Indian Efforts in Cyber Forensics



Similar documents
Hands-On How-To Computer Forensics Training

Guide to Computer Forensics and Investigations, Second Edition

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

CYBER FORENSICS (W/LAB) Course Syllabus

EC-Council Ethical Hacking and Countermeasures

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition

Digital Forensics Tutorials Acquiring an Image with FTK Imager

MSc Computer Security and Forensics. Examinations for / Semester 1

Chapter 7 Securing Information Systems

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches

CDFE Certified Digital Forensics Examiner (CFED Replacement)

InfoSec Academy Forensics Track

Impact of Digital Forensics Training on Computer Incident Response Techniques

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.

Digital Forensic Techniques

Computer Forensic Tools. Stefan Hager

Overview of Computer Forensics

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

CERTIFIED DIGITAL FORENSICS EXAMINER

Computer Hacking Forensic Investigator v8

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

EnCase v7 Essential Training. Sherif Eldeeb

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Computer Forensics Processing Checklist. Pueblo High-Tech Crimes Unit

Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Developing Computer Forensics Solutions for Terabyte Investigations


Digital Forensics & e-discovery Services

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Best Practices. For Seizing Electronic Evidence. v.3 A Pocket Guide for First Responders. United States Secret Service

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Digital Evidence Search Kit

Framework for Live Digital Forensics using Data Mining

Health Informatics in India : Vision and Activities

Information Technologies and Fraud

Scene of the Cybercrime Second Edition. Michael Cross

Computer Forensics Basics, First Responder, Collection of Evidence

Digital Forensics. Module 4 CS 996

CHAPTER 18 CYBER CRIMES

Getting Physical with the Digital Investigation Process

Chapter 3: The Investigator s Office and Laboratory

ISACA-Mumbai Chapter CYBER FORENSICS RAKESH M GOYAL. (rakesh@sysman.in)

Advanced Diploma In Hardware, Networking & Server Configuration

Virtual FAX Function in Vigor IPPBX 2820 Series

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Guidelines on Digital Forensic Procedures for OLAF Staff

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

An overview of IT Security Forensics

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

CERIAS Tech Report GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

Page 1 of 5 Position Code #P Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters

Design Document for Implementing a Digital Forensics Laboratory

Case Study: Mobile Device Forensics in Texting and Driving Cases

Certified Secure Computer User

Computer Forensic Capabilities

Certified Secure Computer User

Enterprise Erase LAN

Ahmedabad. Bangalore. Chandigarh. Charles Sturt University Curtin University CQUniversity Deakin University James Cook University - Brisbane

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection

Mobile Device Forensics. Rick Ayers

Computer Forensics Discipline

EAGLE EYE Wi-Fi. 1. Introduction

Time Clock V1.2 User Manual. Time Clock V1.2. User Manual. Page 1.

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

Digital Forensics. Larry Daniel

CYBERCRIME AND THE LAW

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

CCE Certification Competencies

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

Incident Response. Six Best Practices for Managing Cyber Breaches.

Design and Implementation of a Live-analysis Digital Forensic System

System Security Policy Management: Advanced Audit Tasks

Case Study: Smart Phone Deleted Data Recovery

Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

Managing Remote Access

Short Manual Intellect v SP2 module Unipos Contents:

Technical Procedure for Evidence Search

Computer Forensics. Securing and Analysing Digital Information

NetWrix Server Configuration Monitor

RECOMMENDED HARDWARE CONFIGURATION FOR SCRB RECOMMENDED SOFTWARE REQUIREMENT FOR SCRB

Loophole+ with Ethical Hacking and Penetration Testing

User s Manual Network Management Card

DRAFT Standard Statement Encryption

Digital Forensics at the National Institute of Standards and Technology

Transcription:

Indian Efforts in Cyber Forensics B. Ramani Addl. Director 10-Feb-09 Resource Centre for Cyber Forensics 1

