Presentation is loading. Please wait.

Presentation is loading. Please wait.

Teaching Digital Forensics w/Virtuals By Amelia Phillips.

Similar presentations


Presentation on theme: "Teaching Digital Forensics w/Virtuals By Amelia Phillips."— Presentation transcript:

1 Teaching Digital Forensics w/Virtuals By Amelia Phillips

2 Teaching Digital Forensics – Incorporating Virtualization

3 Agenda  Overview of VMs  Finding a VM  Proper Procedure  Imaging a VM  Analysis of a VM  Restoring an image to a VM

4 Overview of VMs  “Oh, use a virtual!”  What does this really mean?  Why is it so popular?

5 Use of Virtual Machines  VMs allow you to run multiple operating systems on the same physical box  With high capacity servers  High RAM  Quad-core or higher  20 or more OS can run on the same box

6 Use of Virtual Machines(2)  Cut down on equipment cost  Ease of maintenance  Easy to backup, clone and restore  Easy to delete  Easy to create  Have legacy systems and modern systems on same network

7 Use of VMs in Class  Easy to teach legacy systems  Relatively easy to assemble networks  Cut down on the number of physical machines

8 Most Popular VM Software  VMWare  Server  Workstation  Player  Virtual Box  Virtual PC  Many others listed on wikipedia

9 Criminal or Covert Use of VMs  Attack networks  Insider access to sensitive files  Erase evidence  Hard to track

10 Proper Procedure  Forensically sound approach  Document everything  New technology produces new challenges  Live acquisitions  VMs

11 Proper Procedure (2)  VMs are located on other physical boxes  Your search begins with someone’s  Office computer  Personal laptop  Mobile device  USB or other portable drive

12 Proper Procedure (3)  Seize the evidence  Perform a forensic image of the physical drive  Begin the analysis

13 Find the VM  Check the MRU  Examine the Registry  HKEY_CLASSES_ROOT see if the vmdk extension (or similar) has an association  Check the My Virtual Machines folder  Look for.lnk files that point to a VM

14 Find the VM (2)  Examine the Network logs  Look for a VMWare network adaptor  ipconfig or ifconfig  See what has been connected to the machine such as a USB

15 Find the VM (3)  The VM may have been deleted  Be sure to examine the host drive to see if the file(s) can be retrieved  Export any relevant files

16 Examining the VM  Note there may be shared files or folders on the host machine  Examine the Log files  Open the Cengage2010VM folder  Note how many machines this VM was opened on and their names

17

18

19 VMWare files  *.vmdk – the actual hard drive for the VM  *.nvram – the BIOS info  *.vmx – the configuration file

20 Preview VM

21 Note Files of interest

22 Imaging a VM  The easiest tool is FTK Imager  Very similar to imaging a standard physical drive  Launch FTK Imager  Click, File, Create Disk Image

23

24 Select the vmdk file

25 Click Add Select Raw(dd)

26 Fill in the prior dialog box with your information. Select the destination folder and indicate a filename. Be sure to put in 0 for no fragmentation

27

28 Verify Results

29 Analyzing the VM  Load the forensic image into the software of your choice  For ease of demonstration, launch the Forensic Toolkit  Click through any messages regarding KFF and dongle not found

30 Using FTK  Start a new case  Use all the defaults, plus data carving and fill in your information  At the add evidence, select the file we just created

31

32

33 Analyzing the VM  Click Next and Finish  Once the drive has been processed, proceed as normal with your analysis  Be sure to look at the registry

34 USING THE VM AS YOUR FORENSIC TOOL

35 Examining Malware, etc  Many times software on a drive is not readily available for download  Malware may be present that you want to test  You, as the investigator, want to test it  Forensic procedure must dictate what you do next

36 Launch a VM  Use the forensic image of the vmdk (or equivalent), not the original file  Some forensic tools such as EnCase require mounting the drive  Other tools, such as ProDiscover, will prepare the files for you

37 Using ProDiscover

38 Creating VM files

39 Procedure  Be sure to record the hash values of all files created  Be sure to document everything that you do  This is new territory – not proven by case law

40 Advantages of using VM  “clean box” every time  Erase changes made to drive  Can load a verified image every time

41 Conclusion  Virtual machines do offer some challenges  Knowledge of how to mount them for examination in a VM application is needed  Quirks when doing the actual drive image

42 References  Virtual Forensics, by Shavers, Brett, 2009, white paper  Guide to Computer Forensics and Investigations, by Nelson, Bill; Phillips, Amelia; and Steuart, Chris, 2010, Course Technology


Download ppt "Teaching Digital Forensics w/Virtuals By Amelia Phillips."

Similar presentations


Ads by Google