Classification
Computers as an instrument of crime Check forgery Child pornography e-auction fraud, identity theft Phishing most criminal activity
Computers as a target of a crime Intrusion
botnets for spamming Identity theft
Alteration of websites
Email Investigations: Overview
Email has become a primary means of communication.
Email can easily be forged. Email can be abused
SpamAid in committing a crime …Threatening email, …
Email Investigations: Overview
Email evidence: Is in the email itself
Header Contents
In logs: Left behind as the email travels from sender to recipient. Law enforcement uses subpoenas to follow the trace. System ads have some logs under their control.
Notice: All fakemailing that you will be learning can be easily traced.
Email Fundamentals
Email travels from originating computer to the receiving computer through email servers.
All email servers add to the header. Use important internet services to interpret and
verify data in a header.
Email Fundamentals
Typical path of an email message:
ClientMail Server
Mail Server
Mail Server
Client
Email Protocols:
Email program such as outlook or groupwise are a client application.
Needs to interact with an email server:Post Office Protocol (POP) Internet Message Access Protocol (IMAP)Microsoft’s Mail API (MAPI)
Web-based email uses a web-page as an interface with an email server.
Email Protocols:
A mail server stores incoming mail and distributes it to the appropriate mail box.
Behavior afterwards depends on type of protocol.
Accordingly, investigation needs to be done at server or at the workstation.
Email Protocols:
Post Office Service Protocol Characteristics
Stores only incoming messages.
POP Investigation must be at the workstation.
Stores all messages IMAP
MS’ MAPI
Lotus Notes
Copies of incoming and outgoing messages might be stored on the workstation or on the server or on both.
Web-based send and receive.
HTTP Incoming and outgoing messages are stored on the server, but there might be archived or copied messages on the workstation. Easy to spoof identity.
Email Protocols: SMTP
Neither IMAP or POP are involved relaying messages between servers.
Simple Mail Transfer Protocol: SMTPEasy.Has several additions.Can be spoofed:
By using an unsecured or undersecured email server.
By setting up your own smtp server.
Email Protocols: SMTPHow to spoof email
telnet endor.engr.scu.edu 25220 endor.engr.scu.edu ESMTP Sendmail 8.13.5/8.13.5; Wed, 28 Dec 2005
14:58:49 - 0800
helo 129.210.16.8250 server8.engr.scu.edu Hello dhcp-19-198.engr.scu.edu [129.210.19.198], pleased to meet you
mail from: [email protected] 2.1.0 [email protected]... Sender ok
rcpt to: [email protected] 2.1.5 [email protected]... Recipient ok
data354 Enter mail, end with "." on a line by itself
This is a spoofed message.. 250 2.0.0 jBSMwnTd023057 Message accepted for delivery
quit 221 2.0.0 endor.engr.scu.edu closing connection
Email Protocols: SMTP
Return-path: <[email protected]>Received: from MGW2.scu.edu [129.210.251.18]by gwcl-22.scu.edu; Wed, 28 Dec 2005 15:00:29 -0800Received: from endor.engr.scu.edu (unverified [129.210.16.1]) by MGW2.scu.edu(Vircom SMTPRS 4.2.425.10) with ESMTP id <[email protected]> for <[email protected]>;Wed, 28 Dec 2005 15:00:29 -0800X-Modus-BlackList: 129.210.16.1=OK;[email protected]=OKX-Modus-Trusted: 129.210.16.1=NOReceived: from bobadilla.engr.scu.edu (bobadilla.engr.scu.edu [129.210.18.34])by endor.engr.scu.edu (8.13.5/8.13.5) with SMTP id jBSMwnTd023057for [email protected]; Wed, 28 Dec 2005 15:00:54 -0800Date: Wed, 28 Dec 2005 14:58:49 -0800From: JoAnne Holliday <[email protected]>Message-Id: <[email protected]>
this is a spoofed message.
This looks very convincing.
Only hint: received line gives the name of my machine.
If I were to use a machine without a fixed IP, then you can determine the DHCP address from the DHCP logs.
Email Protocols: SMTPHow to spoof email Endor will only relay messages from machines that have
properly authenticated themselves within the last five minutes.
Subject lines etc. are part of the data segment. However, any misspelling will put them into the body of the message.
