A Short Introduction to Digital and File System Forensics



Similar documents
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

CCE Certification Competencies

Hands-On How-To Computer Forensics Training

1/26/15. Chapter 2 Crime Scene

Computer Hacking Forensic Investigator v8

Digital Forensic Tool for Decision Making in Computer Security Domain

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics

EC-Council Ethical Hacking and Countermeasures

Digital Forensics Tutorials Acquiring an Image with FTK Imager

MSc Computer Security and Forensics. Examinations for / Semester 1

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

Overview of Computer Forensics

Design Document for Implementing a Digital Forensics Laboratory

Digital Forensic Techniques

RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES

Digital Forensics and Cyber Crime Datamining

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

Survey of Disk Image Storage Formats

EnCase 7 - Basic + Intermediate Topics

Survey on Different Phases of Digital Forensics Investigation Models

Term Report. Forensics for IT

Digital Forensics for Attorneys Overview of Digital Forensics

Computer Forensics. Securing and Analysing Digital Information

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.

Cell Phone Forensics For Legal Professionals

Spoliation of Evidence. Prepared for:

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

Incident Response and Forensics

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS

Bringing Science to Digital Forensics with Standardized Forensic Corpora.

InfoSec Academy Forensics Track

Journal of Digital Forensic Practice

Scene of the Cybercrime Second Edition. Michael Cross

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Linux in Law Enforcement

CYBER FORENSICS (W/LAB) Course Syllabus

Where is computer forensics used?

Computer Forensic Tools. Stefan Hager

Digital Evidence Search Kit

Detection of Data Hiding in Computer Forensics. About Your Presenter

Computer Forensics: an approach to evidence in cyberspace

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

How To Do Digital Forensics

Large Scale Cloud Forensics

Computer Forensics as an Integral Component of the Information Security Enterprise

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

What is Digital Forensics?

About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics

Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Taxonomy of Anti-Computer Forensics Threats

CDFE Certified Digital Forensics Examiner (CFED Replacement)

Ten Deadly Sins of Computer Forensics

Framework for Live Digital Forensics using Data Mining

Computer Forensic Capabilities

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

CERIAS Tech Report GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford

Microsoft Vista: Serious Challenges for Digital Investigations

Digital Forensics & e-discovery Services

Introduction to Computer Forensics ITP 499 (3 Units)

Course Structure 2015/2016

An overview of IT Security Forensics

Design and Implementation of a Live-analysis Digital Forensic System

INF 3510 INFORMATION SECURITY Guest on Digital Forensics April André Årnes, PhD

NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP)

Impact of Digital Forensics Training on Computer Incident Response Techniques

Admissibility of Digital Photographs in Criminal Trials

Services. Computer Forensic Investigations

Open Source Digital Forensics Tools

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Keywords: Computers, digital evidence, digital evidence bags, forensics, forensics tools

Computer Forensics Today

How Important are Facebook Artifacts?

Getting Physical with the Digital Investigation Process

Digital Forensic Research: Current State-of-the-Art

IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE

EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS

Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation

Chapter 7 Securing Information Systems

Quality Digital Forensics - the Frontier


State of the art of Digital Forensic Techniques

Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall MWF 1:00-2:300, BRIM 301

Digital Forensics. Larry Daniel

Running head: DIGITAL EVIDENCE: 1

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

Transcription:

Antonio Barili Lab Dept. of Industrial and Information Engineering University of Pavia (Italy) antonio.barili@unipv.it Every contact leaves a trace Culprit Scene Victim Edmond Locard (1877-1966) 2015 - Università degli Studi di Pavia - Antonio Barili 2 1

Exchange of Energy Exchange of Information Exchange of Matter 2015 - Università degli Studi di Pavia - Antonio Barili 3 The uncovering and examinaton of artifacts with evidentiary value located on all kind of electronic devices 2015 - Università degli Studi di Pavia - Antonio Barili 4 2

The Challenges of Data authenticity and volatility Data scale Data variety 2015 - Università degli Studi di Pavia - Antonio Barili 5 The Purposes of Find evidence of crimes that took place in the real world (e.g. stalking, murder) Find evidence of crimes that inherently involved a computer system (e.g. hacking) 2015 - Università degli Studi di Pavia - Antonio Barili 6 3

