The Contribution of Tool Testing to the Challenge of Responding to an IT Adversary



Similar documents
NIST CFTT: Testing Disk Imaging Tools

Digital Forensics at the National Institute of Standards and Technology

Deleted File Recovery Tool Testing Results

HAVE YOUR COMPUTER FORENSICS TOOLS BEEN TESTED?

Computer Forensics Standards:

Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test. Reports; The Computer Forensics Tool Catalog Website: Connecting

Mobile Device Forensics. Rick Ayers

Tableau TD3 Forensic Imager Test Results for Digital Data Acquisition Tool

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Recover My Files v Test Results for Video File Carving Tool

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

Useful Computer Forensics Tools Updated: Jun 10, 2003

Open Source Digital Forensics Tools

ipod Forensics Update

MSc Computer Security and Forensics. Examinations for / Semester 1

Hands-On How-To Computer Forensics Training

Guide to Computer Forensics and Investigations, Second Edition

Guide to Computer Forensics and Investigations, Second Edition

Computer Forensics as an Integral Component of the Information Security Enterprise

Forensic Software Testing Support Tools Test Summary Report

Test Results for Mobile Device Acquisition Tool: Lantern v2.3

Where is computer forensics used?

CDFE Certified Digital Forensics Examiner (CFED Replacement)

Digital Forensics. Module 4 CS 996

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Course Title: Computer Forensic Specialist: Data and Image Files

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Test Results for Hardware Write Block Device: Tableau T5 Forensic IDE Bridge (FireWire Interface)

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Survey of Disk Image Storage Formats

ITL BULLETIN FOR SEPTEMBER 2012 REVISED GUIDE HELPS ORGANIZATIONS HANDLE SECURITY-RELATED INCIDENTS

Forensics on the Windows Platform, Part Two

Live System Forensics

FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres

Evaluation of Software Write Blocking In SAFE Block XP V1.1

A Short Introduction to Digital and File System Forensics

Computer Forensic Functions Testing: Media Preparation, Write Protection and Verification

Regional Computer Forensic Laboratory & Digital Forensics. Presented By: D. Justin Price FBI - Philadelphia Computer Analysis Response Team

RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES

Edinburg Napier University. Cloud-based Digital Forensics Evaluation Test (D-FET) Platform

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

information security and its Describe what drives the need for information security.

NISTIR 7276 The Impact of RAID on Disk Imaging

Certified Digital Forensics Examiner

Computer Forensic Tools. Stefan Hager

Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT)

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633

Evaluating Digital Forensic Tools (DFTs)

A STUDY OF FORENSIC IMAGING IN THE ABSENCE OF WRITE-BLOCKERS

Applications of Data Recovery Tools to Digital Forensics: Analyzing the Host Protected Area with the PC-3000

CERTIFIED DIGITAL FORENSICS EXAMINER

Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+)

Forensic Photographic Comparison Analysis

DATA RECOVERY FUNCTION TESTING FOR DIGITAL FORENSIC TOOLS

Introduction. IMF Conference September 2008

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

BlackLight v Test Results for Mobile Device Acquisition Tool

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection

EnCase v7 Essential Training. Sherif Eldeeb

CCE Certification Competencies

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Certified Digital Forensics Examiner

PRODISC VER. Computer Forensics Family. User Manual. Version 4.8 9/06

Digital Forensic Techniques

Certified Digital Forensics Examiner

Forensic Readiness. Presented by: Jack J. Murphy, Ph.D.

What is Digital Forensics?

Legal Notices. AccessData Corp.

Is the Open Way a Better Way? Digital Forensics using Open Source Tools

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

How To Be A Computer Forensics Examiner

Disclaimer of Liability: Redistribution Policy:

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

EnCase 7 - Basic + Intermediate Topics

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Information Technologies and Fraud

Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics

Comparing and Contrasting Windows and Linux Forensics. Zlatko Jovanovic. International Academy of Design and Technology

CYBER FORENSICS (W/LAB) Course Syllabus

Adaptation of PyFlag to Efficient Analysis of Seized Computer Data Storage

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd

Impact of Digital Forensics Training on Computer Incident Response Techniques

EC-Council Ethical Hacking and Countermeasures

Mac Marshal: A Tool for Mac OS X Operating System and Application Forensics

NIST/ITL CSD Biometric Conformance Test Software Web. September National Institute of Standards and Technology (NIST)

Significance of Hash Value Generation in Digital Forensic: A Case Study

Computer Forensics. Securing and Analysing Digital Information

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

Computer Forensic Evidence Collection and Management. Chapter 10 The Computer and Electronic Forensic

Can Computer Investigations Survive Windows XP?

