Incident Response Computer Forensics Toolkit
Incident Response Computer Forensics Toolkit
Incident Response Computer Forensics Toolkit
Incident
evidence to report the crime, and con- data from memory tions. Schweitzer is also the
duct audits to prevent future attacks. author of Internet Security Made
• Analyze and detect when malicious
He also provides you with a firm Easy and Securing the Network
code enters the system and quickly
understanding of the methodologies from Malicious Code.
locate hidden files
for incident response and computer
forensics, Federal Computer Crime law
information and evidence require-
ments, legal issues, and how to work
Response
CD-ROM includes:
with law enforcement.
• Create a forensics toolkit to prop- • Helpful tools to capture and
erly collect and preserve evidence protect forensic data; search
volumes, drives, and servers for
Incident Response
• Contain an incident by severing
evidence; and rebuild systems
network and Internet connections,
quickly after evidence has been
and then eradicate any vulnerabili- Computer
obtained
ties you uncover
• Valuable checklists developed
• Anticipate future attacks and
by the author for all aspects of Forensics
monitor your system accordingly
incident response and handling
• Prevent espionage, insider
attacks, and inappropriate use of
Toolkit
the network
• Develop policies and procedures to
carefully audit the system
Wiley Technology Publishing Timely. Practical. Reliable.
Visit our Web site at www.wiley.com/compbooks/
Schweitzer
ISBN: 0-7645-2636-7
Douglas Schweitzer
*85 5 -IGFADh ,!7IA7G4-fcgdgh!:p;o;p;K;K
a526367 FM.qxd 3/21/03 3:37 PM Page i
Incident Response:
Computer Forensics Toolkit
a526367 FM.qxd 3/21/03 3:37 PM Page ii
a526367 FM.qxd 3/21/03 3:37 PM Page iii
Incident Response:
Computer Forensics
Toolkit
Douglas Schweitzer
a526367 FM.qxd 3/21/03 3:37 PM Page iv
ISBN: 0-7645-2636-7
10 9 8 7 6 5 4 3 2 1
1O/RR/QU/QT/IN
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic,
mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States
Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy
fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8700. Requests to the
Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN
46256, (317) 572-3447, fax (317) 572-4447, E-Mail: [email protected].
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make
no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any
implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives
or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a
professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages,
including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department
within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Trademarks: Wiley, the Wiley Publishing logo, and related trade dress are trademarks or registered trademarks of Wiley Publishing, Inc., in
the United States and other countries, and may not be used without written permission. All other trademarks are the property of their
respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.
a526367 FM.qxd 3/21/03 3:37 PM Page v
Credits
ACQUISITIONS EDITOR PROJECT COORDINATORS
Katie Feltman Cindy Phipps, Bill Ramsey
Acknowledgments
This book would not have been possible without the combined efforts of some very talented peo-
ple. I would first like to thank my agent, Carole McClendon of Waterside Productions for her assis-
tance in again finding me a superb publisher. I would also like to thank the hard-working
individuals at Wiley Publishing who helped to make this book a reality. Their enthusiasm and sup-
port were a continued shot in the arm. In particular, I would like to thank Acquisitions Editor,
Katie Feltman for her confidence in me and for helping me to shape and hone the initial outline
for the book. I am also grateful to Project Editor, Mark Enochs for all his suggestions. I would like
to say thank you to my wife and best friend, Monique, for without her help, this book would not
have been possible. I tip my hat to Russ Shumway who, as my technical editor, did a superb job
ensuring that all my facts were correct and who suggested a number of additions that kept this
book technically sound. Thanks, as well, to my sons Deran and Alex for their enduring patience
with me while I spent many long hours writing.
ix
a526367 FM.qxd 3/21/03 3:37 PM Page x
a526367 FM.qxd 3/21/03 3:37 PM Page xi
Contents at a Glance
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
a526367 FM.qxd 3/21/03 3:37 PM Page xii
a526367 FM.qxd 3/21/03 3:37 PM Page xiii
Contents
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Table of Contents xv
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
a526367 FM.qxd 3/21/03 3:37 PM Page xix
Introduction
On May 14, 1999, 54-year-old Sharon Guthrie drowned in the bathtub of her Wolsey, South Dakota
home. An autopsy revealed that 10 to 20 capsules containing Temazepan were present in her body.
The sleeping pills had been prescribed for her husband, the Reverend William Guthrie, pastor of
the First Presbyterian Church in Wolsey. Despite his denials of any wrongdoing in connection
with the death of his wife, police remained unconvinced of his innocence. Lacking any hard evi-
dence in the case, police decided to engage the services of computer forensics expert, Judd
Robbins. Several of the church computers frequently used by Rev. Guthrie were seized and frozen.
After several days of examining the minister’s files, Robbins eventually uncovered evidence that
Guthrie had been searching the Internet for painless and surefire killing methods. Robbins also
found detailed notes about sleeping pills and lethal household cleaning agents. On January 11,
2000, a 12-member jury convicted Guthrie of murder. Less than two weeks later, Circuit Judge
Eugene Martin sentenced him to life imprisonment.
Computer Crime
Not every crime committed with a computer is a computer crime. If someone steals a telephone
access code and makes a long-distance call, the code he has stolen is checked by a computer before
the call is processed. Nevertheless, such a case is more appropriately treated as “toll fraud,” not
computer crime. It would, however qualify as cyber crime if the code was obtained as a result of
hacking into a computer system. Although this example appears straightforward, many cases are
not so neatly categorized. A bank employee who steals money from a cash drawer is embezzling. A
bank employee who writes a computer program to randomly steal very small amounts from
numerous accounts may also be embezzling, yet committing (and prosecuting) this offense may
require a working knowledge of the bank’s computer system. As a result, such a crime may rea-
sonably be characterized as a computer offense.
According to the U.S. Department of Justice, computers generally play three distinct roles in a
criminal case. First, a computer can be the target of an offense. This occurs when conduct is
designed to take information without authorization from, or cause damage to, a computer or
computer network. The Melissa and Explore.Zip.Worm viruses, along with hacks into the White
House and other Web sites, are examples of this type of offense.
Second, a computer can be incidental to an offense yet still be significant in terms of law
enforcement purposes. For example, drug traffickers may store transactional data (such as names,
dates, and quantities) on computers, rather than in paper form.
Finally, a computer can be the tool used for committing an offense (such as fraud or the unlaw-
ful sale of prescription drugs over the Internet).
xix
a526367 FM.qxd 3/21/03 3:37 PM Page xx
xx Introduction
Digital evidence may be sought in a wide array of computer-related crimes, and computer
forensic examinations use a variety of methods for discovering data that resides in a computer sys-
tem, or for recovering deleted, encrypted, or damaged file information. Any or all of this informa-
tion can be of use in the processes of discovery, deposition, or litigation.
Introduction xxi
incident response teams and are better addressed by an organization’s business continuity (con-
tingency) plans. For the purpose of incident response, therefore, the term incident refers to an
adverse event that is related to information security.
Similarly, an event is any observable occurrence in a system and/or network. Examples of
events include the system boot sequence, a system crash, and data packet flooding within a net-
work. Events are important because they often provide an indication that an incident is occurring.
In reality, events caused by human error (for example, unintentionally deleting a critical directory
and all files contained therein) are the most costly and disruptive. Events related to computer
security, however, are attracting an increasing amount of attention within the computing com-
munity in general as well as within the federal government. Among other reasons, the unparal-
leled growth of networking and the abundance of malicious code available to perpetrators have
resulted in greatly exposing more systems to the threat of unauthorized remote access.
Types of Incidents
According to the Federal Computer Incident Response Center (FedCIRC), the term incident
encompasses the following general categories of adverse events:
✓ Malicious code attacks. Malicious code attacks include attacks by programs such as
viruses, Trojan horse programs, worms, and scripts used by crackers/hackers to gain
privileges, capture passwords, and/or modify audit logs to exclude unauthorized activity.
Malicious code is particularly troublesome in that it is typically written in such a man-
ner that it masquerades its presence, making it difficult to detect. Furthermore, self-
replicating malicious code such as viruses and worms can replicate rapidly, thereby
making containment especially challenging.
✓ Unauthorized access. Unauthorized access encompasses a range of incidents from
improperly logging into a user’s account (for example, when a hacker logs in to a legiti-
mate user’s account) to unauthorized access to files and directories stored on a system
or storage media by obtaining superuser privileges. Unauthorized access may also entail
accessing network data by planting an unauthorized sniffer program or device to capture
all packets traversing the network at a particular point.
✓ Unauthorized utilization of services. It is not absolutely necessary to access another
user’s account to perpetrate an attack on the system or network. An intruder may also
obtain access to information or plant Trojan horse programs by misusing available ser-
vices. Examples include using the network file system (NFS) to mount the file system of
a remote server machine or interdomain access mechanisms in Windows NT to access
files and directories in another organization’s domain.
✓ Disruption of service. Users rely on services provided by network and computing ser-
vices. Those with malicious intent can disrupt these services in a variety of ways, includ-
ing erasing critical programs, mail spamming (flooding a user account with electronic
mail), and altering system functionality by installing Trojan horse programs.
a526367 FM.qxd 3/21/03 3:37 PM Page xxii
xxii Introduction
✓ Misuse. Misuse occurs when someone uses a computing system for other than official
purposes, such as when a legitimate user uses a government computer to store personal
tax records.
✓ Espionage. Espionage is stealing information to subvert the interests of a corporation
or government. Many of the cases of unauthorized access to U.S. government systems
during Operation Desert Storm and Operation Desert Shield were the manifestation of
espionage activity against the United States.
✓ Hoaxes. Hoaxes occur when false information about incidents or vulnerabilities is
spread. In early 1995, for example, several users with Internet access distributed infor-
mation about a so-called Good Times Virus, even though the virus did not exist.
Chapter 1
✓ Incident verification
✓ Building a toolkit
THE HI-TECH REVOLUTION SWEEPING THE GLOBE in communications and information technology
has truly made the world a smaller place. With effects on both our personal and professional lives,
the United States is now investing more resources into the advancement of information technol-
ogy than into the management or manufacture of consumer goods. The Internet has become so
popular that it is now more commonplace to receive an e-mail message than a conventionally sent
letter in daily correspondence. Current estimates put the worldwide Internet population at over
580 million strong and growing.
In this ever-evolving age of information technology, the requirements of law enforcement are
shifting, as well. Some conventional crimes, especially those concerning finance and commerce,
continue to become ever more technologically sophisticated. Paper trails have given way to elec-
tronic trails. Crimes relating to the theft and exploitation of data are detected daily. As evidenced
in the murder of Sharon Guthrie, violent crime is also not immune to the use of the information
technology. Remember, Rev. Guthrie was convicted based upon forensic evidence gleaned from
his computer, namely the discovery of data indicating that he had visited Web sites that offered
instructions for carrying out a murder using tranquilizers. It is not unheard of for those dealing
in arms or drugs to store client names and contact information in databases on their computers.
1
b526367 Ch01.qxd 3/21/03 3:37 PM Page 2
Just as industry is gradually transforming from the manufacture of goods to the processing of
information, criminal activity has to a great extent also converted from a largely physical dimen-
sion to a cyber dimension. Investigations once carried out in a more concrete, material manner
now exist electronically, conducted online or through the examination of computer hardware and
software.
✓ Data objects. Objects or information of potential probative value that are associated with
physical items. Data objects may occur in different file formats (for example, NTFS or
FAT32) without alteration of the original information.
✓ Digital evidence. Information of probative value that is stored or transmitted in digital
form.
✓ Physical items. Items on which data objects or information may be stored and/or
through which data objects are transferred.
✓ Original digital evidence. Physical items and the data objects associated with such items
at the time of acquisition or seizure.
b526367 Ch01.qxd 3/21/03 3:37 PM Page 3
✓ Duplicate digital evidence. An accurate digital reproduction of all data objects contained
on an original physical item.
crime. Their own computers — not just computers of people they know — have been infected with a
virus or worm, their company website has been defaced or its presence crippled by a denial of service
attack, or their information systems have been infiltrated and their company’s proprietary data has
fallen into the hands of an unidentified intruder. Indeed, as time passes, amongst those that actively
use computers, I meet fewer and fewer organizations that have proven immune to these growing
threats. And, I suspect that the people in this room, and the groups you represent, are no different. If
you don’t think that you or your company has ever been affected by some form of cybercrime, either
you just aren’t aware of it, or you are a lucky member of a rapidly narrowing class. An annual com-
puter crime survey conducted jointly between the Computer Security Institute and the FBI bears this
out. In 1996, when we asked systems administrators if anybody had gained unauthorized access to
their computers, less than half, 42 percent, answered yes. Last year, when asked the same question,
well over half of the respondents, a full 70 percent, answered yes. And there lies the irony to the pri-
vacy debate. Law-abiding citizens are finding that their privacy is increasingly being intruded upon by
criminals. Meanwhile, the criminals are gaining privacy. I’ve been the Director of the NIPC for a little
over eight months now, having held a number of different management positions at the Center since
arriving there in 1998. I have watched it grow and develop almost from its inception. Bear in mind
that, just three years ago, infrastructure protection was relatively new ground for the Federal govern-
ment. President Clinton issued Presidential Decision Directive 63 in May of 1998. It was a wake up
call, which established a new framework for doing business. For the first time, the Federal govern-
ment created an interagency entity, the National Infrastructure Protection Center — combining the
United States law enforcement, military, and intelligence communities — to work directly with the
private sector to achieve what many to this day say is impossible: The elimination of all vulnerabilities
to our nation’s critical infrastructures. Eliminating all of these vulnerabilities, stated the President,
would necessarily require “flexible, evolutionary approaches” spanning both the public and private
sectors, and protecting both domestic and international security.
Mr. Dick’s concern that “Law-abiding citizens are finding that their privacy is increasingly
being intruded upon by criminals while the criminals are gaining privacy” is echoed in both the
public and private sectors. Nevertheless, apprehending cyber criminals and remaining within the
confines of the law while doing so, remains imperative. Improper procedures in the gathering and
handling of potential evidence may render that evidence inadmissible in a court of law. The USA
Patriot Act of 2001 made significant changes to federal search and seizure laws.
x-ref
For more on the USA Patriot Act of 2001, see Chapter 2 and Appendix C.
While it is beyond the scope of this book to turn the reader into a forensics expert, the proper
gathering of computer evidence can confirm or dispel concerns about whether an illegal incident
has occurred. Such detective work can also document computer and network vulnerabilities after
an incident has been verified. In addition, you may wish to obtain additional training before
attempting some of techniques outlined in this book.
b526367 Ch01.qxd 3/21/03 3:37 PM Page 5
It is the general consensus among computer security experts that the vast majority of com-
puter crimes are neither detected nor reported. To a certain extent, this is because many com-
puter crimes are not overtly obvious. To use a simple analogy, when an item (especially an
important one) is stolen, the owner readily detects this because the item is missing. However, if a
hacker steals computer data by copying it, the original data remains, and is still accessible to the
owner. There is a variety of ways incidents can occur and various manners in which they impact
an organization.
Some common types of computer incidents include the following:
Unfortunately, there are no blanket solutions to prevent incidents from occurring, and the lim-
ited solutions that do exist are expensive and require an enormous amount of an organization’s
resources. The option of using weak incident response methods (or no methods at all) is, however,
even more expensive and only compounds the damage that incidents cause. What’s required is a
long-term commitment to systematically prevent and respond to security incidents instead of just
making short-term fixes for selected problems. Experience shows that most organizations do not
think about how they will respond to a computer security incident until after they’ve been signif-
icantly victimized by one. They have not assessed (nor anticipated) the business risk of not having
in place formal incident-detection and response mechanisms.
When it is not known that an intrusion (or an intrusion attempt) has occurred, it is difficult,
sometimes impossible, to determine later that your systems have been compromised. If the infor-
mation necessary to detect an intrusion is not being collected and reviewed, the organization can-
not determine what sensitive data, systems, and networks are being attacked and what breaches in
confidentiality, integrity, or availability have occurred. As a result of an inadequate ability to
detect the signs of intrusion, the following may occur:
✓ You will not be able to detect such signs in a timely manner due to the absence of neces-
sary warning mechanisms and review procedures.
✓ You will not be able to identify intrusions because of the absence of baseline information
with which to compare your current operational state. Differences between a previous
configuration and your current state can provide an indication that an intrusion has
occurred.
b526367 Ch01.qxd 3/21/03 3:37 PM Page 7
✓ You will not be able to determine the full extent of an intrusion and the damage it has
caused. You will also be unable to tell whether you have completely removed the pres-
ence of the intruder from your systems and networks. This will significantly impede, and
even increase, your recovery time.
✓ Your organization may be subjected to legal action. Intruders can make use of systems
they have compromised to launch attacks against other systems. If one of your systems
is used in this fashion, you may be held liable for not exercising adequate due care with
respect to security.
✓ Your organization may experience a tarnishing blow to its reputation.
✓ If your investigation finds something that isn’t explained by authorized activity, immedi-
ately initiate your intrusion response procedures (response procedures are covered later
in this chapter).
Even if your organization has implemented security measures (such as firewalls), it is essential
that you closely monitor your computer system for signs of intrusion. Monitoring can be compli-
cated because intruders often hide their activities by modifying the systems they’ve broken into. An
intrusion can already be underway and continue unnoticed because to users it appears that every-
thing is operating normally (on the surface). The following checklist for Windows outlines impor-
tant indications that your system may have been compromised, along with some helpful solutions:
b526367 Ch01.qxd 3/21/03 3:37 PM Page 8
✓ Look for unusual or unauthorized user accounts or groups. There are several ways to do
this. You can use the User Manager tool in Windows NT or the Computer Management
tool in Windows XP (see Figure 1-1) or the net user, net group, and net localgroup
commands at the command line (DOS prompt). If the system does not require guest
access, make sure that the built-in Guest account is disabled.
✓ Using the computer management tool, check all groups for invalid user membership. In
Windows NT, 2000, and XP, several of the default groups give unique privileges to the
members of those groups. For example, while members of the Network Configuration
Operators have limited administrative privileges to manage configuration of networking
features, members of the Administrators group have the power to alter nearly any facet
of the operating system.
Besides the aforementioned built-in Windows management tool, another useful freeware audit-
tip
ing utility is DumpSec by SomarSoft. This security auditing program for Windows NT dumps the
permissions (DACLs) and audit settings (SACLs) for the file system, Registry, printers, and shares
in a concise and easy-to-read format making any holes in system security more readily apparent.
For additional information or to download a copy of DumpSec visit www.somarasoft.com.
✓ Check log files for connections from unusual locations or for any unusual activity.
All versions of Windows NT have a built-in Event Viewer that allows you to check for
unusual logon entries, failures of services, or abnormal system restarts. Keep in mind
that if your firewall, Web server, or router writes logs to a different location than the
compromised system; you need to examine these logs as well.
x-ref
✓ Search for invalid user rights. To examine user rights use the User Manager tool under
Policies → User Rights. There are more than two-dozen rights that can be assigned to
users or groups. Normally the default configuration for these rights is secure.
✓ Check to see if unauthorized applications are running. There are several approaches
hackers can take to start a backdoor program, therefore you may need to take one or
more of the following precautions:
■ Examine the Windows Registry. All versions of Windows come with a built-in Registry
Editor (see Figure 1-2) that can be easily accessed by typing regedit at the command
prompt. Several of the most common locations from which applications start
through the Registry are illustrated in Table 1-2.
x-ref
■ Look for invalid services. Some backdoor programs install themselves as a service
that automatically starts when Windows first loads. Services can then run as any user
with the Logon as Service user right. Check services that are started automatically
and be sure that they are indispensable. The services executable file should also be
scanned with an antivirus program to ensure that it has not been replaced with a
Trojan horse or backdoor program. Logon rights control how security personnel are
allowed access to the computer. These rights apply whether the access is from a key-
board or as a service that is activated when Windows loads. For each logon method,
there exist two logon rights; one to permit logging on to the computer and another
to deny logging on to the computer.
caution
Backdoor programs allow hackers to access your computer while it is connected to the Internet.
They can steal passwords, log keystrokes, and even crash your computer. The intruder first must
trick a user into running the program on the user’s computer. This is usually accomplished by
sending the file by e-mail message or via an instant messaging service.
■ Monitor system startup folders. You can examine all the shortcuts by selecting
Start → Programs → Startup. There are two different startup folders, one for the local
user and one for all users. When a user logs on, all of the applications in both the All
Users folder and in the user’s startup folder are started. Because of this it is important
to check all of the startup folders for suspicious applications.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\KnownDLLs
HKEY_LOCAL_MACHINE\System\ControlSet001\Control\Session Manager\KnownDLLs
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\RunOnce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\RunOnceEx
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
Continued
b526367 Ch01.qxd 3/21/03 3:37 PM Page 12
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\RunOnceEx
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows
(“run=” value)
RegCleaner (see Figure 1-3), written by Jouni Vuorio, is a freeware program for Windows that is
note
✓ Inspect network configurations for unauthorized entries. Look for invalid entries for set-
tings like WINS, DNS, IP forwarding, and so on. These settings can be checked using the
Network Properties tool or by using the ipconfig /all command at the command
(DOS) prompt.
✓ Check your systems program files for alterations. Compare the versions on your systems
with copies that you know have not been altered, such as those from your original
installation media. Be cautious of trusting backups; they too may contain Trojan horses.
✓ Check for unusual ports listening for connections from other hosts by using the net-
stat -an command at the command prompt. Powerful third-party port-scanning pro-
grams like SuperScan by Foundstone, Inc. can also be used to scan for open or active
TCP/UDP ports. SuperScan (see Figure 1-4) is a freeware program that can be found at
www.webattack.com.
x-ref
Figure 1-4: SuperScan by Foundstone, Inc. can scan for open or active TCP/UDP ports.
b526367 Ch01.qxd 3/21/03 3:37 PM Page 14
note Trojan horse programs are often engineered to mimic the same file size as the legitimate pro-
gram they replace. As a result, just checking file properties and time-stamps associated with the
applications is not sufficient for determining whether or not the legitimate programs have been
replaced by a Trojan horse. A better alternative is to use Tripwire.
Tripwire is a Unix-based file-system-integrity-checking program that ensures the integrity of crit-
ical system files and directories by identifying all changes made to them. By using Tripwire for
intrusion detection and damage assessment, you will be able to keep track of system changes
which in turn can speed up the recovery from a system compromise by reducing the number of
files you must restore to repair the system.
Using antivirus software aids in the detection of computer viruses, backdoor programs, and
Trojan horse programs. However, bear in mind that since malicious programs are being created
continuously, it is important to always keep your antivirus software up to date.
✓ Society’s increased reliance on computers. Today, nearly every organization, both public
and private, relies on computers and networks for communication. Because of this
increased reliance, many agencies would suffer great losses to productivity should their
systems become unavailable. Due to system complexity, reliance on computer systems
often presents unanticipated risks and vulnerabilities.
✓ Malicious code. Computer viruses, Internet mail worms, and Trojan horses in particular,
continue to wreak havoc in personal computer security. As bad as this problem is at pre-
sent, malicious code difficulties will only get worse. This is primarily a result of the pro-
liferation of personal computers (with minimal built-in security controls), LANs, and a
blatant disregard for safe computing practices. The number of variants and copycats of
viruses has also increased and shows no signs of abating.
✓ Wide area networks (WANs). The use of WANs, linking governments, businesses, and
educational institutions, continues to grow. An efficient response to a computer security
incident is important for agencies linked via large networks such as an intranet or the
Internet. Because of their interconnectivity, a compromise of one computer can affect
b526367 Ch01.qxd 3/21/03 3:37 PM Page 15
other systems that are connected to the network but are located in different organiza-
tions, resulting in possible legal or financial ramifications. Incident response teams are
aware that intruder attempts to penetrate systems occur daily at numerous sites through-
out the United States, yet many organizations remain unaware that their systems have
been penetrated or have been used as springboards for attacks on other systems.
✓ Reduced barriers to hacking. Computing power is readily available, as is broadband con-
nectivity. Hackers can download tools readily from the Internet, so relatively unskilled
attackers can launch very sophisticated attacks.
Today, being prepared to handle a computer security incident has become a top priority for
most system administrators. As businesses increase their online presence and their dependency
on information systems’ assets, the number of computer incidents also rises. These organizations
are finally recognizing their need to adapt their security positions accordingly. This is accom-
plished in three stages.
First, organizations must develop and implement security plans and controls in a proactive
effort. Second, they must work to ensure that their plans and controls are effective by continually
reviewing and modifying them to guarantee that appropriate security is always in place. Finally,
when controls are bypassed, either intentionally or unintentionally, organizations must be pre-
pared to act quickly and effectively to minimize the impact of these lapses.
The prime objective of these security measures is to prevent an operational security problem
from becoming a business problem that impacts revenue. Administrators and other users can
obtain guidelines in this book to preplan a response to incidents and minimize any negative
impact to a business. Waiting until an incident has occurred is naturally too late to begin planning
how to address such an event. Incident response planning requires maintaining both administra-
tive and technical roles. Each party must be familiar with the other’s role, responsibilities, and
capabilities.
