Data Foresensics
Download
Report
Transcript Data Foresensics
Damien Leake
Definition
To examine digital media to identify and analyze
information so that it can be used as evidence in court
cases
Involves many data recovery techniques
Process of salvaging data from damaged, failed,
corrupted, or inaccessible secondary storage media
Hard drives, USB flash drives, DVDs
Recovery may be required due to physical damage or
logical damage to file system
Digital evidence has to be authentic, reliably obtained,
and admissible
Common Scenarios for
Data Recovery
Operating system failure
Use LiveCD to copy all files to another disk
Can be avoided by proper disk partitioning
Disk-level failure
Compromised file system or disk partition
Repair file system, partition table, master boot record
Hard disk recovery – one time recovery
Recovering deleted files
Often data is not removed, only the references to them
in the file table
Data Reduction During Acquisition
Ever larger hard drives make collecting data very time-
consuming
Data analysis can also take much longer if there are
large amounts of data
Known files
Operating system and application files can often be
disregarded when looking for documents
File types
Many file types can usually be ignored
Live Acquisition
Debate: pull the plug or not when finding suspect’s
computers
For: minimizes disturbance to stored data
Against: Critical data may be in RAM
With full disk encryption, files are decrypted on the fly,
with the decryption key stored in RAM
Open ports, active processes
Fully volatile OS: Knoppix
Unsaved documents
Examining RAM
Evidence cannot be recorded on a target machine
without changing the state
Logs, temp files, network connections opened/closed
Critical data may be overwritten
Analysis utilities may need to be loaded onto target
system
Usually, ram data is sent to another machine over a
network connection
These problems may be avoided if the target machine
was running on a Virtual Machine
Virtual Introspection
Process by which the state of a VM is observed from the
Virtual Machine Manager or another VM on the system
No current production tool, but research shows promise
Can allow live system analysis of a VM
May be possible for it to be undetected by target system
Experienced cyber criminals may have safeguards that
remove critical data from RAM upon breach detection
Virtual Introspection for Xen
Xen is an open source Virtual Machine Manager
Not as robust as some competitors
Open source means that researchers can modify the
VMM should that become necessary
VIX is a suite of tools currently being developed for Xen
Provides API for getting data from different VMs
Pauses target machine, acquires data, un-pauses
machine
Ensures machine state is not modified
Future Work
Support for multiple OS
Currently, Linux 2.6 kernel is supported by VIX
Need Windows and Mac OS support for widespread
significance
Analysis of the extent to which VI can be detected by
the target VM
Timing analysis, page fault monitoring
Application of these techniques to VMware and other
popular VM platforms
Database Forensics
Standard forensics tools tend to be too time
consuming to run on large databases
Database tools to search logs are quicker
Can return a lot of useful information
But they may alter the database in ways that complicate
the admissibility of the content in court
New field of study with little literature
Mobile Device Forensics
State of device at time of acquisition
Password locks
Remote data deletion
Variety of operating systems
Hard to build tools considered industry standard
FTK Mobile Phone Examiner
Most commonly used tool in US
Simple data acquisition
Cable. Infrared, Bluetooth
Does not alter any data on device
Integration with Forensic Toolkit
Perform analysis on multiple phones at once
Reports are automatically court-usable
Oxygen Forensic Suite
Popular tool with European law enforcement agencies
Extracts all possible information
Phone/SIM card data
Contact list, caller groups, speed dials
All calls sent/received/missed
SMS, calendar events, text notes
Can tap into LifeBlog and geotagging in Nokia
Symbian OS phones
EnCase Neutrino
Extension of company’s PC forensic software
Claims to have the only extensively tested signal
blocking technology
Data acquisition starts with SIM card first, then
searches the phone itself
Easily returns device serial number, cell tower location,
and manufacturer information
Anti-Forensics
Avoid detection of events
Disrupt collection of information
Increase time spent on case
Attacking Data
Data wiping
Overwrite erased disk space with random data
Many commercial tools do not do this properly and leave
some of the original data
Data hiding
Encryption
Using anonymous web storage
Steganography
Embedding data into another digital form (images, videos)
Data corruption
Aims to stop the acquisition of evidentiary data
Attacking Forensics Tools
Aims to make examination results unreliable in court
Manipulate essential information
Hashes
Timestamps
File signatures
Compression bomb
Compress data hundreds of times
Causes analyzing computer to crash trying to
decompress it
Attack the Investigator
Exhaust investigator’s time and resources
Leave large amounts of useless data on hard drives
Cases that take too long are more likely to be dropped
Summary
Data forensics attempts to capture and analyze data for
use in court proceedings
Techniques involve traditional data recovery along
with live acquisition of volatile data
Relatively new field, with more research needed for
databases, mobile devices, and virtual machines
Analysis techniques will need to evolve as cyber
criminals develop more sophisticated ways to hide
their actions