Computer and Network Forensics
Computer and Network Forensics
&
Network Forensics
(18 August, 2002)
http://www.cybercrime.gov/searchmanual.pdf
CD-R Utilities
CD-R Diagnostics - http://www.cdrom-prod.com/public.html
Text Searches
dtsearch - http://www.dtsearch.com
Disk Wiping
DiskScrub - http://forensics-intl.com/thetools.html
May 2002 Copyright 2002 All Rights Reserved 17
Software Toolkit - Examples Contd
Forensic Programs
Forensic Toolkit -
http://www.foundstone.com/rdlabs/tools.php
The Coroner's Toolkit (TCT) -
http://www.fish.com/tct/
ForensiX -
http://www.all.net/
New Technologies Inc (NTI) -
http://forensics-intl.com/thetools.html
Start Field
for
time
correlation
netcat data
Step 1. Start the Forensics Station Netcat program listening on port 10,005.
# nc -1 - p 10005 > suspect.netstatus.txt
Step 1. Start the Forensics Station Netcat program listening on port 10,000
nc -1 - p 10000 >
tmp/nc.suspect.passwd_file
Step 2. On the Target Station Netcat data to the Forensics station.
cat /etc/passwd /etc/shadow | nc 192.168.0.2 10000 -w 3
Perform an md5sum on the data after receipt.
Data to be retrieved.
Time/date of the files.
System Logs
Configuration files.
System Ram.
Step 1. Start the Forensics Station Netcat program listening on port 2222.
nc -1 - p 2222 | des -d -c -k password |dd of = messages md5sum
messages
Step 2. On the Target Station Netcat log file to the Forensics station.
dd if =/var/log/messages | des -e -c -k password | nc 192.168.0.2 2222 -w 3
netcat Memory
file
Step 1. Start the Forensics Station Netcat program listening on port 2222.
nc -1 - p 2222 > suspect.mem.images&
Step 2. On the Target Station Netcat log file to the Forensics station.
dd bs=1024 < /proc/kmem | nc 192.168.0.2 2222 -w 3
bs is the block transfer size
Hidden Data.
Files
NTFS streams.
Rename
Attribute change
Extension change
Slack Space - The data between the end of the data and the end
of the block.
Swap File - A hidden window file, pagefile.sys, used by virtual
memory.
Unallocated clusters - Blocks not currently used by a file.
Unused partitions - Space allocated and formatted but does not
appear to contain data.
Hidden files/partitions - Hidden space that might contains unallocated
space used to deliberately hide data.
May 2002 Copyright 2001 All Rights Reserved 73
Forensic Analysis Contd
Log Analysis.
Employ Dumpel to dump the System Log, Application Log and
Security Log.
Import into Excel and analyze.
Dumpel from the NT Resource Kit (NTRK)
Recovering Deleted files and Data
Undeleting Files
File Scavenger http://www.quetek.com/prod01.htm
Disk Search Pro http://www.forensics-intl.com/dspro.html
Recycle Bin
Temporary Files
Backups
Registry Review.
Employ regedit to identify previously installed software and
applications such as steganography tools, sniffer tools,
l0phtcrack, etc.
Look in:
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_CONFIG
Swap Files.
Swap files are hidden system files used as virtual memory
when there is insufficient RAM.
Employ dir /ah or the Windows Explorer >Tools>Folder
Options>Show Hidden Files.
Broken Links
Links associate desktop shortcuts or Start menu with an
application or document.
chklnks.exe from NTRK displays broken links.
Failure to PlayBack.
Encrypted traffic.
Graphics
Modeling and Simulation traffic.
Failure to Trace.
Denial-of-Service.
Distributed Denial of Services.
Spoofed EMail.
Failure to Detect.
Steganography.
Erased Logs
File Encryption.
Binary Trojans
May 2002 Copyright 2002 All Rights Reserved 90
Monitoring Tools
Dsniff http://www.monkey.org/~dugsong/dsniff
tcpdump http://www.tcpdump.org/
WinDump http://netgroup-serv.polito.it/windump/
ethereal http://www.ethereal.com/
Snort http://www.snort.org/
Snoop http://www.packetstormsecurity,org/