Guide to Computer Forensics and Investigations, Second Edition

Slides:



Advertisements
Similar presentations
Working with Disks and Devices
Advertisements

Guide to Computer Forensics and Investigations, Second Edition
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
COS 413 Day 13. Agenda Questions? Assignment 4 Due Assignment 5 posted –Due Oct 21 Capstone proposal Due Oct 17 Lab 5 on Oct 15 in N105 –Hands-on Projects.
11 INSTALLING WINDOWS XP Chapter 2. Chapter 2: Installing Windows XP2 INSTALLING WINDOWS XP  Prepare a computer for the installation of Microsoft Windows.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
CSCD 496 Computer Forensics
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Guide to Computer Forensics and Investigations Third Edition Chapter 7 Current Computer Forensics Tools.
Guide to Computer Forensics and Investigations Third Edition
1 CSCD496 Computer Forensics Lecture 5 Applying Process to Computer Forensics Winter 2010.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 2: Managing Hardware Devices.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
COS/PSA 413 Day 12. Agenda Questions? Assignment 4 posted –Due October 10 Lab 4 tomorrow in N105 –Hands-on Projects 6-1 through 6-4 on Pages Discussion.
Computer Forensics Tools
Mohd Taufik Abdullah Department of Computer Science
COEN 252 Computer Forensics
Guide to Computer Forensics and Investigations, Second Edition
1 Semester 2 Module 2 Introduction to Routers Yuda college of business James Chen
Hands-on: Capturing an Image with AccessData FTK Imager
November 2009 Network Disaster Recovery October 2014.
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
Guide to Computer Forensics and Investigations, Second Edition
NIST CFTT: Testing Disk Imaging Tools James R. Lyle National Institute of Standards and Technology Gaithersburg Md.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
COEN 252 Computer Forensics
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 2: Managing Hardware Devices.
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
University of Management & Technology 1 Operating Systems & Utility Programs.
Chapter 9 Digital Forensics Analysis and Validation
Software Writer:-Rashedul Hasan Editor:- Jasim Uddin.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Introducing and Comparing Operating Systems Chapter 1.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 7 Current Computer Forensics Tools Last modified :40 am.
Guide to Computer Forensics and Investigations Fifth Edition Chapter 6 Current Digital Forensics Tools All slides copyright Cengage Learning with additional.
Guide to Computer Forensics and Investigations Fourth Edition
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 23 Purchasing a PC or Building Your Own.
COMPUTER SYSTEM TOOLS. SCANDISK MICROSOFT UTILITY PURCHASED FROM NORTON, WHICH IS NOW SYMANTEC; INCLUDED WITH MS-DOS 6.2 AND ON AS WELL AS ALL VERSIONS.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS FOURTH EDITION CHAPTER 7 CURRENT COMPUTER FORENSICS TOOLS.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
Guide to Computer Forensics and Investigations Fifth Edition
Create setup scripts simply and easily.
Guide to Computer Forensics and Investigations Fifth Edition
Chapter 5 EnCase Concepts.
LO2: Understand Computer Software
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Digital Forensics Dr. Bhavani Thuraisingham
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 6 Current Digital Forensics Tools.
Presentation transcript:

Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools

Guide to Computer Forensics and Investigations, 2e Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements and expectations for computer forensics tools Understand how computer forensics hardware and software tools integrate Validate and test your computer forensics tools Guide to Computer Forensics and Investigations, 2e

Computer Forensics Software Needs Look for versatility, flexibility, and robustness OS File system Script capabilities Automated features Vendor’s reputation Keep in mind what applications you analyze Guide to Computer Forensics and Investigations, 2e

Types of Computer Forensics Tools Hardware forensic tools Single-purpose components Complete computer systems and servers Software forensic tools Command-line applications GUI applications Guide to Computer Forensics and Investigations, 2e

Tasks Performed by Computer Forensics Tools Acquisition Validation and discrimination Extraction Reconstruction Reporting Guide to Computer Forensics and Investigations, 2e

Guide to Computer Forensics and Investigations, 2e Acquisition Acquisition categories: Physical data copy Logical data copy Data acquisition format Command-line acquisition GUI acquisition Guide to Computer Forensics and Investigations, 2e

Acquisition (continued) Acquisition categories (continued): Remote acquisition Verification Guide to Computer Forensics and Investigations, 2e

Acquisition (continued) Guide to Computer Forensics and Investigations, 2e

Validation and Discrimination Hashing Cyclic redundancy check (CRC)-32, MD5, Secure Hash Algorithms (SHAs) Filtering Based on hash value sets Analyzing file headers Discriminate files based on their types Guide to Computer Forensics and Investigations, 2e

Guide to Computer Forensics and Investigations, 2e Extraction Major techniques include: Data viewing How data is viewed depends on the tool used Keyword searching Recovers key data facts Decompressing Archive and cabinet files Guide to Computer Forensics and Investigations, 2e

Extraction (continued) Major techniques include: Carving Reconstruct fragments of deleted files Decrypting Password dictionary attacks Brute-force attacks Bookmarking First find evidence, then bookmark it Guide to Computer Forensics and Investigations, 2e

Guide to Computer Forensics and Investigations, 2e Reconstruction Re-create a suspect’s disk drive Techniques Disk-to-disk copy Image-to-disk copy Partition-to-partition copy Image-to-partition copy Guide to Computer Forensics and Investigations, 2e