Presentation Overview About C-DAC Resource Centre for Cyber Forensics C-DAC Cyber Forensics Solutions Future Plans 10-Feb-09 Resource Centre for Cyber Forensics 2

National Coverage C-DAC, Pune C-DAC, Bangalore C-DAC, Delhi C-DAC, Hyderabad C-DAC, Mumbai C-DAC, Chennai C-DAC, Kolkata C-DAC, Mohali C-DAC, Noida C-DAC, Trivandrum

C-DAC Trivandrum An ISO 9001-2000 certified premier R&D Institution involved in the design, development and deployment of world class electronic and IT solutions for economic and human advancement, under DIT,Govt of India Established in 1974 as Keltron R&D Center; Taken by GoI in 1988; Formerly Known as ERDCI Work force of 800+

AREAS OF RESEARCH Control & Instrumentation Power Electronics Broadcast & Communications Strategic Electronics ASIC Design Cyber Forensics

Resource Centre for Cyber Forensics The Resource Centre for Cyber Forensics (RCCF) is the premier centre for cyber forensics in India. It was setup in C- DAC, Thiruvananthapuram by the Ministry of Communications and Information Technology and has been functioning for the past three years. The primary objectives of RCCF are Develop Cyber Forensics tools based on requirements from Law Enforcement Agencies Carry out advanced research in cyber forensics Provide technical support to LEAs 10-Feb-09 Resource Centre for Cyber Forensics 6

C-DAC Cyber Forensics Solutions 10-Feb-09 Resource Centre for Cyber Forensics 7

C-DAC Tools CyberCheck Suite Disk Forensics Tools TrueBack V3.1 on Linux Disk Imaging Tool TrueBack V1.0 on Windows Disk Imaging Tool CyberCheck V3.2 on Windows Data Recovery and Analysis Tool NetForce Suite Network Forensics Tools CyberInvestigator V1.0 on Windows Forensic Log Analyzer NeSA V1.0 on Linux Network Session Analyzer EmailTracer V3.0 on Windows Tool for tracing sender of email DeviceAnalyst Suite Device Forensics Tools PDA Imager & Analyzer Tool for imaging and analyzing PDA contents SIM Card Imager & Analyzer Tool for imaging and analyzing GSM SIM Cards CDR Analyzer Tool for analyzing Call Data Records Cyber Forensics Hardware Tools TrueImager High speed H/W based Disk Imaging Tool TrueLock H/W based drive lock for write protecting IDE/SATA disks 10-Feb-09 Resource Centre for Cyber Forensics 8

TrueBack Tuesday, February 10, 2009 9

TrueBack Disk Imaging Tool Software Tool for seizing, acquiring and authenticating Digital Evidence Indigenously developed by RCCF, C-DAC, Thiruvananthapuram Widely used and Certified by agencies like NPA, CBI, IB, CBI Academy, Kerala Police, Forensics Science Laboratories and GEQDs Import substitution for similar products Cost-effective solution Ideal for the use of Indian Law Enforcement Agencies

TrueBack Disk Imaging Tool National Institute of Standards and Technology (NIST), USA, disk imaging tool specification compliant Implementation of National Police Academy (NPA) procedures for Seizure and Acquisition Preview, Seize, Acquire and Seize & Acquire modes of operation Imaging of IDE, SCSI, SATA, CD, DVD, Floppy and USB devices Storage media content previewing facility before seizure and acquisition Report generation in each mode of operation

TrueBack Disk Imaging Tool Main User Interface

TrueBack Disk Imaging Tool Collecting case details

TrueBack Disk Imaging Tool Selecting media for Seizure

TrueBack Disk Imaging Tool Case data summary

TrueBack Disk Imaging Tool TrueBack Seizure process in progress

TrueBack Disk Imaging Tool Seizure process completed

TrueBack Disk Imaging Tool Seizure Report

TrueBack Disk Imaging Tool Hash values of media and blocks

CyberCheck Tuesday, February 10, 2009 20

CyberCheck Data Recovery and Analysis Tool Software Tool for authenticating, recovering, analyzing and reporting Digital Evidence Indigenously developed by RCCF, C-DAC, Thiruvananthapuram Widely used (Over 175 copies have been sold) and Certified by agencies like NPA, CBI, IB, CBI Academy, Kerala Police, Forensics Science Laboratories and GEQDs Import substitution for similar products Cost-effective solution Ideal for the use of Indian Law Enforcement Agencies

