted files) RegShot and RegFromApp to track the registry changes 2 email accounts: cloudstorageforensics2013@gmail.com Google Drive and Dropbox cloudstorageforensics2013@hotmail.com SkyDrive Dropbox client version 2.0.26 Google Drive client version 1.11.4865.2530 SkyDrive client version 17.0.2011.0627

METHODOLOGY - INSTALLATION RegShot execution and state saving DiskPulse start Client installation DiskPulse stop RegShot execution and state saving RegShot differences Registry keys analysis File created analysis

DROPBOX Cloud Storage service available at www.dropbox.com Very popular Born in 2007 November 2012: 100 millions users 300 millions of file saved every day 1 million files every 5 minutes 300 billion files saved in 2012

DROPBOX 2 GB available space for free Can be expanded up to 18 GB by inviting new users It also offers commercial solutions (100/200/500/1000 GB) It works on desktop and mobile OS Windows XP/Vista/7/8 Mac OS X Linux Android ios BlackBerry Kindle

DROPBOX INSTALLATION FOLDER DropBox client is installed inside the user profile, so we have different profiles for each user C:\Users\<username>\AppData\Roaming\Dropbox The default folder used for syncing files is C:\Users\<username>\Dropbox By default the folder contains: A PDF file ( Getting Started.pdf ), changing for every Dropbox client version A folder named Photos\Sample Album, containing 3 JPG files Boston City Flow.jpg Costa Rican Frog.jpg Pensive Parakeet.jpg No more JPG files since version 2.025

DROPBOX REGISTRY CHANGES During the installation different keys and values are created inside the registry SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules SOFTWARE\Microsoft\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\DropBoxExt1 SOFTWARE\Microsoft\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\DropBoxExt1 SOFTWARE\Microsoft\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\DropBoxExt1 NTUSER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Dropbox NTUSER\Software\Microsoft\Windows\CurrentVersion\UFH\SHC NTUSER\Software\Dropbox\InstallPath From the registry we can obtain: Install Location Installed version

DROPBOX FILE CREATED Configuration files are saved inside the installation folder in the user profile Executable and libraries are stored in the bin sub-folder Other four files are created during client installation: C:\Users\<username>\Desktop\Dropbox.lnk C:\Users\<username>\Links\Dropbox.lnk C:\Windows\Prefetch\DROPBOX N.N.NN.EXE-NNNNNNNN.pf C:\Windows\Prefetch\DROPBOX.EXE-NNNNNNNN.pf

DROPBOX CONFIGURATION FILE Configuration files are mainly encrypted since 2011 We can only access Host.dbx and Host.db, containing the local folder name used to sync the account The folder name is encoded in Base64 Example QzpcVXNlcnNcQ2xvdWRTdG9yYWdlXERyb3Bib3g= C:\Users\CloudStorage\Dropbox The most interesting file is filecache.dbx In a live environment we can use IEF Triage In a dead-box we can use Internet Evidence Finder or Dropbox Decryptor (freeware) They work only on Windowx XP and Window Vista We need to know the local user password We need to extract a value from the registry http://www.magnetforensics.com/decrypting-the-dropbox-filecache-dbx-file-new-free-tool/

DROPBOX DECRYPTOR WINDOWS XP Filecache.dbx, from the folder C:\Documents and Settings\<username>\ Application Data\Dropbox Windows Protection Folder C:\Documents and Settings\<username>\ Application Data\Microsoft\Protect Registry value NTUSER.DAT\Software\Dropbox\ks\Client User s password If the folder was not synced after file deletion we can find all the file names and folders

DROPBOX FILECACHE.DB The decrypted filecache.db contains: Server path Local file name Local creation time Local modified time Local size

DROPBOX ONLINE ACCESS By logging in the profile from a browser, the user can access all the information about deleted files In the freeware version, files deleted in the last 30 days can be recovered In the commercial version, all the deleted files can be recovered The user can also obtain information about the devices connected to the account

DROPBOX ONLINE ACCESS For every file we can view version history We can recover previous versions of a file

DROPBOX ONLINE ACCESS We can also recover information about Synced devices Last browser sessions

DROPBOX RAM ANALYSIS CLIENT ACCESS If the client is installed on the PC, we can find in RAM information about the sessions We can use the strings AUTHENTICATE filecache.dbx server_time updated/deleted We can find User email Display name Filecache.dbx path Server time (Unix timestamp) File list Deleted file Similar values were found during the research inside Hiberfil.sys Pagefile.sys

