Computer Forensics BACS 371

Download Report

Transcript Computer Forensics BACS 371

Computer Forensics
BACS 371
Evidentiary Methods II:
Evidence Acquisition
OK, What do we do first?
2
Basic Forensic Methodology



3
Acquire the evidence (legally)
Authenticate that it is the same as the original
Analyze the data without modifying it
Photographing Systems
Before you do anything, begin documentation by
photographing all aspects of the system…
 Monitor
 Desk and surrounding area
 All 4 sides of PC
 Labeled cables still connected
4
Evidence Acquisition

Disassemble the Case of the Computer


Identify storage devices that need to be acquired
(internal/external/both)
Document internal storage devices and hardware configuration




1
Process
Drive condition (make, model, geometry, size, jumper settings, location, drive
interface, …)
Internal components (sound card, video card, network card – including MAC
address, PCMCIA cards, …
Disconnect storage devices (power, data, or both)
Controlled boots



Capture CMOS/BIOS info (boot sequence, time/date, passwords)
Controlled boot from forensic CD to test functionality (RAM, writeprotected storage, …)
Controlled boot to capture drive config (LBA, CHS, …)
5
1Forensic
Examination of Digital Evidence: A guide for Law Enforcment, USDOJ/NIJ, Chapter 3. Evidence Acquistion,
http://www.ncjrs.gov/pdffiles1/nij/199408.pdf
Role of the First Responder

Scene of the Cybercrime1
Do No Harm!
 Identify the Crime Scene
 Protect the Crime Scene
 Preserve Temporary and Fragile Evidence


A guide for First Responders2
Secure and Evaluate the Scene
 Document the Scene
 Collect Evidence
 Packaging, Transportation, and Storage of Evidence
 Forensic Examination

6
1Scene
of the Cybercrime, Shinder & Tittel, p.553
Crime Scene Investigation: A Guide for First Responders, US Dept of Justice, NIJ Guide, July 2001
2Electronic
Role of



1
Investigators
Establish Chain of Command
Conduct Crime Scene Search
Maintain Integrity of Evidence
7
1Scene
of the Cybercrime, Shinder & Tittel, p.554
Role of Crime Scene Technician1





Preserve volatile evidence and duplicate disks
Shut down systems for transport
Tag and log evidence
Transport evidence
Process evidence
8
1Scene
of the Cybercrime, Shinder & Tittel, p.555
Computer Seizure
1
Checklist
 Photograph the monitor
 Preserve Volatile Data
 Shutdown Systems
 Photograph the System Setup
PC – all sides
 Label all connections

 Unplug system and peripherals – mark & tag
 Bag and tag all components
 Bitstream Copy of Disk(s) - (offsite usually)
 Verify integrity of copies - (offsite usually)
9
1Scene
of the Cybercrime, Shinder & Tittel, p.557
Handling, Transportation, Storage





10
Static Electricity
External RF signals
Heat
Humidity
Sunlight
Evidence Logs






11
Lists all evidence collected
Description of each piece of evidence with serial
numbers & other ID information
Identifies who collected the evidence and why
Date and Time of collection
Disposition of Evidence
All transfers of custody
Computer Evidence Worksheet
12
Evidence Tag
• Place or person from whom item was received
• If item requires consent for search
• Description of items taken
• Information contained on storage device
• Data and time item was taken
13
• Full name and signature of individual initially
receiving evidence
• Case and tag number
Evidence Label


14

Case Number and Evidence Tag Number
Date and Time the evidence was collected
Brief Description of items in envelope
Evidence Analysis Logs

How each step is performed
Who was present
 What was done
 Result of procedure
 Time/date


Document all potential evidence
Filename
 Where on disk data are located
 Date and time stamps
 Network information (MAC address, IP address)
 Other file properties (metadata)

15
Evidence Log
Case Number: 123412
Tag #
Date
Action
Taken Location
By
1
13 Jan 01
Initial Submission
Matt Pepe
Maxtor 600GB
(593843420)
1
15 Mar 01
Moved evidence to tape
Matt Pepe
4mm tape
#01101
1
15 Mar 01
Examined Evidence using
EnCase
Matt Pepe
FRED #7
• Evidence Tag Number
• Date
• Action Taken
• Person performing action
• Identifying information
16
Preserve Volatile

1
Data
Order of Volatility2
Registers and Cache
 Routing Table, ARP Cache, Process Table, Kernel Statistics
 Contents of System Memory (RAM)
 Remote Logging and Monitoring Data
 Physical Configuration, Network Topology
 Temporary File Systems
 Data on Disk
 Archival Media

17
1Scene
of the Cybercrime, Shinder & Tittel, p.559
2Guidelines for Evidence Collection and Archiving, IEEE, February 2002
Collecting Volatile Data
Tool
Purpose
netstat
View current network connections
nbstat
View current network connections
arp
View addresses in ARP (Address Resolution
Protocol) cache
plist
List running processes (or view in Task Manager)
ipconfig Gather information about the state of the network
18
netstat – current network connections
19
nbstat – NetBIOS name resolution
arp – addresses in ARP cache
21
ipconfig – state of network
22
Foundstone Tools
Pasco
An Internet Explorer activity forensic analysis tool
Galleta
An Internet Explorer Cookie forensic analysis tool
Rifiuti
A Recycle Bin Forensic Analysis Tool
Vision
Reports all open TCP and UDP ports
NTLast
Security Audit Tool for WinNT
Forensic
Toolkit
Tools to examine NTFS disk partition for unauthorized
activity
ShoWin
Show information about Widows – reveal passwords
BinText
Finds ASCII, Unicode, and Resource strings in a file
23
Things to



1
Avoid
Don’t Shutdown until volatile evidence has been
collected
Don’t trust the programs on the system – use your
own secure programs
Don’t run programs which modify access times of
files
24
1Guidelines
for Evidence Collection and Archiving, IEEE, February 2002
Acquire the Evidence
To shutdown, or to not shutdown, that is the question!


