Computer Forensic Evidence Collection and Management Chapter 12 E-Mail and Internet Investigations.

Slides:



Advertisements
Similar presentations
Kalpesh Vyas & Seward Khem
Advertisements

Basic Communication on the Internet:
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
1 Internet Umm Alqura University السنة التحضيرية مهارات الحاسب الالي (1)
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
© 2010, Robert K. Moniot Chapter 1 Introduction to Computers and the Internet 1.
The Internet Useful Definitions and Concepts About the Internet.
Web Server Administration
Layer 7- Application Layer
Internet…issues Managing the Internet
Remote mailbox access gateway Software lab project.
Computer & Network Forensics Xinwen Fu Chapter 13 Investigations.
Guide to Computer Forensics and Investigations Third Edition Chapter 12 Investigations.
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
Lesson 19 Internet Basics.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Inside of a computer… What happens when you turn your computer on? What loads? Where are applications stored? How are do they run? In what form is information.
Internet Basics.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Forensic and Investigative Accounting
Computer Concepts 2014 Chapter 7 The Web and .
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Guide to Computer Forensics and Investigations, Second Edition Chapter 13 Investigations.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
DATA COMMUNICATION DONE BY: ALVIN SAMPATH CARLVIN SAMPATH.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Lesson 2 — The Internet and the World Wide Web
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
CIS 1310 – HTML & CSS 1 Introduction to the Internet.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Introduction To Internet
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
UNESCO ICTLIP Module 1. Lesson 61 Introduction to Information and Communication Technologies Lesson 6. What is the Internet?
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Internet Research Tips Daniel Fack. Internet Research Tips The internet is a self publishing medium. It must be be analyzed for appropriateness of research.
1 Client Software and Mail Hosts Client PC has client software that communicates with user’s mail host Mail hosts deliver outgoing mail to.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Internet. What is Internet Internet is a computer network made up of millions of networks worldwide. No one knows exactly how many computers are connected.
NetTech Solutions Microsoft Outlook and Outlook Express Lesson Four.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
CSI 3125, Preliminaries, page 1 Networking. CSI 3125, Preliminaries, page 2 Networking A network represents interconnection of computers that is capable.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Guide to Computer Forensics and Investigations Fifth Edition
Information Networks. Internet It is a global system of interconnected computer networks that link several billion devices worldwide. It is an international.
(class #2) CLICK TO CONTINUE done by T Batchelor.
Internet Business Associate v2.0
Instructor Materials Chapter 5 Providing Network Services
HISTORY OF COMPUTERS AND TECHNOLOGY
Chapter 10: Application Layer
Web Development & Design Chapter 1, Sections 4, 5 & 6
Guide to Computer Forensics and Investigations Third Edition
Lesson 19 Internet Basics.
Presentation transcript:

Computer Forensic Evidence Collection and Management Chapter 12 and Internet Investigations

Chapter Objectives Identify the Internet, Web, and network elements Become familiar with the basics concerning investigations Discover the various and Internet data that an provide forensic evidence Look at the tools used to track and identify evidence See how to identify and track SPAM and phishing attempts Develop testimonial evidence for scams and identity theft cases Learn how to prepare evidence for court proceedings.

Introduction Numerous computer system threats arrive daily via that is transmitted over the Internet and corporate networks. These threats could involve SPAM, viruses, worms, Trojan horsed, and phishing messages. forensic investigation can be used for most civil and criminal legal proceedings. Internet and investigations take on a worldwide scope because many scams involving identify theft originate in third-world countries. Documentation is of major importance in the investigative process. Forensic examiner and investigators will be required to become proficient in a number of software tools that have been designed for cases.

Internet Basics The Internet is the publicly available worldwide system of interconnected computer networks that transmit data by packet switching using a standardize Internet Protocol (IP) and many other protocols. Unlike online services, which are centrally controlled, the Internet is decentralized by design. Originally designed by the U.S. Defense Department so that a communication signal could withstand a nuclear ware and server military instruction worldwide, the Internet was first known as the ARPnet. −Network Service provider (NSP) is a company that provides the national or international packet-switching networks that carry Internet traffic −Internet Service provider (ISP) is a company that provide individuals and other companies access to the Internet and other related services such as Webs site building and virtual hosting. −Transmission Control Protocol/Internet Protocol (TCP/IP)refers to an entire suit of protocol used to provide communication on a variety of layers. −File Transfer Protocol (FTP) is a common method of moving files between two sites. −Hyper Transfer Protocol (HTTP) is the set of rules for exchanging files on the web. −Browser is a client to a Web server that allows the user to read hypertext documents on the Web. −Gopher is an Internet server document browsing and searching system.