CyberCheck Data Recovery and Analysis Tool Features Indian Language support Powerful Data recovery facilities High speed search facility Comprehensive Timeline features Detailed Report Generation facility Integrated Email and Internet History Viewer Facility for identifying password protected files Facility for viewing nested ZIP files

CyberCheck Data Recovery and Analysis Tool Unicode and Indian Language Support

CyberCheck Data Recovery and Analysis Tool Table and Disk views

CyberCheck Data Recovery and Analysis Tool Picture Gallery View

CyberCheck Data Recovery and Analysis Tool Timeline View

CyberCheck Data Recovery and Analysis Tool Search hits view

CyberCheck Data Recovery and Analysis Tool Recovery of deleted file

CyberCheck Data Recovery and Analysis Tool Report generated by CyberCheck

EmailTracer Tuesday, February 10, 2009 30

EmailTracer S/W tool for tracing sender of an email Features Trace the originating IP address and other details from email header Generates detailed HTML report of email header analysis Find the city level details of the sender Plot Route traced by the mail Display the originating geographic location of the mail in the world map Keyword searching facility on email content including attachment Tuesday, February 10, 2009 31

EmailTracer S/W tool for tracing sender of an email Tuesday, February 10, 2009 32

EmailTracer S/W tool for tracing sender of an email Tuesday, February 10, 2009 33

EmailTracer S/W tool for tracing sender of an email EmailTracer WhoIs Search Tuesday, February 10, 2009 34

EmailTracer S/W tool for tracing sender of an email EmailTracer NS LookUp Tuesday, February 10, 2009 35

EmailTracer S/W tool for tracing sender of an email Email Tracer IP TraceBack Tuesday, February 10, 2009 36

EmailTracer S/W tool for tracing sender of an email Tuesday, February 10, 2009 Detailed Report 37

CyberInvestigator Tuesday, February 10, 2009 38

CyberInvestigator Indigenously developed by CDAC Thiruvananthapuram Helps Law Enforcement Agencies in investigating Cyber Crimes Log analysis tool Analyses Windows and Linux Logs Offline Intrusion Analysis Querying facility

Features of CyberInvestigator Supports analysis of offline logs Built in & User defined queries. Signature based Offline Intrusion Analysis Supports analysis of Windows event logs Supports analysis of Linux logs like message log, utmp,wtmp & Cron Supports web traffic analysis Supports analysis of Access log & IIS Log Collects information regarding the insertion of USB devices Collects information regarding unauthorised access

CyberInvestigator- Main User Interface

Query Interface for Windows Event log

Analysis O/P of wtmp log

Network Session Analyzer (NeSA) Tuesday, February 10, 2009 44

NeSA Indigenously developed by CDAC Thiruvananthapuram Helps Law Enforcement Agencies in investigating Cyber Crimes Offline Network session analysis tool Reconstructs network sessions from dump files Helps in network trouble shooting and debugging Misuse detection Gather network statistics

Features of NeSA Session Reconstruction - HTTP, SMTP, POP3 and FTP Displays the data in Hex view, Image view, File view and Mail view Powerful & Flexible filtering and searching facility Filtering based on MAC, IP, Port, Protocol, Date and Time Facility to export reconstructed files Statistics generation based on different criteria Time zone based analysis

