Guide to Computer Forensics and Investigations, Second Edition Chapter 13 Investigations
Guide to Computer Forensics and Investigations, 2e2 Objectives Explore the roles of the client and server in Investigate crimes and violations Understand servers Use specialized computer forensics tools
Guide to Computer Forensics and Investigations, 2e3 Exploring the Roles of the Client and Server in Two environments –Internet –Controlled LAN, MAN, or WAN Client/server architecture –Server OS and software differ from those on the client side Protected accounts –Require usernames and passwords
Guide to Computer Forensics and Investigations, 2e4 Exploring the Roles of the Client and Server in (continued)
Guide to Computer Forensics and Investigations, 2e5 Exploring the Roles of the Client and Server in (continued) Name conventions –Corporate: –Public: –Everything belongs to the domain name Tracing corporate s is easier
Guide to Computer Forensics and Investigations, 2e6 Investigating Crimes and Violations Similar to other types of investigations Goals –Find who is behind the crime –Collect the evidence –Present your findings –Build a case
Guide to Computer Forensics and Investigations, 2e7 Identifying Crimes and Violations Depend on the city, state, or country –Spam –Always consult with an attorney Becoming commonplace Examples of crimes involving s: –Narcotics trafficking –Extortion –Sexual harassment
Guide to Computer Forensics and Investigations, 2e8 Examining Messages Access victim’s computer and retrieve evidence Use victim’s client –Find and copy evidence in the –Access protected or encrypted material –Print s Guide victim on the phone –Open and copy including headers Sometimes you will deal with deleted s
Guide to Computer Forensics and Investigations, 2e9 Examining Messages (continued)
Guide to Computer Forensics and Investigations, 2e10 Viewing Headers Learn how to find headers –GUI clients –Command-line clients –Web-based clients Headers contain useful information –Unique identifying numbers –IP address of sending server –Sending time
Guide to Computer Forensics and Investigations, 2e11 Viewing Headers (continued) Outlook –Open the Message Options dialog box –Copy headers –Paste them to any text editor Outlook Express –Open the message properties dialog box –Select Message Source –Copy and paste the headers to any text editor
Guide to Computer Forensics and Investigations, 2e12 Viewing Headers (continued)
Guide to Computer Forensics and Investigations, 2e13 Viewing Headers (continued)
Guide to Computer Forensics and Investigations, 2e14 Viewing Headers (continued)
Guide to Computer Forensics and Investigations, 2e15 Viewing Headers (continued) Eudora –Click the BLAH BLAH BLAH button –Copy and paste the header Pine and ELM –Check enable-full-headers AOL headers –Open Details dialog window –Copy and paste headers
Guide to Computer Forensics and Investigations, 2e16 Viewing Headers (continued)
Guide to Computer Forensics and Investigations, 2e17 Viewing Headers (continued)
Guide to Computer Forensics and Investigations, 2e18 Viewing Headers (continued)
Guide to Computer Forensics and Investigations, 2e19 Viewing Headers (continued) Hotmail –Click Options, Preferences in menu –Click Advanced Headers –Copy and paste headers Juno –Click Options and select Show Headers –Copy and paste headers
Guide to Computer Forensics and Investigations, 2e20 Viewing Headers (continued)
Guide to Computer Forensics and Investigations, 2e21 Viewing Headers (continued)
Guide to Computer Forensics and Investigations, 2e22 Viewing Headers (continued) Yahoo –Click Mail Options –Click General Preferences and Show All headers on incoming messages WebTV –Send the message to yourself –Open it with your regular client –Message will contain the headers
Guide to Computer Forensics and Investigations, 2e23 Examining Headers Gather supporting evidence and track suspect –Return path –Recipient’s address –Type of sending service –IP address of sending server –Name of the server –Unique message number –Date and time was sent –Attachment files information
Guide to Computer Forensics and Investigations, 2e24 Examining Headers (continued)
Guide to Computer Forensics and Investigations, 2e25 Examining Additional Files messages are saved on the client side or left at the server Microsoft Outlook.pst and.ost files Personal address book UNIX groups –Members read same messages Web-based mail files and folders –History, Cookies, Cache, Temp files
