Slides by Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

Computer Forensics.
The Modern Control Boot Disk. 2 What do we mean by a Modern control boot disk? In your previous lectures you learned about the original DOS control boot.
Computer Forensics Infosec Pro Guide
Write Blocking CSC 485/585.
CSN08101 Digital Forensics Lecture 6: Acquisition
Computer Forensics.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
COEN 252 Computer Forensics
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
The Fascinating World of Digital Evidence
Guide to Computer Forensics and Investigations, Second Edition
Computer & Network Forensics
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
COS/PSA 413 Day 5. Agenda Questions? Assignment 1 due –Not corrected-still missing one submission Assignment 2 posted –Case project 2-1 on page 72 and.
Guide to Computer Forensics and Investigations Fourth Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Guide to Computer Forensics and Investigations Third Edition Chapter 7 Current Computer Forensics Tools.
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
COS/PSA 413 Day 12. Agenda Questions? Assignment 4 posted –Due October 10 Lab 4 tomorrow in N105 –Hands-on Projects 6-1 through 6-4 on Pages Discussion.
Incident Response and Forensic Course Disk Image Cataloging Project Concepts and Deliverables.
Collection of Evidence Computer Forensics 152/252.
Mohd Taufik Abdullah Department of Computer Science
Data Acquisition Chao-Hsien Chu, Ph.D.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
COEN 252 Computer Forensics
Capturing Computer Evidence Extracting Information.
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
NIST CFTT: Testing Disk Imaging Tools James R. Lyle National Institute of Standards and Technology Gaithersburg Md.
Guide to Computer Forensics and Investigations Fourth Edition
Objectives Learn what a file system does
Guide to Computer Forensics and Investigations Fourth Edition
Computer Forensics Additional Notes 1. Acknowledgments Dr. David Dampier and the Center for Computer Security Research (CCSR) I downloaded this series.
Preserving Evidence ● Number one priority ● Must also find incriminating evidence ● Must search the contents of the hard drive ● Can not change the hard.
Digital Crime Scene Investigative Process
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Introduction to Computer Forensics and Hashing 1.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 7 Current Computer Forensics Tools Last modified :40 am.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
Guide to Computer Forensics and Investigations Fourth Edition
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
& Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Chapter 8: Installing Linux The Complete Guide To Linux System Administration.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Chapter 3 Data Acquisition Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with additional info from.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS FOURTH EDITION CHAPTER 7 CURRENT COMPUTER FORENSICS TOOLS.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Evidence Acquisition Slides by Chao-Hsien Chu, Ph.D.
Creighton Barrett Dalhousie University Archives
Data Acquisition Chao-Hsien Chu, Ph.D.
Guide to Computer Forensics and Investigations Fifth Edition
Introduction to Computers
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Digital Forensics Dr. Bhavani Thuraisingham
Digital Forensics CJ
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 3 Data Acquisition.
Presentation transcript:

Slides by Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Evidence Acquisition Learning by Doing Theory  Practice

Related Questions  Objectives  Why use images?  Bitstream vs. backups  Forensic imaging tools  Forensic imaging methods (disk to disk, network)  Preserving volatile data  Lab: Imaging - Evidence Acquisition

Learning Objectives  Describe the difference between a forensic copy and a backup;  Explain the importance of capturing the “truest” state of the media as possible with today’s technology;  Describe the accepted procedure to ensure integrity of the images;  Discuss the issues surrounding data acquisition;  Demonstrate mastery of the topic by actually acquiring a forensic image.

Why Use Images The computer/media is the “crime scene” Protecting the crime scene is paramount as once evidence is contaminated it cannot be decontaminated. In keeping with the second IOCE principle, care must be taken not to change the evidence. Most media are “magnetic based” and the data is volatile. Examining a live file system changes the state of the evidence (MAC times) Really only one chance to do it right!

Why Create a Duplicate Image? Digital/computer evidence is fragile

Why Create a Duplicate Image? A file copy does not recover all data areas of the device for examination Working from a duplicate image –Preserves the original evidence –Prevents inadvertent alteration of original evidence during examination –Allows recreation of the duplicate image if necessary

Why Create a Duplicate Image? Digital evidence can be duplicated with no degradation from copy to copy –This is not the case with most other forms of evidence

Bitstream vs. Backups Are backups sufficient? –Ideally NO! –Practically it may be the only method available Most operating systems only pay attention to the live file system structure –Slack, residue, deleted, etc. are not indexed Backups generally do not capture this data and they also modify the timestamps of data, contaminating the timeline.

Bitstream vs. Backups Forensic Copies (Bitstream) –Bit for Bit copying captures all the data on the copied media including hidden and residual data (e.g., slack space, swap, residue, unused space, deleted files etc.) Often the “smoking gun” is found in the residual data. Logical vs. physical image

Forensic Imaging “Cloning gone wild!”

