Section 3.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE CASE STUDY : ANN’S RENDEZVOUS.

Slides:



Advertisements
Similar presentations
Section 3.1 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE
Advertisements

Using Outlook Benefits of Using Outlook Now – Better formatting of HTML mail (with bullets, fonts, etc.) – Great calendar, ability to send meeting.
Case study : The curious mr. x
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
Network Services Networking for Home & Small Business.
Section 2.1 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE
OR I know what you downloaded last night! By: GTKlondike.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
CIS101 Introduction to Computing
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Chapter 30 Electronic Mail Representation & Transfer
August 15 click! 1 Basics Kitsap Regional Library.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Internet Basics.
The OSI and TCP/IP Models Last Update Copyright 2009 Kenneth M. Chipps Ph.D.
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
Forensic and Investigative Accounting
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Outlook 2000 Summertime Technology 2002 Vicki Blackwell Tangipahoa Parish Schools.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Chapter 6: Packet Filtering
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
Section 2.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Simple Mail Transfer Protocol (SMTP)
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Network Services Networking for Home & Small Business.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 1 Essential TCP/IP Network Protocols and.
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
(class #2) CLICK TO CONTINUE done by T Batchelor.
Case study : Ann’s rendezvous
Traffic Analysis– Traffic Forensic Example
Internet Business Associate v2.0
Instructor Materials Chapter 5 Providing Network Services
Networking for Home and Small Businesses – Chapter 6
Investigations [ 10 week ] Investigations 2015 second semester.
Networking for Home and Small Businesses – Chapter 6
Chapter 5 Network and Transport Layers
Traffic Analysis– Traffic Forensic Example
Networking for Home and Small Businesses – Chapter 6
Presentation transcript:

Section 3.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE CASE STUDY : ANN’S RENDEZVOUS

THE MISSION The case: After being released on bail, Ann Dercover disappears! Fortunately, investigators were carefully monitoring her network activity before she skipped town. “We believe Ann may have communicated with her secret lover, Mr. X, before she left,” says the police chief. “The packet capture may contain clues to her whereabouts.” Challenge: You are the forensic investigator. Your mission is to analyze the packet capture and gather information about Ann’s activities and plans. The following questions will help guide your investigation: Provide any online aliases or addresses and corresponding account credentials that may be used by the suspect under investigation. Who did Ann communicate with? Provide a list of addresses and any other identifying information. Extract any transcripts of Ann’s conversations and present them to investigators. If Ann transferred or received any files of interest, recover them. Are there any indications of Ann’s physical whereabouts? If so, provide supporting evidence.

THE MISSION CONTINUED Network: Internal network: /24 DMZ: /24 The “Internet”: /24 [Note that for the purposes of this case study, we are treating the /24 subnet as “the Internet.” In real life, this is a reserved nonroutable IP address space.] Evidence: Investigators provide you with a packet capture from Ann’s home network, “evidence-packet-analysis.pcap.” They also inform you that in the course of their monitoring, they have found that Ann’s laptop has the MAC address 00:21:70:4D:4F:AE. Pg. 135

ANALYSIS: PROTOCOL SUMMARY Begin by taking a high-level look at the packet Wireshark > Statistics > Protocol Hierarchy Notice the presence of “Bootstrap Protocol” Used for DHCP request and response

DHCP TRAFFIC Examine using Wireshark Display Filter “eth.addr == 00:21:70:4d:4f:ae and bootp Wireshark automatically looks up the registered OUI, “00:21:70,” and displays the corresponding manufacturer, Dell. Can be verified using IEEE Request address is Host name matches Ann Router DNS

DHCP CONTINUED Router DNS Renewal Time Value of 30 minutes

KEYWORD SEARCH Matches seven packets Three contain a conversation with TCP port 587 (SMTP) Four contain a conversation with TCP port 143 (IMAP)

EXAMINE SMTP Use Wireshark’s “Follow TCP Stream” to isolate packets beginning with 2011/05/17 13:33:

EXAMINATION CONTINUED Notice Ann’s authentication is in plain text: Her credentials are only Base-64-encoded, not encrypted Take note of the sender and receiver: Look at the body of the Next look at the SMTP packet 2011/05/17 13:34: User: Receiver:

EXAMINATION CONTINUED AGAIN Examination of the third packet matching SMTP using command line Look at the content from (Ann’s computer) to remote server We are interested in the outbound content reconstruction Notice the From: ID, the To: ID and the body of the As the message suggests there is an attachment

SMTP ANALYSIS – ATTACHMENT FILE CARVING $ bless Cut the SMTP and MIME protocol information Attachment of greatest interest is labeled Start carving After set of 0x0D & 0x0A CRLF Carriage-return/linefeed Finish carving Just before the second set Save file as “evidence-packet-analysis-smtp3-attachment”

ATTACHMENT FILE CARVING CONTINUED We need to remove the line breaks before decoding the Base64 encoding Use “fromdos” which is part of the “tofrodos” Debian package $ fromdos -b evidence -packet -analysis -smtp3 –attachment Decode $ base64 -d evidence -packet -analysis -smtp3 -attachment > secretrendezvous.docx Check file type $ file secretrendezvous.docx secretrendezvous.docx: Zip archive data, at least v2.0 to extract Make cryptographic checksums

