F9-Common Forensic Analysis Techniques Dr. John P. Abraham Professor UTPA.

Slides:



Advertisements
Similar presentations
Intro to WinHex CSC 414.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
OPEN SOURCE TOOLS Dr. Abraham Professor UTPA. Open Source Freely redistributable Provides access to source code End user may modify source code.
MODULE 4 File and Folder Management. Creating file and folder A computer file is a resource for storing information, which is available to a computer.
File System Analysis.
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Information Networking Security and Assurance Lab National Chung Cheng University F.I.R.E. Forensics & Incident Response Environment.
Guide To UNIX Using Linux Third Edition
2004, Jei F.I.R.E. Forensics & Incident Response Environment Information Networking Security and Assurance Lab National Chung Cheng University.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Encase Overview. What is Encase EnCase Forensic is the industry standard in computer forensic investigation technology. Encase is a single tool, capable.
Installing software on personal computer
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
COEN 252 Computer Forensics
Hands-on: Capturing an Image with AccessData FTK Imager
Sleuthkit/Autopsy Kevin Krause.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Passwords, Encryption Forensic Tools
COEN 252 Computer Forensics Windows Evidence Acquisition Boot Disk.
Chapter 7 Working with Files.
Linux Operations and Administration
Objectives Learn what a file system does
BACS 371 Computer Forensics
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 3 Windows File Management 1 Morrison / Wells / Ruffolo.
Analyzing an Image using MAC Systems Sleuth kit version & Autopsy 2.24 Page 325 from “Guide to Computer Forensics and Investigations 4th edition”
F8-Noncommercial-Based Forensic Duplications Dr. John P. Abraham Professor UTPA.
Microsoft Office 2003 Illustrated Introductory with Programs, Files, and Folders Working.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Guide To UNIX Using Linux Fourth Edition
NATIONAL PARTNERSHIP FOR ADVANCED COMPUTATIONAL INFRASTRUCTURE SAN DIEGO SUPERCOMPUTER CENTER Coroner’s Toolkit: An Introduction Victor Hazlewood
Guide to Computer Forensics and Investigations Fourth Edition
CSN08101 Digital Forensics Lecture 4: System Level Disk Control Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak.
Chapter 17 Creating a Database.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
1 Comp 104: Operating Systems Concepts Files and Filestore Allocation.
Windows Vista Inside Out Chapter 28 - Chapter 28 - Managing Disks and Drives Last modified
© Janice Regan, CMPT 300, May CMPT 300 Introduction to Operating Systems Memory: Relocation.
Creating and Managing File Systems. Module 5 – Creating and Managing File Systems ♦ Overview This module deals with the structure of the file system,
Chapter 18 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of UNIX Systems.
Operating Systems. An operating system (os) is a software program that enables the computer hardware to communicate and operate with the computer software.
2007/5/ Digital Forensic Research Workshop (DFRWS) New Orleans, LA 1 Data Hiding in Journaling File Systems Knut Eckstein, Marko Jahnke 報告人:陳晉煒.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 3 Windows File Management 1 Morrison / Wells / Ruffolo.
CMPF124 Personal Productivity With Information Technology Chapter 1 – Part 2 Introduction to Windows Operating Systems Manipulating Windows GUI CMPF 124.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Chapter 3 Data Acquisition Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with additional info from.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Today We Will Review: Operating Systems (Windows) (week 3 & 4) Starting up MS Windows Desktop and its contents Functions of the desktop components Brain.
Project 3 File, Document, and Folder Management and Windows XP Explorer.
EnCase Computer Forensics
EXT in Detail High-Performance Database Research Center
Guide to Linux Installation and Administration, 2e
Encase Overview.
Tools for identifying duplicate files and known software files
Understanding File Management
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Microsoft Windows 7 Basics
Digital Forensics Dr. Bhavani Thuraisingham
New Perspectives on Windows XP
Grauer and Barber Series
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
Presentation transcript:

F9-Common Forensic Analysis Techniques Dr. John P. Abraham Professor UTPA

Introduction When you conduct forensic analysis, there are a few steps you must execute in nearly every type of investigation to prepare the data for your analysis. For instance you usually want to recover any deleted files and add them to your analysis. It is always advantageous to reduce your data set to the smallest number of files to analyze so that you can efficiently review the data. Another step you want to perform is string searching to identify relevant files and fragments of relevant files. In Unix-like operating systems, a loop device, vnd (vnode disk), or lofi (loopback file interface) is a pseudo-device that makes a file accessible as a block device. Before use, a loop device must be connected to an existing file in the filesystem. The association provides the user with an API that allows the file to be used in place of a block special file (cf. device file system). Thus, if the file contains an entire file system, the file may then be mounted as if it were a disk device.

