Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science &...

64
Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 06/23/22 1

Transcript of Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science &...

Page 1: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Forensic Analysis

ByMrs. T. Hemalatha,Associate Professor

Department of Computer Science & Engineering

04/19/23 1

Page 2: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Cyber Crime

• Computer crime, or Cyber crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.

• Netcrime refers to criminal exploitation of the Internet.

04/19/23 2

Page 3: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Overview of Presentation• Why is Evidence identification and

Preservation required?• Who benefits from Computer Forensics?• General Types of Forensic Examinations

requested.• Process of Forensics.• Tools of the trade.• What is the Examiner looking for?

04/19/23 3

Page 4: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Why is Evidence important?

• In the legal world, Evidence is EVERYTHING. • Evidence is used to establish facts. • The Forensic Examiner is not biased.

04/19/23 4

Page 5: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Who needs Computer Forensics?

• The Vicitm! • Law Enforcement• Insurance Carriers• Ultimately the Legal System

04/19/23 5

Page 6: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Who are the Victims?

• Private Business• Government• Private Individuals

04/19/23 6

Page 7: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Cybercrime

• Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".

• Such crimes may threaten a nation’s security and financial health

• Ex. Cracking, Copyright Infringement, Loss or interception of Confidential Information etc.

04/19/23 7

Page 8: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Computer Forensics

• Is to examine digital media in a forensically sound manner

• with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.

04/19/23 8

Page 9: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Digital Forensics• Goal

– Computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

– Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of cyber law.

04/19/23 9

Page 10: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Digital Forensics

• Used for various purposes– Investigating Cyber Crimes– Internal Policy Violations– Reconstructing Computer Security Incidents– Troubleshooting Operational problems– Recovering from accidental system damage

04/19/23 10

Page 11: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Some litigations • Civil Matters • Breach of Contract • Asset recovery • Breach of Confidence • Breach of securities industry legislation and regulation and /or

Companies Acts • Employee disputes • Copyright and other intellectual property disputes • Consumer Protection law obligations (and other examples of

no-fault liability) • Data Protection law legislation

04/19/23 11

Page 12: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Criminal Matters • Theft Acts, including deception• Criminal Damage• Demanding money with menaces• Companies Law, Securities Industry and banking offences• Criminal offences concerned with copyright and intellectual

property• Drug offences• Trading standards offences• Official Secrets• Computer Misuse Act offences

04/19/23 12

Page 13: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Phases involved in examination• Collection

Identifying, labeling, recording, and acquiring data from the possible sources of relevant data, while following procedures that preserve the integrity of the data.

• Examinationusing a combination of automated and manual methods, and assessing and extracting data of particular interest, while preserving the integrity of the data

• AnalysisAnalyzing the results of the examination, using legally justifiable methods and techniques, to derive useful information

• ReportingReporting the results of the analysis

04/19/23 13

Page 14: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Investigators

• use a variety of techniques and proprietary software forensic applications to examine the copy, searching hidden folders and unallocated disk space for copies of deleted, encrypted, or damaged files. Any evidence found on the digital copy is carefully documented in a "finding report" and verified with the original in preparation for legal proceedings that involve discovery, depositions, or actual litigation

04/19/23 14

Page 15: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

• Computer Forensic Analysis and Incident Response will help to determine– How did the breach occur?– What systems were compromised?– What did they take? What did they change?– How do we remediate the incident?

• Incident responders should be armed with the latest tools, memory analysis techniques, and enterprise scanning methodologies in order to identify, track and contain advanced adversaries, and remediate incidents.

04/19/23 15

Page 16: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Computer Forensics Methods (1)• safe seizure of computer systems and files, to avoid

contamination and/or interference • safe collection of data and software • safe and non-contaminating copying of disks and other data

media • reviewing and reporting on data media • sourcing and reviewing of back-up and archived files • recovery / reconstruction of deleted files - logical methods • recovery of material from "swap" and "cache" files • recovery of deleted / damaged files - physical methods

04/19/23 16

Page 17: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Computer Forensics Methods (2) • core-dump: collecting an image of the contents of the active

memory of a computer at a particular time • estimating if files have been used to generate forged output • reviewing of single computers for "proper" working during

relevant period, including service logs, fault records, etc. • proving / testing of reports produced by complex client /

server applications • reviewing of complex computer systems and networks for

"proper" working during relevant period, including service logs, fault records, etc.