Many computer security programs are not effective in dealing with newer and less-understood
classes of threats to security. Traditional responses, such as risk analysis, contingency planning,
and computer security reviews, have not been adequate in controlling incidents and preventing
large-scale damage. Anecdotes abound wherein security incidents grow worse or where they have
not been eradicated from a system. Consequently, some organizations spend far too much time
reacting to recurring incidents, sacrificing convenience and productivity. Fearing unknown
threats, some institutions have misguidedly restricted access to their systems and networks. What
is needed instead therefore is a fundamentally different form of computer security response, a
response that is able to quickly detect and react to incidents in a manner that is both efficient and
cost-effective.
caution
A business should always make the effort to eradicate a security incident from the system imme-
diately. For example, when companies fail to patch their e-mail programs for known and publi-
cized flaws, they may get hit with a copycat virus that exploits the exact same flaw.
b526367 Ch01.qxd 3/21/03 3:37 PM Page 16
Having a computer security incident response capability means that an organization is pre-
pared to detect and counter computer security incidents in a skilled and efficient manner. Such a
capability is a combination of technically skilled people, policies, and techniques with the aim of
constituting a proactive approach to handling computer security incidents. Having an incident
response capability with traditional computer security elements can provide organization-wide
protection from damaging incidents, saving the organization valuable resources and permitting it
to take better advantage of the latest computer technology. Many businesses, organizations, and
government agencies have implemented incident response capabilities with great success, gener-
ally focusing on the following areas:
✓ Efficient response. Efficiency is one of the most important aspects of a computer security
incident response capability. Without an efficient capability, incident response is disorga-
nized and ineffective, with the organization maintaining higher expenses and leaving vul-
nerabilities open and unprotected. For example, uneducated responses to small outbreaks
of computer viruses can actually make their effects far worse, resulting in hundreds of
computers being infected by the response team itself. A proper computer security inci-
dent response capability helps in the management of incident response expenses that are
otherwise difficult to track, makes risk assessment more accurate, and improves user
training and awareness with regard to computer security. Conversely, an inefficient inci-
dent response effort can perpetuate existing problems and even exacerbate them.
✓ Centralization. A security incident response capability must utilize centralized means
for reporting and handling incidents. While this undoubtedly increases efficiency, it also
permits a more accurate assessment of the incidents, such as whether they are related
(in order to more quickly avert possible widespread damage). By virtue of centralization,
incident response capability expenses and overhead can be kept down, and duplication of
effort can be reduced (possibly eliminated entirely). Organizations may find a significant
cost savings as a result.
✓ Improved user awareness. The benefits of an incident response capability include
enhanced user awareness of threats and knowledge of appropriate controls. An incident
response capability will help an organization identify vulnerabilities and issue computer
security alerts. Information regarding security awareness can be disseminated through-
out the organization by using a variety of mechanisms such as a company intranet, sem-
inars, and training workshops. Such information greatly improves the users’ ability to
manage their systems efficiently and securely.
personnel with the requisite technical skills. The following are additional necessary features for a
computer security incident response capability:
✓ Structure. There is no single structure for a computer security incident response capa-
bility. Depending on the organization’s needs, this capability can take many forms. While
centralization often presents the most cost-effective structure, some organizations find
that a more widely distributed structure, despite some inevitable overlap, fits in best
with existing structures. Very small organizations may find it practical to share an inci-
dent response capability with a larger organization. Hence, an incident response capabil-
ity structure will vary depending on a variety of factors. Centralized reporting and
centralization of effort, however, generally helps decrease operating costs and improve
efficiency and security.
✓ Alert mechanisms. The incident response capability should include the capacity to
quickly reach all users by sending an alert to a central mailing list, or, alternatively, tele-
phone voice mail, messages via pagers or memorandums, or management contact lists.
✓ Centralized reporting. Effective incident response depends upon an organization’s ability
to quickly and conveniently communicate. Effective communications mechanisms include
a central telephone hotline monitored on a 24-hour basis, a central e-mail messaging
address, or a pager/cell phone arrangement. Users are more inclined to contact their com-
puter security incident response personnel if the organization has made the communica-
tion straightforward (for example, users only have to remember one telephone number).
✓ Personnel. The organization should create a group of individuals that are responsible for
handling incidents: a computer incident response team. Computer security incident
response personnel must diagnose and/or understand technical problems, thus technical
knowledge is a primary requirement for team members. Superior communications skills
are equally important. Computer security incidents can generate emotionally charged
situations; a skilled communicator must know how to resolve technical problems with-
out fueling negative emotions or further complicating the situation. In addition, inci-
dent response personnel may spend much of their time communicating with affected
users and managers, either directly or by preparing alert information, bulletins, and
other guidance materials. It may be difficult, yet imperative, to find personnel who have
the correct mix of technical, communications, and social skills.
personnel will impact (and potentially compromise) the security efforts of the rest of the organi-
zation as well as its customers.
To develop a complete incident response capability, all organizations need an incident response
team. In the event of suspected computer crime or violations of user policies, the team should be
engaged. Beforehand, the team should have written procedures for incident response, including
what conditions warrant calling in local and/or federal law enforcement authorities. For example,
inside violations of user policies may result in administrative actions such as employee suspen-
sion or termination of employment, while other, more serious computer crimes may warrant that
law enforcement be contacted.
In either case, the incident response team must protect evidence. For policy violations and
administrative actions, the following procedures may be sufficient. However, for more serious
computer crimes, law enforcement authorities may instruct the incident team to wait for their
arrival before taking action.
The actions required for securing a suspected computer incident scene include
✓ Loss of passwords
Mid-level incidents are more serious and should be handled the same day the event occurs
(normally within two to four hours of the event). These include
b526367 Ch01.qxd 3/21/03 3:37 PM Page 19
High-level incidents are the most serious. Because of the gravity of these situations and the
likelihood of damage resulting to the organization’s bottom line, these types of incidents should
be handled immediately. They include
✓ Child pornography
✓ Pornography
✓ Personal theft (higher in value than a mid-level incident) related to a computer incident
✓ Malicious code (for example, viruses, worms, Trojan horses, and malicious scripts)
✓ Changes to system hardware, firmware (for example, BIOS), or software without the sys-
tem owner’s authorization
✓ Any violation of the law
Other types of incidents may include isolated cases of viruses or misuse of computer equip-
ment, unintentional actions, and common, unsuccessful scans or probes. When faced with a secu-
rity incident, an organization should be able to respond in a manner that both protects its own
information and helps protect the information of others that might be affected by the incident.
✓ Preservation of evidence
✓ Assessment
✓ Damage determination
✓ Report documentation
✓ Lessons learned
Recovery Operations
Every organization should prioritize those actions that support the smooth recovery of a compro-
mised system. In no case should a compromised system, Web page, or application be returned to
normal operation without the approval of the CIO or the person designated to be in charge of com-
puter security. Computer security officers should reserve the right to further scrutinize the system
to ensure that appropriate security is in place and continues to protect the organization. The orga-
nization should resume normal operation of the restored system only upon approval by the secu-
rity team. Security personnel should usually request a 24-hour period for responding to the
incident with the power to approve or disapprove the return of the system to normal operations.
outside organizations. The impact to each system should be analyzed to determine if control of
the system has been compromised. All compromised systems should be disconnected from exter-
nal communications immediately or as soon as possible. Control of a system is lost when an
intruder obtains control of powerful root or system accounts with high-level administrative priv-
ileges. A determination should also be made if log files have been erased or compromised.
Shutdown Procedures
✓ Program Manager
Shutdown Procedures
✓ Program Manager
Shutdown Procedures
Shutdown Procedures
Shutdown Procedures
■ The root user prompt is set to # sign. If not present, change user to root (type su -).
At that point you are prompted for the root password. If the password is available,
enter it. At the # sign, type sync;sync;halt, and the system will shut down. If you
do not have the root password, pull the power cord from the wall.
■ If the # sign is displayed when at the console, type id and press Enter. If you see that
your user ID is root, type sync;sync;halt, and press Enter. This will shut down the
system. If your user ID is not root, pull the cord from the wall.
✓ Trash icon
Shutdown Procedures
✓ Click Special.
✓ Click Shutdown.
For more on the pros and cons of dealing with law enforcement, see Chapter 2.
✓ If unsure of what actions to take, do not stop systems processes or tamper with files.
This may destroy traces of an intrusion.
✓ Follow organizational policies/procedures. (Your organization should have a computer
incident response capability/plan.)
✓ Use the telephone to communicate. Attacker(s) may be capable of monitoring e-mail
traffic.
✓ Contact the incident response team for your organization. Quick technical expertise is
crucial in preventing further damage and protecting potential evidence.
✓ Consider activating Caller Identification on incoming lines. This information may help
in leading to the identification of the source/route of intrusion.
✓ Establish points of contact with general counsel, emergency response staff, and law
enforcement officials. Preestablished contacts will help in a quick response effort.
✓ Make copies of files an intruder may have altered or left behind. If you have the technical
expertise to copy files, this action will assist investigators in determining when and how
the intrusion may have occurred.
✓ Identify a primary point of contact to handle potential evidence.
✓ Establish a chain-of-custody procedure that tracks who has been involved in handling
the evidence and where it has been stored. Potential hardware/software evidence that is
not properly controlled may lose its value.
✓ Do not contact the suspected perpetrator.
b526367 Ch01.qxd 3/21/03 3:37 PM Page 25
✓ A tool to report any open TCP and UDP ports and map them to the owning process or
application
✓ A tool to capture and analyze logs to identify and track who has gained access to a com-
puter system
✓ A utility to make a bit-stream backup of a hard drive
✓ A program used to document the CMOS System Time and Date on a computer seized as
evidence
✓ A password-cracking utility
✓ A text-search utility that can scan DOS and Windows systems and locate targeted key-
words and/or strings of text in computer-related investigations and computer security
reviews
✓ A forensic binary data search tool that is used to identify targeted graphics file content
and/or foreign language words and phrases stored in the form of computer data
✓ A tool to discover hidden files, such as NTFS Alternate Data Streams
✓ A data collection tool to capture file slack and unallocated (erased file) data
note
The previous list covers basic forensic tools and is not meant to be all-inclusive.
While there are a number of toolkits for Windows platforms, relatively few exist for the Unix or
Linux operating systems. The Coroner’s Toolkit (TCT), a software package that is the de-facto
standard for collecting forensic evidence from Unix platforms and the plethora of forensic tools
available for the Windows platform, are covered in detail in Chapter 7.
b526367 Ch01.qxd 3/21/03 3:37 PM Page 26
Chapter Summary
The Internet is the largest operating computer network in the world. Because it is largely a public
network, threats may come from all corners of the globe. To protect themselves against the con-
stant threat of hackers, crackers, and malicious code, organizations often make use of firewalls,
antivirus software, and intrusion detection systems. Despite sophisticated defensive measures,
however, computers and the networks that connect them are still subject to frequent attacks. As a
result of this unfortunate fact, organizations and governments around the world must remain
prepared to respond to a variety of threats by any computer security incident that circumvents
security measures.
Key points covered in this chapter include
✓ The basic steps all organizations should follow in preparation for responding to incidents
✓ How to verify that a security incident has occurred while preserving key evidence
Chapter 2
Addressing Law
Enforcement Considerations
In This Chapter
THERE IS A GROWING CONCERN that individuals, organizations, and governments around the globe
are increasingly at risk when they choose to ignore the threats posed by hackers, intruders, and
malicious code. The rash of malicious code outbreaks over the past several years are observable
demonstrations of how an individual may cause widespread harm by infecting hundreds of thou-
sands of computers within a matter of hours, and that he or she can locate targets even when
vulnerabilities are well known, highly publicized, and could easily be protected. Whatever their
motivation, the actions of these individuals are oftentimes impossible to distinguish from one
another. From a law enforcement perspective, catching criminals, terrorists, and intelligence
operatives has never been more difficult than in today’s cyber environment.
In today’s setting, attacks and intrusions are encrypted, broken into packets, and routed the
world over, anonymously passing through Internet and telecommunications providers that are
under no obligation to keep track of how their systems are used or, more importantly, how they
may be misused. Law enforcement authorities must act carefully when conducting computer
criminal investigations to catch the perpetrators while preserving the privacy rights and civil
rights of others. This chapter focuses on the legal aspects concerning computer crimes and the
role law enforcement plays in computer crime investigations.
27
b526367 Ch02.qxd 3/21/03 3:37 PM Page 28
On July 24, 2000, Kevin V. DiGregory, deputy assistant attorney general for the U.S. Department
of Justice, made the following statement before the Subcommittee on the Constitution regarding
the Fourth Amendment and its application in the information age:
It is beyond dispute that the Fourth Amendment protects the rights of Americans while they work and
play on the Internet just as it does in the physical world. The goal is a long-honored and noble one: to
preserve our privacy while protecting the safety of our citizens. Our founding fathers recognized that
in order for our democratic society to remain safe and our liberty intact, law enforcement must have
the ability to investigate, apprehend and prosecute people for criminal conduct. At the same time,
however, our founding fathers held in disdain the government’s disregard and abuse of privacy in
England. The founders of this nation adopted the Fourth Amendment to address the tension that can
at times arise between privacy and public safety. Under the Fourth Amendment, the government must
demonstrate probable cause before obtaining a warrant for a search, arrest, or other significant
intrusion on privacy.