POP3 Session Hex View

HTTP Session Thumb Nail View

POP3 Session Mail View

PDA Imager & Analyzer Tuesday, February 10, 2009 50

Introduction Many criminals are now using electronic devices other than PCs to commit illegal activities. Cellular telephones, Smart Phones, and Personal Digital Assistants (PDAs) are only a few of the devices that must now be examined by forensic investigators. CDAC(T) has developed forensics software and hardware tools for the analysis of such devices and PDA Forensics Suite is one among them. PDA Forensics Suite is a is a software tool to forensically acquire, analyze and present the digital evidence from WinCE and Palm OS based PDAs/Smart Phones before the court of law. It consists of two software tools - PDA Imager and PDA Analyzer

PDA Imager PDA Imager is used to forensically image PDAs and Smart Phones. It performs logical and physical acquisition of the devices. It also performs Hashing for authenticating the evidence. Version 1.0 of this software supports acquisition of WinCE and Palm OS based PDAs and Smart Phones. This tool is developed as per the directions provided by the NIST for handheld devices.

PDA Imager Features Standard Windows application Imaging tool for WinCE/Pocket PC/ Windows Mobile/Palm OS PDAs. Acquisition through USB connection. Supports physical and logical acquisition. Logical acquisition includes files, database and registry. Supports MD5 Hashing. Creates a single evidence file with a specific format. Supports comprehensive HTML reporting.

PDA Imager

Seizure & Acquisition PDA Imager

Acquiring PDA

Acquisition Report

PDA Analyzer PDA Analyzer is used to forensically examine the evidence collected from PDAs and Smart Phones. It takes the acquired evidence file taken by PDA Imager as input and identify the required information from the image if present and display it in a file viewer with all details.

PDA Analyzer Features Standard Windows application. User login facilities. Creates log of each analysis session and analyzing officer s details. Explorer type view of contents of the whole evidence file. Display of folders and files with all attributes. Text/Hex view of the content of a file. Picture view of an image file. Gallery view of images. Timeline View of Files Single and Multiple Keyword search. Search with GREP expressions. File search based on extension. Book marking facility for data, files and folders Registry viewer

PDA Analyzer

File Viewer

Gallery Viewer

Timeline Viewer Features(Contd.)

Analysis Report Features(Contd.)

SIM Card Imager & Analyzer Tuesday, February 10, 2009 65

SIM Card Imager & Analyzer A forensic acquisition tool for GSM Sim Cards Indigenously developed by Resource Centre for Cyber Forensics Analysis methods as per NIST guidelines Generates a detailed report for presentation in court

SIM Card Imager & Analyzer Acquires the following contents from SIM Card Phone Book Messages Location Information IMSI Last Dialed Numbers

SIM Card Imager & Analyzer

SIM Card - Acquisition

SIM Card - Acquisition

SIM Card - Acquisition

SIM Card - Analysis Phone Book Details

SIM Card - Analysis Message Details

SIM Card - Analysis Location Information

SIM Card - Analysis Message Summary

SIM Card - Analysis Hash Values of different items

Cyber Forensics Hardware Tools TrueImager & TrueLock Tuesday, February 10, 2009 77

Hardware Tools TrueImager A disk forensic hardware tool for seizing and acquiring storage media from the scene of cyber crime specially designed for Indian Law Enforcement Agencies TrueLock A hardware forensic tool for write protecting suspect storage media while seizing and acquiring the media from the scene of cyber crime

Features & Benefits Smart, Portable handheld Cyber Forensics Digital Evidence Image Recorder. - Seizure - Acquisition High speed data transfer at the rate of 3GB/min Offers built in write-protection of suspect disk. Support Wiping feature for sanitizing the evidence disk.

Features Contd. Support 3 types of Suspect disk media: IDE disk SATA disk USB disk Different Views.