Email Protocols: SMTPHow to spoof email
telnet endor.engr.scu.edu 25220 endor.engr.scu.edu ESMTP Sendmail 8.13.5/8.13.5; Wed, 28 Dec 2005 15:36:13 -0800mail from: [email protected] 2.1.0 [email protected]... Sender okrcpt to: [email protected] 2.1.5 [email protected]... Recipient okdata354 Enter mail, end with "." on a line by itselfDate: 23 Dec 05 11:22:33From: [email protected]: [email protected]: Congrats
You are hrby appointed the next president of Santa Clara University, effectivelyimmediately.
Best, Paul.250 2.0.0 jBSNaDlu023813 Message accepted for deliveryquit
Email Protocols: SMTP
Things are even easier with Windows XP. Turn on the SMTP service that each WinXP machine runs. Create a file that follows the SMTP protocol. Place the file in Inetpub/mailroot/Pickup
Email Protocols: SMTP
To: [email protected]: [email protected]
This is a spoofed message.
From [email protected] Tue Dec 23 17:25:50 2003Return-Path: <[email protected]>Received: from Xavier (dhcp-19-226.engr.scu.edu [129.210.19.226])by server4.engr.scu.edu (8.12.10/8.12.10) with ESMTP id hBO1Plpv027244for <[email protected]>; Tue, 23 Dec 2003 17:25:50 -0800Received: from mail pickup service by Xavier with Microsoft SMTPSVC;Tue, 23 Dec 2003 17:25:33 -0800To: [email protected]: [email protected]: <XAVIERZRTHEQXHcJcKJ00000001@Xavier>X-OriginalArrivalTime: 24 Dec 2003 01:25:33.0942 (UTC) FILETIME=[D3B56160:01C3C9BC]Date: 23 Dec 2003 17:25:33 -0800X-Spam-Checker-Version: SpamAssassin 2.60-rc3 (1.202-2003-08-29-exp) onserver4.engr.scu.eduX-Spam-Level:X-Spam-Status: No, hits=0.3 required=5.0 tests=NO_REAL_NAME autolearn=noversion=2.60-rc3
This is a spoofed message.
Email Protocols: SMTP
SMTP Headers:Each mail-server adds to headers. Additions are being made at the top of the list.
Therefore, read the header from the bottom.
To read headers, you usually have to enable them in your mail client.
URL Obscuring
Internet based criminal activity that subverts web technology:Phishing (fraud)Traffic redirectionHosting of illegal sites
Child pornography
URL Obscuring
Internet based fraud is gaining quickly in importance.
Phishing: The practice of enticing victims with spoofed email to visit a fraudulent webpage.
http://www.antiphishing.org/
URL Obscuring
Technical Subterfuge:Plants crimeware onto PCs.
Example: Vulnerable web browser executes remote script at a criminal website.
Just staying away from porn no longer protects you.
Payload: Use Trojan keylogger spyware. Search for financial data and send it to an untraceable
email address
URL Obscuring
Social Engineering: Target receives e-mail pretending to be from an
institution inviting to go to the institutions website. Following the link leads to a spoofed website, which
gathers data. It is possible to establish a web-presence without any links:
Establish website with stolen / gift credit card. Use email to send harvested information to an untraceable
account, etc. Connect through public networks.
URL Obscuring: Phishing Example
Visible Link: https://www.usa.visa.com/personal/secure_with_visa/index.html?t=h1_/index.html
Actual Link: http://www.verified-web-us.com/Visa%20USA%20%20Personal%20%20Protect%20Your%20Card.htm
Actual website IP: 209.35.123.41
Uses Java program to overwrite the visible address bar in the window:
URL Obscuring
Phishs need to hide web-servers URL Obscuring Javascript or other active web-technology overwrites
URL field no longer possible in latest browsers
Other techniques to hide web-server address Use hosts file
Hiding illegal web-server at legal site Hijacking site to host pages.
URL Basics
Phishs can use obscure features of URL. URL consists of three parts:
ServiceAddress of serverLocation of resource.
http://www.cse.scu.edu/~tschwarz/coen252_03/Lectures/URLObscuring.html
URL Basics
Scheme, colon double forward slash. An optional user name and password. The internet domain name
RCF1037 format IP address as a set of four decimal digits.
Port number in decimal notation. (Optional) Path + communication data.
http://tschwarz:[email protected]/~tschwarz/coen252_03/Lectures/URLObscuring.html
http://www.google.com/search?hl=en&ie=UTF-8&q=phishing
Obscuring URL Addresses
Embed URL in other documents Use features in those documents to not
show complete URL
http://[email protected]/~tschwarz/coen252_03/index.html
URL rules interpret this as a userid.
Hide this portion of the URL.
