Vishveshwaraiah Technological University: Department of Computer Science Engineering
Vishveshwaraiah Technological University: Department of Computer Science Engineering
A seminar report on
“COMPUTER FORENSICS”
Submitted by
„SUJAY P.‟
„2SD06CS110‟
th
8 semester
CERTIFICATE
Certified that the seminar work entitled “COMPUTER FORENSICS”
in a partial fulfillment for the award of degree of Bachelor of Engineering in computer science of
the Vishveshwaraiah Technological University, Belgaum during the year 2009-10. The seminar
report has been approved as it satisfies the academic requirements with respect to seminar work
CONTENT
Introduction
History of Computer Forensics
Steps of Computer Forensics
Reasons for Evidence
Users Computer Forensics
Handling Evidence
Handling Information
Evidence Processing Guidelines
Methods of Hiding Data
Methods of Detecting/Recovering Data
Network forensics
Advantages of Computer Forensics
Disadvantages of Computer Forensics
Conclusion
Introduction
Computer evidence has become a „fact of life' for essentially all law enforcement
agencies and many are just beginning to explore their options in dealing with this new venue.
Almost overnight, personal computers have changed the way the world does business. They
have also changed the world‟s view of evidence because computers are used more and more
as tools in the commission of „traditional' crimes. Evidence relative to embezzlement, theft,
extortion and even murder has been discovered on personal computers. This new technology
twist in crime patterns has brought computer evidence to the forefront in law enforcement
circles.
Forensic science has been defined as “any science used for the purposes of the law...
[Providing] impartial scientific evidence for use in the courts of law, and in a criminal
investigation and trial”.
Multiple methods of
Any information being subject to human intervention or not, that can be extracted
from a computer.
Must be in human-readable format or capable of being interpreted by a person with
expertise in the subject.
Michael Anderson
“Father of computer forensics”.
Special agent with IRS.
Acquisition
Physically or remotely obtaining possession of the computer, all network mappings
from the system, and external physical storage devices.
Identification
This step involves identifying what data could be recovered and electronically
retrieving it by running various Computer Forensic tools and software suites.
Evaluation
Evaluating the information/data recovered to determine if and how it could be used
again the suspect for employment termination or prosecution in court.
Presentation
This step involves the presentation of evidence discovered in a manner which is
understood by lawyers, non-technically staff/management, and suitable as evidence as
determined by United States and internal laws.
Business Environment:
Handling Evidence
Admissibility of Evidence
◦ Must be obtained in a manner which ensures the authenticity and validity and
that no tampering had taken place.
Extracted / relevant evidence is properly handled and protected from later mechanical
or electromagnetic damage.
Establishing and maintaining a continuing chain of custody.
Limiting the amount of time business operations are affected.
Not divulging and respecting any ethically [and legally] client-attorney information
that is inadvertently acquired during a forensic exploration.
Handling Information
Information and data being sought after and collected in the investigation must be
properly handled.
Volatile Information
◦ Network Information
Communication between system and the network.
◦ Active Processes
Programs and daemons currently active on the system.
◦ Logged-on Users
Users/employees currently using system.
◦ Open Files
Libraries in use; hidden files; Trojans (root kit) loaded in system.
Non-Volatile Information
Step 4: Make Bit Stream Backups of Hard Disks and Floppy Disks.
◦ Must be able to prove that you did not alter any of the evidence after the
computer came into your possession.
◦ File slack is a data storage area of which most computer users are unaware; a
source of significant security leakage.
Step 11: Search Files, File Slack and Unallocated Space for Key Words.
Steganography: The art of storing information in such a way that the existence of the
information is hidden.
Watermarking: Hiding data within data
Information can be hidden in almost any file format.
File formats with more room for compression are best
Numerous software applications will do this for you: Many are freely
available online.
Hard Drive/File System manipulation
Slack Space is the space between the logical end and the physical end of file
and is called the file slack. The logical end of a file comes before the physical
end of the cluster in which it is stored. The remaining bytes in the cluster are
remnants of previous files or directories stored in that cluster.
