IT GOVERNANCE AND CYBERCRIME Open Source Forensic Tools 19/04/10.

Slides:



Advertisements
Similar presentations
COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 3 Operating Systems.
Advertisements

COURSE: COMPUTER PLATFORMS
The Penguin Sleuth Kit By Ernest Baca
WinPE, ImageX and ADK. Windows 2012 Server, Roles, Features Install Rules, Best Practices How did the install go? Issues, weird things…what happened?
OPEN SOURCE TOOLS Dr. Abraham Professor UTPA. Open Source Freely redistributable Provides access to source code End user may modify source code.
Data Collection, Analysis and Preservation Computer Forensics: Data Collection, Analysis and Preservation Kikunda Eric Kajangu, Cher Vue, and John Mottola.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 2: Automating the Windows Vista Installation.
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Mgt 240 Lecture Website Construction: Software and Language Alternatives March 29, 2005.
MDOP 2010: Diagnostic and Recovery Toolset (DaRT) Speaker Fabrizio Grossi
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 2 Installing Windows Server 2008.
I Information Systems Technology Ross Malaga 3 "Part I Understanding Information Systems Technology" Copyright © 2005 Prentice Hall, Inc. 3-1 SOFTWARE.
Computer Forensics Tools
Introduction to Microsoft Office Web Apps with Jim Mollé Learn iT! Computer Software Training.
Data Acquisition Chao-Hsien Chu, Ph.D.
COEN 252 Computer Forensics
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
SOFTWARE.
Operating Systems Chapter 4.
Passwords, Encryption Forensic Tools
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Guide to Computer Forensics and Investigations Fourth Edition
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
BACS 371 Computer Forensics
SOFTWARE.
Component 4: Introduction to Information and Computer Science Unit 4: Application and System Software 1 Health IT Workforce Curriculum Version 1.0/Fall.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
10/1/2015 Chapter 2 Installing Windows XP Professional.
Computing and the Web Operating Systems. Overview n What is an Operating System n Booting the Computer n User Interfaces n Files and File Management n.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
WINDOWS XP PROFESSIONAL AUTOMATING THE WINDOWS XP INSTALLATION Bilal Munir Mughal Chapter-2 1.
14 Step-by-Step Instructions for an Upgrade Installation n Prepare for the installation Verify that all devices and applications are Windows 2000 compatible.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Mike Mabey CSE 598 – Spring 2010Nishanth Kotha Venkata A Robot for Google Wave.
1 iPhone Forensics Ruben Gonzalez. 2 Agenda I am the iPhone iPhone Components OS and System Architecture Let’s Dive into iPhone Forensics Evidence Left.
What is CrossLoop? FREE secure screen sharing utility designed for people of all technical skill levels. Connect any two PCs on Earth Available in 21 Languages.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Data recovery in 15 minutes or less UsingKnoppix.
BMTS 242: Computer and Systems Lecture 2: Memory, and Software Yousef Alharbi Website
Chapter 4 Software. Introduction Program: is a set of sequence instructions that tell the computer what to do. Software: is a collection of programs,
2: Operating Systems Networking for Home & Small Business.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Hyper-V Recovery Software Ideal Application to Get Data from VHD v2.1.
به نام خدای مهربان زبان تخصصی دانشجویان کامپیوتر English for Computer Students درس 3 جوانمرد Ejavanmard.blogfa.com
Instructor: Syed Shuja Hussain Chapter 4: Operating System Basics.
By: Tom Maloney. Overview What is ProDiscover What it can be used for A few quick tools A real example ProDiscover vs. ENCASE ProDiscover IR Applications.
System SOFTWARE.
KEEPS – a system for UELMA preservation and security
Efficient Drive forensics – and it’s free!
KEEPS – a system for UELMA preservation and security
Operating Systems Overview
Chapter 4.
Digital Forensics Dr. Bhavani Thuraisingham
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
SOFTWARE TECHNOLOGIES
“Encryption threatens to lead all of us to a very dark place.”
Causes And Solution To Recover Lost Partition Table.
Presentation transcript:

IT GOVERNANCE AND CYBERCRIME Open Source Forensic Tools 19/04/10

Agenda  What is Open Source  Features Open Source  Relevance to Digital Forensics  Windows Based  Unix Based  Caveats of Open Source  Open Source vs. Closed Source  Future

What is Open Source?  NOT free  License – GNU/GPL/GNU 2.0  Collaboration  Many Iterations  Successful

Features of Open Source?  Cost Effective  RAD – Rapid Application Development  “Great minds think alike”  Standards Compliant  Constantly updated  Can be cross platform

Relevance to Digital Forensic  Many areas – Network, Computer and Environmental for example  Work in the same principal and approach:  Acquisition  Extraction  Analysis  Report  Environment Independent  Windows 32/64 bit  Unix/Linux – 32/64bit

Windows Based Software

Forensic Acquisition Utilities 32/64 bit  Open License – Allows for use in commercial and non-commercial environments  Collection of software  4MB download  Allows collection of data from a running computer

FAU – Includes  DD – creates byte-level images of source input  FMData – displays details of file and directory attributes  NC – remake of netcat – read and write data across networks  Volume Dump – shows information about all drives in computer  Wipe – wipes the data from hard drive

LiveView  Written in Java  Boots DD-style Hard disk images into the operating system  Requires other free software to run  Auto generation of MBR (if not present)

Screenshots of LiveView Choose boot type – image or physical drive Booting operating system in virtual environment

TestDisk 6.11  Open source  Recovery of files and partitions  Command line Interface

Screenshots of TestDisk 6.11 TestDisk can create logs and work off the logs. This can easily help with long file recovery processes. Or even additional – saving time and time. Choose the disk from which you want to recover the partitions

Microsoft Coffee  Used specifically by law enforcement (FBI)  Not open source; free  Easy training – can be trained in 10 minutes  Supported by INTERPOL and NW3C (USA)

Unix/Linux Based

AIR – Automated Image Restore  Open source  Provides GUI for DD/DC3DD imaging CLI  User friendly  Does not require knowledge of DD-CLI

Screenshots of AIR

The Sleuth Kit (TSK)  Open source  Comes with a GUI “Autopsy Forensic Browser”  Command line analysis tool  Works similar to encase.  Digital Evidence Bag

Caveats of Open Source  Integrity – not validated in the court of Law  Easily reverse-engineered  Can be exploited  No financial backing

Open Source vs. Closed Source  Open source tools are better tested – more time ensuring it meets the standards  Closed source provides manuals and guidelines on usability of application  Support is often phone based – additional charges vs. Online forum based  Direct developer interaction

Future  Demand  Forensic Laboratory  Subject Matter Experts  Validity/Integrity

Thanks...Any Questions?