Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Forensic Tools. Computer Forensics: A Brief Overview Scientific process of preserving, identifying, extracting, documenting, and interpreting.

Similar presentations


Presentation on theme: "Computer Forensic Tools. Computer Forensics: A Brief Overview Scientific process of preserving, identifying, extracting, documenting, and interpreting."— Presentation transcript:

1 Computer Forensic Tools

2 Computer Forensics: A Brief Overview Scientific process of preserving, identifying, extracting, documenting, and interpreting data on computer The field of computer forensics began to evolve more than 30 years ago in the United States. With the growth of the Internet and increasing usage of technology devices connected to the Internet, computer crimes are increasing at a great speed.

3 Computer Crimes Computer crimes Pure computer crime Computer is the medium of a crime Computer content related crime Illegal access to a system or network Illegal transmission of data Data deletion, damage, alteration Serious hindrance to computer Identity theft Fraud E-theft Incriminating information stored in computer Child pornography Information that unleashes hostility/violence

4 Tools for Computer Forensics Computer forensic tools Integrated GUI based tools Specialized single task tools Process information Network connection information List of processes Process to port mapping Service/driver information Registry analysis Executable file analysis

5 Integrated GUI Based Tools Advantages: – More effective for analyzing content related crime – Useful for searching storage devices, for retrieving deleted files and folder, reconstructing graphic files Disadvantages: – Very expensive – Very complex in design, uses up a lot of resources – Requires trained professionals to use the tools

6 Specialized Single Task Tools Advantages: – More effective for investigating malware attacks, intrusion etc – Useful for live response and live analysis – Simple in design, most tools can be used from command line – Inexpensive, easy to learn and use – Very effective for pedagogical purposes – Can be modified/customized

7 Specialized Single Task Tools Disadvantage: – Has compatibility issues with different versions of operating systems

8 Windows Forensic Analysis Windows Forensic Analysis by Harlan Carvey – Teaches simple but effective analysis techniques for investigating malware attacks – Provides CLI based tools for complete analysis of Windows Operating Systems

9 Compatibility Issues with Newer Windows Operating System About 50% tools are not compatible with Windows XP and Vista ToolWindows XP VistaWindows 7DescriptionComment Bonus\poladt.exeYesNo Parse the raw Security file and display the audit policy Bonus\srv_sort.exeYesNo retrieve Service key info raw Registry/System file, sorting the output based on LastWrite time; automatically determines which of the available ControlSets is marked "current" ch3\code\lspd.exeYesNoparse process details from a Windows 2000 phys. memory/RAM dump, ch3\code\lspi.exeYesNoparse process image from a Windows 2000 phys. memory/RAM dump ch3\code\lspm.exeYesNodump the memory pages used by a process from a Windows 2000 phys. memory/RAM dump, ch3\code\lsproc.exeYesNoparse Windows 2000 phys. memory/RAM dump, looking for processes. ch4\code\pref_ver.exeYesNo Perl script to parse the contents of the XP layout.ini file, locate executables (.exe,.dll,.sys) and locate those files and then extract any file version information ch4\code\sr.exeYesNoUse WMI to get Restore point settings from XP (local or remote) ch4\code\old\bho.exeYesNoretrieve listing of installed BHOs from a local system ch4\code\old\pnu.exeYesNolist the contents of one of the UserAssist\GUID\Count keys, sorted by most recent time ch4\code\old\regp.exeYesNo raw Windows Registry files (ntuser.dat, system32\config\system, system32\config\software) from NT/2K/XP/2K3 systems. ch4\code\old\sam_parse.exeYesNoretrieve user information from a raw Registry/SAM file ch4\code\jt\regslack.exeYesNoNo DOS ch4\code\RegRipper\rip.exeYesNoUse this utility to run a plugins file or a single plugin against a Reg# hive file. ch4\code\RegRipper\rr.exeYesNoParse a Registry hive file for data pertinent to an investigationNo plugins ch5\code\lscl.exeYesNoread/parse restore point change logs for data ch5\code\pdfdmp.exeYesNoAttempt to extract metadata from PDF files ch5\code\pdfmeta.exeYesNoAttempt to extract metadata from PDF files ch5\code\sr.exeYesNo ch5\code\EVT\evt2xls.exeYesNo Parse Windows 2000, XP, 2003 EventLog files in binary format, putting the eventrecords into an Excel spreadsheet; can also generate a report showing event source/ID frequencies (for Security Event Log, login type is added to the event ID), suitable for entry into eventid.net ch5\code\EVT\evtrpt.exeYesNo Tool to translate the binary contents of Windows 2000, XP, and 2003 Event Logs, and generate a report of event ID frequencies and date ranges of the records. ch5\code\EVT\evtstats.exeYesNo parse the contents of Event Log files and display statistics

10 Compatibility Issues with Windows Forensic Tools ToolWindows XP VistaWindows 7DescriptionComment Bonus\poladt.exeYesNo Parse the raw Security file and display the audit policy Bonus\srv_sort.exeYesNo retrieve Service key info raw Registry/System file, sorting the output based on LastWrite time; automatically determines which of the available ControlSets is marked "current" ch3\code\lspd.exeYesNoparse process details from a Windows 2000 phys. memory/RAM dump, ch3\code\lspi.exeYesNoparse process image from a Windows 2000 phys. memory/RAM dump ch3\code\lspm.exeYesNo dump the memory pages used by a process from a Windows 2000 phys. memory/RAM dump, ch3\code\lsproc.exeYesNoparse Windows 2000 phys. memory/RAM dump, looking for processes. ch4\code\pref_ver.exeYesNo Perl script to parse the contents of the XP layout.ini file, locate executables (.exe,.dll,.sys) and locate those files and then extract any file version information ch4\code\sr.exeYesNoUse WMI to get Restore point settings from XP (local or remote) ch4\code\old\bho.exeYesNoretrieve listing of installed BHOs from a local system ch4\code\old\pnu.exeYesNo list the contents of one of the UserAssist\GUID\Count keys, sorted by most recent time ch4\code\old\regp.exeYesNo raw Windows Registry files (ntuser.dat, system32\config\system, system32\config\software) from NT/2K/XP/2K3 systems. ch4\code\old\sam_parse.exeYesNoretrieve user information from a raw Registry/SAM file ch4\code\jt\regslack.exeYesNoNo DOS ch4\code\RegRipper\rip.exeYesNoUse this utility to run a plugins file or a single plugin against a Reg# hive file. ch4\code\RegRipper\rr.exeYesNoParse a Registry hive file for data pertinent to an investigationNo plugins ch5\code\lscl.exeYesNoread/parse restore point change logs for data ch5\code\pdfdmp.exeYesNoAttempt to extract metadata from PDF files ch5\code\pdfmeta.exeYesNoAttempt to extract metadata from PDF files ch5\code\sr.exeYesNo ch5\code\EVT\evt2xls.exeYesNo Parse Windows 2000, XP, 2003 EventLog files in binary format, putting the eventrecords into an Excel spreadsheet; can also generate a report showing event source/ID frequencies (for Security Event Log, login type is added to the event ID), suitable for entry into eventid.net ch5\code\EVT\evtrpt.exeYesNo Tool to translate the binary contents of Windows 2000, XP, and 2003 Event Logs, and generate a report of event ID frequencies and date ranges of the records. ch5\code\EVT\evtstats.exeYesNo parse the contents of Event Log files and display statistics


Download ppt "Computer Forensic Tools. Computer Forensics: A Brief Overview Scientific process of preserving, identifying, extracting, documenting, and interpreting."

Similar presentations


Ads by Google