Basics Electronic mail or is the transmission of messages over communications networks. Most mainframes, minicomputers, and computers networks have an system. Users can send and receive via the Internet or a local area network. The central computer users a server operating systems to run an server program. Client computers contact the centrally located server to send and retrieve messages. − program use a standard such as Multipurpose Internet Mail Extensions (MIME), which encodes messages for transmission that contains information for sending messages from one point to another. −Simple Mail Transfer Protocol (SMTP) is a core Internet protocol used to transfer messages between servers. −POP3, IMAP are protocols supported by clients. −An address is a place where someone can contact another person, typically in the format −Domain Naming System (DNS) is the system that translate Internet domain names into IP numbers.

Specialized Tools After understanding the workings of the various systems, the examiner must now learn how to use the various tools to obtain evidence from the systems. Software companies offer a number of packages that provide forensic functions for investigations. −FINAL can recover the database file and locates lost that do not have data locations information associated with them. Supports Outlook and Endora −Sawmill can read, analyze, and report on GroupWise Internet agent accounting logs. −DBXtract extracts all mail an news messages from individual dbx files. −MailBag Assistant provides tools to search, organize, analyze, and archive a large volume of messages. −Paraben’s Examiner is a comprehensive forensically sound examination tool −Access Data FTK provides for and Zip files analysis and supports Outlook. −EnCase software has a number of powerful features that facilitate efficient examinations. −Coroner’s Toolkit can be used to recover images formUNIX systems. The user of freeware forensic software might constitute a valid objection raised by the opposing attorneys. With a little luck, the examination will result in a match and there will be enough evidence for a warrant or subpoena.

Systems Windows/DOS, Macintosh, and UNIX computer system all provide some type of transmission capability. system include: −GroupWise is a workgroup application suite offering electronic mail and dairy scheduling from Novel. −Microsoft Outlook Express is an and news client bundled with operating system and the Internet Explorer Web browser by Microsoft. −Eudora is a popular software program. −Pine is a popular mail and Usenet client for UNIX and Windows. −ELM is a text-based client that is commonly found on UNIX systems. Forensic examiners must understand many different formats, processed, and contents for each of theses systems.

Internet Search Tools Several Tools are available on the Web that allow for unique and specialized searches. These include: −The American Registry for Internet Numbers (ARIN) service provides a mechanism for finding contract and registration information for resources registered with ARINS. −Entering the IP Address retrieved from the e- mail document will produce a considerable amount of information concerning the mail site. −Google is a popular search engine and a tool for finding resources on the Web. −Freeality has a Web pages that contains links to a number of search engines.

Crimes and Incidents Involving the Internet and Information concerning crimes that occur over the network and on computing and communications devices involve laptop and desktop computers, cell phones, PDAs, and a host of electronic devices. is transmitted and received on many of these devices and, therefore, they are candidates for a forensic investigation when an incident or crime occurs. Identity theft can result from SPAM, Internet threats, and phishing attract. Another particularly disturbing criminal activity involves child exploitation, molestation, and abuse. Corporate can be the vehicle for sexual harassment, pornography, violation of company policies, corporate espionage, and the list is endless.

Investigations forensic examinations conducted in the computer forensic lab will probably be criminal in nature since most incidents involving corporate policy issues will be conducted by security departments. Important considerations for incidents involving include: −What is the name of the ISP? −What are the offenders’ name and address? −Is there a copy of the and is it available? Investigative departments and forensic labs should establish a working relationship with the ISP in the event some evidence is located on one of their servers

Examining Images Categorizing some as a criminal activity depends upon the location of the sender. The examiner must determine the sending location during the early phases of the examination, on order to not waste resources on a nonissue. After it has been determine a crime has been committed using , it will be necessary to access the documents in questions. For crimes where there is a victim, access to copies of the should be easily attained; however, where has been a tool in the commission of some crime, accessing the documents may be more difficult. For many investigation, the forensic examiner can rely on message files, headers, and server log files to look for evidence. s can be copied with just several steps and the process is similar for most systems. Another piece of evidence that might be of value is the HTML code source. It could be used to show how the suspect was going to collect personal information form the victim and the data was being requested.