Bad sectors occur when the OS attempts to read info from a sector
unsuccessfully. After a (specified) number of unsuccessful tries, it copies (if
possible) the information to another sector and marks (flags) the sector as bad
so it is not read from/written to again.
Extra Tracks: most hard disks have more than the rated number of tracks to
make up for flaws in manufacturing (to keep from being thrown away because
failure to meet minimum number).
Usually not required or used, but with direct (hex editor) reads and
writes, they can be used to hide/read data.
Change file names and extensions – i.e. rename a .doc file to a .dll file.
– Human Observation
• Generally, this only occurs if the amount of data hidden inside the
media is too large to be successfully hidden within the media (15%
rule).
– Software analysis
• Even small amounts of processing can filter out echoes and shadow
noise within an audio file to search for hidden information.
• If the original media file is available, hash values can easily detect
modifications.
– Disk analysis utilities can search the hard drive for hidden tracks/sectors/data.
– RAM slack is the space from the end of the file to the end of the containing
sector. Before a sector is written to disk, it is stored in a buffer somewhere in
RAM. If the buffer is only partially filled with information before being
committed to disk, remnants from the end of the buffer will be written to disk.
In this way, information that was never "saved" can be found in RAM slack on
disk.
– Statistical Analysis
• Statistical analysis of the LSB will tell you if the LSB bits are random
or not
– Frequency scanning
– Deleted data can be reconstructed (even on hard drives that have been
magnetically wiped)
– Check swap files for passwords and encryption keys which are stored in the
clear (unencrypted)
– Software Tools
• Break encryption
Example:
GetFree - Forensic Data Capture Tool When files are 'deleted' in DOS, Windows, Windows
95 and Windows 98, the data associated with the file is not actually eliminated. It is simply
reassigned to unallocated storage space where it may eventually be overwritten by the
creation of new files over time. Such data can provide the computer forensics investigator
with valuable leads and evidence.
GetSlack - Forensic Data Capture Utility this software is used to capture all of the file slack
contained on a logical hard disk drive or floppy diskette on a DOS, Windows, Windows 95
and/or Windows 98 computer system. The resulting output from GetSlack can be analyzed
with standard computer utilities or with special NTI tools, e.g., Filter_I and Net Threat
Analyzer software.
Forensic Graphics File Extractor - NTI's Forensic Graphics Image File Extractor is a
computer forensics software tool which was designed to automatically extract exact copies of
graphics file images from ambient data sources and from SafeBack bit stream image backup
files. The latter process has the potential of quickly identifying all graphics file images stored
on a computers hard disk drive. The resulting output image files can be quickly evaluated
using a graphics file viewer.
Network forensics
As technology has advanced, computers have become incredibly powerful.
Unfortunately, as computers get more sophisticated, so do the crimes committed with them.
Distributed Denial of Service Attacks, ILOVEYOU and other viruses, Domain Name
Hijacking, Trojan Horses, and Websites shut down are just a few of the hundreds of
documented attack types generated by computers against other computers usually using an
electronic network. The need for security measures to prevent malicious attacks is well
recognized and is a fertile research area as well as a promising practioner's marketplace.
Though there is an immense effort ongoing to secure computer systems and prevent attacks,
it is clear that computer and network attacks will continue to be successful. When attacks are
successful, forensics techniques are needed to catch and punish the perpetrators, as well as to
allow recovery of property and/or revenue lost in the attack. Computer and Network
Forensics (CNF) techniques are used to discover evidence in a variety of crimes ranging from
theft of trade secrets, to protection of intellectual property, to general misuse of computers.
The ultimate goal of computer and network forensics is to provide sufficient evidence to
allow the criminal perpetrator to be successfully prosecuted. As such, CNF efforts are mainly
centered in law enforcement agencies. Any enterprise that depends on, or utilizes, computers
and networks should have a balanced concern for security and forensic capabilities.
Unfortunately, there is little academic or industrial research literature available on CNF.
