• Tidak ada hasil yang ditemukan

bh-win-01-mobley.ppt 1556KB Jun 23 2011 12:10:06 PM

N/A
N/A
Protected

Academic year: 2017

Membagikan "bh-win-01-mobley.ppt 1556KB Jun 23 2011 12:10:06 PM"

Copied!
53
0
0

Teks penuh

(1)

Computer Forensics,

The Investigators Persepective

Paul T. Mobley Sr. ([email protected]) Computer Forensics Consultant

(2)

What is Computer Forensics?

Computer Forensics can be defined simply, as a process of applying scientific and

analytical techiniques to computer

Operating Systems and File Structures in determining the potential for Legal

(3)

Overview of Presentation

• Why is Evidence identification and Preservation required?

• Who benefits from Computer Forensics? • General Types of Forensic Examinations

requested.

• Process of Forensics. • Tools of the trade.

(4)

Why is Evidence important?

• In the legal world, Evidence is EVERYTHING.

(5)

Who needs Computer Forensics?

• The Vicitm!

• Law Enforcement • Insurance Carriers

(6)

Who are the Victims?

•Private Business •Government

(7)
(8)
(9)
(10)

• ID the perpetrator.

• ID the method/vulnerability of the

network that allowed the perpetrator to gain access into the system.

• Conduct a damage assessment of the victimized network.

• Preserve the Evidence for Judicial action.

(11)

Types of Forensic Requests

• Intrusion Analysis • Damage Assement • Suspect Examination • Tool Analysis

(12)

Intrusion Analysis

• Who gained entry? • What did they do?

• When did this happen? • Where did they go?

(13)

Damage Assesment

• What was available for the intruder to see? • What did he take?

(14)

File Recovery

• Deleted Files • Hidden Files • Slack Space • Bad Blocks

• Steganography • X-Drives

(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)

NTFS Streams

The Forensic ToolKit 1.4 from NT OBJECTives, Inc.

Copyright(c)1998 NT OBJECTives, Inc. All Rights Reserved

AFind - File access time finder

SFind - Hidden data streams finder

(25)

Tool Analysis

• What tools were used? • How were the executed?

(26)

Log File Analysis

• Events.

• What Events are monitored?

• What do the event records reveal? • Firewall/Router/Server log files? • TripWire Database?

(27)

Evidence Search

• Image Files

• Software applications • Deleted Files

• Hidden Files • Encrypted Files • Hidden partitions • Keyword Search

(28)

Forensics Process

• Preparation • Protection • Imaging

• Examination

(29)

Preparation

Confirm the authority to conduct analysis/search of

media.

Verify the purpose of the analysis and the clearly defined

desired results.

• Ensure that sterile media is available and utilized for imaging. (ie..Free of virus, Non-essential files, and verified before use.)

• Ensure that all software tools utilized for the analysis are tested and widely accepted for use in the forensics

(30)

Legal Overview

Employer Searches in Private-Sector Workplaces Warrantless workplace searches by private

employers rarely violate the Fourth Amendment. So long as the employer is not acting as an instrument or agent of the Government at the time of the search, the search is a private search and the Fourth Amendment does not

apply. See Skinner v. Railway Labor Executives’ Ass’n, 489 U.S. 602, 614 (1989).

(31)

Protection

• Protect the integrity of the evidence. Maintain control until final disposition. • Prior to Booting target computer,

DISCONNECT HDD and verify CMOS. • When Booting a machine for Analysis,

(32)
(33)

Imaging

• Utilize disk “imaging” software to make an exact image of the target media. Verify the image.

• When conducting an analysis of target media, utilize the restored image of the

(34)
(35)
(36)

Examination

• The Operating System • Services

• Applications/processes • Hardware

• LOGFILES!

(37)

Examination Continued

• Deleted/Hidden Files/NTFS Streams • Software

• Encryption Software

• Published Shares/Permissions • Password Files

• SIDS

(38)

Off-Site Storage

• “X-Drives” • FTP Links • FTP Logs

(39)

Security Identifers

•SIDS can be used to ID the perpetrator.

(40)
(41)
(42)

SID Structure

• Domain Identifier: All values in the series, excluding the last value ID the Domain.

• Relative Identifier (RID) is the last value. This ID’S the Account or Group

(43)

Documentation

• Document EVERYTHING

• Reason for Examination • “The Scene”

• Utilize Screen Capture/Copy Suspected files

(44)
(45)
(46)
(47)
(48)
(49)
(50)
(51)
(52)
(53)

Closing

• Forensic Techniques are based on the File System of the media to be examined

• Utilizing an NTFS partition enhances

security. If further increases the Forensic examiners chances of recovering useful evidence.

Referensi

Dokumen terkait

'China Times' obviously tends to use Peace Journalism Framework, not tend to use Patriotism Framework, tends to express negative sentiments towards Taiwan and the US government in its

DAMBHA PRIMA UTAMA : Dalam dokumen penaw ar an teknis tidak dilengkapi dengan Spesifikasi Teknis, Soft Copy hasil pemindaian (scan) Sur at Dukungan keter sediaan

Metoda evaluasi yang dipakai adalah sistem gugur dengan ambang batas teknis baik pada unsur-unsur maupun nilai total teknis dimana setiap dokumen yang dinyatakan tidak

MANDALA INDONESIA TECHNOLOGY Divisi Training IT, WINTECH, adalah merupakan unit tugas yang harus diikuti oleh setiap mahasiswa Desain Komunikasi Visual di

dengan judulnya Colorful dengan konsep pewarnaan yang disukai anak kecil, eye catching, dan menyenangkan. Tentu saja dengan bentukan desain yang sangat familiar

Apabila saudara tidak hadir sesuai dengan jadwal tersebut diatas dalam acara pembuktian kualifikasi ini, maka dianggap saudara menyetujui keputusan yang ditetapkan oleh

Untuk membuat file baru, Anda dapat memilih menu File‐New atau tekan tombol atau tekan

Restoran dipilih karena merupakan sebuah fasilitas pemenuh kebutuhan pangan masyarakat yang dibutuhkan setiap hari, selain makan pengunjung juga dapat berkeliling ke

Dengan adanya perancangan walk-in closet ini diharapkan dapat membantu memenuhi kebutuhan wanita dalam hal berpenampilan terutama bagi wanita yang tinggal di ruang