Computer Forensics Principles and Practices



Similar documents
Comparing and Contrasting Windows and Linux Forensics. Zlatko Jovanovic. International Academy of Design and Technology

EnCase 7 - Basic + Intermediate Topics

MSc Computer Security and Forensics. Examinations for / Semester 1

COMPUTER FORENSICS. DAVORY: : DATA RECOVERY

Course Title: Computer Forensic Specialist: Data and Image Files

Linux Kernel Architecture

Operating Systems Forensics

(b) slack file space.

Hands-On How-To Computer Forensics Training

1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

Computer Forensics: Permanent Erasing

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Windows 7: Current Events in the World of Windows Forensics

Understanding Backup and Recovery Methods

Installing Windows XP Professional

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

Personal Cloud. Support Guide for Mac Computers. Storing and sharing your content 2

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.

Part 3: Accessing Local drives and printers from the Terminal Server

Forensics on the Windows Platform, Part Two

Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana USA

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

HW 07: Ch 12 Investigating Windows

Digital Forensic Tool for Decision Making in Computer Security Domain

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

AccuGuard Desktop and AccuGuard Server User Guide

RECOVERING DIGITAL EVIDENCE FROM LINUX SYSTEMS

What is Digital Forensics?

Topic 2: Computer Management File Management Folders A folder is a named storage location where related files can be stored. A folder also known as

Global Image Management System For epad-vision. User Manual Version 1.10

AxCrypt File Encryption Software for Windows. Quick Installation Guide. Version January 2008

Novell Filr. Windows Client

Lab: Data Backup and Recovery in Windows XP

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Microsoft" Windows8 Home Server

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

MCSE TestPrep: Windows NT Server 4, Second Edition Managing Resources

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

Chapter 4. Operating Systems and File Management

DISK DRIVE MAINTENANCE. 1. Disk Cleanup

Excerpts from EnCase Introduction to Computer Forensics

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS

Activity 1: Scanning with Windows Defender

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

TELE 301 Lecture 7: Linux/Unix file

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

Backup Exec 2010: Archiving Options

General Computing Network (GCN) Guide for Mac OS X

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Lab - Data Backup and Recovery in Windows XP

Telecom DaySave. User Guide. Client Version

Introduction to Windows XP

Nortel Networks Call Center Reporting Set Up and Operation Guide

HTTP-FUSE PS3 Linux: an internet boot framework with kboot

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Pro Bundle Evaluator s Guide Software Pursuits, Inc.

Managing Applications, Services, Folders, and Libraries

Microsoft Vista: Serious Challenges for Digital Investigations

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

User Guide Win7Zilla

CCE Certification Competencies

UNDELETE Users Guide

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Beckhoff TwinCAT. Creating Boot Projects for TwinCAT

Introduction Wiping Transparent Wiping Transparent Wiping Reserved Space Enforcer NOTE: BCWipe Enforcer Jetico Central Manager custom wiping schemes

Persona Backup and OS Migration for insync Private Cloud 5.5. June 16, 15

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Linux Overview. The Senator Patrick Leahy Center for Digital Investigation. Champlain College. Written by: Josh Lowery

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems

Chapter 5: Fundamental Operating Systems

UNDELETE Users Guide

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

1/5/2013. Technology in Action

Copyright

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)

Create!form Folder Monitor. Technical Note April 1, 2008

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Digital Forensics with Open Source Tools

Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics

BACKUP & RESTORE (FILE SYSTEM)

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

RECOVERING FROM SHAMOON

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Find the Who, What, Where and When of Your Active Directory

How to monitor AD security with MOM

NTFS Undelete User Manual

Installing a Second Operating System

Transcription:

Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 7: Investigating Windows, Linux, and Graphics Files

Objectives Conduct efficient and effective investigations of Windows systems Find user data and profiles in Windows folders Locate system artifacts in Windows systems Examine the contents of Linux folders Pearson Education Computer Forensics: Principles and Practices 2