Guide to Computer Forensics and Investigations, 2e26 Tracing an Message Contact those responsible for the sending server Finding domain names point of contact – – – – Find suspect’s contact information Verify your findings against network logs
Guide to Computer Forensics and Investigations, 2e27 Using Network Logs Related to Confirm route Router logs –Record all incoming and outgoing traffic –Have rules to allow or disallow traffic Firewall logs –Filter traffic –Verify whether the passed through You can use any text editor or specialized tools
Guide to Computer Forensics and Investigations, 2e28 Using Network Logs Related to (continued)
Guide to Computer Forensics and Investigations, 2e29 Understanding Servers Computer running server OS and package storage –Database –Flat file Logs –Default or manual –Continuous and circular
Guide to Computer Forensics and Investigations, 2e30 Understanding Servers (continued) Log information – content –Sending IP address –Receiving and reading date and time –System-specific information Contact suspect’s network as soon as possible Servers can recover deleted s –Similar to deletion of files on a hard drive
Guide to Computer Forensics and Investigations, 2e31 Understanding Servers (continued)
Guide to Computer Forensics and Investigations, 2e32 Examining UNIX Server Logs /Etc/Sendmail.cf –Configuration information for Sendmail /Etc/Syslog.conf –Specifies how and which events Sendmail logs /Var/Log/Maillog –SMTP and POP3 communications IP address and time stamp Check UNIX main pages for more information
Guide to Computer Forensics and Investigations, 2e33 Examining UNIX Server Logs (continued)
Guide to Computer Forensics and Investigations, 2e34 Examining UNIX Server Logs (continued)
Guide to Computer Forensics and Investigations, 2e35 Examining UNIX Server Logs (continued)
Guide to Computer Forensics and Investigations, 2e36 Examining Microsoft Server Logs Microsoft Exchange Server (Exchange) –Uses a database –Based on Microsoft Extensible Storage Engine Information Store files –Database files *.edb Responsible for MAPI information –Database files *.stm Responsible for non-MAPI information
Guide to Computer Forensics and Investigations, 2e37 Examining Microsoft Server Logs (continued) Transaction logs –Keep track of databases Checkpoints –Keep track of transaction logs Temporary files communication logs –RES#.log Tracking log
Guide to Computer Forensics and Investigations, 2e38 Examining Microsoft Server Logs (continued)
Guide to Computer Forensics and Investigations, 2e39 Examining Microsoft Server Logs (continued) Troubleshooting or diagnostic log –Log events –Use Windows Event Viewer –Open the Event Properties dialog box for more details about an event
Guide to Computer Forensics and Investigations, 2e40 Examining Novell GroupWise Logs Up to 25 databases for users –Stored on the Ofuser directory object –Referenced by a username, an unique identifier, and.db extension Shares resources with server databases Mailboxes organizations –Permanent index files –QuickFinder
Guide to Computer Forensics and Investigations, 2e41 Examining Novell GroupWise Logs (continued) Folder and file structure can be complex –It uses Novell directory structure Guardian –Directory of every database –Tracks changes in the GroupWise environment –Considered a single point of failure Log files –GW\volz\*.log
Guide to Computer Forensics and Investigations, 2e42 Using Specialized Forensics Tools Tools –AccessData’s FTK –EnCase –FINAL –Sawmill-GroupWise –DBXtract –MailBag –Assistant –Paraben
Guide to Computer Forensics and Investigations, 2e43 Using Specialized Forensics Tools (continued) Tools allow you to find: – database files –Personal files –Off-line storage files –Log files Advantage –Do not need to know how servers and clients work
Guide to Computer Forensics and Investigations, 2e44 Using Specialized Forensics Tools (continued) FINAL –Scans database files –Recovers deleted s –Search computer for lost or delete s FTK –All-purpose program –Filters and finds files specific to clients and servers
Guide to Computer Forensics and Investigations, 2e45 Using Specialized Forensics Tools (continued)
Guide to Computer Forensics and Investigations, 2e46 Summary Send and receive via Internet or a LAN –Both environments use client/server architecture investigations are similar to other kinds of investigations Access victim’s computer to recover evidence Copy and print the message involved in the crime or policy violation Find headers
Guide to Computer Forensics and Investigations, 2e47 Summary (continued) Investigating abuse –Be familiar with server’s and client’s operations Check: – message files – headers – server log files