Effective Discovery Techniques In Computer Crime Cases.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
TCCDLA – ECFS Overview. Introduction Daniel A. FitzGerald President of Storm’s Edge Technologies.
Objectives Overview Define an operating system
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
BACS 371 Computer Forensics
File Management Systems
Computer & Network Forensics
Week:#14 Windows Recovery
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
A+ Guide to Software, 4e Chapter 11 Supporting Printers and Scanners.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Windows Anti-virus and Security WNUG Meeting
Operating System & Application Files BACS 371 Computer Forensics.
Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.
OS and Application Files BACS 371 Computer Forensics.
Capturing Computer Evidence Extracting Information.
Guide to Computer Forensics and Investigations, Second Edition
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
Hands-on: Capturing an Image with AccessData FTK Imager
November 2009 Network Disaster Recovery October 2014.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Introduction to. What is Office 365 Office 365 is the same Office you already know and use every day. Office 365 is powered by “the cloud” which is a.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Windows XP Professional Windows XP Professional Overview Install and Upgrade Windows XP Pro Customize and Manage Windows XP Pro Troubleshoot Common Windows.
systemhound © Raxco Software Belgium systemhound PC inventory software.
Licitware a forensic software tool designed to investigate computer crimes.
Digital Crime Scene Investigative Process
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Explain the purpose of an operating system
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Jeff Reintjes, Kevin Hao, Carinne Rawlins. Background 1975 in Redmond, WA 3 rd most successful start-up company ever Founded by Bill Gates and Paul Allen.
How Not to Lose the Only Copy of Your Research Storage and Backup Tools at Brandeis Melanie Radik and Raphael Fennimore Library & Technology Services Workshops.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Microsoft Windows XP Professional MCSE Exam
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
HOW TO INSTALL WINDOWS 7? This step-by-step guide demonstrates how to install Windows 7 Ultimate. The guide is similar for other versions of Windows 7.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Why is my computer so slow? Find Reason and How You can Speed up Your Computer.
CIT 180 Security Fundamentals Computer Forensics.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Creighton Barrett Dalhousie University Archives
RBS Remote Business Support System
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
software & cloud computing
IS4680 Security Auditing for Compliance
Windows 10 An Operating System
Presentation transcript:

Effective Discovery Techniques In Computer Crime Cases

Introduction

Storm’s Edge Technologies  IT Consulting Company servicing the Dallas/Fort worth area.  Services  PC Support and Custom Built PCs  Server Support and Custom Built Server  Network Support  Firewall Support  Web Site Development/Hosting  Custom Application Development  Computer Forensics  Disaster/Data Recovery Services

Contact Information Daniel A. FitzGerald P.O. Box 8995 Fort Worth, TX Phone: Fax: Web:

Forensic Process

Overview Image Hard Drive Process Forensic Image Discovery Procedures Analyze Forensic Image Document Findings Forensic Process

Stage of the Forensic Process Document & Photograph Connect Drive to Write Block Connect PC to Write Block Create Forensic Image Secure Original Evidence Drive Allocate 1 Day Image Hard Drive

Stage of the Forensic Process Update Forensic PC Windows & Anti-Virus Forensic Software Select Forensic Software Encase Forensic Tool Kit Etc… Start the processing Allocate 2-3 Days for each Drive Process Forensic Image

Stage of the Forensic Process Obtain Forensic Reports Review Case Documents Determine Search Terms Develop Analysis Strategy Allocate at least 1 Week Discovery Procedures

Stage of the Forensic Process Analyze Registry Hives Determine Operating System Determine Time Zone of PC Determine Users of PC Analyze Event Logs Perform Search of Terms Allocate at least 1 Week Analyze Forensic Image

Stage of the Forensic Process Generate Registry Reports Operating System Time Zone Users Etc… Generate Event Log Reports Usage Patterns Time Changes Generate Search Term Results Allow 2-4 Days Document Findings

Forensic Timeline 1 Day - Image Hard Drive 2-3 Days - Process Forensic Image 1 Week - Discovery Procedures 1 Week - Analyze Forensic Image 2-4 Days - Document Findings Note: Timeline is based on a single average PC with a 250GB Drive Forensic Process - 21 Days

Computers or Spies?  What can we determine from a PC  Users Passwords  Web-Sites viewed  Documents opened  Pictures viewed  Age of PC  Last Reboot Time  What files have been accessed, deleted, modified, etc…

Computers or Spies?  What can we determine from a PC  Who created the document  When documents were printed  What software created the document  What devices where used  Who has used the PC  What software has recently be used  When the OS was installed  The possibilities too numerous to list!

Integrating the PC  Registry Files contain an abundant amount of information to include  Usernames/Passwords for , websites, and programs  Internet Sites visited along with date/times  Search Terms used on Google and other search engines.  Recent file activity/access  List of software installed

Integrating the PC  Registry Files contain an abundant amount of information to include  Screen Saver required Password  User Logon Required or Not  Date Windows was Installed  Date each user last logged on.  Etc…

Integrating the PC  PC Event Logs can provide some insight into the use of a PC  Change in System Time  Boot/Startup Times  Problems with drivers & devices  Because the event logs generally cover a time period of several months they can provide a good history of activity.

Other Files  INI files are used by programs to store information/configuration.  Plain Text  Safe for Export  LNK (Short Cut) files will often provide insight to the users programs  Start Menu will give you a list of the common program they run/access.

Alibi with a PC  Establish who was using the PC  UserID/Password  Screen Saver w/Password  User Specific knowledge like logging into MySpace web-site.  Establish PC has the correct time  Check BIOS date vs. windows date  Check Event Log for time sync events

Alibi with a PC  Determine Activity and Time  File Dates (Creation, Access, Modified)  Web-Site Activity  Activity  Printer Activity

Classified/Sensitive Data  How to perform a Forensic Analysis when you can not possess the data.  Identify who has secured the evidence  Determine local policies in providing access  Process the Forensic Image files  Review any Sensitive Data on-site  Generate Report  Extract non-sensitive files for processing in your own forensic lab.  Request a review and copy of the report to ensure no classified/sensitive data is exported.

Extracting Non-Sensitive Files  Files to Extract for later processing  Registry Files  Event Logs  INI Files  LNK Files  Access Database of all files  FTK will create this as part of its normal processing of the Forensic Image Files.  EnCase will need to export a CSV file.

What is …  Slack Space – The area between the end of the file and the end of the cluster.  Free Space – The area available to store data including areas where files were stored but have been deleted.  Unallocated Space – The area of a device that is not covered by a partition. This would include any deleted partitions.  Swap File – File used to cache memory to the hard drive  Hibernation File – File used to store memory to the hard drive when hibernating

How Do I?  Prove a USB Key was used on a PC  Prove an Image was viewed  Recover Deleted Files  Determine if a user has opened a file  Prove a file was copied/moved  Find out when a file was deleted  Demonstrate a PC was used remotely  Show who created a file  Etc…..

Open Questions

Storm’s Edge Technologies Daniel A. FitzGerald P.O. Box 8995 Fort Worth, TX Phone: Fax: Web: