Computer Forensics Tool Testing at NIST

38
04/16/10 1 Computer Forensics Tool Computer Forensics Tool Testing at NIST Testing at NIST Jim Lyle Information Technology Laboratory Phone: (301) 975-3207 E-mail: [email protected] WWW: http://www.cftt.nist.gov

Transcript of Computer Forensics Tool Testing at NIST

Page 1: Computer Forensics Tool Testing at NIST

04/16/10 1

Computer Forensics Tool Computer Forensics Tool Testing at NISTTesting at NIST

Jim Lyle

Information Technology Laboratory

Phone: (301) 975-3207

E-mail: [email protected]

WWW: http://www.cftt.nist.gov

Page 2: Computer Forensics Tool Testing at NIST

04/16/10 2

Computers &The InternetComputers &The Internet

Marvelous tools Improve quality of life Enable global communication Improve productivity Makes many activities easer, faster, … … even criminal activity

Page 3: Computer Forensics Tool Testing at NIST

04/16/10 3

A Shocking Revelation . . .A Shocking Revelation . . .

Computers can be involved in crime … As a victim As a weapon As a witness As a record As contraband

Page 4: Computer Forensics Tool Testing at NIST

04/16/10 4

Outline of an InvestigationOutline of an Investigation

Get proper authorization Seize evidence (Hard drives, floppies …) Create duplicates for analysis Analyze the duplicates

– Exclude known benign files– Examine obvious files– Search for hidden evidence

Report results

Page 5: Computer Forensics Tool Testing at NIST

04/16/10 5

Investigators Need …Investigators Need …

Computer forensic investigators need tools that …

Work as they should Produce results admissible in court

Page 6: Computer Forensics Tool Testing at NIST

04/16/10 6

Admissible ResultsAdmissible Results

Software tools must meet Daubert criteria– Tested: accurate, reliable & repeatable– Peer reviewed– Generally accepted methodology

Page 7: Computer Forensics Tool Testing at NIST

04/16/10 7

Response to ProblemResponse to Problem

Independent testing of forensic tools Public review of results Apply black box testing theory to tools

Page 8: Computer Forensics Tool Testing at NIST

04/16/10 8

Goals of CF at NISTGoals of CF at NIST

Establish methodology for testing computer forensic tools (CFTT)

Provide international standard reference data that tool makers and investigators can use in an investigations (NSRL)

Page 9: Computer Forensics Tool Testing at NIST

04/16/10 9

Why NIST/ITL is involved

• Mission: Assist federal, state & local agencies

• NIST is a neutral organization – not law enforcement or vendor

• NIST provides an open, rigorous process

Page 10: Computer Forensics Tool Testing at NIST

04/16/10 10

Project SponsorsProject Sponsors

NIST/OLES (Program management) NIJ (Major funding) FBI (Additional funding) DOD (Equipment and support) Homeland Security (Technical input) State & Local agencies (Technical input)

Page 11: Computer Forensics Tool Testing at NIST

04/16/10 11

Project TasksProject Tasks

Identify forensics functions e.g., – Disk imaging, – Hard drive write protect, – Deleted file recovery– String searching

Develop specification for each function Peer review of specification Test methodology for each function Test Tools (by function) & Report results

Page 12: Computer Forensics Tool Testing at NIST

04/16/10 12

Current ActivitiesCurrent Activities

Hard drive imaging tools Software hard drive write protect Hardware hard drive write protect Deleted file recovery String Searching

Page 13: Computer Forensics Tool Testing at NIST

04/16/10 13

ChallengesChallenges

No standards or specifications for tools Arcane knowledge domain (e.g. DOS,

Windows drivers) Reliably faulty hardware Many versions of each tool

Page 14: Computer Forensics Tool Testing at NIST

04/16/10 14

Overview of MethodologyOverview of Methodology

CFTT directed by Steering Committee Functionality driven Specifications developed for specific

categories of activities, e.g., disk imaging, hard drive write protect, etc.

Test methodology developed for each category

Page 15: Computer Forensics Tool Testing at NIST

04/16/10 15

Developing a SpecificationDeveloping a Specification

After tool function selected by SC … Focus group (law enforcement + NIST)

develop tool function specification Spec posted to web for public comment Comments incorporated Develop test environment

Page 16: Computer Forensics Tool Testing at NIST

04/16/10 16

Tool Test ProcessTool Test Process

After SC selects a tool … Acquire tool & review documentation Select test cases Execute test cases Produce test report

Page 17: Computer Forensics Tool Testing at NIST

04/16/10 17

Disk Imaging Test ParametersDisk Imaging Test Parameters

ValueParameter

Yes, noRemote access

Disk, FAT12/16/32, NT, Ext2Object type

None, Src Rd, Dst Wt, Img R/W/CErrors

Src=Dst, Src<Dst, Src>DstRelative size

Dst interface

BIOS to IDE, BIOS to SCSI, ATA, ASPI, Legacy BIOS

Source interface

Copy, Image, Verify Functions

Page 18: Computer Forensics Tool Testing at NIST

04/16/10 18

Capabilities to test disk Capabilities to test disk imagingimaging

Accuracy of copy– Compare disks– Initialize disk sectors to unique content

Verify source disk unchanged Corrupt an image file Error handling: reliably faulty disk

Page 19: Computer Forensics Tool Testing at NIST

04/16/10 19

Test Case Structure: SetupTest Case Structure: Setup

1. Record details of source disk setup.2. Initialize the source disk to a known value.3. Hash the source disk and save hash value.4. Record details of test case setup.5. Initialize a destination disk.6. If the test requires a partition, create and format

a partition on the destination disk.7. If the test uses an image file, partition and

format a disk for the image file.

