Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. Computer Forensics Consultant Jawz Inc.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
OC RIMS Cyber Safety & Security Incident Response.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Unit 18 Data Security 1.
BACS 371 Computer Forensics
Guide to Computer Forensics and Investigations Fourth Edition
1 An Overview of Computer Security computer security.
Guide to Computer Forensics and Investigations Fourth Edition
COS 413 Day 13. Agenda Questions? Assignment 4 Due Assignment 5 posted –Due Oct 21 Capstone proposal Due Oct 17 Lab 5 on Oct 15 in N105 –Hands-on Projects.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.
Chapter 14: Computer and Network Forensics
Network security policy: best practices
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Capturing Computer Evidence Extracting Information.
Guide to Computer Forensics and Investigations, Second Edition
Version 2.0 BlackHat Briefings July Computer Forensics: A Critical Process in Your Incident Response Plan.
Hands-on: Capturing an Image with AccessData FTK Imager
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
File Recovery and Forensics
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Computer Forensics Principles and Practices
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
Introduction to Digital Forensics Florian Buchholz.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Guest Lecture September 21, 2009.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Understand Audit Policies LESSON Security Fundamentals.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
IDS And Tripwire Rayhan Mir COSC 356. What is IDS IDS - Intrusion detection system Primary function – To monitor network or host resources to detect intrusions.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
File-System Management
Data Compromises: A Tax Practitioners “Nightmare”
Introduction to Computer Forensics
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
System Testing.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Digital Forensics CJ
Threats to Privacy in the Forensic Analysis of Database Systems
Presentation transcript:

Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. Computer Forensics Consultant Jawz Inc.

What is Computer Forensics? Computer Forensics can be defined simply, as a process of applying scientific and analytical techiniques to computer Operating Systems and File Structures in determining the potential for Legal Evidence.

Overview of Presentation Why is Evidence identification and Preservation required? Who benefits from Computer Forensics? General Types of Forensic Examinations requested. Process of Forensics. Tools of the trade. What is the Examiner looking for?

Why is Evidence important? In the legal world, Evidence is EVERYTHING. Evidence is used to establish facts. The Forensic Examiner is not biased.

Who needs Computer Forensics? The Vicitm! Law Enforcement Insurance Carriers Ultimately the Legal System

Who are the Victims? Private Business Government Private Individuals

ID the perpetrator. ID the method/vulnerability of the network that allowed the perpetrator to gain access into the system. Conduct a damage assessment of the victimized network. Preserve the Evidence for Judicial action. Reasons for a Forensic Analysis

Types of Forensic Requests Intrusion Analysis Damage Assement Suspect Examination Tool Analysis Log File Analysis Evidence Search

Intrusion Analysis Who gained entry? What did they do? When did this happen? Where did they go? Why the chosen network? How did they do this?

Damage Assesment What was available for the intruder to see? What did he take? What did he leave behind? Where did he go?

File Recovery Deleted Files Hidden Files Slack Space Bad Blocks Steganography X-Drives NTFS Streams

The Forensic ToolKit 1.4 from NT OBJECTives, Inc. Copyright(c)1998 NT OBJECTives, Inc. All Rights Reserved AFind - File access time finder SFind - Hidden data streams finder HFind - Hidden file finder

Tool Analysis What tools were used? How were the executed? What language were they written in? File Comparison with Suspect’s File.

Log File Analysis Events. What Events are monitored? What do the event records reveal? Firewall/Router/Server log files? TripWire Database? Modem/FTP/Telnet/RAS

Evidence Search Image Files Software applications Deleted Files Hidden Files Encrypted Files Hidden partitions Keyword Search Known Remote Access Tools

Forensics Process Preparation Protection Imaging Examination Documentation

Preparation Confirm the authority to conduct analysis/search of media. Verify the purpose of the analysis and the clearly defined desired results. Ensure that sterile media is available and utilized for imaging. (ie..Free of virus, Non-essential files, and verified before use.) Ensure that all software tools utilized for the analysis are tested and widely accepted for use in the forensics community.

Legal Overview Employer Searches in Private-Sector Workplaces Warrantless workplace searches by private employers rarely violate the Fourth Amendment. So long as the employer is not acting as an instrument or agent of the Government at the time of the search, the search is a private search and the Fourth Amendment does not apply. See Skinner v. Railway Labor Executives’ Ass’n, 489 U.S. 602, 614 (1989). Consult with your Legal Counsel

Protection Protect the integrity of the evidence. Maintain control until final disposition. Prior to Booting target computer, DISCONNECT HDD and verify CMOS. When Booting a machine for Analysis, utilize HD Lock software.

Typical CBD Files

Imaging Utilize disk “imaging” software to make an exact image of the target media. Verify the image. When conducting an analysis of target media, utilize the restored image of the target media; never utilize the actual target media.

Imaging Software

Examination The Operating System Services Applications/processes Hardware LOGFILES! System, Security, and Application File System

Examination Continued Deleted/Hidden Files/NTFS Streams Software Encryption Software Published Shares/Permissions Password Files SIDS Network Architecture/Trusted Relationships

Off-Site Storage “X-Drives” FTP Links FTP Logs Shares on internal networks

Security Identifers SIDS can be used to ID the perpetrator. Security is used within Win2K to ID a user. Security is applied to the SID.

Where to find the SID

SID Structure Domain Identifier: All values in the series, excluding the last value ID the Domain. Relative Identifier (RID) is the last value. This ID’S the Account or Group S

Documentation Document EVERYTHING Reason for Examination “The Scene” Utilize Screen Capture/Copy Suspected files All apps for Analysis/apps on Examined system.

Users

Closing Forensic Techniques are based on the File System of the media to be examined Utilizing an NTFS partition enhances security. If further increases the Forensic examiners chances of recovering useful evidence. The Investigator is looking for evidence to establish a FACT(s).