Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #29 Information/Data Hiding and Counter-forensics November 5, 2007.

Slides:



Advertisements
Similar presentations
Working with Disks and Devices
Advertisements

Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Module 12: Auditing SQL Server Environments
This presentation will take a look at to prevent your information from being discovered by and investigator.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
File System Analysis.
Introduction to Unix (CA263) File System
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Third Edition
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Chapter 12 File Management Systems
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
Guide To UNIX Using Linux Third Edition
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Database Management Systems (DBMS)
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Maintaining Windows Server 2008 File Services
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Intelligent Digital Forensics September 30, 2009.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Guide To UNIX Using Linux Fourth Edition
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Damien Leake. Definition To examine digital media to identify and analyze information so that it can be used as evidence in court cases Involves many.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Chapter Fourteen Windows XP Professional Fault Tolerance.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Module 14: Configuring Server Security Compliance
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Configuration Management (CM)
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
1 Interface Two most common types of interfaces –SCSI: Small Computer Systems Interface (servers and high-performance desktops) –IDE/ATA: Integrated Drive.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Guest Lecture September 21, 2009.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Evidence Correlation November 2011.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Serverless Network File Systems Overview by Joseph Thompson.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 20, 2007.
Creating and Managing File Systems. Module 5 – Creating and Managing File Systems ♦ Overview This module deals with the structure of the file system,
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture 23 Intelligent Digital Forensics October 22, 2007.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
UNIX & Windows NT Name: Jing Bai ID: Date:8/28/00.
Chapter 8: Installing Linux The Complete Guide To Linux System Administration.
2007/5/ Digital Forensic Research Workshop (DFRWS) New Orleans, LA 1 Data Hiding in Journaling File Systems Knut Eckstein, Marko Jahnke 報告人:陳晉煒.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 3 Windows File Management 1 Morrison / Wells / Ruffolo.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA Automatically Creating Realistic Targets for Digital Forensics Investigation  Frank Adelstein.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Chapter 3: Windows7 Part 3.
EXT in Detail High-Performance Database Research Center
Creighton Barrett Dalhousie University Archives
Guide to Linux Installation and Administration, 2e
Windows XP File Systems
Knut Kröger & Reiner Creutzburg
IS3440 Linux Security Unit 4 Securing the Linux Filesystem
Chapter 3: Windows7 Part 3.
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Presentation transcript:

Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #29 Information/Data Hiding and Counter-forensics November 5, 2007

Outline l Review of Lectures l Discussion of the papers on Information/Data Hiding and Counter/Anti forensics

Review of Lectures l Papers on Evidence Correlation l Forensic feature extraction and cross-drive analysis l md5bloom: Forensic file system hashing revisited (OPTIONAL) l Identifying almost identical files using context triggered piecewise hashing (OPTIONAL) l A correlation method for establishing provenance of timestamps in digital evidence l Honeypot example (Grad student presentation)

Papers to discuss l Data Hiding in Journaling File Systems l Evaluating Commercial Counter-Forensic Tools l Automatically Creating Realistic Targets for Digital Forensics Investigation -

Abstract of Paper 1 l Data hiding is one technique by which system perpetrators store information while reducing the risk of being detected by system administrators. The first major section of this article structures and compares existing data hiding methods for UNIX file systems in terms of usability and countermeasures. It discusses variant techniques related to advanced file systems. The second section proposes a new technique that stores substantial amounts of data inside journaling file systems in a robust fashion with low detectability, which is demonstrated by means of a proof-of-concept implementation for the ext3 journaling file system.

Outline l Introduction l Known Hiding Techniques l New Scheme: Deliberate FS Inconsistencies l Directions

Introduction l Several detection avoidance techniques - Trojanizing system binaries or kernel, often referred to as introducing “backdoors” - Purging of system audit and process accounting logs - Data/Information hiding l Data hiding used to hide incriminating data - Sniffer or password collector log files or contraband such as pirated copies of programs or media files.

Known Hiding Techniques l Media Management Layer l File System Layer l Application Layer

Media Management Layer l Using unused media - Usability for the attacker l an attacker has to reduce the size of one of the partitions on the medium - Countermeasures l Regular checking of partition size l Mounting on nonempty directories - Usability for the attacker l The data to be hidden is stored in files in a directory. The attacker mounts an existing filesystem – or a newly created one, using loopback mounting – onto this directory - Countermeasures l Detecting the use of existing partition mounts has to rely on auditing the (remote) system log for subsequent unmount and mount operations

File System Layer l File System Category - data structures may not use an entire logical disk block. l Data unit category: Slack space - file system organizing storage media sectors into individually adressable data units, referred to as “logical disk blocks.” Slack space is defined as the unused part of a file's last data l Metadata category: Use reserved inodes - data structures commonly referred to in UNIX file systems as “inodes” organize per-file metadata such as timestamps, ownership, access rights etc. An attacker may use inodes which the operating system itself will not use

File System Layer l Metadata category: Extended file attributes - UNIX file systems recently have introduced additional file attributes for data storage. They are easy to use for the attacker and easy to detect for the system administrator using commands provided by the operating system. l File name category: special file names -, a file system stores and processes data to assign human- recognizable names to files and directories. Human perception can be deceived in the file name category through creating filenames consisting of space characters or spaces and dots l File name category: removal of open files l Metadata/file name category: Hide in deleted inodes plus trojan fsck

File System Layer l File name category: removal of open files - attackers have been known to hide both program and data files by removing them while the program in question was still running. Upon deletion of an open file the operating system immediately removes the filename from the directory but delays removal of metadata and content until all referring file descriptors have been closed. l Metadata/file name category: Hide in deleted inodes plus trojan fsck - The fundamental idea is to use a trojanized version of the file system checking program (fsck). At boot time the trojanized fsck/rc script combo “undeletes” and spawns the malicious software, for example a sniffer, then “removes” the sniffer executable and the sniffer log file again.