Recovering Deleted Files –Do this first in order to avoid having to perform all other steps twice. –Open source solutions –This open source tool enables us to take a forensic duplication and make it act like a real hard drive device under Linux. –It is a modified version of the Linux kernel developed by NASA –ftp://ftp.hp.nasa.gov/pub/ig/ccd/enhanced_loopbackftp://ftp.hp.nasa.gov/pub/ig/ccd/enhanced_loopback –Some distributions of Linux include this functionality into the Linux kernel by default. –The kernel is altered so that you can associate a file on (the forensic duplication drive) with a local loopback device such as /dev/loop0

Open source solutions slide 2 –When forensic duplication drive is associated with a device, you can run tools on it such as fdisk, just as if the original suspect’s drive were connect to your forensic workstation. –After installation of the enhanced loopback kernel, »You will want to associate the duplication from JBR Bank (JBRWWW) with the /dev/loop0 device. »Make sure the forensic duplication is read-only so that it is not modified during our analysis. These steps are done with the following commands: evid]# chmod 500 JBRWWW.dd evid]# losetup /dev/loop0 JBRWWW.dd »losetup is used to associate loop devices with regular files or block devices

Open source solutions slide 3 After association, we can treat as a normal hard drive. We can now run fdisk on the device to see what the partition table looks like: evid]# fdisk –l /dev/loop0 –We can then mount the partition with the following command: bin]# mount –r /dev/loop1 /mnt/part1 Notice that we mounted loop1 instead of loop0. This is because each partition is associated with the next greater loop device. Partition 1 is loop1, while partition 2 is loop2 and so on.

Recovering deleted files The most used tool used to be The Coroner’s Toolkit at one of the limitations was that it recovers files only from Windows. The recommended tool is TASK and later renamed to The Sleuth Kit that contains all we will need to undelete. It gives several tools.

Tools associated with the Sleuth Kit Fls – provides a file listing. On Linux JBRWWW: –Fls –f ntfs /dev/loop1 –The –f switch tells fls which type of file system we are analyzing. In this case it is NTFS. The sleuth system supports FAT12, Fat16, FAT32, EXT2, EXT3, FReeBSD, FSS, NetBSD, FFS, OpenBSD FFS, and Solaris FFS. If we use the –r switch, you will see a recursive directory listing of the whole hard drive. Using the –p switch you see the full path of every file listed rather than the pseudo-graphical directory structure. Inode of 0 (see p 210) not recoverable. Reallocated inodes are not recoverable.

Examine BRJDEV –We associate the new image with the loopback device using the following commands Chmod 500 bjrdev.dd Losetup /dev/loop0 brjdev.dd We can then see the partition table for BRJDEV with the following command: fdisk –l /dev/loop0 –Once deleted file is found and has not been relocated, we can reconstruct it by using the icat tool included with the sleuth kit. (pg 213). To reconstruct a a file, you can use the icat tool included with the Sleuth Kit.

Commercial Solutions `Remember: with MOST commercial software, deleted files are recovered automatically. Both EnCase and FTK will recover files without user intervention. –Encase: The first step to recover deleted files is to load or evidence into EnCase. Although EnCase enables you to acquire a forensic duplication using its proprietary interface, it also imports raw disk images created with the dd command.