Obscuring URL Addresses
Use the password field.www.scu.edu has IP address 129.210.2.1.Some browsers accept the decimal value
129*256**3 + 210*256**2 + 2*256 + 1 = 2178023937 for the IP address.
http://www.usfca.edu@2178023937 Works as a link. Does not work directly in later versions of IE
Obscuring URL Addresses
http://[email protected] works. Hide the ASCI encoding of @:
http://www.usfca.edu%40129.210.2.1 Or just break up the name:
http://www.usfca.edu%40%127%167w.scu.edu
Or use active page technologies (javascript, …) to create fake links.
'Enroll your card with Verified By Visa program' 2004 Phish sends SPAM consisting of a
single image:
'Enroll your card with Verified By Visa program'
The whole text is a single image, linked to the correct citi URL. If the mouse hovers
over the image, it displays the correct citi URL.
But surrounded by an HTML box that leads to the phishing website.
'Enroll your card with Verified By Visa program'
Target webpage has an address bar that is overwritten with a picture with a different URL.
Go to www.antiphishing.org .
Phishing Phishers now use bogus https
techniques.Exploiting browser flaws to display secure
icon.Hacking legitimate sites or frames from
these sites directly.Purchase and present certificates for sites
that are named in resemblance of the target sites.
The SSL lock icon is no longer a guarantee for a legitimate site.
Hiding Hosts
Name Look-Up: OS checks HOST file first. Can use HOST file to block out certain sites
adservers
Affects a single machine.
OS Location
Linux /etc/hosts
Win95/98/ME C:\windows\hosts
Win NT/2000/XP Pro
C:\winnt\systems32\etc\hosts
Win XP Home C:\windows\system32\drivers\etc\hosts
Subverting IP Look-Up In general, not used for phishing.
Economic Damage Hillary for Senate campaign attack. Hiding illegal websites. (Kiddie Porn)
DNS Server Sabotage IP Forwarding
Subverting IP Look-Up Port Forwarding
URLs allow port numbers. Legitimate business at default port number. Illegitimate at an obscure port number.
Screen clicks Embed small picture.
Single pixel. Forward from picture to the illegitimate site. Easily detected in HTML source code.
Password screens Depending on access control, access to different
sites.
Phisher-Finder
Carefully investigate the message to find the URL.Do not expect this to be successful unless the
phisher is low-tech. Capture network traffic with Ethereal to
find the actual URL / IP address. Use Sam Spade or similar tools to collect
data about the IP address.
Phisher-Finder
Capture network traffic with Ethereal when going to the site.This could be dangerous.
Disable active webpages. Do not use IE (too popular).
Look at the http messages actually transmitted.
Expect some cgi etc. script.
Phisher-Finder
Investigation now needs to find the person that has access to the website. This is were you can expect to loose the trace.
The data entered can be transmitted in various forms, such as anonymous email.
For example, they can be sent to a free email account. IPS usually has the IP data of the computer from which the
account was set up and from which the account was recently accessed.
Perpetrator can use publicly available computers and / or unencrypted wireless access points.
Investigator is usually left with vague geographical data.
Email Investigation
Email investigations derive evidence from: Internal data;
Headers. Contents.
External data; Server logs.
Sending machine itself As we will see.
Email Investigation
Header Analysis:Most recent entries are on the top of the
header. Resolve all inconsistencies of information. Resolve all IP addresses. Create timeline.
Allow for clock drift between different sites.
Compare entries generated (allegedly) by known servers with previous ones.
Email Investigation
Law Enforcement (LE) can use subpoenas for investigation of log files.
The same is true for private entities through the use of John Doe lawsuits.
Phishing Investigation
Find the true URL to identify the server with which a potential victim interacts. Difficult since phishers change sites frequently. Using network tracer when accessing a website can speed
things up. Use subpoena process to obtain
log records of email Contact infos for web-sites, redirection services, etc.
Try to obtain information amicably as often as possible. Outside of US. To guard volatile information
Case Examples:1. A Kornblum, Microsoft A. Kornblum: Searching for John Doe:
Finding Spammers and Phishers Used John Doe lawsuit to obtain sub-
poenas for phisher that became active in September 2003.
Case Examples:1. A Kornblum, Microsoft
Originating emails Traced ultimately to ISP in India, from where not enough data could be
obtained. Traced websites:
At each round, a subpoena request would yield the IP address of a controlling website.
Hosting company in San Francisco. Another hosting company in San Francisco. Redirection Server in Austria.