Objectives (Cont.) Identify graphic files by file extensions and file signatures Identify what computer forensics graphic tools and techniques can reveal and recover Pearson Education Computer Forensics: Principles and Practices 3

Introduction In many cases you may have gigabytes or even terabytes of data that must be searched for evidence. This chapter helps maximize efficiency of the search by showing default locations of file storage and hiding techniques of wrongdoers. Pearson Education Computer Forensics: Principles and Practices 4

Investigating Windows Systems Activities of the user result in user data User profiles Program files Temporary files (temp files) Special application-level files Pearson Education Computer Forensics: Principles and Practices 5

Investigating Windows Systems (Cont.) System data and artifacts are generated by the operating system Metadata Windows system registry Event logs or log files Swap files Printer spool Recycle Bin Pearson Education Computer Forensics: Principles and Practices 6

Hidden Files Files that do not appear by default are hidden files These can be viewed through the following steps: Open Windows Explorer Go to Tools > Folder Options > View > Hidden files and folders Select Show hidden files and folders Click OK Pearson Education Computer Forensics: Principles and Practices 7

Investigating Windows Systems (Cont.) Data and user authentication weaknesses of FAT Userids are not required Only attributes are associated with files or folders Data and user authentication improvements in NTFS Separation of duties Anonymity of the user Pearson Education Computer Forensics: Principles and Practices 8

Investigating Windows Systems (Cont.) Identify the operating systems of a target hard drive by: Operating system folder names The folder for the Recycle Bin The construction of the user root folders because of the differences in the way user data is kept Pearson Education Computer Forensics: Principles and Practices 9

Finding User Data and Profiles in Windows Folders Documents and Settings folder Contains a user root folder for each user account created on the computer Windows NT and above automatically install Administrator All users Default user (hidden) Pearson Education Computer Forensics: Principles and Practices 10

Finding User Data and Profiles in Windows Folders (Cont.) Data stored in the user root folder: Desktop settings, such as wallpaper, screensavers, color schemes, and themes Internet customizations, such as the homepage, favorites, and history Application parameters and data, such as e-mail and upgrades Personal files and folders, such as My Documents, My Pictures, and so on Pearson Education Computer Forensics: Principles and Practices 11

Finding User Data and Profiles in Windows Folders (Cont.) Some of the subfolders in the user root folder include: Application data (hidden) Cookies Desktop Favorites Local Settings (hidden) My Documents NetHood (hidden) Pearson Education Computer Forensics: Principles and Practices 12

Location of User Root Folders Operating System (Platform) User Root Folder Location Windows 9x <partition>:\windows\profiles\userid USER.DAT file Windows NT <partition>:\winnt\profiles\userid NTUSER.DAT file Windows 2000 and Windows XP <partition>:\documents and Settings \userid NTUSER.DAT file Pearson Education Computer Forensics: Principles and Practices 13

In Practice: Temp Internet Files Provide Valuable E-Evidence Data stored in the Temporary Internet Files folder can be valuable supporting evidence, even if deleted Statute 18 U.S.C. 2256(8) rules as pornography any data stored on computer disk that can be converted into a visual image Pearson Education Computer Forensics: Principles and Practices 14

Investigating System Artifacts Types of metadata Descriptive: describes a resource for purposes such as discovery and identification Structural: indicates how compound objects are put together Administrative: provides information to help manage a resource, such as when it was created, last accessed, and modified Be alert for alternate data streams (ADS) Pearson Education Computer Forensics: Principles and Practices 15

In Practice: Searching for Evidence Do not use the suspect system itself to carry out a search for evidence Using Windows to search and open files can change the file s metadata Such changes may cause evidence to be disallowed in court Pearson Education Computer Forensics: Principles and Practices 16

Investigating System Artifacts (Cont.) Registry Can reveal current and past applications, as well as programs that start automatically at bootup Viewing the registry requires a registry editor Event logs track system events Application log tracks application events Security log shows logon attempts System log tracks events such as driver failures Pearson Education Computer Forensics: Principles and Practices 17

