Computer Forensics

Download Report

Transcript Computer Forensics

Computer Forensics
An Intro to Computer Crime
Computer Forensics
 The BTK Killer (Blind, Torture, Kill)
Dennis Rader - Feb 2005 Charged with committing 10
murders beginning in 1974 in the Wichita, KS area.
“Erased” information on a floppy disk sent to a local
TV station was recovered and restored by forensic
computer specialists was traced back to Christ
Lutheran Church where Dennis Rader was Council
President. This, along with other mounting evidence
since his last murder in 2001 served to convict him.
Computer Forensics
 Computer forensics involves the preservation,
acquisition, extraction, analysis, and interpretation
of computer data.
 Investigators frequently encounter computers and
other digital devices in all types of cases.
 The most logical place to start to examine these
practices is with the most common form of
electronic data: the personal computer.
Computer Forensics
 Basic Parts/Key Terms:
• Bit
• Byte
• CPU
• Cluster
• File slack
• HDD
• Hardware
• Message Digest 5/Secure
hash algorithm (SHA)
• Motherboard
• OS
• Partition
• RAM slack
• RAM
• Sector
• Software
• Swap file
• Temporary File
• Unallocated Space
• Visible Data
Computer Forensics
 The Personal Computer
• Hardware
• Software
Computer Forensics
• Power Supply converts power
from the wall outlet to a usable
format for the computer.
• External drive is used to read
from and write to a disk.
• CD/DVD Drive are used to store
everything from music and
video to data files.
• Hard Disk Drive (HDD) is the
component of storage in the
personal computer.
Computer Forensics
Floppy Disk Drive: used
to boot an operating
system or to store data. By
today’s standards, they
don’t hold much data
Expansion Bus with
ROM: class of storage media used in
Expansion Drive: lots of computers and other electronic devices.
wires that carry data from
one hardware device to
Motherboard : basic purpose is to provide
another
the electrical and logical connections by
which the other components of the system
communicate.
Computer Forensics
CPU (Central
Processing Unit): The
main chip within the
computer, know as
the brain of the
computer.
RAM (Random-Access
Computer Case/
Chassis: it the
Memory): the volatile memory of physical box holding the fixed
the computer, when power is
internal computer components in
turned off, its contents are lost. place.
Computer Forensics
 Input Device – the user side of the computer
i.e., keyboard, mouse, joystick, scanner
 Output Device – equipment through which
data is obtained from the computer
 i.e., monitor
 HDD – primary storage component in a
personal computer. Stores the OS, programs,
and data files created by the user.
Computer Forensics
The Operating System
is a software program
that allows the
computer hardware to
communicate and
operate with the
computer software.
Without an operating
system, a computer
would be useless.
Computer Forensics
The Operating System
 Recognizing input from the keyboard
 Sending output to the display screen
 Keep track of files and directories on the disk
 Controlling peripheral devices such as disk
drives and printers
Computer Forensics
 Provide a software platform on top of other
programs called application programs.
 Some examples of operating systems are
Windows and Linux.
Computer Forensics
 Types of HDD
IDE – Integrated drive electronics
SCSI – small computer system interface
SATA – serial ATA
HDD are formatted or mapped and have a defined
layout. They are “logically” divided into sectors,
clusters, tracks and cylinders.
Computer Forensics
 Sectors are the smallest unit of data by a hard disk
drive. They generally consist of 512 bytes.
 Bytes are a group of eight bits.
 A bit takes the form of either a one or a zero, it is the
smallest unit of measurement on a machine. The
word bit is short for binary digit.
 Clusters are a group of sectors in multiples of two.
The cluster size varies from file system to file system
and is typically the minimum space allocated to a file.
Computer Forensics
 Other Common Storage Devices
CD-ROM (CD-R/RW)
USB-thumb drive
Floppy disks
Zip disks
Tapes
DVD +/R /RW
Computer Forensics
 NIC – Network Interface Card
Add-on cards that plug into the motherboard
Hard-wired devices on the motherboard
Add-on cards for laptops (PCMCIA)
USB plug-in cards
Wired/Wireless 801.11 a/b/g/n
Computer Forensics
How the HDD is Made Up
Computer Forensics
 On each disk or platter
there are tracks; these
tracks are divided into
sectors.
 A group of sectors is a
cluster.
 Clusters always have
sectors in groups of 2
Computer Forensics
 There are several platters stacked vertically