Drive Imaging Hardware Forensic mobile field system (MFS) –Laptop with NIC –Portable workstation –Forensic network/system

Write Blockers

Drive Imaging Tools SafeBack ( Ghost ( –Newest version of Ghost has a forensic “switch” now DD (standard unix/linux utility) –#dd if=device of=device bs=blocksize Encase ( Mareware FTK ( ProDiscover Basic

The imaging process “Look Ma no DNA”  Understand the needs/requirements  Determine the best acquisition method  Wipe the storage drive  Configure/check write protection  Data acquisition  Validate data acquisitions  Document the process

Rules of Thumb Make 2 copies of the original media –1 copy becomes the working copy –1 copy is a library/control copy –Verify the integrity of the copies to the original The working copy is used for the analysis The library copy is stored for disclosure purposes or in the event that the working copy becomes corrupted If performing a drive to drive imaging (not an image file) use clean media to copy to! –Shrink wrapped new drives –Next best, zero another drive Verify the integrity of all images!

Disk Imaging Tools Requirements The tool shall make a bit-stream duplicate or an image of an original disk or partition. The tool shall not alter the original disk. The tool shall be able to verify the integrity of a disk image file. The tool shall log I/O errors. The tool’s documentation shall be correct.

Disk Imaging Tools Requirements The tool shall not alter the original If there are no errors accessing the source, then the tool shall create a bit-stream duplicate or image of the source If there are I/O errors accessing the source, then the tool shall create a qualified bit-stream duplicate or image of the source. (A qualified bit-stream duplicate is defined to be a duplicate except in identified areas of the bit-stream.) The identified areas are replaced by values specified by the tool’s documentation The tool shall log I/O errors in an accessible and readable form, including the type of error and location of the error.

Disk Imaging Tools Requirements The tool shall be able to access disk drives through one or more well-defined interfaces Documentation shall be correct insofar as the mandatory and any implemented optional requirements are concerned, i.e., if a user following the tool’s documented procedures produces the expected result, then the documentation is deemed correct If the tool copies a source to a destination that is larger than the source, and it shall document the contents of the areas on the destination that are not part of the copy If the tool copies a source to a destination that is smaller than the source, the tool shall notify the user, truncate the copy, and log this action.

Forensic Boot Disk General principles: –Used to boot suspect systems safely –Contains a file system and statically linked utilities (e.g., ls, fdisk, ps, nc, dd, ifconfig, etc.) –Recognizes large partitions (+2 or + 8 Gb) –Places the suspect media in a locked or read-only state –Does not swap any data to the suspect media

Forensic Boot Disk Open source bootable images: –FIRE ( –Linuxcare Bootable Business Cards ( –Trinux ( Linux Live CDs: –Helix ( –Penguin Sleuth (

Statistics 69% of users use disk images rather than disk copies and 20% use partition images. 48% of copies and images are made in the field and 36% are made in laboratories. 57% of the drives imaged are larger than 8.4GB and 35% are less than that size. 50% of the drives imaged require IDE BIOS/Extended BIOS access and 63% require direct (ASPI) SCSI access. 25 to 33% of users sometimes mix IDE and SCSI drives in making images or copies, 25% often do so, and 13% always do. **Source NIST CFTT Project

Lab #1 - Imaging  Task 1: Make a forensically clean store drive.  Task 2: Make a forensically sound image using EnCase.  Task 3: Make a forensically sound image using FTK.  Task 4: Drive to drive acquisition under DoS Using the provided devices/software to complete the following tasks:

USB Write Protection Windows XP Registry Write Protection Write Blocker Linux Boot CD

USB Write Blocker

Verifying the Image Using a hashing algorithm utility to create a binary or hexadecimal number that represent the uniqueness of a data set such as a file or disk drive. The unique number is referred to as a “digital fingerprint” If two files have the same hash values, they are 100% identical, even if they have different file names. Utility algorithm that can be used to produce hash values include CRC-32, MD5, SHA-1, and SHA- 512.

CRC-32 (Cyclic Redundancy Check) CRC32 is a 32-bit Cyclic Redundancy Check code, used mainly as an error detection method during data transmission. If the computed CRC bits are different from the original (transmitted) CRC bits, then there has been an error in the transmission. If they are identical, we can assume that no error occurred (there is a chance 1 in 4 billion that two different bit streams have the same CRC32).

MD5 (Message-Digest algorithm 5 MD5 (Message-Digest algorithm 5) A mathematical algorithm – cryptographic hash function- that produces a 128-bit hash value. The value can be used to demonstrate the integrity of your data. Changes made to data will result in a different value. The function can be performed on various types of data (files, partitions, physical drive).

SHA (Secure Hash Algorithm) The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.cryptographic hash functionsNational Security AgencyNIST Federal Information Processing Standard SHA-1 produces a message digest that is 160 bits long; the number in the other four algorithms' names denote the bit length of the digest they produce.