Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. ([email protected]) Computer...

53
Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. ([email protected]) Computer Forensics Consultant Jawz Inc.

Transcript of Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. ([email protected]) Computer...

Page 1: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Computer Forensics,

The Investigators Persepective

Paul T. Mobley Sr. ([email protected]) Computer Forensics Consultant Jawz Inc.

Page 2: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

What is Computer Forensics?

Computer Forensics can be defined simply, as a process of applying scientific and analytical techiniques to computer Operating Systems and File Structures in determining the potential for Legal Evidence.

Page 3: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Overview of Presentation

• Why is Evidence identification and Preservation required?

• Who benefits from Computer Forensics?

• General Types of Forensic Examinations requested.

• Process of Forensics.

• Tools of the trade.

• What is the Examiner looking for?

Page 4: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Why is Evidence important?

• In the legal world, Evidence is EVERYTHING.

• Evidence is used to establish facts.

• The Forensic Examiner is not biased.

Page 5: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Who needs Computer Forensics?

• The Vicitm!

• Law Enforcement

• Insurance Carriers

• Ultimately the Legal System

Page 6: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Who are the Victims?

•Private Business•Government•Private Individuals

Page 7: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 8: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 9: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 10: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

• ID the perpetrator.

• ID the method/vulnerability of the network that allowed the perpetrator to gain access into the system.

• Conduct a damage assessment of the victimized network.

• Preserve the Evidence for Judicial action.

Reasons for a Forensic Analysis

Page 11: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Types of Forensic Requests

• Intrusion Analysis

• Damage Assement

• Suspect Examination

• Tool Analysis

• Log File Analysis

• Evidence Search

Page 12: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Intrusion Analysis

• Who gained entry?

• What did they do?

• When did this happen?

• Where did they go?

• Why the chosen network?

• How did they do this?

Page 13: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Damage Assesment

• What was available for the intruder to see?

• What did he take?

• What did he leave behind?

• Where did he go?

Page 14: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

File Recovery

• Deleted Files

• Hidden Files

• Slack Space

• Bad Blocks

• Steganography

• X-Drives

• NTFS Streams

Page 15: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 16: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 17: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 18: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 19: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 20: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 21: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 22: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 23: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 24: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

NTFS StreamsThe Forensic ToolKit 1.4 from NT OBJECTives, Inc. Copyright(c)1998 NT OBJECTives, Inc. All Rights Reserved

AFind - File access time finder

SFind - Hidden data streams finder

HFind - Hidden file finder

Page 25: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Tool Analysis

• What tools were used?

• How were the executed?

• What language were they written in?

• File Comparison with Suspect’s File.

Page 26: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Log File Analysis

• Events.

• What Events are monitored?

• What do the event records reveal?

• Firewall/Router/Server log files?

• TripWire Database?

• Modem/FTP/Telnet/RAS

Page 27: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Evidence Search

• Image Files• Software applications• Deleted Files• Hidden Files• Encrypted Files• Hidden partitions• Keyword Search• Known Remote Access Tools

Page 28: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Forensics Process

• Preparation

• Protection

• Imaging

• Examination

• Documentation

Page 29: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Preparation• Confirm the authority to conduct analysis/search of

media.

• Verify the purpose of the analysis and the clearly defined desired results.

• Ensure that sterile media is available and utilized for imaging. (ie..Free of virus, Non-essential files, and verified before use.)

• Ensure that all software tools utilized for the analysis are tested and widely accepted for use in the forensics community.

Page 30: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Legal OverviewEmployer Searches in Private-Sector Workplaces

         Warrantless workplace searches by private employers rarely violate the Fourth Amendment.  So long as the employer is not acting as an instrument or agent of the Government at the time of the search, the search is a private search and the Fourth Amendment does not apply.  See Skinner v. Railway Labor Executives’ Ass’n, 489 U.S. 602, 614 (1989).  

•Consult with your Legal Counsel

Page 31: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Protection

• Protect the integrity of the evidence. Maintain control until final disposition.

• Prior to Booting target computer, DISCONNECT HDD and verify CMOS.

• When Booting a machine for Analysis, utilize HD Lock software.

Page 32: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

•Typical CBD Files

Page 33: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Imaging

• Utilize disk “imaging” software to make an exact image of the target media. Verify the image.

• When conducting an analysis of target media, utilize the restored image of the target media; never utilize the actual target media.

Page 34: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

•Imaging Software

Page 35: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 36: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Examination

• The Operating System

• Services

• Applications/processes

• Hardware

• LOGFILES!

• System, Security, and Application

• File System

Page 37: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Examination Continued

• Deleted/Hidden Files/NTFS Streams

• Software

• Encryption Software

• Published Shares/Permissions

• Password Files

• SIDS

• Network Architecture/Trusted Relationships

Page 38: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Off-Site Storage

• “X-Drives”

• FTP Links

• FTP Logs

• Shares on internal networks

Page 39: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Security Identifers

•SIDS can be used to ID the perpetrator.•Security is used within Win2K to ID a user.•Security is applied to the SID.

Page 40: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Where to find the SID

Page 41: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 42: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

SID Structure

• Domain Identifier: All values in the series, excluding the last value ID the Domain.

• Relative Identifier (RID) is the last value. This ID’S the Account or Group

• S-1-5-21-838281932-1837309565-1144153901-1000

Page 43: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Documentation

• Document EVERYTHING

• Reason for Examination

• “The Scene”

• Utilize Screen Capture/Copy Suspected files

• All apps for Analysis/apps on Examined system.

Page 44: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Users

Page 45: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 46: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 47: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 48: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 49: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 50: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 51: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 52: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.
Page 53: Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. (pmobley@jawzinc.com) Computer Forensics Consultant Jawz Inc.

Closing

• Forensic Techniques are based on the File System of the media to be examined

• Utilizing an NTFS partition enhances security. If further increases the Forensic examiners chances of recovering useful evidence.

• The Investigator is looking for evidence to establish a FACT(s).