Investigating System Artifacts (Cont.) Swap file/page file Used by the system as virtual memory Can provide the investigator with a snapshot of volatile memory Print spool May contain enhanced metafiles of print jobs Recycle Bin/Recycler Stores files the user has deleted Pearson Education Computer Forensics: Principles and Practices 18

Shredding Data Third-party software packages can be used to delete data and actually overwrite the information, essentially shredding the data Pearson Education Computer Forensics: Principles and Practices 19

Investigating Linux Systems Windows can have many users with administrator access, but Linux has only one administrative account, called root Root account has complete control of the system In Linux, all devices, partitions, and folders are seen as a unified file system A typical installation creates three partitions: the root, boot, and swap partitions Pearson Education Computer Forensics: Principles and Practices 20

Investigating Linux Systems (Cont.) The Linux file system includes the data structure as well as the processes that manage the files in the partition Linux s virtual file system provides a common set of data structures: Superblock Inode Dentry Data block Pearson Education Computer Forensics: Principles and Practices 21

Investigating Linux Systems (Cont.) Seven different file types available in Linux: Normal files Directories Links Named pipes Sockets Block devices Character devices Pearson Education Computer Forensics: Principles and Practices 22

Investigating Linux Systems (Cont.) Default Linux installations generally include system directories such as the following: /boot /dev /proc /root /etc /home /lib /lost+found /sbin /tmp /usr /var /mnt Pearson Education Computer Forensics: Principles and Practices 23

Investigating Linux Systems (Cont.) Key Linux files and directories to investigate: /etc/passwd /etc/shadow /etc/hosts /etc/sysconfig/ /etc/syslog.conf Pearson Education Computer Forensics: Principles and Practices 24

Investigating Linux Systems (Cont.) Deleted files Check the Trash can for each login user for deleted files that can be recovered Using grep to search file contents Grep allows for sophisticated character-based data searches Compressed files Some Linux applications such as OpenOffice automatically compress data files Pearson Education Computer Forensics: Principles and Practices 25

Graphic File Forensics The investigator can use file signatures to determine where data starts and ends and the file type File extension (such as.jpg) one way to identify a graphic file A user can easily change the file extension, but the data header does not change Forensic tools can resolve conflicts between file extensions and file types Pearson Education Computer Forensics: Principles and Practices 26

Graphic File Forensics (Cont.) The process of retrieving all relevant pieces of a file is called data carving or data salvaging An investigator may have to reconstruct the data header using file signature information Layered graphic files (such as Photoshop or Corel) can hide information behind layers Graphics saved as JPEG, TIFF, GIF, or BMP do not have layers Pearson Education Computer Forensics: Principles and Practices 27

Graphic File Forensics (Cont.) Steganography is a form of data hiding in which a message is hidden within another file Data to be hidden is the carrier medium The file in which the data is hidden is the steganographic medium Both parties communicating via steganography must use the same stego application Pearson Education Computer Forensics: Principles and Practices 28

Graphic File Forensics (Cont.) Steganography is difficult to detect; the following clues may indicate stego use Technical capabilities or sophistication of the computer s owner Software clues on the computer Other program files that indicate familiarity with data-hiding methods Multimedia files Type of crime being investigated Pearson Education Computer Forensics: Principles and Practices 29

In Practice: Child Pornography Hiding criminal content within innocent files can allow perpetrators such as child pornographers to exchange information A scenario is described by which child pornographers can easily pass information to others in the ring Pearson Education Computer Forensics: Principles and Practices 30

Summary Search times can be reduced through the use of default folders and operating system artifacts The skill level of the user will determine whether this is an effective use of time in the case Pearson Education Computer Forensics: Principles and Practices 31

Summary (Cont.) A savvy user can hide data through: Nonstandard file folders Renaming file types Using layered graphics Masquerading data with steganographic techniques Pearson Education Computer Forensics: Principles and Practices 32