Darren Quick Supervisor: Dr Kim-Kwang Raymond Choo.

Slides:



Advertisements
Similar presentations
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Advertisements

What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
Objectives Overview Define an operating system
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Overview of Live Computer System Capture and Triage Tool (CCTT)
Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
1 Area 2 Computers and Technology Group by Phil Goff, Branch 116 November 17, 2011.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
 Forensic examination of smartphone mobile devices is hindered not only by the amount of information stored on the device itself, but also the location.
Introduction to Microsoft Office Web Apps with Jim Mollé Learn iT! Computer Software Training.
Cloud computing Tahani aljehani.
By Drudeisha Madhub Data Protection Commissioner Date:
By : Bridget Kargbo. /watch?v=XyjY8ZLzZrw &feature=player_embedd ed /watch?v=XyjY8ZLzZrw &feature=player_embedd.
CLOUD STORAGE HOW TO STORE FILES IN A VIRTUAL CLOUD Leila B.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Cloud Computing الحوسبة السحابية. subject History of Cloud Before the cloud Cloud Conditions Definition of Cloud Computing Cloud Anatomy Type of Cloud.
For more notes and topics visit:
Your Interactive Guide to the Digital World Discovering Computers 2012.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
GIS and Cloud Computing. Flickr  Upload and manage your photos online  Share your photos with your family and friends  Post your photos everywhere.
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
Geographic Information Systems Cloud GIS. ► The use of computing resources (hardware and software) that are delivered as a service over the Internet ►
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Introduction to Cloud Computing
Suntisak Thammavongsa Bachelor of IT (Honours) Supervised by Dr Raymond Choo University of South Australia Investigating a Private Ubuntu Enterprise.
Explain the purpose of an operating system
Internet. The Web as you know it WWW: This is not the internet, but just a part of it. IM, . The web consists of pages that can only be seen by.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
Introduction Thomson Chan Rosaryhill School
FCNS – Technology NEW TECHNOLOGY SOFTWARE: COMING SOON!
Technology in Computer Forensics  Alicia Castro  Thesis Defense  Master of Software Engineering  Department of Computer Science  University of Colorado,
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
| nectar.org.au NECTAR TRAINING Module 1 Overview of cloud computing and NeCTAR services.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Mastering Windows Network Forensics and Investigation Chapter 17: The Challenges of Cloud Computing and Virtualization.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Web Technologies Lecture 13 Introduction to cloud computing.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
Introduction to Cloud Computing What is cloud? Use of computing resources (hardware and software) that are delivered as a service over a network Why cloud.
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
DO NOW Working on the Cloud Do you have a lot of files on your computer but don’t have the space to store them? Do you worry about losing files? Do you.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
WHAT IS CLOUD COMPUTING? Pierce County Library System.
Guide to Computer Forensics and Investigations Fifth Edition
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
General Adult Education and
Unit 3 Virtualization.
Nat 4/5 Computing Science Software
11. Looking Ahead.
Creighton Barrett Dalhousie University Archives
PhD Oral Exam Presentation
DATA SECURITY FOR MEDICAL RESEARCH
File Management in the Cloud
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
RBS Remote Business Support System
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Microsoft OneDrive Accessing content and information when you need it, no matter where you are.
Student IT induction.
Connecting Remotely Winter 2014.
Unit# 5: Internet and Worldwide Web
Cloud Based Learning An Introduction to Google Drive
Presentation transcript:

Darren Quick Supervisor: Dr Kim-Kwang Raymond Choo

 1 - Introduction  2 - Literature Review  3 - Research Method  4 – Digital Forensic Analysis Cycle  5 - Dropbox  6 - Skydrive  7 - Google Drive  8 - Preservation  9 - Summary

 Cloud computing  Cloud storage  Gartner Report (Kleynhans 2012)  Personal cloud will replace PC’s as the main storage by 2014  Dropbox, Microsoft SkyDrive, and Google Drive  PC; client software or browser  Portable devices; browser or apps

 Criminals and victims data of interest  Virtualised, geographically disbursed and transient  Technical and legal issues for investigators; ◦ Identification of data; i.e. service provider ◦ Username, ◦ Data in the account ◦ Difficult to prove ownership ◦ Data may be moved or erased before it can be preserved

 Objective 1: To examine current research published in literature relating to cloud storage and identified cloud storage analysis methodologies.  Objective 2: To develop a digital forensic analysis framework that will assist practitioners, examiners, and researchers follow a standard process when undertaking forensic analysis of cloud storage services.  Objective 3: To conduct research using popular cloud storage services; Dropbox, Microsoft SkyDrive, and Google Drive, and determine whether there are any data remnants which assist digital forensic analysis and investigations.  Objective 4: To examine the forensic implications of accessing and downloading cloud stored data from popular cloud storage services; Dropbox, Microsoft SkyDrive, and Google Drive.

