Network Forensics An example of a computer crime – VIRTUAL crime that needs computer forensic expertise. Your company has recently hired a new salesman.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Guide to Computer Forensics and Investigations, Second Edition
Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Chapter 14: Computer and Network Forensics
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Data Acquisition Chao-Hsien Chu, Ph.D.
Capturing Computer Evidence Extracting Information.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Forensic and Investigative Accounting
Damien Leake. Definition To examine digital media to identify and analyze information so that it can be used as evidence in court cases Involves many.
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Computer Forensics Additional Notes 1. Acknowledgments Dr. David Dampier and the Center for Computer Security Research (CCSR) I downloaded this series.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Digital Crime Scene Investigative Process
CHAPTER FOUR COMPUTER SOFTWARE.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Software.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
CS526: Information Security Chris Clifton December 4, 2003 Forensics.
Introduction to Computer Forensics and Hashing 1.
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
IDS And Tripwire Rayhan Mir COSC 356. What is IDS IDS - Intrusion detection system Primary function – To monitor network or host resources to detect intrusions.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
PhD Oral Exam Presentation
Chapter 7: Investigating Theft Acts
Guide to Computer Forensics and Investigations Fifth Edition
Introduction to Computer Forensics
Introduction to Computer Forensics
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Digital Forensics CJ
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Presentation transcript:

Network Forensics An example of a computer crime – VIRTUAL crime that needs computer forensic expertise. Your company has recently hired a new salesman. Six months after his hire, he leaves your company and forms a competing interest, sending letters to all of your clients. You may think this a bit odd and contact an attorney to consider filing a suit. What has occurred is a virtual theft -- the salesman stole a copy of your client database. Note that this is a VIRTUAL theft -- since you were not deprived of any property (he didn't delete it, just copied it) you will likely not be able to prosecute him criminally.

What is Computer Forensics? Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis. Arose as a result of the growing problem of computer crimes. Computer crimes fall into two categories: –Computer is a tool used in a crime – because of the role of computers and networks in modern communications, it is inevitable that computers are used in crimes. Investigation into these crimes often involves searching computers suspected to be involved. –Computer itself is a victim of a crime – this commonly referred to as incident response. It refers to the examination of systems that have been remotely attacked. Forensics experts follow clear, well-defined mythologies and procedures

Computer forensics started a few years ago- when it was simple to collect evidence from a computer. While basic forensic methodologies remain the same, technology itself is rapidly changing – a challenge to forensic specialists. Basic forensic methodology consists of: –Acquire the evidence without altering or damaging the original –Authenticate that your recovered evidence is the same as the originally seized data –Analyze the data without modifying it.

Acquire the Evidence Keep in mind that every case is different Do not disconnect the computers – evidence may be only in RAM – So collect information from a live system. Consider the following issues: –Handling the evidence- if you do not take care of the evidence, the rest of the investigation will be compromised. –Chain of custody – the goal of maintaining a good chain of custody to ensure evidence integrity, prevent tempering with evidence. The chain should be answers to: Who collected it How and where Who took possession of it how was it stored and protected in storage Who took it out of storage and why?

–Collection You want the evidence to be so pure that it supports your case. –Identification Methodically identify every single item that comes out of the suspect’s/victim’s location and labeled. –Transportation Evidence is not supposed to be moved so when you move it be extremely careful. –Storage Keep the evidence in a cool, dry, and appropriate place for electronic evidence. –Documenting the investigation Most difficult for computer professionals because technical people are not good at writing down details of the procedures.

Authenticating evidence –It is difficult because Crime scenes change Evidence is routinely damaged by environmental conditions Computer devices slowly deteriorate –Keep proof of integrity and timestamp the evidence through encryption of files of data Two algorithms (MD5 and SHA) are in common use today Analysis –Make two backups –Use any well known analysis tools.

Tracking the Offender Keep in mind that cyber sleuths often have to track their offenders across a digital matrix Also that digital forensic techniques and tools are largely undeveloped- so you have little to run on. Tracing IP addresses –For http addresses in dotted quad ( base 256) use a ping to covert it to digit decimal (base 10) –For MAC address use the ARP tables ( be aware that MAC addresses can be changed by software) and NIC can be changed/removed/replaced. –Beware of DNS – may resolve and query with IP addresses. –After getting some information, try to traceroute Learn to read an trail. NetBIOS – a Windows protocol that used to run exclusively on LANS ( instead of TCP/IP) now running on top of TCP/IP to cover WANs, has a nbstat function that can display protocol statistics for all TCP/IP connctions. Other tracing tools include: Neotrace and Netscan Pro. These can do a trace route Use IDS logs

Storage Media Hard Drives –Make an image copy and then restore the image to a freshly wiped hard drive for analysis –Remount the copy and start to analyze it. –Before opening it get information on its configuration –Use tools to generate a report of lists of the disk’s contents ( PartitionMagic) –View operating system logs.

Encryption and Forensics Many times the evidence may be encrypted. Find a way to decrypt it while preserving the its integrity. In addition to encryption codes and compression of data may make the forensic work difficult. Find a way to overcome data compression and use of code.

Data Hiding There are several techniques that intruders may hide data. –Obfuscating data through encryption and compression. –Hiding through codes, steganoraphy, name embedding, obscurity and nonames on files –Blinding investigators through changing behavior of system commands and modifying operating systems. Use commonly known tools to overcome

Hostile Code Any unauthorized code on your computer. It is becoming increasing significant. Hostile code fall into two categories: –Manual – like network tools that allow unauthorized access (NetBus, BackOrifice, IRC), fix utilities that seamlessly replace legitimate binary code with a hostile version, log manipulators, vulnerability scanners, DDoS, –Autonomous – viruses(Melissa, time bombs), DDoS, and IRC bots.

Forensic Electronic Toolkit Computer and network forensics involves and requires: –Identification –Extraction –Preservation –Documentation A lot of tools are needed for a thorough work The “forensically sound “ method is never to conduct any examination on the original media. Before you use any forensic software, make sure you know how to use it, and also that it works. Tools: –Hard Drive - use partitioning and viewing ( Partinfo and PartitionMagic) –File Viewers – to thumb through stacks of data and images looking for incriminating or relevant evidence (Qiuckview Plus, Conversion Plus, DataViz, ThumnsPlus)

More tools (cont.) Unerase – if the files are no longer in the recycle bin or you are dealing with old systems without recycle bins. CD-R/W – examine them as carefully as possible. Use CD-R Diagnostics Text – because text data can be huge, use fast scans tools like dtSearch. Other kits: –Forensic toolkit – command-line utilities used to reconstruct access activities in NT File systems –Coroner toolkit - to investigate a hacked Unix host. –ForensiX – an all-purpose set of data collection and analysis tools that run primarily on Linux. –New Technologies Incorporated (NTI) – EnCase –Hardware- Forensic-computers.com

Forensics based on OS Brands Investigating –Windows computers – pay attention to the Registry. It contains a wealth of information –Unix – take a look at the password files, the shell, the filesystem,

Internet Data Incident Response Guidelines Restore service safely Estimate extent and cost of incident Identify source of attack and their motivation Deter future crime Recover loss Protect public image Conduct due diligence Assume corporate responsibility Increase understanding of security landscape.

Roles and Responsibilities To facilitate teamwork the organization’s roles must be assigned as fallows: –Corporate security and incident team –Security investigator –Emergency response core team –Application owner –Application developer –System owner/administrator –Network administrator –Firewall administrator –Security consultants