Darren Quick [email protected] Supervisor: Dr Kim-Kwang Raymond Choo.

30
Forensic Analysis of Cloud Storage Client Data Darren Quick [email protected] Supervisor: Dr Kim-Kwang Raymond Choo 0 1 0 1 1

Transcript of Darren Quick [email protected] Supervisor: Dr Kim-Kwang Raymond Choo.

Page 1: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Forensic Analysis of Cloud StorageClient Data

Darren [email protected]

Supervisor: Dr Kim-Kwang Raymond Choo

0 1 0 1 1

Page 2: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

1 - Introduction 2 - Literature Review 3 - Research Method 4 – Digital Forensic Analysis Cycle 5 - Dropbox 6 - Skydrive 7 - Google Drive 8 - Preservation 9 - Summary

Outline

Page 3: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Cloud computing Cloud storage Gartner Report (Kleynhans 2012) Personal cloud will replace PC’s as the

main storage by 2014 Dropbox, Microsoft SkyDrive, and

Google Drive PC; client software or browser Portable devices; browser or apps

Introduction

Page 4: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Criminals and victims data of interest Virtualised, geographically disbursed and

transient Technical and legal issues for

investigators;◦ Identification of data; i.e. service provider◦ Username, ◦ Data in the account◦ Difficult to prove ownership◦ Data may be moved or erased before it can be

preserved

Introduction

Page 5: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Objective 1: To examine current research published in literature relating to cloud storage and identified cloud storage analysis methodologies.

Objective 2: To develop a digital forensic analysis framework that will assist practitioners, examiners, and researchers follow a standard process when undertaking forensic analysis of cloud storage services.

Objective 3: To conduct research using popular cloud storage services; Dropbox, Microsoft SkyDrive, and Google Drive, and determine whether there are any data remnants which assist digital forensic analysis and investigations.

Objective 4: To examine the forensic implications of accessing and downloading cloud stored data from popular cloud storage services; Dropbox, Microsoft SkyDrive, and

Google Drive.

Research Objectives

Page 6: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

NIST (2011) definition of cloud computing IaaS – Infrastructure as a Service – user

control PaaS – Platform as a Service – OS provided SaaS – Software as a Service – User has

limited control Criminal use Security of cloud services is well

addressed Mobile devices

Literature Review

Page 7: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Digital forensic analysis process Common procedures for investigation McClain (2011) Dropbox analysis Chung et al. (2012) Dropbox, Google Docs,

Amazon S3 and Evernote Zhu (2011) examines Skype, Viber, Mail,

Dropbox Reese (2010) examines Amazon EBS Clark (2011) examines Exif metadata in

pictures

Literature Review

Page 8: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Objectives not answered in literature Need to conduct primary research

Q1 What data remnants result from the use of cloud storage to identify its use?

H0 - There are no data remnants from cloud storage use

H1 – There are remnants from cloud storage use

Research Method

Page 9: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

a) What data remains on a Windows 7 computer hard drive after cloud storage client software is installed and used to upload and store data with each hosting provider.

b) What data remains on a Windows 7 computer hard drive after cloud storage services are accessed via a web browser with each hosting provider?

c) What data is observed in network traffic when client software or browser access is undertaken?

d) What data remains in memory when client software or browser access is undertaken?

e) What data remains on an Apple iPhone 3G after cloud storage services are accessed via a web browser with each hosting provider?

f) What data remains on an Apple iPhone 3G after cloud storage services are accessed via an installed application from each hosting provider?

Research Question 1

Page 10: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Q2 What forensically sound methods are available to preserve data stored in a cloud storage account?◦ H0 the process of downloading files from cloud storage

does not alter the internal data or the associated file metadata.

◦ H1 the process of downloading files from cloud storage alters the internal file data and the associated file metadata.

◦ H2 the process of downloading files from cloud storage does not alter the internal data, but does alter the file metadata.

◦ H3 the process of downloading files from cloud storage alters the internal data, but not the associated file metadata.