DROPBOX RAM ANALYSIS BROWSER ACCESS If the user was logged with a browser session we found in RAM the username and password in clear We can use the strings login_email login_password

DROPBOX ACCESS AND PASSWORD RECOVERY We can access the profile in 2 ways: Find the password stored somewhere in the PC (ex. Browser) and access through the website Virtualize the forensic image and connect it to Internet In the old versions we could also copy the profile folder in a new machine to sync it

DROPBOX UNINSTALL During the uninstall process the client config folder is removed The registry key NTUSER\Software\Dropbox is preserved (but without values) The prefetch files are not deleted Local copy of the file is not deleted If the user has deleted the local file we can: Carve file Search for default JPG files by hash Boston City Flow.jpg 5FCD8ABC87DE2629A3E75598999944DA Costa Rican Frog.jpg 30BF1FADCFC52C796D143563A9D4484F Pensive Parakeet.jpg B44D238643412E46D5EC7A6FE95D5E8F

DROPBOX UNINSTALL We can also recover information from: Registry keys about recent files LNK files Browser history and cache Thumbnails Registry Point / Volume Shadow Copies Pagefile.sys Hiberfil.sys

DROPBOX IOS APP The Dropbox ios App is stored in \var\mobile\applications\4bd80d3b-7ada-4171-b2a0-8a534f05408d It contains 4 sub folders Cookies DropboxPrivate Preferences Cache The Cache folder contains a local copy of the opened files, but it is available only if we can perform a physical acquisition The Preferences folder contains a file named com.getdropbox.dropbox.plist with User information (Name and Surname) User email

GOOGLE DRIVE Cloud Storage service available at drive.google.com Born in 2012 May 2013: 425 millions users also because it is activated for every Gmail email created

GOOGLE DRIVE 15 GB available space for free It offers commercial solutions (100/200/500 GB 1/2/4/8/16 TB) It works on desktop and mobile OS Windows Vista/7/8 Mac OS X Android ios

GOOGLE DRIVE INSTALLATION FOLDER Google Drive client is installed inside the Program Files folder C:\Program Files\Google\Drive Client configuration is stored in the user profile, so we have different profiles for each user C:\Users\<username>\AppData\Local\Google\Drive The default folder used for syncing files is C:\Users\<username>\Google Drive By default the user folder is empty

GOOGLE DRIVE REGISTRY CHANGES During the installation different keys and values are created inside the registry SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\ SOFTWARE\Google\Drive NTUSER\Software\Microsoft\Windows\CurrentVersion\Run\GoogleDriveSync NTUSER\Software\Classes From the registry we can obtain: Installed version User folder

GOOGLE DRIVE FILE CREATED Configuration files are saved inside the installation folder in the user profile Executable and libraries are stored in the bin sub-folder Other four files are created during client installation: C:\Users\<username>\Desktop\Google Drive.lnk C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ Google Drive\Google Drive.lnk C:\Windows\Prefetch\GOOGLEDRIVESYNC.EXE-NNNNNNNN.pf C:\Windows\Prefetch\GOOGLEUPDATE.EXE-NNNNNNNN.pf

GOOGLE DRIVE SYNC_CONFIG.DB The Sync_config.db is a SQLITE3 DB containing profile configuration Client version installed Local Sync Root Path User Email

GOOGLE DRIVE SNAPSHOT.DB The Snapshot.db is a SQLITE3 DB containing information about local and cloud entry Cloud_entry table File name Created (UNIX Timestamp) Modified (UNIX Timestamp) URL Checksum (MD5 hash) Size Shared MD5 hash)

GOOGLE DRIVE SNAPSHOT.DB The Snapshot.db is a SQLITE3 DB containing information about local and cloud entry Local_entry File name Modified (UNIX Timestamp) Checksum (MD5 hash) Size

GOOGLE DRIVE SNAPSHOT.DB AFTER DELETION After file deletion the file information is removed from the cloud_entry and the local_entry table But sometimes we can still find the file name with a keyword search on the DB itself

GOOGLE DRIVE SYNC_LOG.LOG The Sync_log.log is a log file containing information about the client sync session Inside the file we can find information about Sync sessions File created File saved File deleted We can use a keyword search with the strings: RawEvent(CREATE RawEvent(DELETE RawEvent(MODIFY

GOOGLE DRIVE ONLINE ACCESS By logging in the profile from a browser, the user can access all the information about deleted files

GOOGLE DRIVE ONLINE ACCESS For every file we can view version history We can recover previous version of a file

