Download presentation
Presentation is loading. Please wait.
Published byClara Burns Modified over 9 years ago
1
1 IT Investigative Tools Tools and Services for the Forensic Auditor
2
2 Digital Crime Scene Investigation Problems with Digital Investigation Timing essential – electronic evidence volatile Auditor may violate rules of evidence NEVER work directly on the evidence Skills needed to recover deleted data or encrypted data
3
3 Digital Crime Scene Investigation Extract, process, interpret Work on the imaged data or “safe copy” Data extracted may be in binary form Process data to convert it to understandable form Reverse-engineer to extract disk partition information, file systems, directories, files, etc Software available for this purpose Interpret the data – search for key words, phrases, etc.
4
4 Digital Crime Scene Investigation Technology Magnetic disks contain data after deletion Overwritten data may still be salvaged Memory still contains data after switch-off Swap files and temporary files store data Most OS’s perform extensive logging (so do network routers)
5
5 Disk Geometry Track Sector Cylinder (Clusters are groups of Sectors)
6
6 Slack Space End of File Slack Space Last Cluster in a File
7
7 Illustration of Forensic Tools Forensic Software Tools are used for … Data imaging Data recovery Data integrity Data extraction Forensic Analysis Monitoring
8
8 Data Imaging EnCase Reduces internal investigation costs Platform independent Automated analysis saves time Supports electronic records audit Creates logical evidence files — eliminating need to capture entire hard drives
9
9 Data Recovery File Recovery with PC Inspector
10
10 Data Eradication Securely Erasing Files
11
11 Data Integrity MD5 Message Digest – a hashing algorithm used to generate a checksum Available online as freeware Any changes to file will change the checksum Use: Generate MD5 of system or critical files regularly Keep checksums in a secure place to compare against later if integrity is questioned
12
12 Data Integrity MD5 Using HashCalc
13
13 Data Integrity HandyBits EasyCrypto
14
14 Data Integrity Private Disk
15
15 Data Monitoring Tracking Log Files
16
16 Data Monitoring PC System Log
17
17 Security Software Log Entries
18
18
19
19 Free Log Tools
20
20 Audit Command Language (ACL) ACL is the market leader in computer- assisted audit technology and is an established forensics tool. Clientele includes … 70 percent of the Fortune 500 companies over two-thirds of the Global 500 the Big Four public accounting firms
21
21 Forensic Tools Audit Command Language ACL is a computer data extraction and analytical audit tool with audit capabilities … Statistics Duplicates and Gaps Stratify and Classify Sampling Benford Analysis
23
23
24
24
25
25
26
26
27
27 Forensic Tools: ACL Benford Analysis States that the leading digit in some numerical series follows an exponential distribution Applies to a wide variety of figures: financial results, electricity bills, street addresses, stock prices, population numbers, death rates, lengths of rivers
28
28
29
29
30
30
31
31 Data Monitoring Employee Internet Activity Spector captures employee web activity including keystrokes, email, and snapshots to answer questions like: Which employees are spending the most time surfing web sites? Which employees chat the most? Who is sending the most emails with attachments? Who is arriving to work late and leaving early? What are my employees searching for on the Internet?
32
32 Data Monitoring : Spector Recorded Email
33
33 Data Monitoring : Spector Recorded Web Surfing
34
34 Data Monitoring : Spector Recording Keystrokes
35
35 Data Monitoring : Spector Recorded Snapshots
36
36
37
37 Data Capture : Key Log Hardware KeyKatcher Records chat, e-mail, internet & more Is easier to use than parental control software Identifies internet addresses Uses no system resources Works on all PC operating systems Undetectable by software www.lakeshoretechnology.com
38
38 index.dat files Contain all of the Web sites that you have ever visited. Every URL, every Web page, all of the email that has been sent or received through Outlook or Outlook Express. On Windows 2000 and Windows XP there are several "index.dat" files in these locations: \Documents and Settings\ \Cookies\index.dat \Documents and Settings\ \Local Settings\History\History.IE5\index.dat \Documents and Settings\ \Local Settings\History\History.IE5\MSHist012001123120020101\index.dat \Documents and Settings\ \Local Settings\History\History.IE5\MSHist012002010720020114\index.dat \Documents and Settings\ \Local Internet Files\Content.IE5\index.dat These files cannot be deleted without special software!
39
39
40
40 Background Checks
41
41
42
42
43
43 http://www.expressmetrix.com/solutions/
44
44
45
45 ipconfig /all
46
46 ipconfig /displaydns
47
47 netstat -a
48
48
49
49 Eraser http://www.heidi.ie/eraser/ Private Disk http://www.private-disk.net/ HashCalc http://www.slavasoft.com/hashcalc/index.htm PC Inspector http://www.download.com/3000-2242-10066144.html VeriSign http://www.verisign.com HandyBits Encryption http://www.handybits.com/ EnCase http://www.handybits.com/
50
50 Spector http://www.spectorsoft.com/ Stolen ID Search https://www.stolenidsearch.com/ Abika Background Check http://www.abika.com/ Guide to Log Management http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf ACFE Fraud Prevention Checkup http://www.acfe.com/documents/Fraud_Prev_Checkup_IA.pdf NetWitness http://www.netwitness.com/ GASP Std V 7.0 Free Software http://www.bsa.org/usa/antipiracy/Free-Software-Audit-Tools.cfm Federal Guidelines for Searches http://www.cybercrime.gov/searchmanual.htm
51
51 Florida Criminal Database http://www.fdle.state.fl.us/CriminalHistory/ Federal Bureau of Prisons http://www.bop.gov/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.