How To Improve The Criminal Justice System

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Battling Current Technological Trends

RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University

CHAD TILBURY.

Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer. By:

Transcription:

The Contribution of Tool Testing to the Challenge of Responding to an IT Adversary Jim Lyle National Institute of Standards and Technology 23 October 2006 10/18/2006 1

DISCLAIMER Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that the products are necessarily the best available for the purpose. 10/18/2006 2

Outline Overview of computer forensics at NIST Conformance testing forensic tools Testing Disk imaging tools and Write blocking devices Summary 10/18/2006 3

Something Is Wrong Something is not quite right An investigation is started What is going on? Who is doing it? How? Is it criminal? Now what? 10/18/2006 4

Challenges for the Investigator Technical Hardware: Intel, AMD, Mac, Sun, Operating systems: DOS, Windows, Linux, FreeBSD, UNIX, File systems: FAT, NT, EXT, Mac, UNIX, Networks: TCP/IP, HTTP, FTP, email, IM, Infrastructure 10/18/2006 5

Investigators Need Computer forensic investigators need tools that Work as they should, Reference data to reduce analysis workload, Produce results admissible in court, and Independently tested tools 10/18/2006 6

Where is CFTT? US government, executive branch Department of Commerce (DOC) National Institute of Standards and Technology (NIST) Information Technology Lab (ITL) Software Diagnostics and Conformance Testing Division (SDCT) Computer Forensics: Tool Testing Project (CFTT) Also, the Office of Law Enforcement Standards (OLES) at NIST provides project 10/18/2006 7

Goals of CF at NIST/ITL Establish methodology for testing computer forensic tools (CFTT) Provide international standard reference data that tool makers and investigators can use in investigations (NSRL, CFReDS) 10/18/2006 8

Project Sponsors (aka Steering Committee) NIST/OLES (Program management) National Institute of Justice (Major funding) FBI (Additional funding) Department of Defense, DCCI (Equipment and support) Homeland Security (Technical input) State & Local agencies (Technical input) Internal Revenue, IRS (Technical input) 10/18/2006 9

Origins of CFTT o 1999 US law enforcement saw a need for independent assessment of forensic tools o Mission: Assist federal, state & local agencies o NIST is a neutral organization not law enforcement or vendor o NIST provides an open, rigorous process 10/18/2006 10

Other Related Projects at NIST NSRL -- Hash (MD5, SHA1) file signature data base, updated 4 times a year (Doug White) SAMATE -- Software Assurance Metrics and Tool Evaluation (Paul E. Black) CFReDS -- Computer Forensics Reference Data Sets (Jim Lyle) Cell phone/pda forensics (Richard Ayers, Computer Security Division) Incident Response Guidelines (Tim Grance, Computer Security Division) 10/18/2006 11

Testing Model IV&V (Independent Verification & Validation)? Conformance Testing Model? Other Models? E.g., formal methods? 10/18/2006 12

Conformance Testing Start with a standard or specification Develop Test Assertions Develop Test Suite Identify testing labs to carry out tests 10/18/2006 13

Forensic Tools are like a Swiss army knife Blade knife for cutting Punch for making holes Scissors for cutting paper Cork screw for opening Chianti Forensic tools can do one or more of Image a disk (digital data acquisition) Search for strings Recover deleted files 10/18/2006 14

Testing a Swiss Army Knife How should tools with a variable set of features be tested? All together or by features? Testing by feature uses a set of tests for each feature: acquisition, searching, data recovery Examples: EnCase acquisition, ilook string search, FTK file recovery 10/18/2006 15

Conformance Testing at CFTT A specification giving an unambiguous list of requirements, A test plan describing test cases to run, criteria for selecting test cases and criteria for conformity assessment, A set of test tools for creating test data and extracting test results, A set of test procedures to follow during test execution. 10/18/2006 16

