540 likes | 1.26k Views
CSI Georgia: Introduction to Computer Forensics Brent Williams MSTM, CWNA, CWSP, CNE, MCSE, A+, N+ brent@speakwisdom.com KSU ETTC http://edtech.kennesaw.edu Objectives Gain Basic Knowledge What is Computer Forensics? What are Concepts? What are Procedures? What Not to do?
E N D
CSI Georgia: Introduction toComputer Forensics Brent Williams MSTM, CWNA, CWSP, CNE, MCSE, A+, N+ brent@speakwisdom.com KSU ETTC http://edtech.kennesaw.edu
Objectives • Gain Basic Knowledge • What is Computer Forensics? • What are Concepts? • What are Procedures? • What Not to do? • Learn Some Basic Techniques • Raise Level of Awareness
Caveat • This workshop is not dispensing legal advice • Use what you hear, read, and do in this class at your risk • Consider this class a starting point • There is much more to learn about computer forensics
Be a Professional • Cell Phones and Pagers on Silent • Take Notes – Treat this like a College Level Course • Ask Questions – Take full advantage of this opportunity • Help your neighbor
Organizations • High Technology Crime Investigation Association • www.htcia.org • Atlanta HTCIA • www.atlhtcia.org • Southeast Cybercrime Summit • March 19-23, 2007 • www.southeastcybercrimesummit.com
Places & Products • Access Data (FTK) • www.accessdata.com • X-Ways Forensics (winhex) • www.x-ways.com • ProDiscover • www.techpathways.com • Helix • www.e-fense.com
Certification • Certified Computer Examiner • http://www.certified-computer-examiner.com/index.html • More • Books
The Need for Computer Forensics • High-Tech Crimes are Increasing • Computer Forensics Has Come Into Its Time • Computer Crimes Happen in All Environments • Business • Home • Schools
Concerns • Pornography • Child Pornography • Emails • Instant Messages • Web-sites (MySpace) • Bullying • Emotionally Troubled
Flash Memory What role will it play in your school?
PDA’s and Cell Phones • Palm • Fading? • Lots of aps and storage (flash) • Infrared and BlueTooth beaming • Windows Mobile • Catching on • Lots of storage (flash) • Familiar interface • Easily networked • Feature • WiFi, Bluetooth, EVDO (CDMA) • VGA display
Ideal Forensics Background • Legal, Technical and Law Enforcement • Missing Skills? Build a Team! • Attorney or Legal Advisor • Strong “geek” • Vast knowledge required • School Law Enforcement Person • Others?
Main Forensics Emphasis • Identify the Evidence • Determine how to preserve the evidence • Extract, process, and interpret the evidence • Ensure that the evidence is acceptable in a court of law
Evidence • Computer evidence is fragile • Evidence is easily planted • Journaling is critical • Must be able to show chain • See www.cybercrime.gov
Rules • Law enforcement works under more restrictive rules • More latitude in schools/businesses • Follow “Best Practices” • You lose control when authorities are brought in • Discover child porn? Call police.
What to Prosecute • Decision Factors • Amount of Harm Inflicted is decision factor • Need to discourage future activity • Successful Investigation? • Evidence collected correctly • Chain preserved
Evidence • Can include electronic data • Can include devices • Computers • CD-ROMs • Floppies • Cellular Telephones • Pagers • Digital Cameras
Get Training • Multiple levels of expertise • Learn basic procedures • Gain expertise in technical areas • Get certified • Get degree
Forensics in School Systems • Security and Forensics projects don’t generate revenue • Or FTEs • Hard to get “higher up” to understand need • Shoestring budget • Money for training • Consider forensics/data recovery
End User Training • Users need to be aware • School system policies • Expectation of privacy • Consequences for surfing/storing bad stuff • Social Engineering • Spyware • Laws • Requirements to guard information • Illegal Activities
“A computer Forensics Technician is a combination of private eye and computer scientist.”
