Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.
-
Upload
hortense-sparks -
Category
Documents
-
view
213 -
download
0
Transcript of Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.
![Page 1: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/1.jpg)
Digital CrimeCan Computer Forensics Save Us?
Darren HayesMarch, 2009
![Page 2: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/2.jpg)
Objectives Understanding Crime
Understanding Security Understanding Computer Forensics
Understand Compromises Understand How to be Proactive
Learn how to Investigate Ownership Control Intent
![Page 3: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/3.jpg)
Changes in Digital Crime Criminal Minds
Better understanding of covering tracks Impersonation
International Criminals More influence from international crime
![Page 4: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/4.jpg)
Control of Computers Botnets
RoBOT NETworks 1.5 Million computers infected Uses IRC 70% Spam Botnets
![Page 5: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/5.jpg)
Spamhaus
![Page 6: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/6.jpg)
SpamhausName: “Bad Cow”
Country: Russian Federation
Russian/American spammer. Does "OEM CD" pirated software spam, copy-cat pharmaceuticals, porn spam, porn payment collection, etc. Spams using virus-created botnets and seems to be involved in virus distribution. Partnered with Vlad - aka "Mr. Green"
![Page 7: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/7.jpg)
Xsox Lease Botnets Proxy Attacks DELBOT
Used to render computers useless
![Page 8: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/8.jpg)
Xsox
![Page 9: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/9.jpg)
Hide Identity Russian Business Network Money Mules Anyproxy.net
Russian Web Proxy Server 4,220 US users
Vip72.com Endless supply of Proxy Servers 8,000 US monthly subscribers
![Page 10: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/10.jpg)
Hide Identity Loads.cc
Botnets By hackers for hackers Allows you to spread your malware
Fraud Crew
![Page 11: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/11.jpg)
Fraud Crew
![Page 12: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/12.jpg)
Botnet Crime Credit Card Fraud
Card Forms Preauthorization
Primarily Used for Online Gambling Spam Stock Manipulation Online Poll Manipulation
![Page 13: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/13.jpg)
Network Attacks Spear Phishing
Government contractor compromised
![Page 14: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/14.jpg)
Cellular Phone Forensics
![Page 15: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/15.jpg)
Overview 2002 – First Imaging Software for Cellphones
Made Available 2008 – Memory Dump Available on 40% of
Cellphones Mandate – GPS Chip in Every Cellphone by
2009
![Page 16: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/16.jpg)
Different Forensics Communication through Embedded Chip Different File System Active Memory Storage Smaller Onboard Capacity
![Page 17: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/17.jpg)
iPhone File System Depends on Chip Solid State Memory Larger Storage Capacity Multi-tier Wireless Communication Bit-stream Memory Image Marketing Tracking Device Avg. Memory Capture: 1.4 tb
![Page 18: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/18.jpg)
Blackberry Move from Business Consumer IPD Backup on Desktop
Timestamped Unencrypted 65 Primary databases
Parsed to be viewed
![Page 19: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/19.jpg)
Computer Forensics in Practice?
![Page 20: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/20.jpg)
Enron Fastow, Skilling & Lay found Guilty Hundreds of Employee Computers Examined Thousands of E-mails Researched Documents Required Full Text Search
Capabilities 31 Terabytes (1012 bytes) of Data
(~15 Academic Libraries)
![Page 21: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/21.jpg)
Virginia Tech Massacre Killer: Seung-Hui Cho 32 Murdered Ebay Searches
![Page 22: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/22.jpg)
Scott Peterson Murder Trial Searched Online for
Boats Boat Ramps Tides Knots
![Page 23: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/23.jpg)
Toys R Us Fraud Case Gift Cards Scam
NYC & Chicago Kings County D.A. Evidence
AOL (Login times) Toys R Us (Activity Logs) UPS (Delivery Logs)
Computer
![Page 24: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/24.jpg)
Data Recovered Passwords Websites Visited Emails (Sent / Received) File Creation, Access, Modified, Deletion
Dates & Times
Chat Sessions Files Copied Programs Installed Files Transferred Images Viewed or Saved
![Page 25: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/25.jpg)
Devices Hard Disk Floppy Disk Zip Disk CD DVD Blackberry
USB Tapes TiVo Xbox DVR Smartphone
![Page 26: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/26.jpg)
In the Classroom
![Page 27: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/27.jpg)
Microsoft Applications PowerPoint
Student Presentations Lab Layout Link
![Page 28: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/28.jpg)
Microsoft Applications Excel
Crimes Hardware Inventory Evidence Form Link
Word Research Paper Evidence Form Link
![Page 29: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/29.jpg)
Web Design
![Page 30: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/30.jpg)
Other Applications YouTube Podcasting (www.camstudio.org) Blogging (www.blosxom.com or
www.wordpress.org) Wikis (www.wikispaces.com) Social Networking (www.ning.com) Mashups (www.popfly.com)
![Page 31: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/31.jpg)
Computer Forensics Software Helix (Imaging) FTK (Imager) Invisible Secrets (Steganography) Wireshark (Network Tracking) Snort (Network Intrusion Prevention System) Nmap (Security Auditing) S-Tool (Center for Internet Security) Vmware (Reverse-Engineer Malware)
![Page 32: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/32.jpg)
Resources http://berghel.com/home.php http://www.simson.net/cv/pubs.php http://www.cylab.cmu.edu/ http://www.wireshark.org/ http://www.swgde.org/ http://www.rcfl.gov http://www.ssddfj.org/
![Page 33: Digital Crime Can Computer Forensics Save Us? Darren Hayes March, 2009.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d135503460f949e66db/html5/thumbnails/33.jpg)
Summary Rise in Botnet Activity Anonymous Users Organized Crime Decrease in Password Cracking Increase in Network Attacks Increasing Importance of Mobile Forensics