210 likes | 392 Views
Dan marsh. Montana State University Support Services Supervisor dmarsh@montana.edu 406-994-5093. 4N6. =10. What is Digital Forensics?.
E N D
Dan marsh Montana State University Support Services Supervisor dmarsh@montana.edu 406-994-5093
4N6 =10
What is Digital Forensics? Digital Forensics is the acquiring and scientific examination and analysis of data retrieved from computer or other digital devices (mobile phones, games consoles, memory sticks etc.) in such a way that the information can be used in a court of law.
What is Chain of custody? Chain of Custody Evidence audit trail 04/11/08 – 12:02 Exhibit 34a taken from suspect by officer John 04/11/08 – 13:42 Exhibit 34a past from officer John to officer Bob 04/11/08 – 13:42 Exhibit 34a past from officer Bob to officer Joanne 04/11/08 – 13:42 Exhibit 34a past from officer Bob to officer Joanne
What about in the digital world? File System audit log Date User Task 04/11/08 – 12:02 John_12 Create 04/11/08 – 12:07 John_12 Move 04/11/08 – 12:11 Lucy_99 Read 04/11/08 – 12:17 Ben_45 Read 04/11/08 – 12:17 ALI_04 Read 04/11/08 – 12:17 ALI_04 Move 04/11/08 – 12:31 System Backup 04/11/08 – 12:32 System Backup 04/11/08 – 12:17 System Backup 04/11/08 – 12:17 System Backup
forensics • Training • Triage • Capture Volatile Data • Drive Image Capture • Analysis • Reporting • Court Presentation
training • SANS • http://www.sans.org/ • HTCIA • High Technology Crime Investigation Association • http://www.htcia.org/ • ISSA
Triage • Corporate versus Law Enforcement • Corporate – Detection & Prevention • Law Enforcement - Prosecution • Be Prepared - Have your jump kit ready • Incident Response Team • Search Warrant • http://www.knock-knock.com/federal_guidelines.htm • Protect Chain of Custody • Take pictures • Take notes
Is it live or dead? Live System Dead System • Image Hard Drive • Raid • SAN • NAS • USB Devices • Cameras • Game Consoles • Look for passwords • Capture volatile data • Memory • Open Ports • Running Processes • Attached shares (servers, cloud) • Windows OS • Linux • Macintosh • Mobile Devices • Phones • PDA’s • GPS
Capture volatile Data • Problems with Live Response • Collections are not repeatable • Your tools will leave a footprint • How well do you know your tools? • Will you be able to explain your actions in court? • Memory(You can get running processes, active ports, passwords, encrypted drives) • Win32/64DD/DumpIt, RedLine/Memoryze, Helix, Fast Dump, WinEn/Winacq, FTK Imager, MacMarshall OSX 10.4-7 PPC G4 or Intel • Open Ports • ipconfig, netstat, nbtstat, tcpview, portmon, route, arp, net • Running Processes • pslist, psloggedon, psinfo, tasklist
Drive Image Capture • Write Block (Software, Hardware ) • IDE, SCSI, SATA, SSD • GIF, 2.5”, 3.5” • Target Mode (FireWire, Thunderbolt disabled with OF/EFI password) • eSATA, USB3, USB2, FireWire 400-800, ThunderBolt • Forensic Image • Compare Hash • Encryption • BitLocker, PGP, TrueCrypt (full disk, volume) • Wipe Destination Drive • Tools • EnCase, LinEn, DD, Win32/64DD, ImageW, FTKImager
Analysis • Hardware • Tools • EnCase • Forensic • Enterprise • FTK 4 • OS Forensics • XWays • SIFT • Anti-Forensics • Mobile Forensics • Network Forensics
reporting • Clear and easy to understand • Detailed • Pictures • Meta Data
Court presentation • Expert Witness • Know your tools • Be prepared for the unexpected • Good notes
Memory dump and analysis • http://www.mandiant.com/resources/download/memoryze • Use memorydd.bat to dump ram • http://www.mandiant.com/resources/download/redline/ • Use redline to analyze raw memory dump file from many sources • http://macmarshal.com/ • Use macmarshall to dump and analyze Macintosh memory • http://www.hbgary.com/free-tools • Use fd.exe to dump memory small 80K footprint 32bit only • http://www.moonsols.com/2011/07/18/moonsols-dumpit-goes-mainstream/ • Use dumpit.exe to get memory dump
Web based analysis sites and software • http://anubis.iseclab.org/ • Check your executable and .dll files to see if they are suspicious • http://wepawet.iseclab.org/ • Check your JavaScript, PDF, and Flash files to see if they contain malware • http://malwr.com/ • Check your executable and .dllfiles using its HASH code • https://www.virustotal.com/ • Enter a hash code of a suspect file to see if it has been flagged by 43 different anti-virus and anti-malware tools or submit a file for inspection • http://www.mcafee.com/us/downloads/free-tools/getsusp.aspx • Run getsusp.exe on a desktop you think may be compromised and it returns a list of running processes and open ports and flags them if they are suspicious or unknown. It will create a HASH of all of the files and you can go directly to VirusTotal by clicking on the link. The password of the created zip file is infected
List of forensic applications • http://accessdata.com/support/adownloads • FTK for forensic analysis or FTK Imager for getting a memory or hard drive image • http://osforensics.com/download.html • A free and pro version of a less expensive alternative to forensic analysis • http://www.x-ways.net/forensics/ • Another low cost alternative to forensic analysis • http://www.guidancesoftware.com/ • The premier software of forensics applications • http://computer-forensics.sans.org/community/downloads/ • SIFT is a free alternative Ubuntu Linux version used in SANS training
Must have tools for volatile data • http://live.sysinternals.com/ • Live site with the latest tools from Sysinternalsnow part of Microsoft • http://technet.microsoft.com/en-us/sysinternals/bb545021 • Sysinternals site with the tools in categories and information on each of the tools • http://nirsoft.net/ • Another must have set of tools. Try nirlauncher.exe to have ready access to both the Nirsoft and Sysinternals suite of products.
Hard Drive Image tools • http://sourceforge.net/projects/windd/ • The windows version of the venerable Linus DD tool can be used for both hard drive and memory capture to an image file or other drive • http://www.terabyteunlimited.com/image-for-windows.htm • Imagew.exe comes with LANDesk or you can purchase it directly from the company and very versatile hard drive imager • http://accessdata.force.com/RegisterForDownload?redirectName=000051 • FTK Imager is able to image and view hard drive images there is also a free version FTH Imager Lite
Training and professional development • http://www.sans.org/ • http://www.htcia.org/ • https://www.issa.org/