Do so Without damaging or altering the original
Should you let the machine run, or pull the plug??

Run
• Retains maximum forensic evidence

Pull Plug
• Removes a compromised computer from potentially affecting the whole
network
• How to pull the plug
From the back of the PC
 When the hard drive is not spinning

• Sound
• Drive Light
• Vibration
25
Making Backups




26
File Backup vs. Bitstream Copy
Use Forensically Sterile media
Make 2 backup copies (one to work with and one to
store)
Don’t access the original again!
Level of Effort to Protect Evidence…
If the evidence is going to be used in court
VS.
If the evidence is going to be used for internal
investigation


27
Evidence method should be the same for both
situation in case it ever goes to court
The more documentation the better
Forensic Analysis CYA

Virus Check
Forensic computer
 Media being processed


Collect System Information


CHKDISK/SCANDISK



28
Complete computer hardware inventory
Look for “orphan clusters”
Check for hidden partitions
Document everything!
MD5 Hashing


Wikipedia Entry
Cryptographic Hash Function
A
hash function must be able to process an arbitrarylength message into a fixed-length output




29
Hash Function
Hash Collision
Check Digit
Cyclic Redundancy Check (CRC)
Integrity of Evidence+
Method
Description
Common Types
Checksum
Method for checking for
errors in digital data.
Uses 16- or 32-bit
polynomial to compute
16 or 32 bit integer
result.
CRC-16
CRC-32
One-Way
Hash
Method for protecting
data against
unauthorized change.
Produces fixed length
large integer (80~240
bits) representing digital
data. Implements oneway function.
SHA-1
MD5
MD4
MD2
Digital
Signature
Secure method for
binding identity of signer
with digital data integrity
methods such as oneway hash values. Uses
public key crypto
system.
RSA
DSA
PGP
Advantages








Easy to compute
Fast
Small data
storage
Useful for
detecting
random errors
Easy to compute
Can detect both
random errors
and malicious
alterations
Binds identity to
integrity
operation
Prevents
unauthorized
regeneration of
signature
Disadvantages
Low assurance
against malicious
attack
 Simple to create
data with
matching
checksum

Must maintain
secure storage of
hash values
 Does not bind
identity with
data
 Does not bind
time with data

Slow
 Must protect
private key
 Does not bind
time with data

+Proving the Integrity of Digital Evidence with Time,” International Journal of Digital Evidence, Spring 2002, V1.1,
www.ijde.org (Oct 25, 2005)
31
Hashing
1
Algorithms
Algorithm
Description
MD2
Developed by Ronald L. Rivest in 1989, this
algorithm was optimized for 8-bit machines.
MD4
Developed by Rivest in 1990. Using a PC, collisions
can now be found in this version in less than one
minute.
MD5
Developed by Rivest in 1991. It was estimated in
1994 that it would cost $10 million to create a
computer that could find collisions using brute force.
SHA
SHA-1 was a federal standard used by the
government and private sector for handling sensitive
information and was the most widely used hashing
function.
HAVAL
A variation of the MD5 hashing algorithm that
processes blocks twice the size of MD5.
1Hands-on
Ethical Hacking and Network Defense, Simpson, 2006, p. 305
32
MD5 Hash
“[The MD5 algorithm] takes as input a message of arbitrary
length and produces as output a 128-bit ‘fingerprint’ or ‘message
digest’ of the input. It is conjectured that it is computationally
infeasible to produce two messages having the same message
digest, or to produce any message having a given prespecified
target message digest. The MD5 algorithm is intended for digital
signature applications, where a large file must be ‘compressed’ in
a secure manner before being encrypted with a private (secret)
key under a public-key cryptosystem such as RSA.”1
33
1http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html
MD5 Hash



128-bit number representing a “fingerprint” of a file
Odds of two different files having the same MD5
Hash are 1 in 2128
MD5 issues???

Collisions – Two different files generating the same hash
http://marc-stevens.nl/research/md5-1block-collision/md5-1block-collision.pdf

SHA Collisions
http://people.csail.mit.edu/yiqun/SHA1AttackProceedingVersion.pdf
34
Hash Try It…

http://www.sha1-online.com/

http://www.digital-detective.co.uk/freetools/md5.asp

http://www.miraclesalad.com/webtools/md5.php
Hash Converter:
http://hash.online-convert.com/sha1-generator
35
Admissibility of Evidence
The whole point of all of this is to make sure that the
evidence is admissible. Which means it is…
 Relevant
 Substantiates
an issue that is in question in the
case
 Competent
 Reliable
and credible
 Obtained
36
legally
5 Mistakes of Computer Evidence
Turn on the Computer (don’t do it!)
Get Help from the Computer Owner
Don’t Check for Computer Viruses
Don't Take Any Precautions In The Transport
of Computer Evidence
Run Windows To View Graphic Files and To
Examine Files
1.
2.
3.
4.
5.
37
1
Electronic Fingerprints: Computer Evidence Comes Of Age by Michael R. Anderson