How To Do Digital Forensics



Similar documents
Digital Forensics Tutorials Acquiring an Image with FTK Imager

MSc Computer Security and Forensics. Examinations for / Semester 1

Incident Response and Computer Forensics

CCE Certification Competencies

Digital Forensic Techniques

Impact of Digital Forensics Training on Computer Incident Response Techniques

Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)


DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Scientific Working Group on Digital Evidence

Case Study: Hiring a licensed Security Provider

Digital Forensics & e-discovery Services

Computer Forensics Processing Checklist. Pueblo High-Tech Crimes Unit

EnCase Implementation Statement of Work

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

Overview of Computer Forensics

What is Digital Forensics?

Incident Response and Forensics

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

Guidelines on Digital Forensic Procedures for OLAF Staff

DATABASE ANALYST I DATABASE ANALYST II

Cell Phone Forensics For Legal Professionals

EnCase Implementation Statement of Work

Best Practices for Computer Forensics

A Short Introduction to Digital and File System Forensics

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Ricoh Legal. Live Data Acquisition: The New Default Standard for Capturing ESI?

CYBER FORENSICS (W/LAB) Course Syllabus

Page 1 of 5 Position Code #P Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters

Getting Physical with the Digital Investigation Process

Chapter 7 Securing Information Systems

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

CERIAS Tech Report GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford

Certified Digital Forensics Examiner

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.

To Catch a Thief: Computer Forensics in the Classroom

Computer Forensic Capabilities

Hands-On How-To Computer Forensics Training

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

Acronis Backup & Recovery 11

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Open Source Digital Forensics Tools

Reading Materials: Required Text Book: Marjie T. Britz (2009). COMPUTER FORENSICS AND CYBER CRIME; ISBN-13: ; 2 nd

Digital Forensics for Attorneys Overview of Digital Forensics

Digital Forensics, ediscovery and Electronic Evidence

Where is computer forensics used?

Journal of Digital Forensic Practice

Digital Forensics for Attorneys - Part 2

The Role of Digital Forensics within a Corporate Organization

FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres

Digital Forensics. Larry Daniel

EC-Council Ethical Hacking and Countermeasures

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Disaster Recovery Checklist Disaster Recovery Plan for <System One>

CERTIFIED DIGITAL FORENSICS EXAMINER

Acronis Backup & Recovery 11.5 Quick Start Guide

MFR IT Technical Guides

About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics

How To Image A Single Vm For Forensic Analysis On Vmwarehouse.Com

EnCase v7 Essential Training. Sherif Eldeeb

Lab III: Unix File Recovery Data Unit Level

Computer Forensics as an Integral Component of the Information Security Enterprise

Operating Systems Forensics

Open Source and Incident Response

InfoSec Academy Forensics Track

Hardware/Software Guidelines

Oracle VM Server Recovery Guide. Version 8.2

Domain 1 The Process of Auditing Information Systems

Computer Forensics using Open Source Tools

Course Forensic Science. Unit II History

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

CDFE Certified Digital Forensics Examiner (CFED Replacement)

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

Legal view of digital evidence

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS

IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE

Chapter 4. Operating Systems and File Management

Case study on asset tracing

Managed Security Services SLA Document. Response and Resolution Times

Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics

Avamar Backup and Data De-duplication Exam

The E-Discovery Process

Transcription:

Enterprise Risk Management Miami, FL Digital Forensics Risk Management and Information Systems Security Consulting Services January 2011

UMiami alumnus Bachelors: Information Systems and Marketing MS Computer Science / MBA Information Systems Telecommunications Certification Total Qualitt Certification Systems and Network Consultant Various Infrastructure and Security Manager Sony Latin America, Inc. IS Security Consultant Enterprise Risk Management CISSP, CISA, PCI QSA 2 Member of: IIA, ISSA, ISACA, Infragard, SFTA

- What is digital forensics? - Digital forensics taxonomy - Methodology -System description -Evidence collection -Analysis -Reporting - Demonstration Agenda 3

What is Forensic Science? Science - Organized study of natural phenomena Science - Application of the scientific method Forensis Latin meaning public, forum, discussion Forensic belonging to, suitable for use in courts or public for a Forensic Science any science used for the purpose of law 4

The Three Elements Science Evidence Law 5

Digital Forensics definition Forensics is most often understood to refer to the process or processes by which digital evidence is identified, preserved, analyzed and presented. 6

Computer Forensics Taxonomy Victim Network Subject Network Forensics Media Forensics 7