Applications Layer l Obfuscated Loopback Filesystems - A simple, but effective method to obfuscate the real purpose of the image file is to use the offset option of the loopback mount command l Unused spaces in application file formats - file formats contain unused sections, for example the comment field in a jpeg image format. Space is quite limited and largely depends on the number of available application files. l Steganography - steganography is a research field, but from the file system centric or “lower level” point of view space is being offered largely depends on the number and size of “host files.”

New Scheme: Deliberate FS Inconsistencies l The new data hiding scheme that is proposed works by introducing deliberate file system inconsistencies. l It relies on a fundamental property of journaling file systems. l Because the journal records all recent file system modifications, the time required for the file system consistency check at boot time can be drastically reduced: l Instead of checking consistency amongst all categories of file system data, the modifications recorded in the journal are “replayed” to check whether all of them were executed successfully. l If, due to a system crash. not all recorded modifications were performed, the journal allows for a very efficient “roll back” to a clean file system state

Directions l Need to analyze how effective the new technique is? If so, we need to develop countermeasures l Need to develop additional techniques l Does this not give ideas to the attacker? l Classified research?

Abstract of Paper 2 l Digital forensic analysts may find their task complicated by any of more than a dozen commercial software packages designed to irretrievably erase files and records of computer activity. These counter-forensic tools have been used to eliminate evidence in criminal and civil legal proceedings and represent an area of continuing concern for forensic investigators. In this paper, we review the performance of six counter-forensic tools and highlight operational shortfalls that could permit the recovery of significant evidentiary data. In addition, each tool creates a distinct operational fingerprint that an analyst may use to identify the application used and, thus, guide the search for residual data. These operational fingerprints may also help demonstrate the use of a tool in cases where such action has legal ramifications.

Outline l Introduction l Testing Method l Counter-forensics tool testing l Analysis results l Directions

Introduction l Many counter-forensic commercial tools claim to expunge all traces of information about specific computer usage, including documents and other files created, records of websites visited, images viewed and files downloaded. l To do this, counter-forensic tools must locate activity records scattered across the file system and erase them irretrievably, while leaving the rest of the operating system intact. l The technical challenge of finding and eliminating this data is complex l Rigorous testing and evaluation of these counter forensic tools are needed. l This paper attempts to do this

Testing Method l Test System - The testing platform was a desktop machine with 128MB of RAM and Windows XP Professional installed on a 2.5GB partition. l Activity record - Test activity on the system breaks down into two general categories: browsing and document creation and management. The activity covered a span of eight days. l Counter-forensics tool testing - Tested six software packages: Window Washer 5.5, Windows & Internet Cleaner Professional 3.60, CyberScrub Professional 3.5, SecureClean 4, Evidence Eliminator 5.0 and Acronis Privacy Expert 7.0.

Analysis l All the counter-forensic tools failed to eradicate some potentially sensitive information – either data specifically targeted for wiping by the user or records that contained information the tool was designed to eliminate. l Some shortfalls were more serious than others. In one case, the tool failed to wipe, or overwrite, any of the files it deleted. l Paper describes a summary table with the areas of weakness and representative examples of data recovery. l These classifications are subjective

Directions l Is the approach described realistic? Does it work in a teal world environment l Are the assumptions valid? l Are there better approaches for testing and analysis

Abstract of Paper 3 l The need for computer forensics education continues to grow, as digital evidence is present in more crimes, whether the crimes directly involve computers or not. An essential component of training in computer forensics is hands-on, realistic laboratory assignments. Authors are developing FALCON (Frame-work for Laboratory Exercises Conducted Over Networks), an extensible framework that addresses the problem of creating, running, and evaluating detailed, realistic computer laboratory assignments in computer forensics. FALCON includes a component that enables instructors to set up scenarios on virtual target machines for the students to investigate. Existing tools for both “live” and “dead” machine investigations can be integrated into FALCON. In addition, FAL-CON logs all student activity for automated assessment of student performance.

Outline l Introduction l Falcon Architecture l Results l Directions

Introduction l Introduction l Falcon Architecture l Results l Directions

Architecture l Lab creation tool - The FALCON Lab Creation Tool (LCT) will automatically configure a set of target machines for a lab exercise based on a specification that the instructor provides. l Lab environment execution - The FALCON Lab Execution Environment (LEE) provides students with an inter-active environment, allowing them to conduct a forensic investigation. l Lab evaluation tool - The FALCON Lab Evaluation Tool (LET) takes the audit log file generated by the LEE and analyzes it for certain patterns, providing metrics for objective lab assessment.

Results The students were only told that the company, an ice cube company, was having problems with “penguin pornography,” which was defined in the assignment as any depiction of a penguin without a hat. The assignment was meant to parallel a child pornography investigation, while keeping the tone light. The students were given 11 questions to answer about details of the case (who did it, what did they do, how did they do it, what is the supplier’s site, what is the password to the site, etc.). The questions asked in the assignment appear below. The complete assignment is available at

Directions l Need projects for university students l Create an environment where professors can place their assignments in a common repository l Will discuss at the next DFRWS workshop