• review of system / program documentation for: design methods, testing, audit, revisions, operations management.

04/19/23 17

Page 18: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Computer Forensics Methods(3) • reviewing of applications programs for "proper" working

during relevant period, including service logs, fault records, etc.

• identification and examination of audit trails • identification and review of monitoring logs • telecoms call path tracing (PTTs and telecoms utilities

companies only) • reviewing of access control services - quality and resilience of

facilities (hardware and software, identification / authentication services)

• reviewing and assessment of access control services - quality of security management

• reviewing and assessment of encryption methods - resilience and implementation

04/19/23 18

Page 19: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Computer Forensics Methods (4)• setting up of pro-active monitoring in order to detect

unauthorised or suspect activity • monitoring of e-mail • use of special "alarm" or "trace" programs • use of "honey pots" • inter-action with third parties, e.g. suppliers, emergency

response teams, law enforcement agencies • reviewing and assessment of measuring devices, etc. and

other sources of real evidence, including service logs, fault records, etc.

• use of routine search programs to examine the contents of a file

• use of purpose-written search programs to examine the contents of a file

04/19/23 19

Page 20: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Computer Forensics Methods (5)• reconciliation of multi-source files • examination of telecoms devices, location of associated

activity logs and other records perhaps held by third parties • event reconstruction • complex computer intrusion • complex fraud • system failure • disaster affecting computer driven machinery or process • review of "expert" or rule-based systems • reverse compilation of suspect code • use of computer programs which purport to provide

simulations or animations of events: review of accuracy, reliability and quality

04/19/23 20

Page 21: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Examination

• The Operating System• Services• Applications/processes• Hardware• LOGFILES! • System, Security, and Application• File System

04/19/23 21

Page 22: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Examination Continued

• Deleted/Hidden Files/NTFS Streams• Software• Encryption Software• Published Shares/Permissions• Password Files• SIDS• Network Architecture/Trusted Relationships

04/19/23 22

Page 23: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Off-Site Storage

• “X-Drives”• FTP Links• FTP Logs• Shares on internal networks

04/19/23 23

Page 24: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Toolkit requirements

• File Viewers

• Uncompressing Files

• Graphically Displaying Directory Structures

• Identifying Known Files

• Accessing File Metadata 04/19/23 24

Page 25: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Protection

• Protect the integrity of the evidence. Maintain control until final disposition.

• Prior to Booting target computer, DISCONNECT HDD and verify CMOS.

• When Booting a machine for Analysis, utilize HD Lock software.

04/19/23 25

Page 26: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Operating system• Volatile Data vs. Non Volatile data

• Focus on Volatile Data

– Contents of Memory - 3rd party utilities

– Network Configuration – ifconfig, ipconfig

– Network Connections - netstat

– Running Processes - ps

– Open Files - lsof

– Login Sessions

– Operating System Time – date,time,nlsinfo

04/19/23 26

Page 27: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

File System• File systems are designed to store files on media • Deleted Files • Slack Space• Free Space - is the area on media that is not allocated

to any partition; it includes unallocated clusters or blocks

• Data might be hidden is through Alternate Data Streams (ADS) within NTFS volumes - used to store unnamed stream

• Renaming the files with inappropriate extensions – File headers need to be analyzed to detect such attacks

04/19/23 27

Page 28: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Network system Data

• Packet sniffers• Wire shark• Traffic analyzer• NAT

04/19/23 28

Page 29: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Application Data• Configuration Files• Log files

– Event log– Audit Log– Error log– Installation log– Debugging log

• Types of application– Local or client server or peer to peer– Web application

• Trusted or Malware analysis

04/19/23 29

Page 30: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Log File Analysis

• Events.• What Events are monitored?• What do the event records reveal?• Firewall/Router/Server log files?• Modem/FTP/Telnet

04/19/23 30

Page 31: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Memory Forensics• effective at finding evidence of worms, rootkits, and

advanced malware• Identify Rogue Processes• Analyze process DLLs and Handles• Review Network Artifacts• Look for Evidence of Code Injection• Check for Signs of a Rootkit• Acquire Suspicious Processes and Drivers

– STUXNET– TDL3/ TDSS– Zeus/Zbot

04/19/23 31

Page 32: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Dead-box and Live-box analysis

•Dead Box Analysis – Accessing and analyzing all the Non volatile Information•Live Box Analysis - – Accessing and analyzing all the volatile Information•fdpro.exe was used to create a physical memory from a Windows XP SP3 OS.