Know your hardware • Servers • Workstations • PDAs • CD-ROM, CD/DVD, Zip • Webcams • Modems • Key Loggers • USB Devices • Firewire/Bluetooth • Wireless
Know your operating system • Windows • 9x, 2000, 2003, XP • Unix/Linux • OS X • DOS
Know the File System • FAT • NTFS • EXT2/EXT3
Auditing and Logging in an OS • Event viewer • Auditing
Will this End Up in Court • Assume your case will! • Courts require ample unaltered evidence • Evidence must be processed properly • Specially trained teams should conduct investigation
Types of Evidence • Real Evidence • Documentary evidence • Testimonial evidence • Demonstrative evidence
Evidence Gathering • Photograph scene • Record details in notebook • PC model and serial • Hard-drive model and serial • Note conditions around PC • Get BIOS date and time • Power-off or Shut-down? • Remove Hard Drive • Image on scene or at lab
Evidence Gathering • Have secure-erased drives ready • Get Suspect Drive Image • Attach a write-blocker • Get two or more images of the drive • Seal original drive • Place a copy of the drive back in the PC • Original drive should be locked away
Preparing an Evidence Drive • Use USB drive case
Preparing an Evidence Drive • Use large drives • Have several • Secure erase all drives • Record date, time, and method • Store in locked area • Software? • Winhex (free) • www.x-ways.net
LAB 1A PREPARE EVIDENCE DRIVE Install WinHex Connect Evidence Drive to Analysis PC WinHex Pro Select Physical Media (not Logical Drive) Edit / Fill Sectors / hex 00 Will take several minutes (25 min for 40Gb)
Image Options IMAGING SUSPECT PC Image Options 1. Remove HD from Suspect, place as Slave in Analysis PC IDE or SATA connection Use Write Blocker, Winhex 2. Remove HD from PC, Attach Write Blocker Connect to analysis PC, Winhex 3. Boot from CD, Image to USB drive Helix Certified not to write to suspect drive
Sources for Write Blockers • www.digitalintelligence.com • www.blackbagtech.com • www.forensicpc.com
The Best Approach • Remove Drive, write block, attach to analysis PC • Get image • Multiple copies • Image Type • Drive to Drive • Drive to Image File (DD)
Alternative: • Boot suspect PC with Helix • Easiest for laptops • Attach USB evidence drive • Use AIR or similar tool to image drive
Lab 1B: Image to Drive Put WinHex on Analysis PC Mount HD0 (Drive) Image to USB Evidence Drive Boot PC with Helix CD Open terminal window Dcfldd if=/dev/hda of=/dev/sda Speed: 4 min per GB Use AIR Boot from Helix CD (Turn off evidence drive for next step)
Lab 1C: Image to File • Use flash key as suspect drive • Mount flash key in WinHex • Get image (file) and hash • Verify hash of image file
What is the Hash (MD5) • Used to verify that image is accurate • MD5 suspect drive or partition • MD5 image • Should match • Record!
Analysis • While booted in Windows • Examine Helix • Install and use ExifPro • Windows Search • Show Hidden Files • While booted in Helix • Find Files • Show Images • Prodiscover
LAB 3A – Examine Image with Windows • MyComputer • Search • Wrong Extension? • Encrypted? • Helix Utilities
LAB 3B – Inspect Image File • USING WINHEX TO INSPECT IMAGE FILE from DVD • Open Image File in WinHex • Tools / Disk Tools / File Recover By Type • Pick JPG, other? • Write results to folder on C:
Email - Outlook Express • Local Settings\Application Data\Identities\…\Microsoft\Outlook Express • OE Reader (free) • Mail stored in .dbx files
LAB 4 – Examine PC with Helix • Examine PC with Helix Windows • System Information • Drive letter discrepancy? • Incident Response • Windows Forensics Toolchest • Security Reports • (others want NetCat) • Scan for Images • (no path information) • Windows Search (for files) • Disk Management (for drives, partitions)
Lab 5 – Examine while Booted with Helix • Look for files • Look for images
Passwords and Encryption • NTPassword • http://home.eunet.no/pnordahl/ntpasswd/ • Password Tools • http://www.passwordportal.net/ • http://www.brothersoft.com/downloads/crack-password.html • http://www.elcomsoft.com/index.html • http://www.accessdata.com/
LAB 6 – PRODISCOVER • Create Case • View Report progress • Add Image of C: Partition • View Report progress • Content View • Examine Deleted Files • Click check box on interesting file • Make comment • View Report progress • Look in badpics2 folder • Gallery view • Examine Cluster View
LAB 6A – PRODISCOVER • Content Search • Search for pattern • Drugs, sex, etc. • Click Search Results • Note docs and email! • Check and interesting file and comment • Review Report • Search for Files Named… • Search for *.jpg
LAB 6B - PRODISCOVER • What about files with wrong ext? • Pick Folder on Left Side • Tools – Signature Matching • Sig file is Headersig.txt • Match recursively • Highlight and add to report • View Report • Drill into folder with mismatch – note highlight • Export Report