Methodology The overall forensic investigation methodology has the following 4 phases: System Description Evidence Collection Analysis Reporting 8

System Description Determine what the workstation or server is utilized for. Affect the way the investigation is executed. Unplug the machine or not? Shutdown, power off or not? Determine type of file system in use 9

Evidence Collection Evidence is defined as everything that can be collected from the system under investigation. IMPORTANT -> Avoid data loss Preserve the evidence Volatile Memory, Network status and connections, Processes running, Swap files. Chain of custody Establishes continuity of possession Proof of integrity 10

Direct Identification Use indelible marker to place case, item number, date and initials on item. Sharpie or Etching is best. Indirect Place item in a sealed container Record serial numbers and description Combined evidence 11

Refers to: Chain of Custody Unbroken control of evidence from seizure to court The paper/electronic record which demonstrates this control Is the most often used challenge to seized evidence A successful challenge may weaken or eliminate evidence from consideration at trial Applies to original, copy and derivative evidence 12

Evidence Examples 13

File Systems A system for organizing directories and files, generally in terms of how it is implemented in the disk operating system. Units are called sectors (512 bytes or 2 to the power of 9) Sectors are organized in clusters or Allocation Units. 14

Collecting Evidence (cont.) Sanitize the hard drive you will use to store the evidence (Wipe programs) Ensure that it is not possible to overwrite the evidence Use a hardware device to write protect the accesses Windows: HKLM\System\CurrentControlSet\Control\StorageDevicePolicies WriteProtect{REG_DWORD}=1 Unix: mount the device with the read-only option mount -o ro,loop,nodev,noexec images/honeypot.hda8.dd mnt mount r /dev/sda1 /mnt/usb 15

Collecting Evidence (cont.) Backup tools - don t work Commercial tools: Encase, Image, Forensic Toolkit, Forensic Replicator DD is a common UNIX program whose primary purpose is the low-level level copying and conversion of files. DCFLDD is the DD version with Steroids Other tools: PCAT, WMFT, Memdump 16

Real investigation takes place Two steps: Analysis Settings goals and criteria Timeline creation bedrock of the investigation. Everything centers around it. Map of activities. Data Recovery Key function of forensics. 17

Examining Media Goals Software tools & Methodology The Examiner s notion of what s in/out What the customer wants Media Criteria Data 18

Setting Goal & Criteria I m looking for: The Case Who What When Where How Why In what objects will I find: The Evidence 19

Data Recovery What data we should recover? Create a dirty word list Extract unallocated disk units Search the image using the dirty list 20

Reporting Examination Output and Reporting: Ensure on preservation of the provided documentation Ensure on proper format Ensure on the output clarity and documentation logic Ensure it meets the examination goals and scope 21

Report Is treated as a legal document Represents the results of the forensic exam Informs and states an opinion Will be the basis for testimony examination Associated with lab notes and exhibits 22

Quality Assurance Report with notes and printout are reviewed Self-review Peer review Admin review Release a report only once the proper QA has been completed Any conflicts should be resolved prior to submission Can t pull a report back 23

Forensic Information Theory Media Data Information Evidence 24

Exhibit Presentation Exhibits are connected to the testimony as facilitating objects They are not considered as evidence by themselves They need to be backed up by illustration, oral representation, and explanation. Support technical documentation to jury 25

Ensure on Illustration Reason to have exhibits: Illustrate on the described technology Illustrate any associated process Illustrate findings and results 26

Exhibit Characteristics Size Should be viewable, noted and readable by anyone in the jury Should be clear and concise Should present a point Simple yet efficient Of professional quality 27

Exhibit Characteristics The following should be clear and easily identifiable: Case numbers Item numbers Physical/Logical locations etc Separate exhibits by item/section Technical Logical 28 etc

Demonstration Case An anonymous caller has informed a corporate security department that a trusted employee, Jack Lansky, has been selling the company s secrets to a corporate spy. The caller alleges that Lansky has sent company proprietary and/or Trade Secret information to Russians in return for a trip to the Caribbean. Based on this information, security officers began an investigation. Facts: Lansky has been reported being on a cruise at the Caribbean Lansky is a top level engineer who has access to the company's confidential and sensitive information There was found a 1GB DataTraveler Kingston USB drive on Lansky s desk drawer. The company already did their internal investigation, and decided to handle the USB drive s image acquisition and handling of chain of evidence. They didn t find anything of value regarding the case. Company decides to hire us for a second opinion on the case and the USB drive image. We are denied access to image Lansky s workstation. We further ask for a copy of the workstation s registry, which is provided to us. 29

Questions 30