Computer & Network Forensics

Slides:



Advertisements
Similar presentations
CSI Challenge 2012.
Advertisements

Database Basics. What is Access? Database management system Computer-based equivalent of a manual database Makes it easy to organize and update information.
CC SQL Utilities.
MS-Access XP Lesson 1. Introduction to MS-Access Database Management System Software (DBMS) Store data in databases Database is a collection of table.
Wincite Introduces Knowledge Notebooks A new approach to collecting, organizing and distributing internal and external information sources and analysis.
Effective Discovery Techniques In Computer Crime Cases.
Integrated Imaging and Document Management System Product Demonstration.
Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
XP Chapter 3 Succeeding in Business with Microsoft Office Access 2003: A Problem-Solving Approach 1 Analyzing Data For Effective Decision Making.
Creating Custom Forms. 2 Design and create a custom form You can create a custom form by modifying an existing form or creating a new form. Either way,
Introduction to Structured Query Language (SQL)
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
Microsoft Access 2010 Chapter 7 Using SQL.
Tutorial Introduction Fidelity NTSConnect is an innovative Web-based software solution designed for use by customers of Fidelity National Title Insurance.
Hands-on: Capturing an Image with AccessData FTK Imager
MyiLibrary® ‘Search & View’ Website Training June 8, 2010.
Chapter Seven Advanced Shell Programming. 2 Lesson A Developing a Fully Featured Program.
Microsoft Office 2007 Access 2007 Chapter 9 Administering a Database System.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 1. Chapter 2: Relational Databases and Multi-Table Queries Exploring Microsoft Office.
Classroom User Training June 29, 2005 Presented by:
Access 2007 Database Application Managing Business Information Effectively BCIS 1 and 2.
XP New Perspectives on Microsoft Access 2002 Tutorial 51 Microsoft Access 2002 Tutorial 5 – Enhancing a Table’s Design, and Creating Advanced Queries and.
Using SD K12 SharePoint ®. What is SharePoint? Microsoft SharePoint Components Web Browser Collaboration functions Process management modules Search modules.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 6 Generating Form Letters, Mailing Labels, and a Directory
 A database is a collection of data that is organized so that its contents can easily be accessed, managed, and updated. What is Database?
With Windows 7 Introductory© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Windows 7 Introductory Chapter 2 Managing Libraries Folders, Files.
Analyzing Data For Effective Decision Making Chapter 3.
Microsoft Project 2010 ® Tutorial 6: Sharing Project Information with Other People & Applications.
Teacher’s Assessment Assistant Worksheet Builder Starting the Program
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Plug-In T8: Decision Making Using Access 2007 Business Driven Technology.
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 17 Creating a Database.
To access our web services, go to……. Click on Customer Login.
6 1 Lecture 8: Introduction to Structured Query Language (SQL) J. S. Chou, P.E., Ph.D.
Microsoft Access 2010 Chapter 10 Administering a Database System.
Copyright © Prentice Hall Database Management Systems Chapter 13 Getting Data Together.
FIX Eye FIX Eye Getting started: The guide EPAM Systems B2BITS.
Regular Expressions for PHP Adding magic to your programming. Geoffrey Dunn
Introduction to Database using Microsoft Access 2013 Part 6.1 November 18, 2014.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
®® Microsoft Windows 7 for Power Users Tutorial 3 Managing Folders and Files.
Lesson 13 Databases Unit 2—Using the Computer. Computer Concepts BASICS - 22 Objectives Define the purpose and function of database software. Identify.
Chapter 3 Automating Your Work. It is frustrating when you have to type the same passage of text repeatedly. For example your name and address. Word includes.
> > >> < <
Microsoft Office 2013 Try It! Chapter 4 Storing Data in Access.
XP New Perspectives on Microsoft Office Access 2003, Second Edition- Tutorial 6 1 Microsoft Office Access 2003 Tutorial 6 – Creating Custom Forms.
Irakli Garibashvili Director, National Scientific Library in Georgia.
LM 5 Introduction to SQL MISM 4135 Instructor: Dr. Lei Li.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Database (Microsoft Access). Database A database is an organized collection of related data about a specific topic or purpose. Examples of databases include:
Inventory system is used through almanara program to do the inventory process with more easily and flexible way for all items that are existed within.
Responder Field Edition & Pro
Creighton Barrett Dalhousie University Archives
Presented by Steve Abrams, M.S. Charleston, SC / Long Island, NY
Tools for identifying duplicate files and known software files
Practical Office 2007 Chapter 10
Responder Field Edition & Pro
Knut Kröger & Reiner Creutzburg
Search Techniques and Advanced tools for Researchers
Advanced Searching & Filtering
Microsoft Office Access 2003
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Microsoft Office Access 2003
FTK Using FTK.
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
Presentation transcript:

91.580.203 Computer & Network Forensics Xinwen Fu FTK Forensic Toolkit

Big Picture AccessData download Acquire and preserve the evidence FTK Imager version 2.5.4 Known Filter Library File version 27_jun_2007 Forensic Toolkit®(FTK™) version 1.81 Acquire and preserve the evidence Analyze the case Prepare a report Dr. Xinwen Fu

Acquire and Preserve the Evidence Create an image of the suspect drive using hardware devices Create an image of the suspect drive using software applications FTK Imager dd Key point of creating an image No changes to the evidence should be made Dr. Xinwen Fu

Big Picture Acquire and Preserve the evidence Analyze the case Prepare a report Dr. Xinwen Fu

Analyze the Case - Hashing Refer to the process of generating a unique value based on a file’s contents Used to verify file integrity and identify duplicate and known files MD5, SHA1 FTK Imager -> File -> Export File Hash List Demo Dr. Xinwen Fu