GOOGLE DRIVE ONLINE ACCESS We can also recover information about recent activities

GOOGLE DRIVE RAM ANALYSIS CLIENT ACCESS If the client is installed on the PC, we can find in RAM information about the sessions We can use the strings user_emailvalue highest_app_versionvalue local_sync_root_pathvalue snapshot.db sync_config.db We can find User email Version number Sanpshot.db and sync_config.db path Local sync folder path Similar values were found during the research inside Hiberfil.sys Pagefile.sys

GOOGLE DRIVE RAM ANALYSIS BROWSER ACCESS If the user was logged with a browser session we found in RAM the username and password in clear We can use the strings Email= Passwd=

GOOGLE DRIVE ACCESS AND PASSWORD RECOVERY We can access the profile in 2 way: Find the password stored somewhere in the PC (ex. Browser, Mail client, etc.) and access through the website Virtualize the forensic image and connect it to Internet

GOOGLE DRIVE UNINSTALL During the uninstall process the client config folder is removed We found Sync_log.log entries from unallocated space The prefetch file are not deleted Local file are not deleted If the user deleted the local file we can try to carve it We can also recover information from: Registry keys about recent files LNK files Browser history and cache Thumbnails Restore points/ Volume Shadow Copies Pagefile.sys Hiberfil.sys

GOOGLE DRIVE IOS APP The Google Drive ios App is stored in \var\mobile\applications\8f139264-9142-4b84-a7c3-421add6ba05f It contains 2 sub folders Documents Library Cookies Preferences Caches The Preferences folder contains a file named com.google.drive.plist with User information (Name and Surname) User id User email The cache folder contains the cached copy of the opened files, but it can be extracted only if we can perform a physical dump

GOOGLE DRIVE IOS APP The Documents folder contains 3 interesting SQLite databases: Contacts_snapshot_useremail.db Feed_snapshot_useremail.db Items_snapshot_useremail.db The Contacts db contains the user email and name of the contacts with shared files with the user The Items db contains all the information about file stored in the user Drive Identifier Title Kind MD5 hash Last Modified By (username) Last Modified Date Last Viewed Date Shared With Me Date Last Modified by Me Date

GOOGLE DRIVE IOS APP ITEMS_SNAPSHOT_USEREMAIL.DB

SKYDRIVE Cloud Storage service available at skydrive.live.com Born in 2007 May 2013: 250 millions users also because it is activated for every Gmail email created and it is pre installed in Windows 8

SKYDRIVE 7 GB available space for free It offers commercial solutions (20/50/100 GB) It works on desktop and mobile OS Windows Vista/7/8 Mac OS X Windows Phone Android ios

SKYDRIVE INSTALLATION FOLDER SkyDrive client is installed inside the user profile, so we have different profiles for each user C:\Users\<username>\AppData\Local\ Microsoft\SkyDrive The default folder used for syncing files is C:\Users\<username>\SkyDrive By default the user folder contains 3 empty folders Documents Images Public

SKYDRIVE LOCAL FILE SHARING!

SKYDRIVE REGISTRY CHANGES During the installation different keys and values are created inside the registry SYSTEM\ControlSet001\Services\Parameters\FirewallPolicy\FirewallRules SOFTWARE\Microsoft\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\SkyDrive1 SOFTWARE\Microsoft\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\SkyDrive2 SOFTWARE\Microsoft\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\SkyDrive3 NTUSER\Software\Microsoft\Windows\CurrentVersion\Uninstall NTUSER\Software\Microsoft\Windows\CurrentVersion\Run NTUSER\Software\Microsoft\Windows\CurrentVersion\UFH\SHC NTUSER\Software\Microsoft\SkyDrive NTUSER\Software\Classes\SkyDrive.SyncFileInformationProvider NTUSER\Software\Classes\SkyDriveClient.SkyDriveClient From the registry we can obtain: Current Version Path User folder

SKYDRIVE FILE CREATED Configuration files are saved inside the installation folder in the user profile There are 4 sub folders: Settings: client settings Log: activities log Setup: client update log Update: last client update Other 7 files are created during client installation: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SkyDrive.lnk C:\Users\Default\Links\SkyDrive.lnk C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SkyDrive.lnk C:\Users\<username>\Links\SkyDrive.lnk C:\Windows\Prefetch\SKYDRIVE.EXE-NNNNNNNN.pf C:\Windows\Prefetch\SKYDRIVECONFIG.EXE-NNNNNNNN.pf C:\Windows\Prefetch\SKYDRIVESETUP.EXE-NNNNNNNN.pf