Headers examiners must be familiar with the memo header fields, received fields, and message-ID fields. Numerous fields are described in the RFC 2076 standard and examiners should be familiar with these documents. The header is basically a section of formatted text at the top of a message followed by a black line. It is created by servers for delivery and is used for troubleshooting. There are only a few fields that are required in the message headers. The forensic examiner will use information attached to these fields in an attempt to develop case evidence.

Headers (Cont.)

SMTP is a protocol for sending messages between servers. SMTP is generally used to send messages from a mail client to a mail server; this is why both the POP (or IMAP) server and the SMTP server must be specified when configuring applications. The initial SMTP server adds the following to the message: Memo header fields Specifics about the mail message Specifics about the client Initial received field Each additional SMTP server involved in the transmission adds a received field.

Headers (Cont.) SMTP is a protocol for sending messages between servers. SMTP is generally used to send messages from a mail client to a mail server; this is why both the POP (or IMAP) server and the SMTP server must be specified when configuring applications. The initial SMTP server adds the following to the message: Memo header fields Specifics about the mail message Specifics about the client Initial received field Each additional SMTP server involved in the transmission adds a received field. Multiple SMTP received information fields in the header are ordered by clock time. After the forensic examiner has a copy of the message, header, and attachments, from retrieval process, the examination can begin.

and Web Evidence The following scenarios involve examination of a Novel GroupWise message and MS Outlook message One message is a SPAM message and the other is a phishing attempt. The phishing concerning eBay is the fist document to be examined. The software tool used to make these screen images is Snagit.

and Web Evidence (Cont.) The next step is to display the header information associated with the . Copy this header information to some storage device fore examination. Remember to make two copiers: one for the examination and one for any legal proceedings.

and Web Evidence (Cont.) A preliminary check of the IP addresses found in the header might yield some information. User the DOS PING command to validate the IP Address. Another step that can be taken is to use the DOS TELNET. The result of the PING show that the IP Address is viable. The result of the TELNET does not reveal any new information, except there is a device at the IP address.

and Web Evidence (Cont.) Access Enter the IP Address in the “Search for” block and press enter

and Web Evidence (Cont.) The search will display the following information: Click on the OrgTechhandle: AWC12-ARIN A contact can be made with this administrator, who might posses some relevant information involving the investigation.

SPAM Investigation The security officer received the following from a member of the corporate staff. It appears to be a common SPAM message; however, further investigation indicates there might be more to this than it appears on the surface. Of particular interest is the block that asks the receiver to select whether e- mails are to be discontinued. Caution! Clicking on the block can add the user’s name to many mailing list.

SPAM Investigation (Cont.) Using the technique presented in the phishing , the header was retrieved using the view header function.

SPAM Investigation (Cont.) Neither PING not TELNET was successful.

SPAM Investigation (Cont.) Access bin/whois.plhttp://ws.arin.net/cgi- bin/whois.pl Enter the IP address found in the Click on RRWE and provide the IP address: Click on IPTEC_ARIN and provide the IP Address:

SPAM Investigation (Cont.) Click on RRWE and provide the IP address: See Comment

SPAM Investigation (Cont.) Click on IPTEC_ARIN and provide the IP Address:

SPAM Investigation (Cont.) Click on IPTEC_ARIN and provide the IP Address: Information for this POC has been reported to be invalid. Not only is this a SPAM, it also is capturing unsuspecting users address for mail list. If users receiving these s and investigators working these cases send a complaint to the RDC, it might help track down these people.

Documenting Evidence Identifying and retrieving evidence is of little use if it has not been thoroughly and properly documented. Of particular importance is the chain-of-custody, evidence documents, and investigative journals Investigators concerning s are a little different from those involving electronic devices and computers. Most evidence is obtained from the Internet or support organizations, such as credit bureaus and government operations and consists of printouts and screen captures. The investigative journal is important.