• Tidak ada hasil yang ditemukan

CSI GAETC Introduction to Forensics and Data Recovery

N/A
N/A
Protected

Academic year: 2017

Membagikan "CSI GAETC Introduction to Forensics and Data Recovery"

Copied!
70
0
0

Teks penuh

(1)

Introduction to

Computer Forensics

Brent Williams

MSTM, CWNA, CWSP, CNE, MCSE, A+, N+ KSU ETTC

Slides at: www.speakwisdom.com

(2)

Caveat

I am not dispensing legal advice

Use what you hear, read, and do at

your own risk

Consult with your legal advisor when

(3)

The Need for

(4)

The Need for

Computer Forensics

Anyone can access anything via the

internet

Students, faculty, staff and parents

doing bad stuff!

Technology is more sophisticated Faster

More portable

(5)

Concerns

Pornography

Child Pornography

Emails

Threatening

Relationship related

Instant Messages

Web sites (MySpace)

Bullying

(6)
(7)
(8)

Bringing Things to School

(9)

PDA’s and Cell Phones

Palm

Fading?

Lots of aps and storage (flash)

Infrared and BlueTooth beaming Windows Mobile

Lots of storage (flash)

Familiar interface

Easily networked (WiFi, Bluetooth)

View photos and movies

(10)

More Threats

Downloads

To School PCs CDs/DVDs

Social Networking Sites FaceBook

MySpace Phishing

(11)

Objectives

Gain Basic Knowledge

What is Computer Forensics? Concepts

Procedures

What Not to Do? What to do Next?

(12)

Do You Have a Duty

To Report?

Yes, if you suspect a crime has been

committed

Yes, if you suspect “sexual

exploitation” including conduct involving child pornography.

Once you bring in police, you stop

(13)

Kinds of Forensics

PC/Laptop

Files, email, internet activity

Device

Cell phone

PDA

MP3 Player (iPod!)

Network

Internet traffic

(14)

Places

High Technology Crime Investigation

Association

www.htcia.org Atlanta HTCIA

www.atlhtcia.org

Southeast Cybercrime Summit

(15)

Places

Access Data (FTK)

www.accessdata.com

X-Ways Forensics (winhex) www.x-ways.com

ProDiscover

www.techpathways.com Helix

(16)

Certification

Certified Computer Examiner

http://www.certified-computer-examiner.com/index.html More

Google search “computer forensics” Books

Plenty!

(17)

Preparation

What to Do Before You Start

(18)

Build a Response Team

Cover all bases

Legal, Technical, Law Enforcement, PR Attorney or Legal Advisor

Strong “Geek”

Vast knowledge required

School Law Enforcement Person,

Local Police

(19)

Incident Response Plan

Response plan

Who is called?

How others are notified?

Clear process

Who has responsibility for what?

Decision Points

Policy issue / Legal issue

Coordinate with law enforcement

(20)

Someone Must

Know Your Hardware & Software

Servers

Workstations

PDAs

• CD-ROM, CD/DVD

Webcams

Modems

Key Loggers

USB Devices Wireless

Windows

9x, 2000, 2003, XP

Unix/Linux

OS X

DOS

FAT

NTFS

(21)

Someone Must Know

Auditing and Logging

Know where OS keep logs Know kinds of OS logs

Windows

Event viewer

Auditing

Date and time of device

Date and time of log entries

(22)
(23)

Will this End Up in Court?

Assume your case will!

Courts require ample unaltered

evidence

Evidence must be processed properly Specially trained team should always

(24)

Main Emphasis of Forensics

Identify the Evidence

Determine how to preserve the

evidence

Extract, process, and interpret the

evidence

Ensure that the evidence is

(25)

Evidence

Computer evidence is fragile

Courts know that digital evidence is

easily planted/altered

You must be able to show that

evidence is pristine and unmodified!

(26)

Evidence

Can include any form of electronic data Can include devices

Computers CD-ROMs Floppies

Cellular Telephones

Pagers

(27)

Rules

More latitude in schools/businesses

Internal processes

Governed by policy documents

Expectation of privacy

Law enforcement works under more

restrictive rules

Subpoenas & search warrants

Chain of command

(28)

What to “Prosecute”?

Harm inflicted?

Violation of Written Policy? Policy communicated to

teacher/student/parents?

Investigation conducted by trained

personnel?

(29)

Problem in

School Systems

Security and Forensics projects don’t

generate revenue

Or FTEs

Hard to get “higher up” to understand need

Until superintendent and board picture is in the paper

(30)

Training

Training team is essential They need to

Learn basic procedures

Gain expertise in technical areas Sufficient Personal Interest?

(31)

End User Training

Users need to be aware

School System Policies

Requirements to guard information

Laws

Awareness Illegal Activities

Social Engineering

Spyware

(32)
(33)

Do It Right!

Photograph system scene

Take Notes (two present)

Get the basics

System Model/SN

HD model and SN

System Date/Time

Bios BOOT info

Power Down (pull plug)

(34)

Evidence Gathering

Have secure-erased drives ready Get Suspect Drive Image

Attach a write-blocker

Get two or more images of the drive

Seal original drive

Place a copy of the drive back in the PC

(if appropriate)

(35)
(36)

Preparing an Evidence Drive

(37)

Preparing an Evidence Drive

Use large drives Have several

Secure-erase all drives

Record date, time, and method

Store in locked area

Software to Secure Erase?