Why is so powerful? Computer system store a vast amount of information Intentionally (documents, databases, log files) Unintentionally (partially erased documents and other artifacts) Computer systems are windows into the past!!! 2015 - Università degli Studi di Pavia - Antonio Barili 7 What makes Digital Evidence different from traditional forms of evidence Witnesses can testify in Courts Traditional documents may be directly evaluated by judges and jurors Digital Evidence needs and expert witness to be translated into meaningful evidence to the Court 2015 - Università degli Studi di Pavia - Antonio Barili 8 4

Useful byproducts of Data recovery Auditing and incident response Security testing of hardware and services 2015 - Università degli Studi di Pavia - Antonio Barili 9 Procedures and methods Legal issues Technical issues The bound is not what is technically possible, but what is cost-effective for a particular case 2015 - Università degli Studi di Pavia - Antonio Barili 10 5

The Model (RFC 3227 / 2002) Identification Acquisition Preservation Analysis Presentation 2015 - Università degli Studi di Pavia - Antonio Barili 11 The Model - Acquisition Physical images (disk images) Logical images (documents and files) Live data capture (memory dumps) Network data capture (logfiles, packet capture) 2015 - Università degli Studi di Pavia - Antonio Barili 12 6

Example - File System Forensic dd if=/dev/sdb of=/temp/image.raw Forensic image formats: RAW (DD), EWF; AFF 2015 - Università degli Studi di Pavia - Antonio Barili 13 Example - File System Forensics dd if=/dev/sdb of=/temp/image.raw Write Blockers preserve original evidence from tampering 2015 - Università degli Studi di Pavia - Antonio Barili 14 7

Example - File System Forensics 2015 - Università degli Studi di Pavia - Antonio Barili 15 Example - File System Forensics Example - File System Forensics DEMO TEST00 FORMATTED AND WIPED TEST01 JPEG IMAGE ALLOCATED TEST02 JPEG IMAGE DELETED TEST03 FORMATTED (NOT WIPED) 2015 - Università degli Studi di Pavia - Antonio Barili 16 8

Example - File System Forensics Volume metadata (MBR, GPT...) File System metadata (FAT, MFT, indexes, logfiles...) File metadata (file headers, EXIF codes...) File content 2015 - Università degli Studi di Pavia - Antonio Barili 17 Example - File System Forensics Preserving information integrity Document any operation Chain of custody Hashing 2015 - Università degli Studi di Pavia - Antonio Barili 18 9

Evaluating Digital Evidences The Daubert Standard a. Empirical testing: whether the theory or technique is falsifiable, refutable, and/or testable b. Whether it has been subjected to peer review and publication c. The known or potential error rate d. The existence and maintenance of standards and controls concerning its operation e. The degree to which the theory and technique is generally accepted by a relevant scientific community 2015 - Università degli Studi di Pavia - Antonio Barili 19 Evaluating Digital Evidences FRE 702 702. TESTIMONY BY EXPERT WITNESSES A witness who is qualified as an expert by knowledge, skill, experience, training, or education may testify in the form of an opinion or otherwise if: (a) The expert s scientific, technical, or other specialized knowledge will help the trier of fact to understand the evidence or to determine a fact in issue; (b) The testimony is based on sufficient facts or data; (c) The testimony is the product of reliable principles and methods; and (d) The expert has reliably applied the principles and methods to the facts of the case. 2015 - Università degli Studi di Pavia - Antonio Barili 20 10

Example - File System Forensics A GPS Navigation Device was imaged, all strings longer than 8 chars (ascii or unicode) were carved from the image using sysinternals string.exe Note: carving requires the image to be mounted as a RAW (uncompressed) file 2015 - Università degli Studi di Pavia - Antonio Barili 21 One final question: Is digital evidence that much fragile? Friends, Romans, countrymen, lend me your ears I come to bury Caesar, not to praise him. The evil that men do lives after them The good is oft interred with their bones FaceBook was yet to come! 2015 - Università degli Studi di Pavia - Antonio Barili 22 11

References [1] Garfinkel, S. L., Digital forensics, Am. Sci., vol. 101, no. 5, pp. 370 377, 2013. [2] Carrier, B., File system forensic analysis, Addison- Wesley, 2005. 2015 - Università degli Studi di Pavia - Antonio Barili 23 Thank You! 2015 - Università degli Studi di Pavia - Antonio Barili 24 12