TrueLock A hardware drive lock which prevents all data writes to hard disk drives connected to a computer s IDE interface. Helps in the preservation of digital evidence. A cost-effective solution for supporting disk imaging Connecting Hard disk to PC through True Lock

Features Write protects the IDE Hard Disc connected to the PC s IDE interface. Supports all IDE Drives. Requires no special software. Physical Dimension: 84mm X 41.5mm X 25mm

Achievements Designed and developed the first indigenous suite of products for carrying out cyber forensics investigation More than 175 copies of C-DAC s CyberCheck Suite licensed to Law Enforcement Agencies Conducted more than 25 basic and advanced level training programmes on Cyber Forensics to LEAs Analyzed more than 200 Cyber Crime cases and submitted technical reports to different courts in India 10-Feb-09 Resource Centre for Cyber Forensics 83

Organizations that use CyberCheck Suite Hitech Cyber Cell, Thiruvananthapuram Army Cyber Security Establishment, New Delhi Intelligence Bureau, New Delhi Delhi Police, New Delhi CBI Academy, Ghaziabad GEQDs of Hyderabad and Shimla CFSL, Hyderabad FSLs of Chandigarh, Chennai, Thiruvananthapuram and Haryana DFSL, Gujarat Cyber Crime Investigation Cell, Thane, Maharashtra Cyber Cells of Bangalore and Arunachal Pradesh SCRB, Thiruvananthapuram National Academy of Taxes, Nagpur National Police Academy, Hyderabad Cabinet Secretariat, New Delhi Kerala IT Mission, Thiruvananthapuram

Training on Cyber Forensics Successfully conducted more than 25 training programmes covering basic and advanced Cyber Forensics concepts. Conducted a certificate programme on Cyber Forensics to 32 officers of Kerala Police. Conducted 2 weeks separate training programmes on Cyber Forensics to officers from Intelligence Bureau and Forensic Science Laboratories. Conducted 7 training programmes of one week duration to Judicial Officers in collaboration with CCA at different State Judicial Academies. Recently conducted one month training programme on Cyber Forensics to 51 Police Officers from all Police Districts of Kerala.

Case Categories Nature of Crime Number Hacking 17 Document Forgery 65 Financial Frauds 22 Software Piracy 7 Pornography 13 Mobile Phone Crime 64 Email Crimes 41 Total 229

Cyber Forensic Analysis Statistics Agency Reported Cases Analysis Completed RAW 1 1 CBI 32 26 Bangalore Police 6 6 CCPS Bangalore 27 24 Chennai Police 3 2 Crime Branch, Kerala 17 11 Vigilance, Kerala 16 9 Kerala Police 127 74 Total 229 153

Advantages of C-DAC Solutions Completely indigenous development Self-reliance in technology Cost-effective solution Developed for Law Enforcement Agencies and Corporate houses Total technical support 10-Feb-09 Resource Centre for Cyber Forensics 88

Current Activities Development of Enterprise Forensics System that will provide proactive solutions to cyber crimes and offences in Enterprise and Corporate networks. Design and development of advanced forensic tools for memory analysis, malware analysis, software forensics, peripheral device forensics, etc. Setting up Virtual Training Environment facilities for training 10-Feb-09 Resource Centre for Cyber Forensics 89

What C-DAC can offer Provide a well tested and certified cyber forensics suite of products (CyberCheck Suite) for acquisition and analysis on portable lab as well as forensic workstation Cost effective solution Software for Network Forensics, Live Forensics and Device Forensics Hardware tools for disk forensics Introductory training in cyber forensics Advanced training in cyber forensics 10-Feb-09 Resource Centre for Cyber Forensics 90

Contacts: B.Ramani, Addl. Director : ramani@cdactvm.in V.K.Bhadran, Addl. Director : bhadran@cdactvm.in K.L.Thomas, Jt.Director : thomaskl@cdactvm.in Resource Centre for Cyber Forensics Centre for Development of Advanced Computing Vellayambalam, Thiruvananthapuram Kerala 695033 Phone: 0471 2728929 Tuesday, February 10, 2009 91

THANK YOU 10-Feb-09 Resource Centre for Cyber Forensics 92