Congress and the courts have also recognized that lesser intrusions on privacy should be permitted
under a less exacting threshold. The Electronic Communications Privacy Act (ECPA) establishes a
three-tier system by which the government can obtain stored information from electronic communi-
cation service providers. In general, the government needs a search warrant to obtain the content of
unretrieved communications (like e-mail), a court order to obtain transactional records, and a
subpoena to obtain information identifying the subscriber. See 18 U.S.C. §§ 2701–11.
In addition, in order to obtain source and destination information in real time, the government
must obtain a “trap and trace” or “pen register” court order authorizing the recording of such infor-
mation. See 18 U.S.C. 3121, et seq.
Because of the privacy values it protects, the wiretap statute, 18 U.S.C. §§ 2510–22, commonly
known as Title III, places a higher burden on the real-time interception of oral, wire and electronic
communications than the Fourth Amendment requires. In the absence of a statutory exception, the
government needs a court order to wiretap communications. To obtain such an order, the government
must show that normal investigative techniques for obtaining the information have or are likely to fail
or are too dangerous, and that any interception will be conducted so as to ensure that the intrusion is
minimized.
The safeguards for privacy represented by the Fourth Amendment and statutory restrictions on
government access to information do not prevent effective law enforcement. Instead, they provide
boundaries for law enforcement, clarifying what is acceptable evidence gathering and what is not. At
the same time, those who care deeply about protecting individual privacy must also acknowledge that
law enforcement has a critical role to play in preserving privacy. When law enforcement investigates,
successfully apprehends, and prosecutes a criminal who has stolen a citizen’s personal information
from a computer system, for example, law enforcement is undeniably working to protect privacy and
deter further privacy violations. The same is true when law enforcement apprehends a hacker who
compromised the financial records of a bank customer.
As we move into the 21st century, we must ensure that the needs of privacy and public safety
remain in balance and are appropriately reflected in the new and emerging technologies that are
changing the face of communications. Although the primary mission of the Department of Justice is
law enforcement, Attorney General Reno and the entire Department understand and share the legiti-
mate concerns of all Americans with regard to personal privacy. The Department has been and will
remain committed to protecting the privacy rights of individuals. We look forward to working with
Congress and other concerned individuals to address these important matters in the months ahead.
b526367 Ch02.qxd 3/21/03 3:37 PM Page 30
According to the U.S. Department of Justice, to determine whether an individual has a reason-
able expectation of privacy of information stored in a computer, it helps to treat the computer like
a closed container such as a briefcase or file cabinet. The Fourth Amendment generally prohibits
law enforcement from accessing and viewing information stored in a computer without a warrant
if law enforcement would be prohibited from opening a closed container and examining its
contents in the same situation (under the same circumstances).
note
the hacker out, then locking the door. Unfortunately, this does little to help with overall security.
Not only is the intruder free to attempt the same exploit on another company’s network, he or she
may have been savvy enough to leave behind a backdoor through which to return to the exploited
system later, undetected. In addition, others with malicious intent may learn of the exploit
through the hacker community and because of the lack of law enforcement response, join in
compromising computer systems.
To believe that a hacker is motivated solely by the desire to show off computing prowess with
no real intention to damage, steal, or defraud is naive. What may appear to be a simple hack with
no real risk of damage can, in fact, be a part of a larger scheme to launch a very destructive attack
against other sensitive machines. Intruders may compromise numerous systems, collecting them
like trading cards. Some hackers use the “stolen” computers as springboards to launch attacks
against other computers, shutting down the next victim, taking information from the system,
and using the stolen data in extortion schemes, or to engage in countless other types of illegal
conduct. With each compromise, the security of all networks is weakened. If victims do not report
such incidents, law enforcement cannot provide an effective and appropriate response.
Industry experts claim that there is a wide variety of reasons for the reluctance to report com-
puter security incidents. There is the perception on the part of some businesses that there is little
upside to reporting network intrusions. According to Richard P. Salgado, Trial Attorney for the
Computer Crime and Intellectual Property Section of the U.S Department of Justice, the rationale
for not reporting an intrusion includes the following:
✓ “The victim company does not know which law enforcement entity to call. Surely, the
victim reasons, the local or state police will not be able to comprehend the crime, and
the FBI and Secret Service would have no interest in my system.
✓ If the victim company does report the intrusion to an appropriate agency, law enforce-
ment will not act. Instead, the fact of the intrusion will become public knowledge,
irreparably shaking investor confidence and driving current and potential customers
to competitors who elect not to report intrusions.
✓ If law enforcement does act on the report and conducts an investigation, law enforce-
ment will not find the intruder. In the process, however, the company will lose control
of the investigation. Law enforcement agents will seize critical data and perhaps entire
computers, damage equipment and files, compromise private information belonging to
customers and vendors, and seriously jeopardize the normal operations of the company.
Only competitors will benefit as customers flee and stock value drops.
✓ If law enforcement finds the intruder, the intruder likely will be a juvenile, reside in a
foreign country, or both, and the prosecutor will decline or be unable to pursue the case.
✓ If the intruder is not a minor, the prosecutor will conclude that the amount of damage
inflicted by the intruder is too small to justify prosecution.
✓ If law enforcement successfully prosecutes the intruder, the intruder will receive proba-
tion or at most insignificant jail time, only to use his or her hacker experience to find
fame and a lucrative job in network security.”
b526367 Ch02.qxd 3/21/03 3:37 PM Page 32
Salgado states further that while the preceding list of excuses may appear startling, barriers
to reporting can be overcome by better-informed computer network owners and operators, and
skillful investigatory and prosecutorial practices. The risk presented by failing to report intrusions
is enormous. For the foreseeable future, computer networks are only going to become more com-
plex, more interconnected, and therefore more vulnerable to intrusions. Networks are also going
to command more importance in our private lives, our nation’s defense, and the world’s economy.
For these reasons, it is imperative that organizations and individuals understand the importance
of reporting intrusions.
One of the more noticeable benefits of cooperation between private sector organizations and
law enforcement agencies is the faster distribution of information about threats and the ways to
counter them. Conversely, organizations in the private sector sometimes find that calling in law
enforcement to investigate a computer crime may lead to the following:
✓ A shutdown of the business as the law enforcement agents seize and review evidence
While there have been attempts to alleviate the aforementioned fears and foster cooperative
ventures between law enforcement and the private sector, victims of computer intrusion are still
hesitant to call in law enforcement when an intrusion has occurred. In her opening speech at the
April 5, 2000 Cybercrime summit, Attorney General Janet Reno addressed these issues. Following
is an excerpt from her speech:
Law enforcement, like industry, has its duties, its tools and its constraints. As a prosecutor for almost 15
years in Miami, I can tell you that I know how intrusive a criminal investigation can be. I have heard
from bankers long before they talked in terms of cyber tools about why they didn’t report an embezzle-
ment, why they didn’t want to put up with a criminal investigation. I want your opinions, your sugges-
tions about what we can do in law enforcement to design investigations that achieve the truth, that do
it according to principles of the Constitution and do it with the least disruption to your undertakings.
We ask industry to recognize that law enforcement has much to offer to make the Internet a secure
place for their businesses and customers. But I also recognize that it is hard for government to attract
a sufficient number of people who have both the technical and the legal expertise to deal with the criti-
cal issues that we face. I have been so proud of those in the Department of Justice who have done so
much with limited resources, limited equipment. And we want to work with you to understand better
how we can attract people, what we can do to retain them, how we can work with you in public-private
partnerships to achieve new goals. Senior officials from the Department’s Computer Crime Section
meet regularly with representatives from Internet service providers, telecommunications carriers, and
others through information industry group. The FBI’s National Infrastructure Protection Center and
its Computer Crime Squads have worked to develop the Infragard Program in communities around the
country, to build relationships. And I think relationships is what it is all about. Until that FBI agent sits
down with your security officer or deals one on one in terms of an investigation, people do not know
each other. But when they have that experience, when you have a good working relationship, when you
can build on a good experience, you learn so much about how we can work together. I would like to use
b526367 Ch02.qxd 3/21/03 3:37 PM Page 33
this opportunity to make sure that we do that in the most effective way possible. We have also begun
regular meetings with the Law Enforcement and Security Council of the Internet Alliance, an industry
group that includes many of the largest ISPs. Industry and law enforcement have made sincere efforts
to cooperate and have made real gains. Today’s conference is another step in the right direction. We are
not interested in a top-down approach. We do not know best. We know that people in the field, state and
local law enforcement, industry can tell us what needs to be done. And we can provide a vantage point
that can be helpful, as well. We do not want invasive government regulation or monitoring of the
Internet. We must recognize that with overlapping areas of responsibility and control we can do so
much if we define the particular function of each. The private sector in that regard should take the lead,
I think, in protecting the security of private-sector computer systems. We must take the lead in pro-
tecting government systems. And we must share information about vulnerabilities so that we can each
take steps to protect our systems against attack. Once the systems have been victimized, law enforce-
ment must take the lead on investigating network and other computer crimes. We need to ensure that
we have the technical and legal tools necessary to do it. We also want to ensure that we have the infor-
mation and continued cooperation necessary to effectively investigate these cases. Always mindful that
the victim is concerned about confidentiality, that the victim is concerned about the intrusion of the
law enforcement process in their business, we need to design an approach that can be effective. These
are the issues that we jointly face. This is an opportunity to speak directly, but even then we have
another challenge. What happens when you learn information about a particular issue that if linked
with ten other people or ten other businesses’ information indicates a real threat to national security or
a real threat to the Internet or a real threat to business? How can we develop the trust that will permit
us to share information? If we share information how can we develop a process that will provide us a
procedure for giving early warning to all concerned to avoid further injury to all concerned without
interrupting or interfering with your business processes?
In her speech, Reno maintained that in order to balance constitutional rights such as privacy
and freedom of speech with safety and security, a close relationship must be forged between law
enforcement and private industry. As we’ve seen however, organizations are often reluctant to call
in law enforcement because they fear the loss of confidential data or negative publicity. But, it is
only when cyber crime is brought to the attention of law enforcement by businesses and other
victims that effective measures can be taken to battle it.
As mentioned earlier in this chapter, organizations are often concerned that information
shared with the government might be made public. In his testimony of March 2000, Harris Miller
also opined the following:
Companies are understandably reluctant to share sensitive proprietary information about prevention
practices, intrusions, and actual crimes with either government agencies or competitors. Information
sharing is a risky proposition with less than clear benefits. No company wants information to surface
that they have given in confidence that may jeopardize their market position, strategies, customer
base, or capital investments. Nor would they risk voluntarily opening themselves up to bogus but
costly and time-consuming litigation. Releasing information about security breaches or vulnerabili-
ties in their systems presents just such risks. Negative publicity or exposure as a result of reports of
information infrastructure violations could lead to threats to investor — or worse — consumer confi-
dence in a company’s products. Companies also fear revealing trade secrets to competitors, and are
understandably reluctant to share such proprietary information. They also fear sharing this informa-
tion, particularly with government, may lead to increased regulation of the industry or of Electronic
Commerce in general.
These concerns are relevant whether we are talking about inter-industry, cross-industry, or
industry/government information sharing. Combine this with a historic lack of trust towards law
enforcement, or a concern that company systems may become caught up in an investigation and thus
lose production/development time, and many companies find it easier to keep quiet and absorb the
pain inflicted by intrusions, even at substantial cost. I also would be remiss if I did not remind the
committee of a company’s need to protect individual customers’ privacy. Industry fears that privacy
breaches on innocent customers might inadvertently occur during investigations.
Few high-tech companies are interested in being perceived by their customers as the active agents
of law enforcement. Agencies, meanwhile, are often viewed as demanding this type of information
from the private sector but giving little back in return. Let me be blunt. Information sharing cannot
be a one-way street.
Under the Freedom of Information Act, information such as the extent of damages caused by a
virus infection or hacker incident might well become public, damaging an organization’s reputation,
and aiding the competition as a side effect. By sharing details of an attack with law enforcement agen-
cies, organizations could increase their odds of detecting and reducing the threats of cyber-criminal
activity.
The current U.S. legal system makes it complicated and difficult to share information about
intrusion cases before any arrests can be made. To address privacy concerns, information is to be
safeguarded, classified, and protected, and everything possible should be done to make sure that
the information gets only into the appropriate hands. Confidential data (such as personal financial
and medical records) are routinely transferred across a series of information systems. There are
many ways to safeguard this information and ensure that only those who need to know have
access to it and then in only limited amounts.
b526367 Ch02.qxd 3/21/03 3:37 PM Page 35
✓ The NIPC is the national focal point for gathering information on threats to critical
infrastructures as well as the principal means of facilitating and coordinating the federal
government’s response to an incident, mitigating attacks, investigating threats, and
monitoring reconstitution efforts.
