Computer Forensics.

Slides:



Advertisements
Similar presentations
The Modern Control Boot Disk. 2 What do we mean by a Modern control boot disk? In your previous lectures you learned about the original DOS control boot.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Computer Forensics.
1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.
This presentation will take a look at to prevent your information from being discovered by and investigator.
COEN 252 Computer Forensics
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
File System Analysis.
Slides by Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802
Guide to Computer Forensics and Investigations, Second Edition
BACS 371 Computer Forensics
Guide to Computer Forensics and Investigations Fourth Edition
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Guide to Computer Forensics and Investigations Fourth Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
Chapter 14: Computer and Network Forensics
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Data Acquisition Chao-Hsien Chu, Ph.D.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
COEN 252 Computer Forensics
Capturing Computer Evidence Extracting Information.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
Phases of Computer Forensics 1 Computer Forensics BACS Management Information Systems for the Information Age 5e, Haag, Cummings, McCubbrey, 2005,
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Computer Related Evidence & What is this computer geek going to do now that I have done all the hard work?
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Preserving Evidence ● Number one priority ● Must also find incriminating evidence ● Must search the contents of the hard drive ● Can not change the hard.
Digital Crime Scene Investigative Process
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
Guide to Computer Forensics and Investigations Fourth Edition
© Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance...
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
CIT 180 Security Fundamentals Computer Forensics.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Creighton Barrett Dalhousie University Archives
Acquisition and Examination of Forensic Evidence
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Digital Forensics CJ
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Presentation transcript:

Computer Forensics

What is Computer Forensics? Scientific process of preserving, identifying, extracting, documenting, and interpreting data on a computer Used to obtain potential legal evidence

Computer Forensics Minor http://informatics.nku.edu/departments/computer-science/programs/mcf.html

Computer Forensics Procedures The Forensic Paradigm Identification Collection Analysis and Evaluation Reporting Identify specific objects that store important data for the case analysis Establish a chain of custody and document all steps to prove that the collected data remains intact and unaltered Determine the type of information stored on digital evidence and conduct a thorough analysis of the media Prepare and deliver an official report

Identification: Common Mistakes … You are the investigator, which objects do you think will be useful for investigations? Computer (case and power supply) Just the hard drive (without computer) Monitor Keyboard and mouse Media (CD, DVD, USB drives, etc.) Printer Digital forensics does not replace traditional forensic analysis Any action that modifies the crime scene could invalidate evidence in court

Collection To collect computer evidence, care must be taken not to change the evidence Imaging media using a write-blocking tool to ensure the suspect device is not be modified Establishing and maintaining the chain of custody Documenting everything that has been done Using only tools and methods that have been tested and evaluated to validate their accuracy and reliability

Forensic Constraints Chain of custody Priority by volatility Maintain possession of all objects Must be able to trace evidence back to source “Prove” source integrity Priority by volatility Some data is more volatile RAM > swap > disk > CDs/DVDs Idea: capture more volatile evidence first

Image Evidence: Laptop USB ADAPTER DATA CABLE LAPTOP at Crime Scene EVIDENCE DISK

Why Use Images Information on digital media is easily changed. Once changed it is usually impossible to detect that a change has taken place (or to revert the data back to its original state) unless other measures have been taken A common practice is calculate a cryptographic hash to establish a check point Examining a live file system changes state of the evidence The computer/media is the “crime scene” Protecting the crime scene is paramount as once evidence is contaminated, it cannot be decontaminated Really only one chance to do it right!

Collection: Common Mistakes … What is the first step to collect evidence, when you find: A computer turned on A computer turned off A computer on a crime scene should be considered fully adversarial

Analysis and Evaluation Know where evidence can be found Understand techniques used to hide or “destroy” digital data Toolbox of techniques to discover hidden data and recover “destroyed” data Cope with HUGE quantities of digital data… Ignore the irrelevant, target the relevant Thoroughly understand circumstances which may make “evidence” unreliable If you have a hard drive with a broken sector that gives different result, what happens when you hash the entire drive?

Where is the Evidence? Undeleted files, expect some names to be incorrect Deleted files Windows registry Print spool files Hibernation files Temp files (all those .TMP files in Windows!) Slack space Swap files Internet browsing histories Alternate or “hidden” partitions On a variety of removable media (USB drives, backup tapes, …)

Hidden Data in the Hard Drive Slack Space Slack space is the space between The logical end of the file (i.e., the end of the data actually in the file) and The physical end of the file (i.e., the end of the last sector devoted to the file).

Digital Forensics Tools Forensics tools are typically command line tools that are guaranteed not to alter the disk: HELIX a live cd with a plenty of forensic tools ready to be used http://www.e-fense.com/products.php ENCASE a series of proprietary forensic software products produced by Guidance Software http://www.guidancesoftware.com/ …

Open Source vs. Closed Source Commercial products such as EnCase are recognized by law. What is the best approach? 21/01/2008 15 di 7 15

How to Hide Data? Cryptography Steganography The process of hiding data inside other data (e.g. image files). Change file names and extensions E.g. rename a .doc file to a .tmp file Hidden tracks most hard disks have # of tracks hidden (i.e. track 0) They can be used to hide/read data by using a hex editor Deleted Files not truly deleted, merely marked for deletion. During Forensic is important to do not use any tools that write to the disk

Stenography http://en.wikipedia.org/wiki/Steganography

Why Create a Duplicate Image? CCSP Fall 2005 10/25/2005 Why Create a Duplicate Image? A file copy does not recover all data areas of the device for examination Working from a duplicate image Preserves the original evidence Prevents inadvertent alteration of original evidence during examination Allows recreation of the duplicate image if necessary Never do anything that might inadvertently cause something to be written to the suspect’s original media. Scott L. Ksander

Bitstream vs. Backups Forensic copies (Bitstream) Bit for bit copying captures all the data on the copied media Including hidden and residual data (e.g., slack space, swap, residue, unused space, deleted files etc.) Often the “smoking gun” is found in the residual data. Logical vs. physical image

Reporting Accurately describe the details of an incident Be understandable to decision makers Be able to withstand legal scrutiny Be unambiguous and not open to misinterpretation Be easily referenced Contain all information required to explain the conclusions Offer valid conclusions, opinions, or recommendations when needed Create report in a timely manner

Anti-Forensic and Data Security Anti-forensic techniques try to frustrate forensic investigators and their techniques Securely deleting data, so that it cannot be restored with forensic methods Prevent the creation of certain data in the first place Data which was never there, obviously cannot be restored with forensic methods.

Privacy Through Media Destruction thermite… or or shredder Degausser Magnetic Field

Disk Wiping Simple erase Destructive erase The data is still on the drive but the segment has been marked as available Next time data is written to the drive it MAY overwrite the segment Destructive erase First overwrites all data in the file with random data Next marks the segment as available It may be possible to find ghost images of what was previously on the disk surface Overwriting Hard Drive Data: The Great Wiping Controversy, ICISS 2008

Darik’s Boot and Nuke http://www.dban.org/ http://sourceforge.net/projects/dban/