Download presentation
Presentation is loading. Please wait.
Published byAusten Hampton Modified over 9 years ago
1
Penetrating encrypted evidence Writer : Hank Wolfe University of Otago, Computer Security, Forensics, Information Science Department, New Zealand Presentation : Digital Investigation, 2004 Reporter : Sparker
2
Introduction Every investigator will encounter suspect hard drives and other media that has been encrypted. The accused will be asked to provide the keys necessary for decryption of data files or entire hard drives. The final decision, however, rests with the accused.
3
There are some technical methods to obtain the relevant keys Social engineering. Surveillance.
4
Social engineering A divorce settlement case. The ethics of the profession. Once the integrity is compromised, it is impossible to regain the confidence and trust held before..
5
Social engineering (cont.) Before attempting to use the decrypt software tools. Every has something that is important to them, we use this technique to guess passwords. It does not always work but it is always worth a try.
6
Social engineering (cont.) Often-simple methods can be very effective. It is human nature to create keys and passwords that are easily remembered. As forensic investigators, it is part of our job to find out all that we can about the accused and his/her background.
7
Surveillance A criminal case involving child pornography. A series of tools like D.I.R.T. or STARR or KeyKatch or KeyGhost or the Password Recovery Toolkit and others. They are installed on the target machine by various means (a virus, a Trojan, … and so on). These tools can intercept ans record keystrokes among other things and transmit this information in encrypted form back to forensic computers.
8
Surveillance (contd.) The advantage of these tools is that they are flexible and can capture, based on the way they have been configured, many different kinds of information-including but not limited to keystrokes. Electromagnetic transition emanate from all electric devices. With the right equipment, it is possibleto receive those emanations and convert them back into their source form. The emanations can be acquired from a reasonable distance covertly and converted back into the key codes.
9
Surveillance (contd.) The contents of a computer display unit can also be captured, interpreted and viewed by someone other than the operator at a distance (Van Eck, or TEMPEST, or HIJACK, or NONSTOP). Using this surveillance technique requires six equipments consists of, antenna, receiver, amplifier, sync generator, a multi-sync monitor, snd recorder..
10
Conclusion We all need to share our successful techniques and learn from each other and accept that we do not have all of the answers. The techniques described have been and will continue to be successful and should be regarded as just another set of tools for the standard forensic tool kit..
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.