✓ The NIPC includes investigators and analysts experienced in computer crimes and
infrastructure protection. It is linked electronically to the rest of the federal govern-
ment, including other warning and operation centers, as well as private sector
Information Sharing and Analysis Centers (ISACs).
✓ The NIPC provides law enforcement and intelligence information and reports to relevant
federal, state, and local agencies as well as private-sector ISACs. Before disseminating
such information, the NIPC coordinates with the intelligence community to protect
national security interests.
✓ When it detects an increased threat condition, the NIPC issues attack warnings and
protective guidance to private-sector ISACs and the owners and operators of computer
systems.
The NIPC combines the efforts of the law enforcement, intelligence, and the defense commu-
nities. By combining efforts, the NIPC can provide a unique response perspective to threat and
incident information obtained from investigation, intelligence collection, foreign liaison, and
private sector cooperation. This perspective ensures that all information is examined from a
multidiscipline perspective.
While developing infrastructure protection capabilities, the NIPC has held firm to two guiding
tenets. “First, the government can only respond effectively to threats by focusing on protecting
assets against attack while simultaneously identifying, investigating, and responding to those who
nonetheless would attempt or succeed in launching those attacks. And second, the government
can only help protect this nation’s most critical infrastructures by building and promoting a
coalition of trust, one . . . amongst all government agencies, two . . . between the government and
the private sector, three . . . amongst the different business interests within the private sector
itself, and four . . . in concert with the greater international community.” The focus of the NIPC is
to develop the capacity to warn, investigate, and build partnerships, as well as initiate effective
responses to computer security incidents.
b526367 Ch02.qxd 3/21/03 3:37 PM Page 36
In this ever-growing world of digital dependence, many e-mail messages and word-processing
documents are never fully deleted. Instead, they continue to reside somewhere on the user’s hard
drive. By pressing Delete on your computer keyboard, you are not actually destroying the docu-
ment. Nor are you throwing the document out when you place it in your computer’s Recycle Bin
or empty the Trash (Windows and Mac systems). Instead, you’ve simply deleted the “directions”
the computer uses to find the data. The actual data remains until new data comes along and
overwrites it.
x-ref
Operating systems, data storage devices, and our ability to access remote data continue to
evolve, forcing electronic disclosure procedures to evolve as well. The idea of addressing these
issues and doing so correctly can quickly become daunting. It is important to realize however,
that qualified professional help is available to assist in the electronic disclosure process. To better
understand current disclosure law, following is Title 18, Part I, Chapter 121, Sec. 2702 of the
Federal Criminal Code as it relates to disclosure of computer information:
Disclosure of Contents
(a) Prohibitions. Except as provided in subsection (b)
1. a person or entity providing an electronic communication service to the public shall not
knowingly divulge to any person or entity the contents of a communication while in
electronic storage by that service; and
2. a person or entity providing remote computing service to the public shall not knowingly
divulge to any person or entity the contents of any communication which is carried or
maintained on that service —
A. on behalf of, and received by means of electronic transmission from (or created by
means of computer processing of communications received by means of electronic
transmission from), a subscriber or customer of such service; and
B. solely for the purpose of providing storage or computer-processing services to such
subscriber or customer, if the provider is not authorized to access the contents of any
such communications for purposes of providing any services other than storage or
computer processing; and
3. a provider of remote computing service or electronic communication service to the
public shall not knowingly divulge a record or other information pertaining to a sub-
scriber to or customer of such service (not including the contents of communications
covered by paragraph 1 or 2) to any governmental entity.
A. if the contents (i) were inadvertently obtained by the service provider; and (ii) appear
to pertain to the commission of a crime; or
B. if required by section 227 of the Crime Control Act of 1990 [42 U.S.C.A. S 13032]; or
C. if the provider reasonably believes that an emergency involving immediate danger of
death or serious physical injury to any person requires disclosure of the information
without delay.
(c) Exceptions for disclosure of customer records. A provider described in subsection (a) may
divulge a record or other information pertaining to a subscriber to or customer of such service,
not including the contents of communications covered by subsection (a)(1) or (a)(2)
Because of the universal widespread use of computers, computer-based discovery and disclo-
sure has now become commonplace in civil litigation. While it does in many ways promise to
simplify trial preparation and presentation, it is complicated, and as such it also has the potential
to dramatically increase the costs connected with such litigation. Computer-based discovery and
disclosure can be costly as a result of the manpower that must be contributed by hired experts in
the field. Most observers believe that in spite of its costs, computer-based discovery will eventually
overtake conventional discovery, as more and more information is routinely generated, transmit-
ted, and stored on computers. Many of the costs associated with computer-based discovery can be
avoided through proper management of the discovery process as well as the early detection of
potential problems and their solutions.
✓ The theft or compromise of national defense, foreign relations, atomic energy, or other
restricted information
✓ A computer owned by a U.S. government department or agency
b526367 Ch02.qxd 3/21/03 3:37 PM Page 39
In the United States, there are numerous federal laws protecting against attacks on computers,
misuse of passwords, electronic invasions of privacy, and other cyber transgressions. One of the earli-
est pieces of legislation geared toward the cyber world was the Computer Fraud and Abuse Act of
1986. This central piece of legislation governs most common computer crimes, although many other
laws may also be used to prosecute different types of computer crime. The act amended Title 18 of the
United States Code §1030. This act was designed to complement the Electronic Communications
Privacy Act of 1986, which served to outlaw the unauthorized interception of digital communications.
The Computer Abuse Amendments Act of 1994 expanded the 1986 act to address the transmission of
viruses and other harmful code. More recently, the USA Patriot Act of 2001 (covered later in this
chapter) made additional sweeping changes to federal computer crime laws.
(b) Whoever attempts to commit an offense under subsection (a) of this section shall be punished
as provided in subsection (c) of this section.
(c) The punishment for an offense under subsection (a) or (b) of this section is
1. (A) a fine under this title or imprisonment for not more than ten years or both, in the case
of an offense under subsection (a)(1) of this section which does not occur after a conviction
for another offense under such subsection, or an attempt to commit an offense punishable
under this subparagraph; and (B) a fine under this title or imprisonment for not more than
twenty years, or both, in the case of an offense under subsection (a)(1) of this section which
occurs after a conviction for another offense under such subsection, or an attempt to
commit an offense punishable under this subparagraph; and
2. (A) a fine under this title or imprisonment for not more than one year, or both, in the case of
an offense under subsection (a)(2), (a)(3), or (a)(6) of this section which does not occur after
a conviction for another offense under such subsection, or an attempt to commit an offense
punishable under this subparagraph; and (B) a fine under this title or imprisonment for not
more than ten years, or both, in the case of an offense under subsection (a)(2), (a)(3), or
(a)(6) of this section which occurs after a conviction for another offense under such subsec-
tion, or an attempt to commit an offense punishable under this subparagraph; and
b526367 Ch02.qxd 3/21/03 3:37 PM Page 41
3. (A) a fine under this title or imprisonment for not more than five years or both, in the case
of an offense under subsection (a)(4) or (a)(5) of this section which does not occur after a
conviction for another offense under such subsection, or an attempt to commit an offense
punishable under this subparagraph; and (B) a fine under this title or imprisonment for
not more than ten years, or both, in the case of an offense under subsection (a)(4) or (a)(5)
of this section which occurs after a conviction for another offense under such subsection,
or an attempt to commit an offense punishable under this subparagraph.
(d) The United States Secret Service shall, in addition to any other agency having such authority,
have the authority to investigate offenses under this section. Such authority of the United States
Secret Service shall be exercised in accordance with an agreement, which shall be entered into by
the Secretary of the Treasury and the Attorney General.
(e) As used in this section —
5. the term “financial record” means information derived from any record held by a finan-
cial institution pertaining to a customer’s relationship with the financial institution;
6. the term “exceeds authorized access” means to access a computer with authorization
and to use such access to obtain or alter information in the computer that the accesser
is not entitled so to obtain or alter; and
7. the term “department of the United States” means the legislative or judicial branch of the
government or one of the executive departments enumerated in section 101 of title 5.
(f) This section does not prohibit any lawfully authorized investigative, protective, or intelligence
activity of a law enforcement agency of the United States, a State, or a political subdivision of a
State, or of an intelligence agency of the United States.
As one can see, the legislation was carefully designed to address only federal and interstate
computer crimes. This was born out of a concern that the act could violate individual state
computer crime laws. According to the act, a federal interest computer, is “exclusively for the use
of a financial institution or the United States Government, or, in the case of a computer not exclu-
sively for such use, used by or for a financial institution or the United States Government, and the
conduct constituting the offense affects such use, or which is one of two or more computers used
in committing the offense, not all of which are located in the same State.” Financial institutions
covered by the act specifically include federally insured banks, thrifts and credit unions; registered
securities brokers; members of the Federal Home Loan Bank System, the Farm Credit
Administration, and the Federal Reserve System. A felony conviction under the Computer Fraud
and Abuse Act could result in a prison term of five years for a first offense and ten years for a sec-
ond offense.
The Computer Fraud and Abuse Act of 1986 came about as the result of years of research and
discussion among those in the legislative community. One of the principal reasons for the act’s
delay was the enormous difficulty in collecting testimony from computer crime victims.
Organizations were (and continue to be) exceedingly hesitant to admit they had been victimized
because they were apprehensive about having their vulnerabilities publicized.
increase the chances of successfully prosecuting computer hackers by changing the standard
from “intent” to cause harm to “reckless disregard” and by addressing the transmission of viruses
and other harmful code. In addition, while previous laws protected only “federal interest comput-
ers” (machines belonging to a government agency or financial services firm), the new regulations
cover computers “used in interstate commerce,” meaning any PC connected to the Internet.
✓ Allow for indefinite detention of noncitizens who are not terrorists on minor visa
violations if they cannot be deported because they are stateless, their country of origin
refuses to accept them, or because they would face torture in their country of origin.
✓ Minimize judicial supervision of federal telephone and Internet surveillance by law
enforcement authorities.
✓ Expand the ability of the government to conduct secret searches.
✓ Give the attorney general and the secretary of state the power to designate domestic
groups as terrorist organizations and deport any noncitizen who belongs to them.
✓ Grant the FBI broad access to sensitive business records about individuals without
having to show evidence of a crime.
✓ Lead to large-scale investigations of American citizens for “intelligence” purposes.
The USA Patriot Act amended more than 15 federal statutes, including the laws governing com-
puter fraud and abuse, criminal procedure, wiretapping, foreign intelligence, and immigration.
b526367 Ch02.qxd 3/21/03 3:37 PM Page 44
These amendments expanded the authority of the FBI and other federal law enforcement agencies
to gain access to business, medical, educational, and library records, including stored electronic
data and communications. It also expanded the laws governing wiretaps and trap-and-trace phone
devices to Internet and electronic communications. These enhanced surveillance procedures are
the ones that pose the greatest challenge to privacy and confidentiality of electronic data.
x-ref
For a summary of important changes made by the USA Patriot Act of 2001 that relate to com-
puter crime and electronic evidence, see Appendix C.
Chapter Summary
Over the past decade, computers and the Internet have come to play an integral part in many of our
citizens’ lives. Each day, millions of people throughout the world log on to the Internet where they
surf the Web, send and receive e-mail messages, or conduct e-commerce transactions and activities.
Unfortunately, wrongdoers too have not let the computer revolution pass them by. When commit-
ting their crimes, an increasing number of criminals now capitalize on the use of high-tech devices,
such as pagers, cellular phones, laptop computers, and the Internet. For instance, the Internet can
be used to quickly distribute viruses or to launch Denial of Service (DoS) attacks against vulnerable
computer networks. It is not uncommon for drug or arms dealers to use computers to keep a data-
base of their illicit transactions.
According to the U.S. Department of Justice in a July 2002 bulletin, Searching and Seizing
Computers and Obtaining Electronic Evidence in Criminal Investigations, “The dramatic increase in
computer-related crime requires prosecutors and law enforcement agents to understand how to
obtain electronic evidence stored in computers. Electronic records, such as computer network logs,
e-mails, word-processing files, and ‘.jpg’ picture files, increasingly provide the government with
important (and sometimes essential) evidence in criminal cases. The purpose of this publication is to
provide federal law enforcement agents and prosecutors with systematic guidance that can help them
understand the legal issues that arise when they seek electronic evidence in criminal investigations.”