Forensic techniques are developed by the try and fix method, and few organizations have
plans for conducting forensics in response to successful attacks. We propose several
categories of policies that will help enterprises deter computer crime and will position them
to respond effectively to successful attacks by improving their ability to conduct computer
and network forensics. These policies correlate to taxonomy of approaches common to
computer attacks. We present policies in the following categories: Retaining Information,
Planning the Response, Training, Accelerating the Investigation, Preventing Anonymous
Activities and Protecting the Evidence.
The evidence found during a forensic investigation may depend on the type of crime
committed. For example, in a criminal case, incriminating evidence may be found such as
documents related to homicides, financial fraud, drug or embezzlement record keeping, or
child pornography. In a civil case, evidence of personal and business records related to fraud,
divorce, discrimination, or harassment could be found.
CNF experts are not only hired by lawyers. CNF techniques are sometimes needed by
insurance companies to discover evidence to decrease the amount paid in an insurance claim.
Individuals may also hire CNF experts to support a claim of wrongful termination, sexual
harassment, or discrimination. Gathering evidence is at the heart of CNF. In computer-related
crimes, evidence is accumulated from information collected by different components of the
system. The information does not become evidence until a crime is committed and this data
is used to find clues. For this reason, we call the data collected by the system potential
evidence. There are many sources of potential evidence in computers and network
components. Files are an obvious source of potential evidence. Application output word
processors, spread sheets, etc. are almost always valuable potential evidence, as are hidden
application files that may contain history information, caches, backups, or activity logs.
Occasionally, sophisticated criminals may encrypt incriminating files or attempt to hide them
with system-oriented or otherwise unlikely looking names. There are numerous sources of
potential evidence, which we discuss more exhaustingly in the section dedicated to
establishing recommended policies. Because gathering potential evidence may not be as easy
as finding application files on a computer, it requires someone with special skills. CNF
experts are specially trained with the skills necessary to successfully carry out a forensic
investigation. A forensics expert must have the investigative skills of a detective, the legal
skills of a lawyer, and the computing skills of the criminal. Even with these skills, CNF is not
an exact science, so there is no guarantee that an expert will find sufficient evidence.
However, experienced forensics specialists can find more potential evidence than even the
best hackers will expect.
Conclusion
Practical investigations tend to rely on multiple streams of evidence which
corroborate each other - each stream may have its weaknesses, but taken together may point
to a single conclusion. Disk forensics may remain for some time the single most important
form of digital evidence .Increasing number of computer crime means increasing demand for
computer forensics services. In doing computer forensics investigation, choosing the right
disk imaging tool is very important. There is no standard conformity of computer forensic
imaging methodology or tool. This paper only provides guidance and suggestions regarding
imaging tool. It should not be constructed as mandatory requirement.
Today, everyone is exposed to potential attacks and has a responsibility to its network
neighbors to minimize their own vulnerabilities in an effort to provide a more secure and
stable network. As the enormity of the problem unfolds, we will better comprehend how vital
it is to work towards dramatic changes in research, prevention, detection and reporting, and
computer crime investigation. Security can no longer be thought of as an impediment to
accomplishing the mission, but rather a basic requirement that is properly resourced.
Our focus has been to implement the newest and most advanced technology, but little
has prepared us for the gaping security holes we‟ve neglected to mend along the way. From
the ranks of management to every employee that works behind each terminal, the policies
that protect and mitigate risks must be current, understood, and aggressively enforced.
Reporting must be standard operating procedure so that everyone can realize the total impact
and define what is required for a secure cyber environment. The responsibility belongs to
everyone and it is with that effort we will be able to harness the security of this new
technological age. An enormous challenge lies before us and we must attack it with the same
enthusiasm and determination that brought us to this new frontier.
References
All State Investigations, Inc. January 2005 http://www.alls
tateinvestigation.com/ComputerForensicServices.htm
Computer Forensics, Inc. http://www.forensics.com/
Computer Forensic Services, LLC. January 2005.
http://www.computer-forensic.com/index.html
International Association of Computer Investigative
Specialists. January 2005. http://www.cops.org/