Analyze the Case - Known File Filter (KFF) An FTK utility that compares file hashes against a database of hashes from known files Three purposes Eliminate ignorable files (such as known system and program files) Alert you to known illicit or dangerous files Check for duplicate files (maybe different file names) Container files: Files which contain other files, such as zip and e-mail files with attachments When KFF identifies a container file as ignorable, FTK does not extract its component files KFF includes the HashKeeper database, which is updated periodically and is available for download on the FTK update page Dr. Xinwen Fu

Analyze the Case - Searching Live search Involve an item-by-item comparison with the search term: time consuming Allow you to search non-alphanumeric characters and perform regular expression searches Indexed search Use the index file to find a search term The index file contains all discrete words or number strings found in both the allocated and unallocated space in the case evidence Dr. Xinwen Fu

Data Carving Search for items, such as graphics embedded in other files Search the index for specific file headers and carves the file’s associated data Find any embedded or deleted item as long as the file header still exists Recover previously deleted files located in unallocated space Data carving during evidence processing (when a new case is added) Select Data Carve in the Process to Perform Screen during the New Case Wizard Data carving done in an existing case Select Tools > Data Carving Dr. Xinwen Fu

Live Search In the Search window, click Live Search In the Search Term field, enter the term you want to search for In the Item Type column, specify if you want FTK to search in Text or Hexadecimal Click Add to add the search term to the Search Items column In the Max Hits Per File field, enter the maximum number of times you want a search hit to be listed per file Dr. Xinwen Fu

Indexed Search FTK uses the search engine, dtSearch, to perform all indexed searches To index evidence when it is added to the case, check the Full Text Index box on the Evidence Processing Options form To index evidence after it is added to the case, select Tools -> Analysis Tools -> Full Text Indexing In the Search window, click Indexed Search In the Search Term field, enter the term you want to search for, including any wildcard characters Click Add to add the search term to the search list To refine the search, click Options In the Search Items column, select the index term you want to search Click View Item Results to initiate the search Dr. Xinwen Fu

Using Filters If you want to minimize the number of evidence items to examine, you can apply an existing filter or create a customized filter to exclude unwanted items FTK allows you to filter your case evidence by file status, type, size, and date parameters Dr. Xinwen Fu

Overview Window - Unfiltered Dr. Xinwen Fu

Overview Window - Filtered Dr. Xinwen Fu

Overview Window – Filtered + Actual Files Dr. Xinwen Fu

Search by Regular Expression Page 295 of FTK Manual (V1.81.0) Search through large quantities of text information for patterns of data such as the following Telephone Numbers Social Security Numbers Computer IP Addresses Credit Card Numbers Dr. Xinwen Fu

Regular Expressions for Data Pattern Arithmetic expression: 5/((1+2)*3) Regular expressions also have operands, operators, sub-expressions, and a value Operands in regular expressions can be any printable characters Component Example Operands 5, 1, 2, 3 Operators /, ( ), +, * Sub-Expressions (1+2), ((1+2)*3) Value Approximately 0.556 Dr. Xinwen Fu

Simple Regular Expressions Made up entirely of operands Regular expression dress causes to return a list of all files that contain the sequence of characters dress Dr. Xinwen Fu

Complex Regular Expressions Operators allow regular expressions to search patterns of data rather than specific values Find all Visa and MasterCard credit card numbers in case evidence files: \<((\d\d\d\d)[\- ]){3}\d\d\d\d\> Dr. Xinwen Fu

\<((\d\d\d\d)[\- ]){3}\d\d\d\d\> \: Escape character Modification of operands: \< Modification of operators: \- \<: begin-a-word operator The first character immediately follows a non-word character such as white space or other word delimiter ( ): Parentheses Group together a sub-expression \d: any decimal digit character from 0-9 [ ]: next character must be a character listed between the brackets {3}: the preceding sub-expression must repeat three times, back to back \>: end-a-word operator Dr. Xinwen Fu

Other Variations on the Same Expression \<((\d\d\d\d)(\-| )){3}\d\d\d\d\> | (union operator): the next character to match is either the left operand (the hyphen) or the right operand (the spacebar space) \<\d\d\d\d(\-| )\d\d\d\d(\-| )\d\d\d\d(\-| )\d\d\d\d\> Dr. Xinwen Fu

Predefined Regular Expressions Visa and MasterCard Numbers \<((\d\d\d\d)[\- ]){3}\d\d\d\d\> U.S. Social Security Numbers \<\d\d\d[\- ]\d\d[\- ]\d\d\d\d\> U.S. Phone Number ((\<1[\-\. ])?(\(|\<)\d\d\d[\)\.\-/ ] ?)?\<\d\d\d[\.\- ]\d\d\d\d\> ?: the sub-expression immediately to its left appear exactly zero or one time in any search hits IP Addresses \<[1-2]?[0-9]?[0-9]\.[1-2]?[0-9]?[0-9]\.[1-2]?[0-9]?[0-9]\.[1-2]?[0-9]?[0-9]\> Dr. Xinwen Fu

Big Picture Acquire and Preserve the evidence Analyze the case Prepare a report Dr. Xinwen Fu

Prepare a Report Create a case report and case log to document the evidence and investigation results Use the Report Wizard to create and modify reports: FTK -> File -> Report Wizard The report may include Bookmarks (information you selected during the examination): FTK -> Tools -> Create Bookmark … Customize graphics references Select file listings Include supplementary files and the case log Dr. Xinwen Fu

Dr. Xinwen Fu

Discussion: Case Studies How digital forensics might relate to you, your firm or your case Case Studies What tools, knowledge and techniques you may use for the case Dr. Xinwen Fu