 NIST (2011) definition of cloud computing  IaaS – Infrastructure as a Service – user control  PaaS – Platform as a Service – OS provided  SaaS – Software as a Service – User has limited control  Criminal use  Security of cloud services is well addressed  Mobile devices

 Digital forensic analysis process  Common procedures for investigation  McClain (2011) Dropbox analysis  Chung et al. (2012) Dropbox, Google Docs, Amazon S3 and Evernote  Zhu (2011) examines Skype, Viber, Mail, Dropbox  Reese (2010) examines Amazon EBS  Clark (2011) examines Exif metadata in pictures

 Objectives not answered in literature  Need to conduct primary research  Q 1 What data remnants result from the use of cloud storage to identify its use?  H 0 - There are no data remnants from cloud storage use  H 1 – There are remnants from cloud storage use

a) What data remains on a Windows 7 computer hard drive after cloud storage client software is installed and used to upload and store data with each hosting provider. b) What data remains on a Windows 7 computer hard drive after cloud storage services are accessed via a web browser with each hosting provider? c) What data is observed in network traffic when client software or browser access is undertaken? d) What data remains in memory when client software or browser access is undertaken? e) What data remains on an Apple iPhone 3G after cloud storage services are accessed via a web browser with each hosting provider? f) What data remains on an Apple iPhone 3G after cloud storage services are accessed via an installed application from each hosting provider?

 Q 2 What forensically sound methods are available to preserve data stored in a cloud storage account? ◦ H 0 the process of downloading files from cloud storage does not alter the internal data or the associated file metadata. ◦ H 1 the process of downloading files from cloud storage alters the internal file data and the associated file metadata. ◦ H 2 the process of downloading files from cloud storage does not alter the internal data, but does alter the file metadata. ◦ H 3 the process of downloading files from cloud storage alters the internal data, but not the associated file metadata.

 Q 2 a) What data can be acquired and preserved from a cloud storage account using existing forensic tools, methodologies, and procedures when applied to cloud storage investigations?

 Research experiment undertaken using Virtual PC’s to create various circumstances of accessing cloud storage services.  VM’s forensically preserved and analysed for data remnants

 Prepare Virtual PC’s with Windows 7  Base (control) clean installation  Install Browser (Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari)  Install Client Software and upload test files  Use browser to access account and view files  Use browser to access and download files  Use Eraser to erase files  Use CCleaner to remove browsing history  Use DBAN to erase virtual hard drive

 Commence (Scope)  Prepare and Respond  Identify and Collect  Preserve (Forensic Copy)  Analyse  Present  Feedback  Complete

 Using the Framework to guide the process  Analysis of the VM images  In the Control VM’s; ‘Dropbox’ references  Client Software ; encrypted, sample files  System Tray link to ‘launch Dropbox website’  Browser remnants  OS remnants; Prefetch information, Link Files, $MFT, Registry, Thumbcache, Event logs  Network traffic; IP’s, URL client/web  RAM; password in cleartext  Eraser/CCleaner; left remnants  DBAN; all erased

 iPhone 3G iOS (using the framework) ◦ Base (control); nil located ◦ Browser; filenames in History.plist + URL ◦ Dropbox App; username in keychain.plist  Case study (used to illustrate findings) ◦ ‘Botnet’ hypothetical example describing finding information on PC and iPhone re Dropbox use

 Conclusion; ◦ dbx files are now encrypted, earlier versions;  Filecache.db and config.db ◦ Password in cleartext in memory ◦ Process of booting a forensic image in a virtual PC will synchronise and provide access to the account without requiring a username or password  Current Police investigation; located illicit data being stored in a Dropbox account (real world application of the research)

 Using the Framework to guide the process  Analysis of the VM images  In the Control VM’s; ‘skydrive’ references  Client Software; SyncDiagnostics.log, OwnerID.dat  OS remnants; Prefetch information, Link Files, $MFT, Registry, Thumbcache, Event logs  Network traffic; IP’s, filenames  RAM; password in cleartext  Eraser/CCleaner; left remnants  DBAN; all erased

 iPhone 3G iOS (using the framework) ◦ Base (control); nil located ◦ Browser; OwnerID in URL, filenames in History.plist ◦ SkyDrive App; username in keychain.plist  Case study (used to illustrate findings) ◦ ‘IP Theft’ hypothetical example describing finding information on PC and iPhone re SkyDrive use

 Conclusion; ◦ SyncDiagnostics.log and OwnerID.dat files ◦ Password in cleartext in memory ◦ Process of booting a forensic image in a virtual PC may synchronise the files in an account. Access to the account requires a password.

