Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test. Reports; The Computer Forensics Tool Catalog Website: Connecting



Similar documents
Mobile Device Forensics. Rick Ayers

Deleted File Recovery Tool Testing Results

Digital Forensics at the National Institute of Standards and Technology

NIST CFTT: Testing Disk Imaging Tools

EC-Council Ethical Hacking and Countermeasures

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

BlackLight v Test Results for Mobile Device Acquisition Tool

Test Results for Mobile Device Acquisition Tool: Lantern v2.3

HAVE YOUR COMPUTER FORENSICS TOOLS BEEN TESTED?

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Recover My Files v Test Results for Video File Carving Tool

Computer Forensics: Permanent Erasing

How To Get A Computer Hacking Program

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Information Technologies and Fraud

Hands-On How-To Computer Forensics Training

Tableau TD3 Forensic Imager Test Results for Digital Data Acquisition Tool

RAID Rebuilding. Objectives CSC 486/586. Imaging RAIDs. Imaging RAIDs. Imaging RAIDs. Multi-RAID levels??? Video Time

Computer Forensics Standards:

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Course Title: Computer Forensic Specialist: Data and Image Files

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

Open Source Digital Forensics Tools

Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+)

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Evidence. Robert J. O Leary, CFCE; DFCP Director NIJ ECTCoE 550 Marshall St. Suite B Phillipsburg, NJ 08865

Linux in Law Enforcement

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

Computer Forensic Tools. Stefan Hager

Computer Forensics using Open Source Tools

MSc Computer Security and Forensics. Examinations for / Semester 1

NIST Mobile Forensics Workshop and Webcast. Mobile Device Forensics: A Z

Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC

Of the programs offered by IACIS, the Basic Computer Forensic Examiner (BCFE) Training Program is at the forefront.

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

CDFE Certified Digital Forensics Examiner (CFED Replacement)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Digital Forensic Techniques

CTC 328: Computer Forensics

Incident Response and Computer Forensics

Evidentiary Integrity for Incident Response (EIIR)

Computer Hacking Forensic Investigator v8

Retrieving Internet chat history with the same ease as a squirrel cracks nuts

RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES

FOG Guide. IPBRICK International. July 17, 2013

Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics

PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference

Is the Open Way a Better Way? Digital Forensics using Open Source Tools

Legal Notices. AccessData Corp.

CERTIFIED DIGITAL FORENSICS EXAMINER

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

Where is computer forensics used?

State of the art of Digital Forensic Techniques

Cyber Security at NSU

Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics

Computer Forensics. Securing and Analysing Digital Information

FORENSIC ARTIFACTS FROM A PASS THE HASH (PTH) ATTACK BY: GERARD LAYGUI

Guidance Software Professional Development and Training Dulles Va (Makers of EnCase)

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Live System Forensics

Guide to Computer Forensics and Investigations, Second Edition

How To Improve The Criminal Justice System

CYBER FORENSICS (W/LAB) Course Syllabus

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

EnCase 7 - Basic + Intermediate Topics

Large Scale Cloud Forensics

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection

COMPUTER FORENSICS. DAVORY: : DATA RECOVERY

RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University

Design and Implementation of Digital Forensics Labs:

Incident Response and Forensics

A STUDY OF FORENSIC IMAGING IN THE ABSENCE OF WRITE-BLOCKERS

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633

Guide to Computer Forensics and Investigations, Second Edition

Example of Standard API

Informatica forense. Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.

An enterprise grade information security & forensic technical team

What is Digital Forensics?

Computer Forensics as an Integral Component of the Information Security Enterprise

Mac Marshal: A Tool for Mac OS X Operating System and Application Forensics

Digital Forensics with Open Source Tools

Modern Digital Forensics!!

BEST PRACTICES FOR A COLLECTION OF AN IOS MOBILE DEVICE

Transcription:

Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test Reports; The Computer Forensics Tool Catalog Website: Connecting Forensic Examiners With the Tools They Need U.S. Cyber Crime Conference May 2, 2014 Ben Livelsberger NISTInformation Technology Laboratory, Computer Forensics Tool Testing Project

Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that the products are necessarily the best available for the purpose.neither NIST nor myself has financial interest in any of the real products mentioned as part of this talk.

Overview Overview of CFTT Computer Forensic Tool Catalog website Federated Testing Project Summary Sponsors Questions

CFTT Overview Computer Forensics Tool Testing Project James Lyle, Project Leader 100 Bureau Drive, Stop 8970 Gaithersburg, MD 20899-8970 USA E-mailcftt@nist.gov Website:www.cftt.nist.gov

CFTT Overview CFTT Computer Forensics Tool Testing Program provides a measure of assurance that the tools used in the investigations of computer-related crimes produce valid results. Directed by a steering committee composed of representatives of the law enforcement community. The steering committee selects tool categories for investigation and testing. A vendor may request testing of a tool, however the steering committee makes the decision about which tools to test. CFTT is a joint project of: DHS, OLES, FBI, DoD, Secret Service, NIJ and other agencies.

Test Specification Requirements Test Plan Test Cases and Assertions Setup and Test Procedures Final Test Report Generation CFTT Methodology

Requirements Requirements Statements used to derive test assertions that define expectations of a tool or application. Core Requirements Requirements that all mobile device acquisition tools shall meet. Optional Requirements Requirements that all mobile device acquisition tools shall meet on the condition that specified features or options are offered by the tool.

