Introduction to Knoppix-STD: Forensic Analysis of a Compromised Linux Harddrive Dana M. Epp Computer Security Software Architect Scorpion Software Corp.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

Guide to Computer Forensics and Investigations, Second Edition
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
COEN 252 Computer Forensics
Guide to Computer Forensics and Investigations Fourth Edition
Effective Discovery Techniques In Computer Crime Cases.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. Computer Forensics Consultant Jawz Inc.
Guide to Computer Forensics and Investigations, Second Edition
Computer & Network Forensics
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
BACS 371 Computer Forensics
Forensic and Investigative Accounting
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
1 CSCD496 Computer Forensics Lecture 5 Applying Process to Computer Forensics Winter 2010.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
Guide to Computer Forensics and Investigations Third Edition Chapter 11 Network Forensics.
Incident Response and Forensic Course Disk Image Cataloging Project Concepts and Deliverables.
Chapter 14: Computer and Network Forensics
Advance evidence collection and analysis of web browser activity by Junhoon Oh David Rivera 11/7/2013 Digital Forensics.
Data Acquisition Chao-Hsien Chu, Ph.D.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Capturing Computer Evidence Extracting Information.
Guide to Computer Forensics and Investigations, Second Edition
Hands-on: Capturing an Image with AccessData FTK Imager
Sleuthkit/Autopsy Kevin Krause.
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
Passwords, Encryption Forensic Tools
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Preserving Evidence ● Number one priority ● Must also find incriminating evidence ● Must search the contents of the hard drive ● Can not change the hard.
1 Forensics: The use of science and technology to investigate and establish facts in criminal or civil courts of law. Computer Forensics: Commonly defined.
Digital Crime Scene Investigative Process
NATIONAL PARTNERSHIP FOR ADVANCED COMPUTATIONAL INFRASTRUCTURE SAN DIEGO SUPERCOMPUTER CENTER Coroner’s Toolkit: An Introduction Victor Hazlewood
CS526: Information Security Chris Clifton December 4, 2003 Forensics.
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
COEN 250 Computer Forensics Windows Life Analysis.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
Miguel Cárdenas Montes, EGEE, JSPG, Deer Hass, Procedure for scaling images of computers under attack or under suspicion” Joint Security Policy.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Computer Forensics Infosec Pro Guide Ch 6 Testing Your Tools.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 Nov 1, 2005 Computer Forensics (Lab 2 Related)
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Guide to Computer Forensics and Investigations, Second Edition Chapter 12 Network Forensics.
& Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago,
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Data Acquisition Chao-Hsien Chu, Ph.D.
Chapter 7: Investigating Theft Acts
Guide to Computer Forensics and Investigations Fifth Edition
Joint Security Policy Group Ginebra, Enero 2005
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Forensic Recovery of Evidence Device (FRED)
Presentation transcript:

Introduction to Knoppix-STD: Forensic Analysis of a Compromised Linux Harddrive Dana M. Epp Computer Security Software Architect Scorpion Software Corp.

Being able to break security doesn’t make you a hacker anymore than being able to hotwire cars makes you an automotive engineer. - Eric S. Raymond

Overview  Forensic analysis first steps  Gathering evidence for analysis  Securing evidence to maintain integrity  Prepping you Analysis machine with Knoppix-STD  Create an Attack Timeline  Beginning the Analysis  Review ‘tools of the trade’  Live Demo!

Uh Oh. You’ve been compromised!

Step 1: Collect the Evidence  Create a Investigative Log. Document EVERYTHING.  Make an image of the harddisks at that point in time. – Ghost/mirror entire drive, or – dd partition(s) to image(s) dd if=/dev/hda1 of=/var/case01.dd  md5sum drive/image and document time, date and checksum (and possible digitally sign results) date > case01.evidence.seal md5sum case01.dd >> case01.evidence.seal gpg –clearsign case01.evidence.seal

Sample Evidence Seal cat case01.evidence.seal.asc -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sun Dec 7 10:39:20 PST 2003 c b3d567f06d2c45e53904 case01.dd -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (MingW32) iD8DBQE/03Xj/VFbhJ3GXVMRAnf+AJ9hYhxkKUKTjLZwJjj3bTRBzHyxgwCfSyyC jLNK6kEXgfiwrBdo6x0G9Dc= =gqEl -----END PGP SIGNATURE-----

Step 2: Secure the Evidence  NEVER work on the original evidence. Work on the copy.  Secure the original with checksum (or better yet an evidence seal) in a safe or evidence locker that only trusted people have access to.  To maintain evidence chain… you should document who has accessed the evidence, when they accessed it, and why… AT ALL TIMES. Physical security measures should ensure accountability. (ie CCTV to safe/locker)  These procedures are not about paranoia, its about evidence integrity if needed in a criminal case

Step 3: Prep Analysis Machine  Boot into Knoppix-STD (or your favorite Linux OS with all the right tools, which we will list later)  Mount copy of evidence into filesystem READ ONLY: mount –o ro,loop,nodev,noexec case01.dd /mnt/evidence

Step 4: Create Timeline  Capture drive’s forensic data grave-robber –c /mnt/evidence –m \ –d /var/investigations/case01 –o LINUX2  Extract deleted inode (mod/access/change) times ils case01.dd | ils2mac > case01.ilsbody  Combine evidence for timeline conversion cat case01.ilsbody body > case01.evidence  Generate Timeline mactime –p /mnt/evidence/etc/passwd \ –g /mnt/evidence/etc/group -b case01.evidence \ 11/28/2003 > case01.timeline

Step 5: Begin Analysis  At this point what happens is dependant on the investigation.  The timeline file will show modify, access, and changed actions at given times, and in sequence.  With patience, you should be able to trace exactly what went on

Tools to use during Analysis  istat – Display all known info about an inode istat case01.dd  dcat – Display chunks of a block of forensic data dcat –h case01.dd  icat – Access a block of forensic data by inode icat case01.dd > file  unrm – Recover a block of forensic data unrm case01.dd startblock-endblock > filedump  hexdump – Dump data in hexadecimal hexdump –C file

References / More Information  The Coroner's Toolkit  File System Analysis Techniques  Autopsy  Good Forensic Analysis of HoneyNet Project Attack  Good Practice Guide for Computer based Electronic Evidence  Knoppix-STD  My Blog

Any Questions Before the Live Demo? Dana M. Epp