Key points covered in this chapter include
✓ Why the Freedom of Information Act serves as a deterrent to reporting computer crimes
✓ The advantages and disadvantages of informing and involving law enforcement in cyber-
crime investigations
✓ The benefits and legal aspects of information sharing
✓ The function of the National Infrastructure Protection Center in combating cyber crime
✓ The importance of federal computer crime laws and their significance in forensic
examinations
✓ Understanding disclosure and discovery in computer crime investigations
b526367 Ch03.qxd 3/21/03 3:37 PM Page 45
Chapter 3
RESPONDING TO COMPUTER SECURITY INCIDENTS IS, BY AND LARGE, NOT AN EASY MATTER. Effective
incident response requires a blend of technical knowledge, communication, responsibility, and
coordination among all of an organization’s response staff. There are several distinct stages of
response when addressing a computer security incident: preparation, identification, contain-
ment, eradication, recovery, and follow-up. Understanding the importance of each stage is critical
to carrying out an efficient response. All personnel in an organization’s hierarchy need to under-
stand the process of responding so that they can work together to handle any unexpected aspects
of incidents they may encounter. This chapter focuses on forensic preparation and preliminary
response and its role in mitigating the effects of computer security incidents.
toward the home user and those geared toward businesses or power users. This chapter discusses
the more powerful networking operating systems.
The most commonly used operating systems can be divided into three families: the Microsoft
Windows family of operating systems, the Unix/Linux family of operating systems, and the Apple
Macintosh operating systems. Each of these families offers versions of operating systems that are
specifically geared toward networking, making them widely used by organizations around the
world. In fact, Unix/Linux operating systems, considered some of the most secure systems, are
designed specifically for networking. The high learning curve required to configure and maintain
Unix/Linux-based computers, however, has kept them from being widely adopted.
Under the Microsoft family, Windows NT 4.0, 2000, and XP are commonly used network oper-
ating systems employed by organizational networks. Because they are easy to set up and use, and
have the largest base of applications written for them, they are one of the most popular and widely
used operating systems around the world. The Apple Macintosh operating system (currently in
version OS X) is a Unix-based network operating system with many powerful networking and
security features. However, due to certain architectural differences inherent with Apple hardware,
Mac OS–based computers have not attained the popularity of Windows operating systems. (Mac
OS is, however, considered by many to be better suited for organizations that use graphic-intense
programs such as CAD/CAM.)
While all contemporary operating systems provide some measure of security, it is the network
operating systems that possess the greatest security capabilities. They allow network administra-
tors to specify access privileges to individual files, directories, and hardware devices. Through
their extensive use of auditing and log files, network operating systems have the added appeal of
capturing and preserving potential forensic evidence.
Since log files are sometimes the only evidence of suspicious activity, failure to enable the
mechanisms to record this information and failure to use them to initiate alert mechanisms sig-
nificantly lessens an organization’s ability to detect intrusion attempts and to determine whether
the attempts have met with success. Similarly, problems can result from not having the required
procedures and mechanisms in place to analyze the log files that have been recorded.
Logs can help organizations by
In all versions of Windows, to enable auditing, you first need to be logged on as an administra-
note
tive user. Only administrative users are permitted to modify key security and/or system settings.
The procedure varies depending upon the version of Windows being used. Consult your Windows
user manual for details regarding administrative account privileges for the version of Windows
you use.
1. From the Start menu, select Programs → Administrative Tools → User Manager.
2. From the User Manager Policies menu, select Audit, which activates the Audit Policy
dialog screen.
b526367 Ch03.qxd 3/21/03 3:37 PM Page 48
3. Now enable the Audit These Events option and then select the following audit events:
■ In the Failure column, select all of the events.
■ In the Success column, select the following events: Logon and Logoff, User and
Group Management, Security Policy Changes, Restart, Shutdown, and System.
4. Select OK to accept the Audit Policy. Now all the selected options will be written to the
event log.
Like its predecessor NT 4.0, Windows 2000 disables each audit policy category by default, so the
security log remains empty on a newly installed operating system.
The general procedure to enable local auditing/logging in Windows 2000 is as follows:
1. Log on to Windows 2000 with an account that has full administrative rights.
2. From the Start menu, navigate to Administrative Tools → Local Security Policy. This
opens the local security settings window.
3. In the left pane, double-click on Local Policies to expand it.
4. Now, double-click Audit Policy.
5. In the right pane, select the policy you wish to enable or disable by double-clicking it.
6. Select the desired Success and/or Fail check box.
1. Log on as Administrator.
2. Click the Start button and select the Control Panel.
3. In the Control Panel, select Performance and Maintenance, then select Administrative
Tools.
4. Double-click Local Security Policy shortcut to open and expand it.
5. In the left pane, select Audit Policy to display the individual policy settings, which will
appear in the right pane. (See Figure 3-1.)
6. Double-click each setting in the right pane to enable auditing for each type of auditing
desired. (See Figure 3-2.)
Remember, the most basic way to have intrusion detection in Windows is to enable auditing.
This will alert you to changes in account policies, attempted password hacks, and unauthorized
file access, as well as create log files that can later be used as evidence.
b526367 Ch03.qxd 3/21/03 3:37 PM Page 49
Finally, because the default size of the Windows log file is only 512K, administrators with sys-
tems having moderate to high use may wish to increase the amount of data the log files may con-
tain. While the exact procedure varies depending upon which version of Windows is being used,
the general procedure is as follows:
Centralized Logging
Log files are usually the best source of information for determining if a system or network is expe-
riencing a security compromise or other problem. With the proliferation of interoperable devices,
it is not uncommon to find organizations using multiple computer network platforms such as
Windows, Linux, or Novell NetWare. As a result, administrators often find it onerous to sift
through the various operating system log files to gather evidence and look for the signs that indi-
cate an incident has occurred. To make this process easier, centralized logging via the syslog pro-
tocol is often employed. Syslog support, which is included in Unix- and Linux-based systems, is an
industry standard protocol used for capturing log information for devices on a network. Syslog is
not included in Windows and Macintosh operating systems; however, there are third-party appli-
cations (covered later in this section) available to add this capability to your system.
The basic premise of centralized logging is to collect log data and send that data to a computer
other than the one compromised. By doing this, the location of the log data is centralized and the
integrity of that data remains protected. Centralized logging maintains a single centralized point
of storage for log data, making it easier to back up, secure, and analyze. While a number of logging
mechanisms exist for various computing platforms, the objective of a centralized logging mecha-
nism is to support the most widely used and popular platforms. Cross-platform centralized log-
ging software products from various vendors can be easily installed on an organization’s network.
The following two Windows-based centralized system-logging products are well suited to the task:
b526367 Ch03.qxd 3/21/03 3:37 PM Page 52
✓ Kiwi Syslog Daemon by Kiwi Enterprises is a freeware syslog daemon for the Windows
platform. According to the manufacturer it receives, logs, displays, and forwards syslog
messages received from hosts, such as routers, switches, Unix hosts, and any other sys-
log-enabled devices. Kiwi is online at www.kiwisyslog.com.
✓ GFI LANguard Security Event Log Monitor by GFI Software, Ltd. is a centralized secu-
rity event log scanner that, according to its manufacturer, retrieves all event logs from
servers and workstations and alerts the administrator of security breaches for immediate
intrusion detection. By analyzing Windows NT/2000 event logs in real time, GFI
LANguard Security Event Log Monitor can alert you to significant security events hap-
pening on your workstations and servers (for example, a user attempting to log on as an
administrator, or a person being added to the administrator group). Because GFI
LANguard analyzes the system event logs, rather than sniffing network traffic like tradi-
tional intrusion detection system (IDS) products do, it is not impaired by switches, IP
traffic encryption, or high-speed data transfer. Find GFI at www.gfi.com.
Unfortunately, there will always be security flaws that can be exploited. While illegal entry and
access to computer systems cannot always be completely prevented, such problems at least need
to be recorded and tracked in an audit log for the purpose of revealing the security flaws in your
systems and possibly identifying those (humans or computers) that have exploited these flaws.
Information logging is of utmost importance in a properly secure setting. Logs by themselves,
however, offer little if the files aren’t being collected and reviewed.
While file permissions protect log files from unprivileged alteration, you may also wish to protect
tip
log files from unauthorized alteration by having log files written to a CD-ROM or other read-only
media.
Time Synchronization
While centralized logging can be beneficial for responding to security incidents, it also presents a
unique problem. The more devices on the network, the more likely their times will not remain
synchronized. This lack of synchronization may pose a difficulty for incident response.
Automating the synchronization of system clocks saves substantial time during an incident
response. Another benefit of synchronization is that the evidence is strengthened when the IDS
and the host report the same event at the same time. If your organization conducts business
across multiple time zones, use Greenwich Mean Time (GMT) to configure systems.
While a number of time synchronization mechanisms exist for various computer platforms,
the objective of a centralized time-synchronization mechanism is to support the most platforms.
For Internet protocol (IP)–based networks, Network Time Protocol is the one most commonly
used. The Network Time Protocol (NTP) provides a mechanism to synchronize time on computers
across the Internet. Unix, Linux, and most IP devices have built-in native support for the NTP pro-
tocol. While Windows does not, it can use NTP via such third-party freeware products as:
b526367 Ch03.qxd 3/21/03 3:37 PM Page 53
In order to participate in the existing NTP synchronization network and obtain accurate, reliable
note
time when using Unix or Linux, it is usually necessary to construct an appropriate configuration
file, commonly known as ntp.conf. The exact syntax for this configuration file varies depending
upon the timeserver with which you are trying to synchronize and the version of Unix/Linux you
are using. Users are encouraged to consult with their Unix/Linux documentation for details.
Time-Stamping
One of the first things a hacker or network intruder will attempt is to modify their time of entry
into a computer system. It is to the hacker’s advantage to seek networks whose time clocks are not
synchronized. In addition, by falsifying the date and time, a hacker can send a forensic investiga-
tor even further down a blind alley. There are two ways to avoid this problem:
b526367 Ch03.qxd 3/21/03 3:37 PM Page 54
✓ Ensure that the verification of time within your system cannot be distorted
Computer clocks are often comprised of low-cost oscillating circuits that can easily drift by sev-
eral seconds per day. While this may not seem like a big deal, it can amount to several minutes over
the course of a year. Synchronizing the times on all network devices adds a level of clock uniformity
to all respective parts of the network. To prevent hacker attempts aimed at falsifying their entry
time into a system, a network should employ a digital time-stamp that can be used at a later date to
prove that an electronic document existed at the time stated on its time-stamp. To be reliable, the
time-stamps must remain authentic, and the best way to ensure that a document has not been
forged is to employ the services of a digital time-stamping service (DTS). While there are numerous
companies that provide this type of service, two stand out as leaders in this emerging field.
✓ Datum, Inc. provides secure and auditable time-stamping technology for electronic
transactions, time references for computer networks, and encryption engines for distrib-
ution and reception of confidential information. Find Datum online at www.datum.com.
✓ Evertrust.net markets and produces high-quality digital time-stamping solutions that
help to protect the integrity of digital documentation. Look online at
www.evertrust.net.
✓ Easily identify the users and applications that are affected by a problem
During a computer security incident, the network map serves as both a reference and a blue-
print. The map can be created by hand using any drawing or flow chart application. However, this
can be both complicated and time-consuming. The better and preferred method is to use any one
of the many software programs specifically designed for this task. One such program, the award-
winning WhatsUP Gold by Ipswich, Inc. (www.ipswitch.com), is well suited to the task. Another
program that can help in developing a network map is GFI LANguard Network Security Scanner
(Figure 3-6) by GFI Software, Ltd. (www.gfi.com). Bear in mind that incident response is the
process of successfully responding to an incident whether the objective is to just recover from the
incident or to bring the perpetrators to prosecution. Having a network map can help an organiza-
tion efficiently respond to computer security incidents by quickly providing information about
the location and status of network devices.
the flash memory used by digital cameras. Since BIOS chips require special hardware to alter any
information stored on them, it is unlikely that they will contain information related to a security
incident. Thus, to a forensic investigator, preserving data stored on BIOS chips is not as important
as preserving data stored in RAM.
Volatile memory presents a different position. Examples of volatile memory are the RAM (ran-
dom access memory) chips used by all computers to load and store data generated by the operating
system and applications. Any data stored on this type of memory is lost when the computer is pow-
ered off; with that lost data goes any potential evidence. Properly collected, data taken from volatile
memory can be useful for apprehending an attacker and can yield useful, admissible evidence.
When collecting evidence you should proceed from the volatile to the less volatile. Here is a
simple example of the order of volatility for a typical computer.
1. Memory
2. Temporary file systems
3. Disk
4. Physical configuration of the network
Memory is highest on the list because it is most volatile. Because evidence of an attack can
easily slip away when memory is overwritten or deleted, one of the first steps to take is to perform
a data dump. That is, the contents of the system memory should be printed or copied while it still
resides in memory. When performed at the right time, this operation can capture and preserve
potential evidence by documenting all the actions of any altered programming code that exists in
memory. The information obtained from this process may also serve as evidence of how any mali-
cious code operated on the system.
By default, Windows NT, like most networking operating systems, only generates a memory
dump file upon a system crash. Fortunately, Windows 2000 and XP include a handy feature that
allows you to manually cause the system to stop responding and to generate a memory dump file.
