slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
What is Computer Forensics? PowerPoint Presentation
Download Presentation
What is Computer Forensics?

What is Computer Forensics?

55 Vues Download Presentation
Télécharger la présentation

What is Computer Forensics?

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Network ForensicsAn example of a computer crime – VIRTUAL crime that needs computer forensic expertise. Your company has recently hired a new salesman. Six months after his hire, he leaves your company and forms a competing interest, sending letters to all of your clients. You may think this a bit odd and contact an attorney to consider filing a suit. What has occurred is a virtual theft -- the salesman stole a copy of your client database. Note that this is a VIRTUAL theft -- since you were not deprived of any property (he didn't delete it, just copied it) you will likely not be able to prosecute him criminally.

  2. What is Computer Forensics? • Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis. • Arose as a result of the growing problem of computer crimes. • Computer crimes fall into two categories: • Computer is a tool used in a crime – because of the role of computers and networks in modern communications, it is inevitable that computers are used in crimes. • Investigation into these crimes often involves searching computers suspected to be involved. • Computer itself is a victim of a crime – this commonly referred to as incident response. • It refers to the examination of systems that have been remotely attacked. • Forensics experts follow clear, well-defined mythologies and procedures

  3. Computer forensics started a few years ago- when it was simple to collect evidence from a computer. • While basic forensic methodologies remain the same, technology itself is rapidly changing – a challenge to forensic specialists. • Basic forensic methodology consists of: • Acquire the evidence without altering or damaging the original • Authenticate that your recovered evidence is the same as the originally seized data • Analyze the data without modifying it.

  4. Acquire the Evidence • Keep in mind that every case is different • Do not disconnect the computers – evidence may be only in RAM – So collect information from a live system. • Consider the following issues: • Handling the evidence- if you do not take care of the evidence, the rest of the investigation will be compromised. • Chain of custody – the goal of maintaining a good chain of custody to ensure evidence integrity, prevent tempering with evidence. The chain should be answers to: • Who collected it • How and where • Who took possession of it • how was it stored and protected in storage • Who took it out of storage and why?

  5. Collection • You want the evidence to be so pure that it supports your case. • Identification • Methodically identify every single item that comes out of the suspect’s/victim’s location and labeled. • Transportation • Evidence is not supposed to be moved so when you move it be extremely careful. • Storage • Keep the evidence in a cool, dry, and appropriate place for electronic evidence. • Documenting the investigation • Most difficult for computer professionals because technical people are not good at writing down details of the procedures.

  6. Authenticating evidence • It is difficult because • Crime scenes change • Evidence is routinely damaged by environmental conditions • Computer devices slowly deteriorate • Keep proof of integrity and timestamp the evidence through encryption of files of data • Two algorithms (MD5 and SHA) are in common use today • Analysis • Make two backups • Use any well known analysis tools.

  7. Tracking the Offender • Keep in mind that cyber sleuths often have to track their offenders across a digital matrix • Also that digital forensic techniques and tools are largely undeveloped- so you have little to run on. • Tracing IP addresses • For http addresses in dotted quad ( base 256) use a ping to covert it to digit decimal (base 10) • For MAC address use the ARP tables ( be aware that MAC addresses can be changed by software) and NIC can be changed/removed/replaced. • Beware of DNS – may resolve and query with IP addresses. • After getting some information, try to traceroute • Learn to read an email trail. • NetBIOS – a Windows protocol that used to run exclusively on LANS ( instead of TCP/IP) now running on top of TCP/IP to cover WANs, has a nbstat function that can display protocol statistics for all TCP/IP connctions. • Other tracing tools include: Neotrace and Netscan Pro. These can do a trace route • Use IDS logs

  8. Storage Media • Hard Drives • Make an image copy and then restore the image to a freshly wiped hard drive for analysis • Remount the copy and start to analyze it. • Before opening it get information on its configuration • Use tools to generate a report of lists of the disk’s contents ( PartitionMagic) • View operating system logs.

  9. Encryption and Forensics • Many times the evidence may be encrypted. Find a way to decrypt it while preserving the its integrity. • In addition to encryption codes and compression of data may make the forensic work difficult. • Find a way to overcome data compression and use of code.

  10. Data Hiding • There are several techniques that intruders may hide data. • Obfuscating data through encryption and compression. • Hiding through codes, steganoraphy, name embedding, obscurity and nonames on files • Blinding investigators through changing behavior of system commands and modifying operating systems. • Use commonly known tools to overcome

  11. Hostile Code • Any unauthorized code on your computer. It is becoming increasing significant. • Hostile code fall into two categories: • Manual – like network tools that allow unauthorized access (NetBus, BackOrifice, IRC), fix utilities that seamlessly replace legitimate binary code with a hostile version, log manipulators, vulnerability scanners, DDoS, • Autonomous – viruses(Melissa, time bombs), DDoS, and IRC bots.

  12. Forensic Electronic Toolkit • Computer and network forensics involves and requires: • Identification • Extraction • Preservation • Documentation • A lot of tools are needed for a thorough work • The “forensically sound “ method is never to conduct any examination on the original media. • Before you use any forensic software, make sure you know how to use it, and also that it works. • Tools: • Hard Drive - use partitioning and viewing ( Partinfo and PartitionMagic) • File Viewers – to thumb through stacks of data and images looking for incriminating or relevant evidence (Qiuckview Plus, Conversion Plus, DataViz, ThumnsPlus)

  13. More tools (cont.) • Unerase – if the files are no longer in the recycle bin or you are dealing with old systems without recycle bins. • CD-R/W – examine them as carefully as possible. Use CD-R Diagnostics • Text – because text data can be huge, use fast scans tools like dtSearch. • Other kits: • Forensic toolkit – command-line utilities used to reconstruct access activities in NT File systems • Coroner toolkit - to investigate a hacked Unix host. • ForensiX – an all-purpose set of data collection and analysis tools that run primarily on Linux. • New Technologies Incorporated (NTI) • EnCase • Hardware-

  14. Forensics based on OS Brands • Investigating • Windows computers – pay attention to the Registry. It contains a wealth of information • Unix – take a look at the password files, the shell, the filesystem,

  15. Internet Data Incident Response Guidelines • Restore service safely • Estimate extent and cost of incident • Identify source of attack and their motivation • Deter future crime • Recover loss • Protect public image • Conduct due diligence • Assume corporate responsibility • Increase understanding of security landscape.

  16. Roles and Responsibilities • To facilitate teamwork the organization’s roles must be assigned as fallows: • Corporate security and incident team • Security investigator • Emergency response core team • Application owner • Application developer • System owner/administrator • Network administrator • Firewall administrator • Security consultants