SKYDRIVE SETTINGS FOLDER Settings folder contains ClientPolicy.ini: client configuration parameters Max File Size Bytes Max Client MB Transferred Per Day Max Client Requests Per Day Max Items In One Folder Number Of Concurrent Uploads ApplicationSettings.xml: it contains the UserCid <UserCid>.ini: user configuration parameters installname: personal computer name lastrefreshtime: date and time of the last online sync library: user folder path <UserCid>.dat: file and folder name

SKYDRIVE CLIENTPOLICY.INI

SKYDRIVE APPLICATIONSETTINGS.XML

SKYDRIVE USERCID.INI Fri, 26 Jul 2013 16:38:49 GMT

SKYDRIVE USERCID.DAT BEFORE DELETION

SKYDRIVE USERCID.DAT AFTER DELETION

SKYDRIVE USERCID.DAT IEF BEFORE DELETION

SKYDRIVE USERCID.DAT IEF AFTER DELETION

SKYDRIVE LOGS FOLDER It contains a log file about client software activities SyncDiagnostics.log: contains information about last sync <PCNAME>.dev=0.YYYY-MM-DD.HHMM,SSSS-1.log: contains detailed sync logs for a particular day

SKYDRIVE LOG FILE We can find information about all the files, including the deleted ones We can use a string search CreateNewFileRealizerWorkItem: function invoked every time a file is created in the local folder FILE_ACTION_ADDED: invoked every time a file is added locally FILE_ACTION_REMOVED: invoked every time a file is removed locally FILE_ACTION_RENAMED: invoked every time a file is renamed locally

SKYDRIVE ONLINE ACCESS By logging in the profile from a browser, the user can access all the information about deleted file We can also view all the device used to sync the account through a client

SKYDRIVE DRIVE ONLINE ACCESS We can access to the file stored inside a synced PC

SKYDRIVE ONLINE ACCESS If a user has deleted a file we can still access to a copy inside a Recycle Bin for a 30 days period We can also access to different revisions of a file

SKYDRIVE RAM ANALYSIS CLIENT ACCESS If the client is installed on the PC, we can find in RAM information about the sessions We can use the strings login.live.com skydrive We can find User email Version number Config Path Local sync folder path File names Similar values were found during the research inside Hiberfil.sys Pagefile.sys

SKYDRIVE RAM ANALYSIS BROWSER ACCESS If the user was logged with a browser session we found in RAM the username and password in clear We can use the string passwd=

SKYDRIVE ACCESS AND PASSWORD RECOVERY We can access the profile in 2 ways: Find the password stored somewhere in the PC (ex. Browser, Mail client, etc.) and access through the website Virtualize the forensic image and connect it to Internet

SKYDRIVE DRIVE UNINSTALL During the uninstall process the client config folder is removed We found Log entries from unallocated space The prefetch files are not deleted The key NTUSER\Software\SkyDrive is still present but without values Local file are not deleted If the user deleted the local file we can try to carve it We can also recover information from: Registry keys about recent files LNK files Browser history and cache Thumbnails Restore points/ Volume Shadow Copies Pagefile.sys Hiberfil.sys

SKYDRIVE IOS APP The SkyDrive ios App is stored in \var\mobile\applications\654bcfcd-7c12-4be8-bc62- B6FF2638D967 It contains 3 sub folders Documents Library Caches The Preferences folder contains a file named com.microsoft.skydrive.plist with User email The cache folder contains the cached copy of the opened files, but it can be extracted only if we can perform a physical dump

ICLOUD Using itunes we can make a backup of an ios device In order to perform the backup it is needed that: The phone is not protected by a lock code, or Knowing the lock code, or Obtaining the synchronization certificates for the device from a trusted computer The keychain file stores WiFi, e-mail and third-party applications password If the backup is not encrypted keychain file is encrypted using a key hard-coded into the device If the backup is password protected keychain file is encrypted using the user-chosen password

ICLOUD If an attacker can get his hands on an unlocked phone, he can: Make a backup by choosing the password he wants «Crack» the backup.with the choosen password Access data stored on the phone.and the passwords stored in the keychain

ICLOUD

ICLOUD Researchers at the Russian software company Elcomsoft have analyzed the communication protocol between idevice and Apple icloud They were able to emulate the correct commands to retrieve the contents of a user's icloud storage (http://cansecwest.com/slides/2013/cracking% 20and% 20Analyzing% 20Apple% 20iCloud.ppt) The download operations are completely transparent to the device owner, so an attacker can monitor user activities every time a new backup is created online