Research Question 2

Page 11: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Research Question 2a Q2a) What data can be acquired and preserved

from a cloud storage account using existing forensic tools, methodologies, and procedures when applied to cloud storage investigations?

Page 12: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Research Method

Controlinstallation

Dropbox

MicrosoftSkyDrive

GoogleDrive

Windowsclient

software

InternetExplorer

MozillaFirefox

GoogleChrome

MemoryVMEM

Hard driveVMDK

NetworkPCAP

AppleSafari

AppleiPhone

XRY

Research experiment undertaken using Virtual PC’s to create various circumstances of accessing cloud storage services.

VM’s forensically preserved and analysed for data remnants

Page 13: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Prepare Virtual PC’s with Windows 7 Base (control) clean installation Install Browser (Internet Explorer, Mozilla

Firefox, Google Chrome, Apple Safari) Install Client Software and upload test files Use browser to access account and view files Use browser to access and download files Use Eraser to erase files Use CCleaner to remove browsing history Use DBAN to erase virtual hard drive

Experiment Process

Page 14: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Commence (Scope) Prepare and Respond Identify and Collect Preserve (Forensic Copy) Analyse Present Feedback Complete

Digital Forensic Analysis Cycle

Page 15: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Using the Framework to guide the process Analysis of the VM images In the Control VM’s; ‘Dropbox’ references Client Software 1.2.52; encrypted, sample files System Tray link to ‘launch Dropbox website’ Browser remnants OS remnants; Prefetch information, Link Files, $MFT,

Registry, Thumbcache, Event logs Network traffic; IP’s, URL client/web RAM; password in cleartext Eraser/CCleaner; left remnants DBAN; all erased

Dropbox

Page 16: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

iPhone 3G iOS 4.2.1 (using the framework)◦ Base (control); nil located◦ Browser; filenames in History.plist + URL◦ Dropbox App; username in keychain.plist

Case study (used to illustrate findings)◦ ‘Botnet’ hypothetical example describing finding

information on PC and iPhone re Dropbox use

Dropbox

Page 17: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Conclusion;◦ dbx files are now encrypted, earlier versions;

Filecache.db and config.db◦ Password in cleartext in memory◦ Process of booting a forensic image in a virtual PC

will synchronise and provide access to the account without requiring a username or password

Current Police investigation; located illicit data being stored in a Dropbox account (real world application of the research)

Dropbox

Page 18: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Using the Framework to guide the process Analysis of the VM images In the Control VM’s; ‘skydrive’ references Client Software; SyncDiagnostics.log,

OwnerID.dat OS remnants; Prefetch information, Link Files,

$MFT, Registry, Thumbcache, Event logs Network traffic; IP’s, filenames RAM; password in cleartext Eraser/CCleaner; left remnants DBAN; all erased

Microsoft SkyDrive

Page 19: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

iPhone 3G iOS 4.2.1 (using the framework)◦ Base (control); nil located◦ Browser; OwnerID in URL, filenames in

History.plist◦ SkyDrive App; username in keychain.plist

Case study (used to illustrate findings)◦ ‘IP Theft’ hypothetical example describing finding

information on PC and iPhone re SkyDrive use

Microsoft SkyDrive

Page 20: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Conclusion;◦SyncDiagnostics.log and OwnerID.dat files◦ Password in cleartext in memory◦ Process of booting a forensic image in a virtual

PC may synchronise the files in an account. Access to the account requires a password.

Microsoft SkyDrive

Page 21: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Using the Framework to guide the process Analysis of the VM images In the Control VM’s; ‘drive google’ references Client Software; Sync_config.db and snapshot.db Password in cleartext stored on Hard Drive System Tray link to ‘visit Google Drive on the

web’ OS remnants; Prefetch information, Link Files, $MFT,

Registry, Thumbcache, Event logs Network traffic; IP’s, username Eraser/CCleaner; left remnants DBAN; all erased

Google Drive

Page 22: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

iPhone 3G iOS 4.2.1 (using the framework)◦ Base (control); nil located◦ Browser; username in cookies, filenames in