Developing a Specification 1. NIST develops a specification (requirements) 2. The specification is posted to the web for peer review 3. Relevant comments and feedback are incorporated 4. A test plan, test assertions and test cases, is developed. 5. The test plan is posted to the web for peer review 6. Relevant comments and feedback are incorporated 7. Final versions of the specification and test plan are posted 8. The test tools and test procedures are developed 10/18/2006 17

Ready to Test Tools Everything ready to test a tool Specification (requirements, test assertions & test cases, test procedures) Validated test harness (user manual, validation plan, validation report) Steering committee selects tools to test Most widely used tools selected May be unfair to vendors 10/18/2006 18

Testing a Tool 1. Steering Committee selects tool to test. 2. NIST acquires the tool to be tested. 3. NIST reviews the tool documentation. 4. NIST selects relevant test cases depending on features supported by the tool. 5. NIST executes tests. 6. NIST produces test report. 7. Steering Committee reviews test report. 8. Vendor reviews test report. 9. NIJ posts test report to web. 10/18/2006 19

Evaluating Test Results If a test exhibits an anomaly 1. Look for hardware or procedural problem 2. Anomaly seen before 3. If unique, look at more cases 4. Examine similar anomalies 10/18/2006 20

Acquisition Requirements First draft: All digital data is acquired Problems: Some sectors masked by HPA or DCO Really want an accurate acquisition What about I/O errors? Ignore for now Second Draft: several requirements All visible sectors are acquired All masked sectors are acquired All acquired sectors are accurately acquired 10/18/2006 21

More Requirements A requirement, simple at first glance, is really complex and becomes three requirements Three simple requirements are easier to measure Some tools might not see the masked (HPA, DCO) sectors A vocabulary with definitions helps the reader understand the exact meaning of terms in the requirements 10/18/2006 22

Impact from Imaging Testing Release 18 (Feb 2001) - A US government organization was doing some testing and uncovered an issue under a specific set of circumstances. Linux doesn t use the last sector if odd Several vendors have made product or documentation changes CFTT cited in some high profile court cases 10/18/2006 23

Write Blocker Test Results Some blockers allowed an obsolete low level formatting command that command cannot modify drive contents with meaningful data but can erase the drive. Some blockers substituted a different read command for the command issued by the host. Some blockers cached the results of the IDENTIFY DEVICE command so that the number of sectors on the drive returned for the IDENTIFY DEVICE command was not updated to reflect a change in number of accessible sectors. 10/18/2006 24

Current Activities Hard drive imaging tools Software hard drive write protect Hardware hard drive write protect Deleted file recovery String Searching 10/18/2006 25

Challenges No standards or specifications for tools Arcane knowledge domain (e.g. DOS, BIOS, Windows drivers, Bus protocols) Reliably faulty hardware Many versions of each tool 10/18/2006 26

Available Specifications Disk Imaging (e.g., Safeback, EnCase, Ilook, Mares imaging tool) Deleted file recovery Write Block Software Tools (e.g., RCMP HDL, Pdblock, ACES) Write Block Hardware Devices (A-Card, FastBlock, NoWrite) 10/18/2006 27

Specifications Under Development String Searching File carving 10/18/2006 28

Available Test Reports Disk imaging: Sydex SafeBack 2.0, NTI Safeback 2.18, EnCase 3.20, GNU dd 4.0.36 (RedHat 7.1),FreeBSD 4.4 dd Software write block: RCMP HDL V0.4, V0.5, V0.7,V0.8, PDblock Write block devices: FastBloc, WiebeTech, Tableau, MyKey 10/18/2006 29

Test Reports in Progress Disk imaging: IXimager, EnCase V4, EnCase V5, linen Additional Write blocker models 10/18/2006 30

Available Testing Software FS-TST tools to test disk imaging: drive wipe, drive compare, drive hash (SHA1), partition compare. (DCCI uses these tools) SWBT tools to test interrupt 13 software write blockers 10/18/2006 31

Summary The tool user to makes informed choices about tools. The tool vendors get feedback for tool improvement. Independently tested tools are less likely to be successfully challenged in court. The specification process highlights technical issues that need consensus. Diverse organizations can test forensic tools in a comparable way. First step toward development of international standards for forensic tools. Programs similar to CFTT can be established. 10/18/2006 32

Jim Lyle www.cftt.nist.gov cftt@nist.gov Contacts Sue Ballou, Office of Law Enforcement Standards susan.ballou@nist.gov 10/18/2006 33