Chapter 14 - HCC Learning Web

Download Report

Transcript Chapter 14 - HCC Learning Web

Forensic and Investigative Accounting
Chapter 14
Digital Forensics Analysis
© 2011 CCH. All Rights Reserved.
4025 W. Peterson Ave.
Chicago, IL 60646-6085
1 800 248 3248
www.CCHGroup.com
Hacker Defined
A hacker is generally defined as an individual
or group whose intent is to gain access to a
computer network for malicious purposes.
Chapter 14
Forensic and Investigative Accounting
2
Collecting Clues and Evidence
A forensic investigator needs to be familiar
with the protocols used on the Internet to be
able to collect clues about either internal or
external attackers.
In addition, when law enforcement officials
send requests or subpoenas for information
about a company’s logs, the forensic analyst
must understand the type of information being
sought.
Chapter 14
Forensic and Investigative Accounting
3
Protocols
Internet protocols are those rules allowing
different operating systems and machines to
communicate with one another over the
Internet.
Chapter 14
Forensic and Investigative Accounting
4
Transmission Control Protocol (TCP)
and Internet Protocol (IP)


TCP/IP protocols are the communication guidelines
used and widely supported over the Internet.
Almost every packet of information sent over the
Internet uses the datagrams contained within a
TCP/IP envelope. The datagrams consist of layers
of information needed to verify the packet and get
the information from the sender’s to the receiver’s
location following traffic control guidelines.
Chapter 14
Forensic and Investigative Accounting
5
Transmission Control Protocol (TCP)
and Internet Protocol (IP)
Message encapsulation is used in sending the
packets. In message encapsulation, each layer
of information in the sent packet is interpreted
by the same layer at the receiving end of the
transmission. Additionally, each layer can only
communicate with the one directly above or
below it.
Chapter 14
Forensic and Investigative Accounting
6
Transmission Control Protocol (TCP)
and Internet Protocol (IP)
Layered Operating System Interconnection (OSI) Model
Application Layer
Transportation Layer
Network Layer
Data Link Layer
Hardware Layer
Electronic Impulse
Chapter 14
Forensic and Investigative Accounting
7
Transmission Control Protocol (TCP)
and Internet Protocol (IP)
The application layer issues the commands
that define the operations.
 The transportation layer functions to
provide reliable message delivery.
 The network layer controls the route the
data takes to get to its destination.

(continued on next slide)
Chapter 14
Forensic and Investigative Accounting
8
Transmission Control Protocol
(TCP) and Internet Protocol (IP)
The data link layer transfers the datagram
from one network node to another.
 The hardware layer (or physical layer)
provides the means of sending and
receiving data on a network by converting
bits into voltages for transmission to a coax
cable.

Chapter 14
Forensic and Investigative Accounting
9
IP Address Defined
An IP address is a 32-bit number (four bytes)
that identifies the sender and recipient who is
sending or receiving a packet of information
over the Internet.
Chapter 14
Forensic and Investigative Accounting
10
New Version of IP Addresses
IPv4 is being replaced with IPv6.
 The reason for the change is that the 32
bit version has run out of IP addresses.
 IPv6 uses 64-bits.
 IPv6 provides for approximately
340,282,366,920,938,000,000,000,000,
000,000,000,000 unique IP addresses.

Chapter 14
Forensic and Investigative Accounting
11
Web Log Entries
One important method for finding the
web trail of an attacker is in examining
web logs.
 Recorded network logs provide
information needed to trace all website
usage.

Chapter 14
Forensic and Investigative Accounting
12
Web Log Entries
Information provided in a log includes the
visitor’s IP address, geographical location,
the actions the visitor performs on the site,
browser type, time on page, and the site the
visitor used before arriving.
 Logs should be stored on a separate
computer from the web server hosting the
site so they cannot be easily altered.

Chapter 14
Forensic and Investigative Accounting
13
TCPDUMP
TCPDUMP is a form of network sniffer that
can disclose most of the information
contained in a TCP/IP packet.
 A sniffer is a program used to secretly
capture datagrams moving across a network
and disclose the information contained in
the datagram’s network protocols.

Chapter 14
Forensic and Investigative Accounting
14
Decoding Simple Mail Transfer
Protocol (SMTP)
SMTP is the protocol used to send e-mail
over the Internet.
 SMTP server logs can be used to check the
path of the e-mail from the sending host to
the receiving host.

Chapter 14
Forensic and Investigative Accounting
15
Decoding Simple Mail Transfer
Protocol (SMTP)
Most of the important information about the
origin of an e-mail message is in the long
form of the header. The most important data
for tracing purposes is the IP addresses and
the message ID.
Chapter 14
Forensic and Investigative Accounting
16
Tracing and Decoding IP Addresses
Traceroute
 Whois
 Ping
 Finger searches

Chapter 14
Forensic and Investigative Accounting
17
Narrowing the Search
Preliminary Incident Response Form
 John Doe subpoena

Chapter 14
Forensic and Investigative Accounting
18
Forensic Audit

The forensic audit is an audit performed to
determine whether fraud is being committed
in the executive boardroom. The
monitoring methods used in a forensic audit
are investigative, directed at top-level
executives, and do not rely on a traditional
accounting audit practices.
Chapter 14
Forensic and Investigative Accounting
19
Due Diligence Searches




Internet databases
– General searches
– Name, telephone number, and e-mail address search
engines
– Internet relay chat (IRC), FTP, and Listserv searches
– Usenet postings search
– Legal records
– Instant messaging (IM)
Web page searches
Government data searches
Miscellaneous searches
Chapter 14
Forensic and Investigative Accounting
20