Guide to Computer Forensics and Investigations, 2e Reporting Configure your forensic tools to: Log activities Generate reports Use this information when producing a final report for your investigation Guide to Computer Forensics and Investigations, 2e

Guide to Computer Forensics and Investigations, 2e Tool Comparisons Guide to Computer Forensics and Investigations, 2e

Tool Comparisons (continued) Guide to Computer Forensics and Investigations, 2e

Other Considerations for Tools Flexibility Reliability Expandability Keep a library with older version of your tools Guide to Computer Forensics and Investigations, 2e

Computer Forensics Software Example: Norton DiskEdit Advantages Require few system resources Run in minimal configurations Fit on a bootable floppy disk Disadvantages Cannot search inside archive and cabinet files Most of them only work on FAT file systems Guide to Computer Forensics and Investigations, 2e

UNIX/Linux Command-line Forensic Tools Dominate the *nix platforms Examples: SMART The Coroner’s Toolkit (TCT) Autopsy SleuthKit Guide to Computer Forensics and Investigations, 2e

Guide to Computer Forensics and Investigations, 2e GUI Forensic Tools Simplify computer forensics investigations Help training beginning investigators Most of them come into suites of tools Guide to Computer Forensics and Investigations, 2e

GUI Forensic Tools (continued) Advantages Ease of use Multitasking No need for learning older OSs Disadvantages Excessive resource requirements Produce inconsistent results Create tool dependencies Guide to Computer Forensics and Investigations, 2e

Computer Hardware Tools Provide analysis capabilities Hardware eventually fails Schedule equipment replacements When planning your budget Failures Consultant and vendor fees Anticipate equipment replacement Guide to Computer Forensics and Investigations, 2e

Computer Investigation Workstations Carefully consider what you need Categories: Stationary Portable Lightweight Balance what you need and what your system can handle Guide to Computer Forensics and Investigations, 2e

Computer Investigation Workstations (continued) Police agency labs Need many options Use several PC configurations Private corporation labs handle only system types used in the organization Keep a hardware library Guide to Computer Forensics and Investigations, 2e

Building your Own Workstation It is not as difficult as it sounds Advantages Customized to your needs Save money ISDN phone system Disadvantages Hard to find support for problems Can become expensive if careless Guide to Computer Forensics and Investigations, 2e

Building your Own Workstation (continued) You can buy one from a vendor as an alternative Examples: F.R.E.D. FIRE IDE Guide to Computer Forensics and Investigations, 2e

Guide to Computer Forensics and Investigations, 2e Using a Write-Blocker Prevents data writes to a hard disk Software options: Software write-blockers are OS-dependent PDBlock Hardware options Ideal for GUI forensic tools Act as a bridge between the disk and the workstation Guide to Computer Forensics and Investigations, 2e

Using a Write-Blocker (continued) Discards the written data For the OS, the data copy is successful Connecting technologies FireWire USB 2.0 SCSI controllers Guide to Computer Forensics and Investigations, 2e

Recommendations for a Forensic Workstation Data acquisition techniques: USB 2.0 FireWire Expansion devices requirements Power supply with battery backup Extra power and data cables External FireWire and USB 2.0 ports Guide to Computer Forensics and Investigations, 2e

Recommendations for a Forensic Workstation (continued) Ergonomic considerations Keyboard and mouse Display High-end video card Monitor Guide to Computer Forensics and Investigations, 2e

Validating and Testing Forensic Software Evidence could be admitted in court Test and validate your software to prevent damaging the evidence Guide to Computer Forensics and Investigations, 2e

Using National Institute of Standards and Technology (NIST) Tools Computer Forensics Tool Testing (CFTT) program Based on standard testing methods ISO 17025 criteria ISO 5725 Also evaluate disk imaging tools Forensic Software Testing Support Tools (FS-TSTs) Guide to Computer Forensics and Investigations, 2e

Using NIST Tools (continued) National Software Reference Library (NSRL) project Collects all known hash values for commercial software applications and OS files Helps filtering known information Guide to Computer Forensics and Investigations, 2e

The Validation Protocols Always verify your results Use at least two tools Retrieving and examination Verification Understand how tools work Disk editors Norton DiskEdit Hex Workshop WinHex Guide to Computer Forensics and Investigations, 2e

The Validation Protocols (continued) Disk editors (continued) Do not have a flashy interface Reliable tools Can access raw data Guide to Computer Forensics and Investigations, 2e

Computer Forensics Examination Protocol Perform the investigation with a GUI tool Verify your results with a disk editor WinHex Hex Workshop Compare hash values obtained with both tools Guide to Computer Forensics and Investigations, 2e

Computer Forensics Tool Upgrade Protocol Test New releases Patches Upgrades If you found a problem, report it to your forensics tool vendor Use a test hard disk for validation purposes Guide to Computer Forensics and Investigations, 2e

Guide to Computer Forensics and Investigations, 2e Summary Create a business plan to get the best hardware and software Computer forensics tools functions Acquisition Validation and discrimination Extraction Reconstruction Reporting Guide to Computer Forensics and Investigations, 2e

Guide to Computer Forensics and Investigations, 2e Summary (continued) Maintain a software library on your lab Computer forensics tools types: Software Hardware Forensics software: Command-line GUI Guide to Computer Forensics and Investigations, 2e

Guide to Computer Forensics and Investigations, 2e Summary (continued) Forensics hardware: Customized equipment Commercial options Include workstations and write-blockers Always test your forensics tools Guide to Computer Forensics and Investigations, 2e