which are divided by sectors, clusters, tracks,
and cylinders. Tracks are circles that are
defined around the platter. Cylinders are
groups of tracks that reside directly above
and below each other.
 Each file system table tracks data in different
ways.
Computer Forensics
 OS – Provides a bridge between the system
hardware and the user. It lets the user interact with
the hardware and manages the file system and
applications
 Partition – is a contiguous set of blocks that are
defined and treated as an independent disk. After it
is partitioned it is Formatted (high-level). i.e. floppy –
FAT 12, Windows – FAT 32, Linux – EXT3 and Mac –
HPFS
 Each has a different way of storing data
Computer Forensics
 Consider a room full of safe
deposit boxes. If a person rents
two boxes located in opposite
ends of the room – the db
tracking the locations of the
boxes is much like a file system
tracking the location of data
within the clusters of a HDD.
 If the db managing the locations
of the boxes were wiped out, the
property in them would still
remain; we just wouldn’t know
what was where!
Computer Forensics
Processing the Electronic Crime Scene
 Before an investigator can begin processing the
crime scene he/she must still ensure that the proper
legal requirements are present.
Search warrant (on school property, school has say!)
Consent
 The scene must be documented in as much detail as
possible. The investigator must make sure not to
disturb any evidence before he/she touches the
computer.
Computer Forensics
 Crime Scene Documentation
Sketching and Photographing
Floor plan of network, overall layout, close-ups of
any running computer on the network.
All the connections to the main frame, peripheral
devices and notation of serial numbers (Photos)
“Encase” , Forensic Toolkit (FTK), Forensic
Autopsy Software – Forensic software applications
capable of imaging and assisting in the analysis of
data.
Computer Forensics
 Forensic Software
comes equipped
with a method to
obtain forensic
images and
compress data if
need be.
Computer Forensics
 Investigators must decide:
Perform a live acquisition of the data
Perform a system shutdown (i.e. with a server)
“Pull the Plug”
Combination of all three
 BEFORE Disconnecting
 Labeling all peripherals of the computer to the port
 Numbering scheme to ID peripherals if more than 1
computer
Computer Forensics
 Forensic Image Acquisition
Least Intrusive Method to obtain data without
destroying evidentiary data
Remove HDD and place in Laboratory Forensic
Computer so that a “Forensic Image” or copy can
be created in a ‘read-only’ format
Must be able to PROVE there were no ‘Writes’ to
the forensic image
Copy “Empty areas of the Drive”
Computer Forensics
 Analysis of Electronic Data – Based on the skill of
the Computer Forensic Technologist
 Most Common Types of Evidentiary Data
 Visible Data – all data that the OS is presently aware of
and thus is readily accessible to the user
 Data/Work Product Files – data from any software
program. White Collar crimes-MS Word or WordPerfect,
EXCEL or Peachtree or QuickBooks, etc. A suspect’s
computer may contain valuable information in these files
Such as Bank Account Records, Counterfeiting
pictures, and questionable E-Mails.
Computer Forensics
Swap File Data – a file or defined space on the
HDD used to conserve RAM. Data is paged or
swapped to this file or space to free – up RAM for
use by applications that are open.
Temporary Files–temporarily written by an
application to perform a function or a backup
copy while working on a project. Some are
automatically written as a program is running
without the user telling the program to ‘save’.
Computer Forensics
 Swap Files, Temporary Files, and Print Spools
(data sent to a printer) can all be used to
recover data not easily accessible to the
average user and usually, even the suspect.
Computer Forensics
 Latent Data – Areas of files and disks that are
typically not apparent to the computer user &
sometimes the OS but contains data all the
same. Examples:
Slack Space-file & RAM
Unallocated Space
Defragmented Space
Swap Files and Space
Deleted Files
Computer Forensics
 Deleted Files
When files are deleted, they still remain on the Hard
Drive. The first character of a filename is replaced
with the Greek letter sigma.
This renders the file inaccessible to the average
user.
Forensic Scientists have programs that can access
these files and obtain evidence.
Computer Forensics
 The files you save on your
computer rarely are ever totally
gone.
 Forensic Scientists can access a
plethora of data from a Hard Drive
even if it is deleted,
defragmented, and reformatted.
 This data can be used to
incriminate or exonerate the
suspect.