Helix

WinHex Pro

(38)

Prepare Evidence Drive

Connect to Analysis PC

WinHex Pro

Select Physical Media (not

Logical Drive)

Edit / Fill Sectors / hex 00

Will take several minutes

(39)

Image Options

Boot suspect PC with Helix Easiest for laptops

Attach USB evidence drive

(40)

Image Options

Remove HD from Suspect, place as

Slave in Analysis PC Use Write Blocker

Remove HD from PC, place in USB Case

Use Write Blocker

(41)

Image Options

Get image

Multiple copies Image Type

Drive to Drive

(42)
(43)
(44)
(45)

Sources for Write Blockers

www.digitalintelligence.com www.blackbagtech.com

(46)

Other Image Options

Use USB Evidence Drive

Boot PC with Knoppix or Helix CD

Open terminal window

dd if=/dev/hda of=/dev/sda

Speed: 1 hour per GB

Boot PC with Helix CD

Open terminal window

Dcfldd if=/dev/hda of=/dev/sda

(47)

Other Image Options

– GHOST!

•Boot with BartPE CD

Open command window Ghost32 –ir –fnf

(Image Raw, No Fingerprint) Speed: 2 min per GB

– GHOST!

Version 7.5 or later

Boot with Ghost Floppy

(48)

What is the Hash?

Used to verify that image is accurate MD5 suspect drive or partition

MD5 image

(49)

Extracting

(50)

Analysis

Work on Image, not Original Time Consuming!

Tools Allow

Finding deleted files

Images

Email

IE cache

Searching for text (“drugs”, etc.) Show Hidden Files

(51)

Definitions

Unallocated Space

Space never used on a hard drive

Space made available by deleted files Slack Space

(52)

1. Examine Suspect HD

Boot Suspect PC with Helix Hidden Drive? (QTPARTED) Browse with File Manager

See images, open documents See hidden partition

Use Retriever

(53)

1a. Examine USB Evidence

Drive Image in Windows

Use Windows Disk Management MMC

to look at Partition

MyComputer

Search

Wrong Extension? Encrypted?

MS TweakUI

(54)

2. Find Images

(Not Deleted) ExifPro

(55)

3. Find Deleted Files

(56)

4. Examine in Windows

Examine PC with Helix Windows

System Information

Drive letter discrepancy?

Incident Response

Windows Forensics Toolchest Security Reports

(others want NetCat)

Scan for Images

(no path information)

Windows Search (for files)

(57)

WinHex

Open .dd file Specialist

Interpret file as disk

View all .jpg’s in file system

Tools, Disk Tools, Explore Recursively You can add path column

(58)

WinHex

Find .jpg’s in Unallocated space

Tools, Disk Tools, File Recovery by Type Find text in files

Search, Find Text (or Simultaneous

(59)

Email - Outlook Express

Local Settings\Application

Data\Identities\…\Microsoft\Outlook Express

OE Reader (free)

Mail stored in .dbx files

(60)
(61)

Passwords and Encryption

• NTPassword

– http://home.eunet.no/pnordahl/ntpas swd/

• Password Tools

– http://www.passwordportal.net/

– http://www.brothersoft.com/downloa ds/crack-password.html

(62)

Steganography and

Keystroke Logging

• Steganography – Try Steganote Keystroke logging

(63)

Common

(64)

PRODISCOVER

Create Case

Add Image

Content View

Examine Deleted Files

Click check box on interesting file Make comment

(65)

PRODISCOVER

Content Search

Search for pattern

Drugs, sex, etc.

Click Search Results

Finds anything: docs and email!

(66)

PRODISCOVER

What about files with wrong ext? Pick Folder on Left Side

(67)
(68)

You are now…

Dangerous!

(69)
(70)

Thank you!

Referensi

Dokumen terkait

Demikian Pengumuman Pemenang Pelelangan ini dibuat dan ditandatangani pada hari, tanggal dan bulan sebagaimana tersebut di atas untuk dipergunakan sebagaimana

Apabila Pimpinan perusahaan diwakilkan, maka yang mewakili harus membawa surat kuasa dan foto copy KTP dari Pimpinan Perusahaan/Pemberi Kuasa beserta cap stempel

Mata kuliah ini mengarahkan mahasiswa untuk membantu mahasiswa dengan berbagai hal yang berkaitan dengan bermain dan permainan anak yang mencakup manfaat, karakteristik, dan

Maka, dapat disimpulkan bahwa kreatifitas adalah kemampuan untuk membuat sesuatu hal yang baru berdasarkan data, informasi/unsur-unsur/karya-karya yang telah ada sebelumnya,

• Issue Temporary Land use Certificates (TLCs) for all current land uses that are already suitable according to the Land Suitability Matrix (LSM). • “Close the loop” by using LSM

Generic naming system for the administrative divisions is: provincial level (province, autonomous regions and municipalities), local level (regions, autonomous prefectures

Penerimaan barang dan jasa oleh perusahaan yang berasal dari pemasok merupakan titikkritis dalam siklus ini, sebab pada saat inilah kebanyakan perusahaan pertama

 Peserta didik secara kelompok untuk mengidentifikasi pertanyaan dan wacana yang berkaitan dengan kedudukan, fungsi dan arti penting pancasila sebagai dasar negara