Owner did not like spammers and handed out record voluntarily. IP controlled by Quest. 69 year old quest customer in Davenport, Iowa. Who had grandson Jayson Harris living with him. MS involved FBI who raided household and obtained three machines. MS sued Jayson Harris and obtained a 3M$ default judgment against him. Criminal charges are pending.
Case Examples:2. Highschool Death Threads Blog sites allow comments by anonymous
friends. Death threads were made on a high-
school related blog anonymously. XPD (name altered) was informed by
principal.
Case Examples:2. Highschool Death Threads XPD contacted blog site, but owner/operator did not
have valid contact data. However, blog site operator gave out the IP address
from which the comment originated. XPD went to ISP to obtain the address of the computer
to which the IP was assigned at the time of the thread. XPD obtained a search warrant for the premises of the
owner of the address. The owner was a respectable, older community member. XPD assumed that there was a grandson involved.
Case Examples:2. Highschool Death Threads Search warrant was executed at 7 am. No sign of high school student in the house, but
the owner was running an unsecured wireless access point.
XPD convinced the owner to keep the access point running, but to set up logging.
Using google maps and addresses of all high school students, they also identified a suspect.
Case is still pending.
Computer Crime Evidence
Computers are used by criminals Activities of computer users leave traces around:
Fraud Investigation Perp stole friend’s credit card information while visiting. Started shopping spree to satisfy demanding girl friend. Police obtained warrant, searched house, seized computer. Investigators were able to reconstruct shopping sessions.
Computer Crime Evidence
Examples for Evidence IE usage:
IE retains data in a file called index.dat Index.dat contains data on websites used.
Computer Crime Evidence
Deleted filesWhen a file is deleted:
Blocks are marked as free Directory entry is marked as free
What remains are: The file itself Almost the complete directory entry
USB Storage Example
0B-0C: Bytes per Sector (little endian)00 02 02 00 = 512decimal
0D: Sectors per Cluster: 04 10: Number of FATs: 02
USB Storage Example
06-07: Size of FAT is 00 7B sectors There are two FATs Conclusion:
Root Directory starts at sector 1+7B+7BGo to sector 247
USB Storage Root Directory
Three entries. Top: a short entry. Then a long followed by the associated short
entry.
USB Storage Root Directory
First Entry File attribute is 28 -> 0010 1000 b Volume marker is set Archive marker is set Volume Label Name is Lexar Media
USB Storage Root Directory
Time field is 7D 6F. Translated from little endian 6F 7D. Binary 0100 1111 0111 1101. Hour is 01001 -> 13. Minute is 111011 -> 51. Creation time is 13:51.
USB Storage Device Root Directory
Date field is 6B 2F. Translated from little endian 2F 6B. In binary 0010 1111 0110 1011. Year is 001 0111 = 23 after 1980 ->2003 Month is 1011 = 11 = November Day is 01011 = 11. Formatted on the 11/11/2003.
USB Storage Device Root Directory Next two entries: a deleted long and short
record. File attribute 0F (long entry) File attribute 10 (directory) Leading byte 0xE5 (deleted)
USB Storage Device Root Directory Long entry file name: .Trashes Short entry file name: TRASHE~1 Created by MACs Deleted on 10/24/2003 582F -> 2F 58 -> 0010 1111 0101 1000
USB Storage Device Root Directory First cluster is 04 59 -> 0x 5904 -> 22788 Size is 00 00 08 00 -> 0x 00 08 00 00 = 2048.
USB Storage Device Root Directory Go through the directory to find interesting
entries. At the end, a deleted directory called My
Pictures. Starts at cluster 0x0846
USB Storage Device Directory Go to this sector:
Two deleted directories kittieporn and adultporn First starts at cluster 0x4708
USB Storage Device Directory Entry
File is called “CAT55.304438-1-t” Size is 0x07C1 = 1985, fits into 1 cluster Starts at cluster 0x849.
USB Storage DeviceDeleted File Use Winhex to save this block into a file. Change file extension to JPG. Now we can look at it. Indeed, minors in a seductive position and
completely naked!
Recovering Files This was easy because we just followed
directory entries. WinHex actually calculates a lot of the
values that we distilled by hand. Reconstructs directory entries on its own. But has no generic file previewer
Recovering Files
If directory entry is overwritten:Look for sectors in slack space.Look for files that have not been overwritten.Try to splice pieces of the file together from the
FAT.Use pattern recognition software to guess file
type.Result is frequently useful.
Recovering Files
Text files:Search for Words in the Duplicate.Learn how word processors store files. Interesting finds, especially in old MS Word
formats.
Top Related