It must first be configured to do so, however.
caution
Configuring Windows 2000 and XP to generate a memory dump file upon system crash requires
you to edit the Windows Registry. An incorrect Registry entry may cause serious problems that
may require you to reinstall your operating system. Use the Registry Editor carefully and with
extreme caution. Before modifying the Registry, be sure to back it up. Furthermore, it is important
that you understand the procedure for restoring the Registry in the event a problem does occur.
x-ref
4. On the Edit menu, click Add Value, and then add the following Registry values:
Value Name: CrashOnCtrlScroll
Data Type: REG_DWORD
Value: 1
After you restart the computer, you can generate a memory.dmp file on demand by simply
holding down the right-Ctrl key and pressing the Scroll Lock key twice.
The preceding steps also work under Windows XP; however, the procedure for adding the
note
The location of the memory.dmp file varies slightly depending upon the location of the drive in
note which you have Windows installed and which version of Windows you are using. For Windows NT
4.0 and 2000, the default location is the directory C:\WINNT. For Windows XP the default direc-
tory is C:\WINDOWS. If you installed NT or XP in a directory other than C, you will need to sub-
stitute the appropriate drive letter for the location of your Windows directory such as
D:\WINNT or D:\WINDOWS.
✓ On the Windows 2000/XP CD-ROM: Install the Support Tools by running Setup.exe from
the Support\Tools folder on the CD-ROM. By default, Dumpchk.exe is installed to the
Program Files\Support Tools folder.
After locating the Dumpchk.exe on your Windows CD-ROM, copy the file to your default
Windows directory (for example, C:\WINNT for NT and 2000, or C:\WINDOWS for XP). You can then
run the Dumpchk utility directly from the command (DOS) prompt using the following syntax:
dumpchk.exe Memory.dmp
To use the crash utility to analyze the file, use this command:
Once the memory dump file is created and its integrity verified, it needs to be properly preserved
for future review by a computer forensic expert or legal authorities. Much of the information
contained in a memory dump file is complex, requires an advanced knowledge of computer pro-
gramming to understand, and is beyond the capability of the average computer user. However, the
b526367 Ch03.qxd 3/21/03 3:37 PM Page 59
aforementioned procedures for collection can be quite beneficial when an organization wishes to
capture and preserve memory-related computer evidence when performing a computer forensic
investigation.
Remember the following when dealing with digital evidence obtained from a memory dump:
✓ Upon seizing memory-related evidence, actions taken should not change that evidence.
✓ People who access original digital evidence should be trained for that purpose.
✓ All activity relating to the seizure, access, storage, or transfer of digital evidence must be
fully documented, preserved, and available for review.
✓ Individuals are responsible for all actions taken with respect to digital evidence while
such evidence is in their possession.
✓ Any individual or group that is responsible for seizing, accessing, storing, or transferring
digital evidence is responsible for complying with these principles.
With incident response and computer forensics, the safeguarding and protection of evidence is
vital. A well-informed computer forensics professional should ensure that a subject computer
system is carefully handled to ensure that
and does not require the operating system to be turned on (booted). This ensures that the system
is not altered in any way during the imaging process and thereby preserves its evidentiary value.
Once an image is made, forensic examination is conducted using only the image (copy) and not
the original hard drive.
The storage capacity of computer hard drives has grown exponentially over the past few years.
As a result, hard drives are now capable of storing enormous amounts of data, making the process
of imaging more complicated. The best approach for this task is to use a disk-imaging tool. The
process of simply turning on the computer or utilizing a software utility like PowerQuest’s
Partition Magic to copy the original hard drive may potentially contaminate the evidence. The
basic file-by-file copy does not capture all residual data (for example, deleted files, slack space, and
swap files) necessary to perform a complete forensic analysis.
Choosing and using the right tool is imperative in a computer forensics investigation.
According to the disk-imaging specifications published by the National Institute of Standards and
Technology (NIST), the requirements of a top-level disk-imaging tool are as follows:
✓ The tool shall make a bit-stream duplicate or an image of an original disk or a disk
partition on fixed or removable media.
✓ The tool shall not alter the original disk.
✓ The tool shall be able to access both IDE and SCSI disks.
✓ The tool shall be able to verify the integrity of a disk image file.
In addition, NIST mandates that the following requirements be met by all disk-imaging tools:
✓ If there are no errors accessing the source media, then the tool shall create a bit-stream
duplicate of the original.
✓ If there are I/O errors accessing the source media, then the tool shall create a qualified
bit-stream duplicate. (A qualified bit-stream duplicate is defined to be a duplicate except
in identified areas of the bit-stream.) The identified areas are replaced by values specified
by the tool’s documentation.
✓ The tool shall log I/O errors, including the type of error and location of the error.
✓ The tool shall be able to access disk drives through one or more of the following inter-
faces: direct access to the disk controller, Interrupt 13 BIOS interface, Interrupt 13 BIOS
extended interface, ASPI SCSI interface, or Linux interface.
✓ Documentation shall be correct insofar as the mandatory and any implemented optional
requirements are concerned. For example, if a user following the tool’s documented
procedures produces the expected result, then the documentation is deemed correct.
b526367 Ch03.qxd 3/21/03 3:37 PM Page 61
✓ The tool shall copy a source to a destination that is larger than or equal to the size of the
source, and shall document the contents of the areas on the destination that are not part
of the copy.
✓ The tool shall notify the user if the source is larger than the destination.
The following two disk-imaging tools are among the select few that currently meet the afore-
mentioned stringent requirements as mandated by NIST:
✓ Linux dd is a freeware utility for any Linux system that can effectively image and copy
every sector on all SCSI and IDE drives. This utility includes an MD5 mechanism, which
can validate the data, and writes images to hard drive, tape, and any other removable
media. Linux dd can be found at www.redhat.com.
✓ SnapBack DatArrest, by Columbia Data Products, Inc. (CDP), is a complete disk-imaging
solution that is run from a single floppy disk. According to its manufacturer, it can
acquire data at a rate of up to 300MB a minute, as well as back up DOS, Windows, Win95,
WinNT, and Unix from the same disk, while providing a legal record of an exact “picture
in time” of the computer’s contents. It can even back up a self-destructive (booby-
trapped) hard drive. Additional details and pricing can be found at www.snapback.com.
✓ The passage of evidence from one party to the next is fully documented.
✓ The passage of evidence from one location to the next is fully documented.
The excerpt that follows, from the March 2001 USA Bulletin by Orin S. Kerr, Trial Attorney for
the Computer Crime and Intellectual Property Section of the U.S. Department of Justice, explains
some of the important issues that can arise when the government seeks the admission of
computer records under the Federal Rules of Evidence.
b526367 Ch03.qxd 3/21/03 3:37 PM Page 62
The USA Bulletin further states, “The best evidence rule states that to prove the content of writ-
ing, recording, or photograph, the original writing, recording, or photograph is ordinarily
required. See Fed. R. Evid. 1002. Agents and prosecutors occasionally express concern that a mere
printout of a computer-stored electronic file may not be an ‘original’ for the purpose of the best evi-
dence rule. After all, the original file is merely a collection of 0s and 1s. In contrast, the printout is
the result of manipulating the file through a complicated series of electronic and mechanical
processes. Fortunately, the Federal Rules of Evidence have expressly addressed this concern. The
Federal Rules state that [i]f data are stored in a computer or similar device, any printout or other
output readable by sight, shown to reflect the data accurately, is an original.”
The aforementioned bulletin refers to the Federal Rules of Evidence, which can be found at
www.cybercrime.gov in the Computer Crime and Intellectual Property Section of the U.S.
Department of Justice. These rules govern the introduction of evidence in proceedings, both civil
and criminal, in federal courts. While they do not apply to suits in state courts, the rules of many
states have been closely modeled on these provisions. When it comes to chain-of-custody, authen-
tication or identification is paramount. The standard for authenticating computer records is the
same as for authenticating other records. The degree of authentication does not vary simply
because a record happens to be (or has been at one point been) in electronic form.
b526367 Ch03.qxd 3/21/03 3:37 PM Page 63
In summary, for digital images, the chain-of-custody should document the identity of the indi-
viduals who have had custody and control of the digital image file(s) from the point of capture to
archiving. Once the file has been archived, the chain-of-custody should document the identity of
the individuals who have custody and control of the archived image.
✓ Scope as applied to the type(s) of platform(s) and organization functions subject to con-
tingency planning
✓ Resource requirements
✓ Training requirements
✓ Plastic tarps that may be unrolled over IT equipment to protect it from water damage
✓ Heat-resistant and waterproof containers for backup media and vital nonelectronic
records
✓ Emergency master system shutdown switch
and last components provide essential information to ensure a comprehensive plan. The
Notification/Activation, Recovery, and Reconstitution phases address specific actions that the
organization should take following a system disruption or emergency.
Plans should be formatted to provide quick and clear direction in the event those personnel
unfamiliar with the plan or the systems are called on to perform recovery operations. Plans should
be clear, concise, and easy to implement in an emergency. Where possible, checklists and step-by-
step procedures should be used. Concise and well-formatted language reduces the likelihood of
creating an overly complex or confusing plan.
✓ Notification procedures
✓ Reporting procedures
✓ Security requirements
7. PLAN MAINTENANCE
To be effective, the plan must be maintained in a ready state that accurately reflects system
requirements, procedures, organizational structure, and policies. IT systems undergo frequent
changes because of shifting business needs, technology upgrades, or new internal or external poli-
cies. Therefore, it is essential that the contingency plan be reviewed and updated regularly, as part
of the organization’s change management process, to ensure new information is documented and
contingency measures are revised if required. As a general rule, the plan should be reviewed for
accuracy and completeness at least annually or whenever significant changes occur to any ele-
ment of the plan. Certain elements, such as contact lists, will require more frequent reviews.
Depending on the system type and criticality, it may be reasonable to evaluate plan contents and
procedures more frequently.
Chapter Summary
Many organizations are not sufficiently prepared to deal with computer (or network) intrusions
and are more likely to address the need to prepare and respond to incidents only after a breach has
occurred. Even with sophisticated security and preventative measures in place, intrusions can —
and do — happen. The best defense is a good offense. Organizations need a strategy — including
preparation and plans for detection and response — to handling intrusions effectively. This chap-
ter focuses on preparation, which includes selecting, installing, and becoming familiar with sev-
eral tools and techniques that will assist you in the response process and help you collect and
maintain data related to an intrusion.
Key points covered in this chapter include
✓ How to prepare operating systems to collect and preserve evidence via logging and
auditing
✓ The benefits of time synchronization, time-stamping, and their role in strengthening an
organization’s incident response capability
✓ The importance of identifying and mapping network devices for incident response
✓ The procedures for collecting evidence from memory and the imaging of hard disks
Chapter 4
✓ Tracking and recovering deleted files through the Windows Recycle Bin
WORLDWIDE, IT’S ESTIMATED THAT ABOUT 90 PERCENT OF PCS run one version or another of the
Microsoft Windows operating system. In fact, the nearly ubiquitous nature of the Microsoft
Windows operating systems was the focus of a much-publicized U.S. Department of Justice
antitrust trial. With its user-friendly interface and widespread popularity, Windows continues to
be the prime target for attacks by hackers and other intruders using malicious code. Recent stud-
ies indicate that unpatched and unprotected Windows-based computers that have been connected
to the Internet are generally compromised in less than 72 hours.
Despite the use of powerful firewalls and sophisticated intrusion detection systems, even a
protected system can become the victim of an attack. To be effective, today’s incident response
personnel must be trained in investigation techniques, incident response tactics, and the legal
procedures for collecting evidence. One popular target for malicious intruders is the Windows
Registry. Knowledgeable hackers can gain access to the Registry and manipulate user passwords,
DNS settings, access rights, or other features that they may need in order to accomplish their
objectives. To complicate matters more, the Windows Registry is large as well as dynamic, and the
information in the Registry is diverse, making it difficult to monitor.
This chapter focuses on the roles the Windows Registry and data storage play in forensics
investigation and incident response procedures. It provides incident handlers with the knowledge
and tools needed to protect the Registry while successfully investigating and responding to
computer incidents within their organizations.
69
b526367 Ch04.qxd 3/21/03 3:37 PM Page 70
Everything from installed applications and Control Panel options to the colors displayed on the
screen is stored in the Registry database. With Windows 9.x, the Registry is contained in two files
(system.dat and user.dat) located in the Windows directory. Also located in the Windows directory
are backup copies of the Registry called System.da0 and User.da0. With Windows NT/2000, the
Registry files are referred to as hives and are stored in various directories within the NT operating
system. Before the advent of Windows 95, Registry functions were performed by WIN.INI,
SYSTEM.INI, and other .INI files that are associated with applications.
Registry Structure
The Registry has a hierarchal structure similar to the directory structure on the hard disk. Each
main branch, denoted by a folder icon in the Registry Editor (a.k.a. REGEDIT, see Figure 4-1) is
called a hive. Located within those hives are keys. Each key may contain other keys called subkeys
along with their values. It is the values that contain the actual information that is stored within
the Registry.