 Using the Framework to guide the process  Analysis of the VM images  In the Control VM’s; ‘drive google’ references  Client Software; Sync_config.db and snapshot.db  Password in cleartext stored on Hard Drive  System Tray link to ‘visit Google Drive on the web’  OS remnants; Prefetch information, Link Files, $MFT, Registry, Thumbcache, Event logs  Network traffic; IP’s, username  Eraser/CCleaner; left remnants  DBAN; all erased

 iPhone 3G iOS (using the framework) ◦ Base (control); nil located ◦ Browser; username in cookies, filenames in History.plist ◦ Google Drive App; unable to install, need iOS 5  Case study (used to illustrate findings) ◦ ‘Steroid importation’ hypothetical example describing finding information on PC and iPhone re Google Drive use

 Conclusion; ◦ sync_config.db and snapshot.db files files ◦ Password in cleartext in RAM and on Hard Drive ◦ System Tray link to ‘visit Google Drive on the web’ ◦ Process of booting a forensic image in a virtual PC will give full access to an account without requiring a username or password

 No documented process to collect data once identified  Some jurisdictions have legal power to secure data accessible at the time of serving a warrant, such as 3LA Crimes Act 1914  Tested in VM with Dropbox, Microsoft SkyDrive, and Google Drive  Access via Browser and Client Software  No change to files (Hash values same after downloading when compared with original)

 Times and Dates change;

 Q 1 = H 1 There are remnants from cloud storage use which enable the identification of the service, a username, or file details.  Q 2 = H 2 The process of downloading files from cloud storage does not alter the internal data, but does alter the file metadata.

 Identified software files for each service, e.g. ◦ SyncDiagnostics.log – SkyDrive ◦ Snapshot.db – Google Drive ◦ Filecache.db – Dropbox  Identified OS remnants; ◦ Prefetch ◦ Link files ◦ Registry  Identified Browser History remnants  No change to access and download files  Difference in timestamps for downloaded files  Process to boot PC in a VM

 Other cloud storage services; ◦ Amazon S3, iCloud, and UbuntuOne  Physical iPhone extract compared to logical extract  Android, Windows Mobile devices  Apple iOS 5 devices  Further test the framework

 Quick, D & Choo, K-K R ‘Dropbox Analysis: Data Remnants on User Machines’. Submitted to Digital Investigation  Quick, D & Choo, K-K R ‘Digital Droplets: Microsoft SkyDrive forensic data remnants’. Submitted to Future Generation Computer Systems  Quick, D & Choo, K-K R ‘Forensic Collection of Cloud Storage Data from a Law Enforcement Perspective’. Submitted to Computers & Security  Quick, D & Choo, K-K R ‘Google Drive: Forensic Analysis of data remnants’. Submitted to Journal of Network and Computer Applications

 Chung, H, Park, J, Lee, S & Kang, C (2012), Digital Forensic Investigation of Cloud Storage Services, Digital Investigation  Clark, P (2011), 'Digital Forensics Tool Testing–Image Metadata in the Cloud', Department of Computer Science and Media Technology, Gjøvik University College.  Kleynhans, S (2012), The New Pc Era- the Personal Cloud, Gartner Inc,  McClain, F (2011), Dropbox Forensics, updated 31 May 2011, Forensic Focus  McKemmish, R (1999), 'What Is Forensic Computing?', Trends and Issues in Crime and Criminal Justice, Australian Institute of Criminology, vol. 118, pp  NIST (2011), Challenging Security Requirements for Us Government Cloud Computing Adoption (Draft), U.S. Department of Commerce.  Ratcliffe, J (2003), 'Intelligence-Led Policing', Trends and Issues in Crime and Criminal Justice vol. 248, pp. 1-6  Reese, G (2010), Cloud Forensics Using Ebs Boot Volumes, Oreilly.com  Zhu, M (2011), 'Mobile Cloud Computing: Implications to Smartphone Forensic Procedures and Methodologies', AUT University.