Page 20: Computer Forensics Tool Testing at NIST

04/16/10 20

Test Case Structure: Run ToolTest Case Structure: Run Tool

1. If required, setup I/O error

2. If required, create image file

3. If required, corrupt image file

4. Create destination

Page 21: Computer Forensics Tool Testing at NIST

04/16/10 21

Test Case Structure: MeasureTest Case Structure: Measure

1. Compare Source to Destination

2. Rehash the Source

Page 22: Computer Forensics Tool Testing at NIST

04/16/10 22

Test LoggingTest Logging

Log everything, automatically if practical Hardware, Software, Versions Time/date Operator

Page 23: Computer Forensics Tool Testing at NIST

04/16/10 23

Legacy BIOS QuirksLegacy BIOS Quirks

Some may under report drive size Example, Quantum SIROCCO1700A has

3335472 sectors 3309/16/63 spc 1008 BIOS: 3,330,432 sectors with geometry

826/64/63 spc 4032 BIOS under reports by 1.25 logical cyls and

5 physicals

Page 24: Computer Forensics Tool Testing at NIST

04/16/10 24

Evaluating Test ResultsEvaluating Test Results

If a test exhibits an anomaly …

2. Look for hardware or procedural problem

3. Anomaly seen before

4. If unique, look at more cases

5. Examine similar anomalies

Page 25: Computer Forensics Tool Testing at NIST

04/16/10 25

Refining the Test ProcedureRefining the Test Procedure

During dd testing some results seemed to indicate that the Linux environment was making a change to the source disk.

After investigation we found that the problem was actually the test procedure.

Page 26: Computer Forensics Tool Testing at NIST

04/16/10 26

Hard Drive Write ProtectHard Drive Write Protect

Can be done either in hardware or software Software write protection limited to specific

environment: BIOS access or device driver Hardware write protection more general

Page 27: Computer Forensics Tool Testing at NIST

04/16/10 27

Hard Drive BIOS AccessHard Drive BIOS Access

Application program

issue int 0x13 cmd

BIOS interrupt 0x13

issue cmd to drive

Disk drive & controller

return

Page 28: Computer Forensics Tool Testing at NIST

04/16/10 28

SWB Tool OperationSWB Tool Operation

BIOS interrupt 0x13

Application program

issue int 0x13 cmd

issue cmd to drive

SWB tool

return

allow

block

Disk drive & controller

return

Page 29: Computer Forensics Tool Testing at NIST

04/16/10 29

Test Harness OperationTest Harness Operation

BIOS interrupt 0x13

interrupt 13 monitor

tally

allow

block

SWB tool

return

Test harness

issue int 0x13 cmd query result

query

issue cmd to drive

allow

block

Disk drive & controller

return

Page 30: Computer Forensics Tool Testing at NIST

04/16/10 30

CPU

Device

Send I/O CMD to Device

Return result to CPU

BUS1 BUS 2

PROTOCOL ANALYZER

Monitor Bus Traffic

BUS

HWB TestingHWB Testing

HWB

Page 31: Computer Forensics Tool Testing at NIST

04/16/10 31

ImpactImpact

Release 18 (Feb 2001) - A US government organization was doing some testing and uncovered an issue under a specific set of circumstances.

Linux doesn’t use the last sector if odd Several vendors have made product or

documentation changes CFTT cited in some high profile court cases

Page 32: Computer Forensics Tool Testing at NIST

04/16/10 32

Available SpecificationsAvailable Specifications

Hard Drive Imaging (e.g., Safeback, EnCase, Ilook, Mares imaging tool)

Write Block Software Tools (e.g., RCMP HDL, Pdblock, ACES)

Write Block Hardware Devices (A-Card, FastBlock, NoWrite) – not final

Page 33: Computer Forensics Tool Testing at NIST

04/16/10 33

Specifications Under Specifications Under DevelopmentDevelopment

String Searching Deleted File Recovery Revised Disk Imaging

Page 34: Computer Forensics Tool Testing at NIST

04/16/10 34

Available Test ReportsAvailable Test Reports

Sydex SafeBack 2.0 NTI Safeback 2.18 EnCase 3.20 GNU dd 4.0.36 (RedHat 7.1) FreeBSD 4.4 dd RCMP HDL V0.8

Page 35: Computer Forensics Tool Testing at NIST

04/16/10 35

Test Reports in ProductionTest Reports in Production

RCMP HDL V0.4 RCMP HDL V0.5 RCMP HDL V0.7

Page 36: Computer Forensics Tool Testing at NIST

04/16/10 36

Available Testing SoftwareAvailable Testing Software

FS-TST – tools to test disk imaging: drive wipe, drive compare, drive hash (SHA1), partition compare. (DCCI uses these tools)

SWBT – tools to test interrupt 13 software write blockers

Page 37: Computer Forensics Tool Testing at NIST

04/16/10 37

Benefits of CFTTBenefits of CFTT

Benefits of a forensic tool testing program– Users can make informed choices– Neutral test program (not law enforcement)– Reduce challenges to admissibility of digital

evidence– Tool creators make better tools

Page 38: Computer Forensics Tool Testing at NIST

04/16/10 38

ContactsContactsJim Lyle Doug White

www.cftt.nist.gov www.nsrl.nist.gov

[email protected] [email protected]

Mark Skall

Chief, Software Diagnostics & Conformance Testing Div.

www.itl.nist.gov/div897 [email protected]

Sue Ballou, Office of Law Enforcement Standards

Steering Committee Rep. For State/Local Law Enforcement

[email protected]