04/19/23 32

Page 33: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Evidence Search

• Image Files• Software applications• Deleted Files• Hidden Files• Encrypted Files• Hidden partitions• Keyword Search• Known Remote Access Tools04/19/23 33

Page 34: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Malicious code

• Investigators need to know if malicious code is running on a suspect’s machine. Physical memory analysis provides a new approach to detecting rootkits and malicious code. This capture shows HBGary Responder identifying a hidden kernel driver called msdirectx.sys. The process notepad.exe is hidden from the system

04/19/23 34

Page 35: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Evidence Processing Guidelines • New Technologies Inc. recommends following 16

steps in processing evidence • They offer training on properly handling each step

– Step 1: Shut down the computer• Considerations must be given to volatile information• Prevents remote access to machine and destruction of

evidence (manual or ant-forensic software)

– Step 2: Document the Hardware Configuration of The System

• Note everything about the computer configuration prior to re-locating

04/19/23 35

Page 36: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Evidence Processing Guidelines (cont)

– Step 3: Transport the Computer System to A Secure Location

• Do not leave the computer unattended unless it is locked in a secure location

– Step 4: Make Bit Stream Backups of Hard Disks and Floppy Disks

– Step 5: Mathematically Authenticate Data on All Storage Devices

• Must be able to prove that you did not alter any of the evidence after the computer came into your possession

– Step 6: Document the System Date and Time– Step 7: Make a List of Key Search Words– Step 8: Evaluate the Windows Swap File

04/19/23 36

Page 37: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Evidence Processing Guidelines (cont)

– Step 9: Evaluate File Slack• File slack is a data storage area of which most computer users

are unaware; a source of significant security leakage.

– Step 10: Evaluate Unallocated Space (Erased Files)– Step 11: Search Files, File Slack and Unallocated Space for

Key Words– Step 12: Document File Names, Dates and Times– Step 13: Identify File, Program and Storage

Anomalies– Step 14: Evaluate Program Functionality– Step 15: Document Your Findings– Step 16: Retain Copies of Software Used

04/19/23 37

Page 38: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 38

Page 39: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 39

Page 40: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 40

Page 41: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 41

Page 42: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 42

Page 43: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 43

Page 44: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 44

Page 45: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 45

Page 46: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

NTFS Streams

The Forensic ToolKit 1.4 from NT OBJECTives, Inc. Copyright(c)1998 NT OBJECTives, Inc. All Rights Reserved

AFind - File access time finder

SFind - Hidden data streams finder

HFind - Hidden file finder

04/19/23 46

Page 47: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Typical CBD Files

04/19/23 47

Page 48: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Imaging Software

04/19/23 48

Page 49: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 49

Page 50: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Security Identifers

SIDS can be used to ID the perpetrator.Security is used within Win2K to ID a user.Security is applied to the SID.

04/19/23 50

Page 51: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Where to find the SID

04/19/23 51

Page 52: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 52

Page 53: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

SID Structure

• Domain Identifier: All values in the series, excluding the last value ID the Domain.

• Relative Identifier (RID) is the last value. This ID’S the Account or Group

• S-1-5-21-838281932-1837309565-1144153901-1000

04/19/23 53

Page 54: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Users

04/19/23 54

Page 55: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 55

Page 56: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 56

Page 57: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 57

Page 58: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 58

Page 59: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 59

Page 60: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 60

Page 61: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 61

Page 62: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

04/19/23 62

Page 63: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Documentation

• Document EVERYTHING• Reason for Examination• “The Scene”• Utilize Screen Capture/Copy Suspected files• All apps for Analysis/apps on Examined

system.

04/19/23 63

Page 64: Forensic Analysis By Mrs. T. Hemalatha, Associate Professor Department of Computer Science & Engineering 7/2/20151.

Thank You

04/19/23 64