History.plist◦ Google Drive App; unable to install, need iOS 5

Case study (used to illustrate findings)◦ ‘Steroid importation’ hypothetical example

describing finding information on PC andiPhone re Google Drive use

Google Drive

Page 23: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Conclusion;◦sync_config.db and snapshot.db files files◦Password in cleartext in RAM and on Hard

Drive◦ System Tray link to ‘visit Google Drive on the

web’ ◦ Process of booting a forensic image in a virtual

PC will give full access to an account without requiring a username or password

Google Drive

Page 24: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

No documented process to collect data once identified

Some jurisdictions have legal power to secure data accessible at the time of serving a warrant, such as 3LA Crimes Act 1914

Tested in VM with Dropbox, Microsoft SkyDrive, and Google Drive

Access via Browser and Client Software No change to files (Hash values same

after downloading when compared with original)

Forensic Preservation

Page 25: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Times and Dates change;

Forensic Preservation

Last Accessed File Created Last Written Entry Modified Dropbox browser Last Written (UTC) Last Written (UTC) unZIP time unZIP time

client download time download time same download time Google browser 1/01/1980 1/01/1980 unZIP time unZIP time Drive client last written download time same download time

SkyDrive browser upload date/time upload date/time unZIP time unZIP time client download time download time same download time

Page 26: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Q1 = H1

There are remnants from cloud storage use which enable the identification of the service, a username, or file details.

Q2 = H2

The process of downloading files from cloud storage does not alter the internal data, but does alter the file metadata.

Results

Page 27: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Identified software files for each service, e.g.◦ SyncDiagnostics.log – SkyDrive◦ Snapshot.db – Google Drive◦ Filecache.db – Dropbox

Identified OS remnants;◦ Prefetch◦ Link files◦ Registry

Identified Browser History remnants No change to access and download files Difference in timestamps for downloaded files Process to boot PC in a VM

Contributions

Page 28: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Other cloud storage services;◦ Amazon S3, iCloud, and UbuntuOne

Physical iPhone extract compared to logical extract

Android, Windows Mobile devices Apple iOS 5 devices Further test the framework

Future research

Page 29: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Quick, D & Choo, K-K R 2012. ‘Dropbox Analysis: Data Remnants on User Machines’. Submitted to Digital Investigation

Quick, D & Choo, K-K R 2012. ‘Digital Droplets: Microsoft SkyDrive forensic data remnants’. Submitted to Future Generation Computer Systems

Quick, D & Choo, K-K R 2012. ‘Forensic Collection of Cloud Storage Data from a Law Enforcement Perspective’. Submitted to Computers & Security

Quick, D & Choo, K-K R 2012. ‘Google Drive: Forensic Analysis of data remnants’. Submitted to Journal of Network and Computer Applications

Publications(in submission / under review)

Page 30: Darren Quick Darren.Quick@gmail.com Supervisor: Dr Kim-Kwang Raymond Choo.

Chung, H, Park, J, Lee, S & Kang, C (2012), Digital Forensic Investigation of Cloud Storage Services, Digital Investigation

Clark, P (2011), 'Digital Forensics Tool Testing–Image Metadata in the Cloud', Department of Computer Science and Media Technology, Gjøvik University College.

Kleynhans, S (2012), The New Pc Era- the Personal Cloud, Gartner Inc, McClain, F (2011), Dropbox Forensics, updated 31 May 2011, Forensic

Focus McKemmish, R (1999), 'What Is Forensic Computing?', Trends and Issues in

Crime and Criminal Justice, Australian Institute of Criminology, vol. 118, pp. 1-6.

NIST (2011), Challenging Security Requirements for Us Government Cloud Computing Adoption (Draft), U.S. Department of Commerce.

Ratcliffe, J (2003), 'Intelligence-Led Policing', Trends and Issues in Crime and Criminal Justice vol. 248, pp. 1-6

Reese, G (2010), Cloud Forensics Using Ebs Boot Volumes, Oreilly.com Zhu, M (2011), 'Mobile Cloud Computing: Implications to Smartphone

Forensic Procedures and Methodologies', AUT University.

References