Test Specification Requirements Test Plan Test Cases and Assertions Setup and Test Procedures Final Test Report Generation CFTT Methodology

Test Plan Test Cases Describe the combination of test parameters required to test each assertion. Assertions General statements or conditions that can be checked after a test is executed

Test Specification Requirements Test Plan Test Cases and Assertions Setup and Test Procedures Final Test Report Generation CFTT Methodology

Setup and Test Procedures Objective: Documentation on data population of target media and test procedures providing third parties with information for an independent evaluation or replication of posted test results. Contents: Techniques used for data population Test Case Execution Procedures

Test Specification Requirements Test Plan Test Cases and Assertions Setup and Test Procedures Final Test Report Generation CFTT Methodology

Test Report Results summary Test case selection Results by Test Case-Variation Testing environment Test results

Tool Validation Tool validation results issued by the CFTT project at NIST provide information necessary for: Toolmakers to improve tools Users to make informed choices about acquiring and using computer forensic tools And for interested parties to understand the tools capabilities

Computer Forensics Tool Catalog Website The Perfect Tool Idea: one tool that does everything Reality: need a bunch of tools Solution: an effective way for connecting practitioners to the tools they need

How Does the Tool Catalog Work? It s taxonomy-driven Taxonomy: Forensic functionalities + associated technical parameters and technical parameter values Example:Deleted File Recovery Technical Parameters: Tool host OS / runtime environment : Windows, Linux, Mac Supported file systems : FAT16, FAT32, NTFS,exFAT, EXT3 Overwritten file identification : supported, not supported

Taxonomy-driven: benefits It s searchable Uniform information across tools It svendorpopulated tool info more accurate, easier to collect tool submissions reviewed at NIST before posting field to list available test reports

New Tools, Entries, Functionalities by Month Tools Entries Functionalities

What s in the Catalog? Cloud Services 1 Hardware Write Block 14 Remote 2 Capabilities/RemoteForensics Deleted File Recovery 9 Hash Analysis 9 Social Media 5 Disk Imaging 12 Image Analysis (Graphic Files) 2 Software Write Block 5 Email Parsing 10 Instant Messenger 3 Steganalysis 4 File Carving 2 Media Sanitization/Drive Reuse 4 String Search 6 Forensic Boot Environment 2 Memory Capture &Analysis 11 Web Browser Forensics 2 Forensic Tool Suite (Mac 3 Mobile Device Acquisition & Analysis 19 Windows Registry Analysis 3 Investigations) Forensic Tool Suite (Windows 4 P2P Analysis 4 Investigations)

Community/Vendor Participation ATC-NY Defense Cyber Crime Center Paraben Corporation AccessData Elcomsoft Co Ltd Sleuth Kit Arsenal Recon Fookes Software Ltd Susteen Inc. ArxSys Forensic Telecommunications Services Ltd SysTools Software Private Limited Backbone Security - Steganography Analysis and Research Center (SARC) ForensicSoft, Inc. Tableau by Guidance Software Belkasoft Fox-IT Teel Technologies BlackBag Technologies HBGary The Sleuth Kit CRU-DataPort / WiebeTech Hot Pepper Technology, Inc. X-Ways Software Technology AG CYANLINE LLC Intelligent Computer Solutions, Inc dtsearch Corp. Cellebrite Mobile Synchronization Ltd. Katana Forensics Inc. maresware Computer Evidence Specialists LLC Magnet Forensics perlustro lp Defense Cyber Crime Center (DC3) MicroSystemationAB (MSAB) viaforensics

Demo

Federated Testing: SharedTest Materials & Well- Tested Tools Tools, methods and procedures must be validated Correct and efficient processing of digital evidence Admissibility to courts/judicial proceedings Tool validation Difficult Expensive Time consuming

What is Federated Testing? Same tools used across agencies, labs and digital evidence sections a lot of duplicatedwork The Computer Forensics Tool Testing (CFTT) Project at NIST currently creates tool specifications, test methods and test reports. Federated Testing is an expansion of CFTT to provide the digital forensics community with shared test materials for tool validation. Benefits: Cost savings Can improve quality of testing (rigorous methods and high quality testing materials)

TargetAreas CFTT has methodologies for: diskimaging HardwareWriteBlock* MobileDevices* Forensic MediaPreparation* Deleted File Recovery File Carving Implementing: disk imaging available Fall 2014

What will the test materials look like? Platform for delivering the materials: live Linux (Ubuntu) CD Components: Website Reference information Test Plan Final report Command line test support tools Test case setup and analyze results

Demo

Summary Computer Forensics Tool Catalog Website Purpose: provide an effective way for connecting practitioners with the tools they need Taxonomy-driven, vendor populated & searchable Federated Testing Tool validation is difficult, expensive and time consuming Federated Testing is an expansion of CFTT to provide the digital forensics community with shared test materials for tool validation coming this Fall!

Summary (cont.) Computer Forensics Tool Catalog website - Spreadthe word. Ask vendors you work with to list their tools. Give us feedback; tell us what you like/don t like. Federated Testing Give me you contact information. We d love to get your feedback!

ProjectSponsors Department of Homeland Security, Science and Technology Directorate(Major funding) NIST/OLES (Program management)

Contacts Computer Forensics ToolCatalog: www.cftt.nist.gov/tool_catalog/index.php BenLivelsbergerwww.cftt.nist.gov benjamin.livelsberger@nist.govcftt@nist.gov SueBallou, Officeof Special Programs susan.ballou@nist.gov

Questions?