ICLOUD

ICLOUD

ICLOUD

CONCLUSIONS A lot of useful information can be found by analyzing artifacts left by Cloud Storage clients Dropbox and Google Drive use Sqlite databases to store information about files Dropbox databases are encrypted but in some cases can be easily decrypted (Dropbox Decryptor, IEF) Google Drive databases are in clear and contain information about file still present in the storage Google Drive Sync_log.log is useful to obtain information about deleted files SkyDrive uses a binary file (usercid.dat) to store information about files still present in the storage SkyDrive usercid.dat file can be analyzed with Internet Evidence Finder or with a Hex editor SkyDrive log files are useful to obtain information about deleted files Ram analysis is useful to obtain information about client configuration Interesting information can be found by analyzing traditional Windows artifacts (LNK, Browser, Thmubnails, Hiberfil, etc.)

REFERENCES Quick D. (2011), Cloud Storage Forensic Analysis, University of South Australia Chung, H, Park, J, Lee, S & Kang, C (2012), Digital Forensic Investigation of Cloud Storage Services, Digital Investigation Clark, P (2011), 'Digital Forensics Tool Testing Image Metadata in the Cloud', Department of Computer Science and Media Technology, Gjøvik University College. McClain, F (2011), Dropbox Forensics, updated 31 May 2011, Forensic Focus Reese, G (2010), Cloud Forensics Using Ebs Boot Volumes, Oreilly.com Zhu, M (2011), 'Mobile Cloud Computing: Implications to Smartphone Forensic Procedures and Methodologies', AUT University Saliba (2012), Recovering Digital Evidence in a Cloud Computing Paradigm, SANS

Q&A? Mattia Epifani Digital Forensics Expert Owner @ REALITY NET System Solutions President @ DFA Association CEH, CHFI, CCE, CIFI, ECCE, AME, ACE, MPSC Mail Linkedin mattia.epifani@realitynet.it http://www.linkedin.com/in/mattiaepifani

CLOUD STORAGE FORENSICS - LAB MATTIA EPIFANI SANS EUROPEAN DIGITAL FORENSICS SUMMIT PRAGUE, 7 OCTOBER 2013

THE CASE Some private and sensitive files of a private company were published online on a public website on August 2 10.15 a.m. By analyzing the log from the website 2 public IP addresses were found By tracing back the IP addresses, it was found that: The first IP address is a mobile connection assigned to an employee of the private company The second IP address is a home DSL connection assigned to the line of the same employee A laptop computer and a desktop computer were seized at the employee s home On the laptop there was a Windows 7 Ultimate operating system, while in the desktop there was a Windows XP operating system During the seizure, the laptop was found switched on and with a Dropbox account logged on within a Internet Explorer browser

STOLEN FILES Analyzing the files published on the public website it was possible to identify 3 PDF 3 JPG Here follow the files names and the calculated MD5 hashes Pesto.jpg 200F3BD177EAAA1056330C364A422839 Pesto_recipe.pdf 50CF277AF4637B82421EEF743E724FE6 Pizza_margherita.jpg 8722AA6EDC6AA9C416F3DDE30BDE83AC Pizza_Margherita_Recipe.pdf FE4494C4C27E2D002EA29D9BC1317F9E Tiramisu.jpg 868B307E352A1CA54FE9FA4F856B20F5 Tiramisu_recipe.pdf 23DAC74327C6C8C4CA976C0A51D42FEE

FIRST RESPONDER PROCEDURE During the seizure, police realized a memory dump of the laptop before switching it off Then a complete forensic copy of the hard drives was performed No traces of the files were found on the laptop or the desktop computer, also with a file carving utility A file wiping tool was found inside both the PCs On the laptop the following elements were found: Dropbox client Google Drive client SkyDrive client On the desktop an installation of a Dropbox client was found The user in the laptop was not password protected, while the Administrator user in the desktop was protected with a very complex password «password»

QUESTIONS Can you find any trace left regarding the stolen files inside the seized PCs? Can you find any trace left regarding files that are probably referable to the stolen files? Verify any other element of interest in the RAM memory dump Bonus question: can you find traces of other files previously present on the Cloud Storage clients? You can download the lab exercise from http://www.realitynet.it/downloads/cloud_lab_files.zip If you want the solutions.write an email!