EnCase Open EnCase Create a case Add your evidence. Add a raw image to the case. –Click on the case name and then choose file->Add raw image. Add the evidence by changing the name of the evidence to JBRWWW and right-clicking on the empty white area in the middle of the menu. Add the dd image we acquired from the DVD. Next, if we click on any of the “home base” symbols, or sideways triangles, within the directory structures in the left pane in EnCase, we will see all the files in that directory and below. We transverse to the C:\winnt\system32\os2\dll directory on JBRWWW and examined that directory for any deleted files. EnCase does not detect the deleted information that the sleuth kit discovered. If we transverse to the home directory c:\ on JBRWWW, we see that EnCase detected a number of deleted files that the Sleuth Kit did not. See p

Production of Time Stamps and Other Metadata for Files –Metadata includes Full tile names, File sizes, MAC times, MD5 hashes, etc. Open Source Solutions Use GNU’s find command. First create a file called metadata.txt with title using the redirect > Use the find command and append to that file. See commands on p218. You can also use fls from sleuth kit. Fls gives us output we can parse into other programs such as a spreadsheet or database. since we don’t have the MD5 hashes in our output, we write a short Perl script to add MD5 hashes to the information we just collected. See p. 219 for the script.

Commercial Solutions –Production of metadata with EnCase v4 is a very simple task. –We have everything we need in the Windows explorer-like view in the right pane of EnCase. –Before we can export the metadata, we must calculate the MD5 hashes of the files in the evidence. –Although not intuitive, the function to calculate the MD5 hashes is under the “Search” button in the menu bar. –At this point you want to select ONLY “Compute Hash Value” and no other options, and then click start. –After the hashes have been computed, view the files from one of the evidence sets. If you scroll to the right in the right pane, you will see a column named Hash Value, which contains the MD5 hashes we just computed. –Now we are ready to export the file metadata! –To export the metadata, select the home base in the left pane –IN the right pane, right-click and choose Export. We will choose all the fields in the export submenu because we can delete them later if needed. –After you have export the file metadata, you can open the files and view the contents. –We can now examine the file metadata for JBRWWW. First we suspect that the files in C:\winnt\system32\os2\dll were created by the attacker. If we examine the creation times of the relevant files, we see they were created approximately at 7:25PM on 10/01/2003.

Fig 9-7 –If we read from bottom up in figure 9-7, we see that first PSEXECSVC.exe was created on the system at approximately 6:58PM. This is the service that is created when a remote user executes PsExec, a remote control tool –We can assume that someone used PsExec, which requires valid administrator credentials, against our machine at that time. –Next we see that nc.exe was created on the machine at approximately 7:24pm. –Nc.exe is the netcat tool. At 7:25PM, IROFffer was transferred to the machine. –At 7:48 and 7:52, update.exe was transferred to JBRWWWW. –Lastly, after 10PM, several components of IROffer were created, possibly from usage of the tool.

Removing Known Files Files we already know such as all the OS files. In windows, typically located in the C:\windows, C:\winnt, or C:\Program Files directories –A better way to ignore known files is to compare the MD5 hashes of every file in a forensic duplication with a known set of hashes and ignore any matches. –We can create known set of hashes for nearly any type of operating system or use someone else’s work such that is found at

Open source solutions p.225 Md5deep is a program to create md5 hash recursively You can now compare existing hash to this created hash and determine files that do not match. We can download NIST’s NSRL distribution for operating systems and thereby eliminate all operating system files and other trusted files. The left over files would be the unknown files that warrants additional investigation. W can create perl script other scripts to do this for many directories. Commercial Solutions: enCase

File signatures and Electronic discovery Attacker may rename their files to a benign file name such as SCSI.EXE. Investigators may skip all known executable files. Forensic investigation programs will examine contents of all files. Open source solutions: sleuth kit and Perl Script. The magic file (/usr/share/magic)contains information about the headers and footers of several well-known types of files. We can use this and perl to determine file signature of a file on your forensic workstation. Created files will contain sigs as part of your file name indicating that it contains signature information. Commercial solutions: EnCase can determine file signatures

String searching and file fragments Conducting a search across the whole hard drive and detect files or file fragments that contain the information you are looking for. Open source solutions: First extract all strins from the binary data in the evidence file. Use strings command under unix. P.238 bottom. Now we can search the resulting strings file for matches (grep command). Commercial: Encase