VIEW THE ATTACHMENT Always work with a copy

MORE CARVING Lets carve the image out of the.docx file Start by unzipping the file Notice the.png file Take the cryptographic checksum View a copy of the image

FINDING ANN THE EASY WAY Use NetworkMiner

EASY WAY CONTINUED “NetworkMiner automatically parses headers and displays them along with the body of each SMTP message. It can also show other types of messages, such as IMs.” Pg 151 “The “Files” tab displays files that NetworkMiner automatically carved out of the packet capture.” Pg 151

SMTPDUMP Use smtpdump to: analyze SMTP flow #3 in the packet capture (-f 3) extract attachments (-x) print the MD5sum (-m) print authentication data (-A)

DOCXTRACT Use docxtract to: extract all images from the carved.docx attachment (-x -i) print the corresponding cryptographic checksum (-m)

FINDSMTPINFO.PY Can be used to : Print SMTP authentication information Extract all messages from the packet capture Extract all attachments from the messages Print the MD5 sums for each of the attachments Extract the files embedded within the.docx file Print the MD5 sums for each of the embedded files Produces reports suitable for professional forensic reports Pg. 152

FINDSMTPINFO.PY CONTINUED Example:

FINDSMTPINFO.PY CONTINUED AGAIN Tool will: automatically unzip attached.docx file Extract embedded files MD5sums

TIMELINE All times listed below occurred on May 17, :32: —Packet capture begins 13:32: —First DHCP Request from 00:21:70:4d:4f:ae (Ann’s computer) 13:32: —DHCP ACK from to Ann’s computer, assigning 00:21:70:4d:4f:ae the IP address with a 1-hour lease time. 13:33: :33: —First SMTP conversation. sent from Ann’s computer with sender and recipient 13:34: :34: —Second SMTP conversation. sent from Ann’s computer with sender and recipient 13:35: :35: —Third SMTP conversation. sent from Ann’s computer with sender and recipient 13:35: —Packet capture ends Pg 154

THE CASE THEORY Ann Dercover connected her laptop (“ann-laptop”) to the network on May 17, 2011, at 13:32:03. Her computer was probably manufactured by Dell. At 13:33:05, Ann sent from her AOL account, to asking the recipient, “Hey, can you hook me up quick with that fake passport you were talking about?” At 13:34:15, Ann sent from her AOL account, to informing the recipient, “Sorry—I can’t do lunch next week after all. Heading out of town. Another time!” At 13:35:15, Ann sent from her AOL account, to aol.com, with the message, “Hi sweetheart! Bring your fake passport and a bathing suit. Address attached. love, Ann.” The had a.docx attachment that contained an address and a map. Pg 155

CHALLENGE QUESTION RESPONSES Provide any online aliases or addresses and corresponding account credentials that may be used by the suspect under investigation. Based on our SMTP analysis, there are indications that Ann Dercover uses the address and that her password is “s00pers3kr1t.” Who did Ann communicate with? Provide a list of addresses and any other identifying information. We have seen that sent s to the following recipients:

RESPONSES CONTINUED Extract any transcripts of Ann’s conversations and present them to investigators. Here is a quick summary of Ann’s conversations, sent via SMTP: SMTP Message #1 Sender: Recipient: Date [beginning of SMTP conversation]: May 17, :33:05 Subject: need a favor Message [formatting removed]: Hey, can you hook me up quick with that fake passport you were talking about? - Ann Attachments of interest: None Pg. 155

RESPONSES CONTINUED AGAIN SMTP Message #2 Sender: Recipient: Date [beginning of SMTP conversation]: May 17, :34:15 Subject: lunch next week Message [formatting removed]: Sorry—I can’t do lunch next week after all. Heading out of town. Another time! - Ann Attachments of interest: None SMTP Message #3 Sender: Recipient: Date [beginning of SMTP conversation]: May 17, :35:15 Subject: rendezvous Message [formatting removed]: Hi sweetheart! Bring your fake passport and a bathing suit. Address attached. love, Ann Attachments of interest: secretrendezvous.docx Pg. 156

AND AGAIN If Ann transferred or received any files of interest, recover them. We recovered one Office Open XML Document (.docx) file, attached to Ann’s to The MD5 checksum of the.docx file was: 9049b6d9e26fe878680eb3f28d72d1d2 The SHA256 checksum was: 24601c174587be4ddfff0b9e6d598618c6abfcfadb16f7dd6dbd7a24aed6fec8 The document began with the text, “Meet me at the fountain near the rendezvous point. Address below. I’m bringing all the cash.” This was followed by a PNG image of a map with an address. Pg 156

AND AGAIN Are there any indications of Ann’s physical whereabouts? If so, provide supporting evidence. The document that Ann sent to indicates that she would like to meet him at the following address: Playa del Carmen 1 Av Constituyentes 1 Calle 10 x la 5ta Avenida Playa del Carmen, 77780, Mexico Of course, there is no guarantee that Ann and/or the recipient ever traveled to this location. Perhaps Ann was trying to throw us off her trail! Pg 156

THE NEXT STEP Conduct further analysis on the packet capture to see if there are more s, web traffic, etc. If there is sufficient evidence, a warrant might be in order to monitor Ann’s account and / or open her account using her credentials and investigate her past activity.

Works Cited Davidoff, S., & Ham, J. (2012). Network Forensics Tracking Hackers Through Cyberspace. Boston: Prentice Hall. Disclaimer: All information and data pulled directly from this book. Pages