What follows is an overview of the six main Registry branches. Note that each branch contains
a specific portion of the information stored in the Registry:
Within the Registry keys, there are five types of values. Following is a list of values along with a
brief explanation of their functions:
✓ String or REG_SZ. This type is a standard string, used to represent human-readable text
values.
✓ Binary or REG_BINARY. This type stores the value as raw binary data. Most hardware
component information is stored as binary data and is displayed in the Registry Editor
in hexadecimal format.
✓ DWORD or REG_DWORD. This type represents the data as a four-byte number and is com-
monly used for Boolean values, such as when 0 is disabled and 1 is enabled. Additionally,
many parameters for device drivers and services are this type and can be displayed in
binary, hexadecimal, and decimal format.
✓ Multistring value or REG_MULTI_SZ. This type is a multiple string used to represent val-
ues that contain lists or multiple values; each entry is separated by a NULL character.
✓ Expandable string value or REG_EXPAND_SZ. This type is an expandable data string, that
is, a string containing a variable to be replaced when called by an application. For exam-
ple, the string “%SystemRoot%” is replaced by the actual location of the directory
containing the Windows NT system files.
1. At the top of the editor, select the Help menu, then Help Topics.
2. Select the Contents tab, then select Change Keys and Values.
3. Select the topic that you want.
b526367 Ch04.qxd 3/21/03 3:37 PM Page 72
An alternative Registry Editor (REGEDT32.EXE) is available for use with Windows NT/2000. It
note
includes some additional features not found in the standard version. Advanced features include
the ability to view and modify security permissions, and the ability to create and modify the
extended string values REG_EXPAND_SZ & REG_MULTI_SZ.
b526367 Ch04.qxd 3/21/03 3:37 PM Page 73
HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\Run
While this is a common location for launching legitimate software applications, it can also be used
by hackers or malicious coders to cause a dangerous application (like a Trojan horse or a key-
stroke logger) to be launched the next time the computer is started. While Registry data may be
viewed through the built-in Windows Registry Editor (REGEDIT), most values in the Registry are
read and updated only by the applications that use it.
One of the first steps when gathering information on a compromised Windows computer is the
collection of volatile data. Volatile data can be defined as active information temporarily reflecting
the machine’s current state. This includes the contents of registers, caches, physical and virtual
memory as well as information about network connections, shares, running processes, disks,
floppy disk drives, tape, CD/ROM, and printing activity. One useful tool for the collection of
volatile Registry data is Regmon (see Figure 4-3), by Mark Russinovich and Bryce Cogswell.
Regmon is a freeware utility that displays, captures, and logs all Registry activity in real time.
Because it has the ability to monitor, capture, and log Registry activity, it is useful as both an inci-
dent-response and a forensic tool. For additional details or to download Regmon, visit www.sys-
internals.com.
Another useful freeware tool for monitoring and logging changes to the Windows Registry is
InCntrl5 (see Figure 4-4), written by Neil J. Rubenking. InCntrl5 monitors the changes made to
Registry, drives, and .INI and text files of Windows-based computers. While it was primarily
designed to track systemwide changes that occur when installing new software, it is also quite
useful when conducting a forensic examination as it allows the examiner to compare changes
made to a system both before and after a system compromise. InCntrl5 can be downloaded at
www.extremetech.com.
b526367 Ch04.qxd 3/21/03 3:37 PM Page 74
event of any damage to a Windows system, especially its Registry. In addition, since hackers and
malicious coders often target the Registry, a backup copy of an unadulterated Registry can be used
as a baseline for comparison when conducting a forensic examination of an affected computer.
The concept of backing up files is often disregarded and/or poorly understood among organiza-
tional computer users. Unfortunately, the consequences of not properly backing up files can put
an organization out of business. The following are general backup procedures for Windows NT
4.0, 2000, and XP.
WINDOWS NT 4.0
Under Windows NT 4.0 there are two methods that that can be used in order to back up and
restore the entire Registry. The first (and preferred) method is to use the built-in Windows NT
Backup tool (Ntbackup.exe) and use the option to either back up or restore the Registry. This pro-
gram, which is part of Windows NT 4.0, can be invoked by simply typing ntbackup in the Run
command box in the Windows Start menu or at the command prompt. Bear in mind that to
employ this method you need a functioning tape, Zip, or CD-RW drive to receive the backup.
The second backup method is to use RDISK with the rdisk /s command. Windows NT con-
tains an RDISK utility that is used to extract essential data (from the Registry of a Windows NT
system) required for recovery in the event that the Registry has become damaged. When used with
the /s option, RDISK aids in recovery of user accounts, groups, policies, and access controls by
extracting Security Account Manager (SAM) information. After using this procedure, the
extracted data is initially written to files in a directory named repair, usually located in the
C:\WINNT\ directory.
The RDISK utility is not intended for making a complete backup of a Windows NT 4.0 Registry.
note
The RDISK data files are only intended to contain the essential information needed for quick
recovery, not the entire contents of the Registry. To perform a complete backup of the Windows
NT 4.0 Registry, a more comprehensive utility tool (like Ntbackup.exe) or a third-party utility
specifically designed for Registry backup should be used.
WINDOWS 2000
In order to make a backup of the entire Registry under Windows 2000, it is necessary to use the
Windows 2000 Backup utility. While the backup utility is often used to create an Emergency
Repair Disk (ERD), it can also be used to back up and restore the System State, which includes the
Registry, the COM+ Class Registration database, and other critical files required for booting the
computer.
The procedure for backing up the System State on a Windows 2000 computer is as follows:
Select the System State check box. (All of the components to be backed up are listed in the
right pane. You cannot individually select each item.)
note
During the System State backup, you must select to back up the Winnt\Sysvol folder. This option
is also required during the restoration process in order to have a working system volume (sysvol)
after the recovery.
The procedure for restoring the System State from a backup on a Windows 2000 computer is as
follows:
As with the System State backup procedure, during the restore operation, the Winnt\Sysvol folder
note
must also be selected to be restored in order to have a working sysvol after the recovery process.
Be sure that the advanced option to restore “junction points and data” is also selected prior to
the restoration. This ensures that sysvol junction points are re-created.
If you wish to restore the System State on a compromised or damaged system, it is best to per-
form the aforementioned steps while the computer is operating in Safe Mode. In order to start the
computer in Safe Mode, follow these steps:
1. Power on the computer, and press the F8 key as soon as you see the Windows 2000 Boot
menu.
2. Using the arrow keys on the keyboard, highlight the appropriate Safe Mode option, and
then press Enter.
3. Windows will now boot up in Safe Mode.
b526367 Ch04.qxd 3/21/03 3:37 PM Page 77
WINDOWS XP
Like Windows 2000, to back up the System State (Registry, the COM+ Class Registration database,
and critical boot files) under Windows XP, you need to employ the Backup utility.
The procedure for backing up the System State on a Windows XP computer is as follows:
The procedure for restoring the System State from a backup on a Windows XP computer is as
follows:
✓ http://freeware.intrastar.net/registry.htm
✓ www.webattack.com
✓ www.davecentral.com
Hard disks store data on one or more metal oxide platters, each with two sides upon which data
can be stored. The hard-disk platters are made of glass or aluminum. A typical hard drive contains
several of these 3.5-inch platters, which can contain tens of billions of individual bits of data. Areal
density has been the primary growth rate indicator for hard-drive capacity. The higher the areal
density of a hard disk’s platters, the more data bits that can be packed into each square inch of
platter real estate. These platters, which spin at a rate of between 3,600 and 10,000 revolutions per
minute, hold the magnetic charges that make up the data stored on the disks. A hard disk drive
has one read/write head per platter, which is attached to an actuator arm. This head actually floats
on a cushion of air generated by the rapidly spinning platters. The distance that the heads float is
only about 1 to 2 micro-inches (one millionth of an inch) above the surface of the platters.
Because of these extreme tolerances, the disk drive is sealed to prevent any dirt or dust from
entering the drive.
All information contained on a hard-disk drive is stored in tracks, which are concentric circles
placed on the surface of each platter, much like the annual rings of a tree. Since a hard-disk track
would be too large for an operating system to manage as a continuous single unit, multiple tracks
are used. The tracks are numbered, starting from zero, and they begin at the outside of the platter
and increase (0, 1, 2, 3, and so on) toward the center. A modern hard disk has tens of thousands of
tracks on each platter. Each track can hold many thousands of bytes of data. Even with multiple
tracks, data storage still requires a tremendous amount of operating system resources to read and
write data. It would be inefficient to make a track the smallest unit of storage on the disk, since
this would mean small files would also occupy a large amount of disk space. Obviously having a
small file occupy a large area of disk space is wasteful, and for that reason, disk tracks are further
divided into even smaller numbered divisions known as sectors. Sectors are the basic unit of data
storage on a hard disk.
is written by the other head. As with a hard drive, the head mechanism is moved by an actuator.
Using a design similar to that of early hard drives, a motor moves the heads in and out, giving
them the ability to position themselves over any track on the disk to store and retrieve data.
The benefit of floppy disks is that they are portable, making it easy to transfer data from one
computer to another. The drawback of floppy disks is that they are not a reliable medium for stor-
ing important files since dust, scratches, moisture, and magnetic fields can easily damage them.
From an incident response and forensic standpoint, the floppy disk plays an important role.
One should never allow a suspect computer to boot from its hard drive or use its operating system
to perform investigative tasks. Many times evidence is erased or altered during the normal boot
process. In addition, you do not know what type of cleanup procedures are waiting in the boot
process. When conducting a forensic investigation you should always boot from a floppy disk.
Keep in mind that the computer’s BIOS may first need to be modified via the BIOS setup program
to allow the computer to boot from a floppy disk. This exact procedure varies depending upon the
type of BIOS that was used in the manufacture of the computer’s chipset. Once you are sure you
can boot from the floppy drive, the hard drive can be examined.
The BIOS setup program can normally be entered only during the boot process; however, some
tip
BIOSes permit entry into their setup program using a key combination at any time. One recent
universal standard has begun to emerge; the use of the Del key to enter the setup program dur-
ing the boot process. This appears to hold true for the two most popular BIOSes, AMI and Award,
as well as several others. Older BIOSes can use a multitude of strange key combinations, includ-
ing but not limited to: Esc, F1, F2, F10, Ctrl+Esc, Alt+Esc, Ctrl+Alt+Esc, Ctrl+Alt+Enter, Ins, and
several others.
The CD-ROM
Compact Disc-Read Only Memory, better known as a CD-ROM, is a type of optical disc capable of
storing enormous amounts of data. While the most common size for such discs is around 650 to
700MB, newer high-capacity CD-ROMs are capable of storing even more than that. A 700MB
single CD-ROM has the storage capacity of around 700 floppy disks, enough storage to hold
roughly 300,000 text pages. In 1978 Phillips and Sony Corporation joined forces in an endeavor to
produce the current audio CD. Sony pushed for a 12-inch disc while Phillips wanted a smaller,
more portable disc. With the details eventually ironed out, the current standard 4.72-inch
(120mm) disc was announced in 1982. Legend has it that this size was chosen because it could
contain Beethoven’s Ninth Symphony in its entirety.
Since its introduction by Sony and Philips, the compact disc has had a remarkable impact on
how people listen to music. CD-ROMs have affected how we watch movies, share photographs, and
read books. The advantages of CDs include their small size, large data capacity, low manufactur-
ing cost, and physical robustness. With the continued cooperation of Sony and Phillips, additional
specifications were announced in the late 1980s that led to the use of the CD-ROM for the storage
of computer data.
b526367 Ch04.qxd 3/21/03 3:37 PM Page 81
CD TECHNOLOGY
While identical in size and appearance to audio CDs, computer CDs are designed to store
computer data in addition to audio data. CD-ROMs are made of a thin metallic film of aluminum
alloy surrounded by polycarbonate. The metallic film is the part of the CD where the digital infor-
mation is stored. The clear polycarbonate shell simply protects the film and provides rigidity to
the disc. These CDs are single sided; all of the reading is done from the underside of the CD and a
label is usually placed on the top.
Information stored on the metallic film of the CD can be read only by reflecting a low-power
laser off the aluminum film. A special light receptor in the CD-ROM drive notes where light is
reflected and where light is absent. The absence of reflected light is caused by small pits etched
into the surface of the aluminum strata. Individual pits are only .12 microns (millionths of an
inch) deep and are etched into the spiral track that traverses from the outside edge of the disc to
its center (similar to old-style vinyl analog records). The absence of pits (the surface or high
points) is referred to as lands. A low-power laser reads the pits and lands, which are converted by
the CD-ROM drive into binary code (0s and 1s). This binary (native) computer code is the actual
data used by the computer. Standard CD-ROM discs are read-only and cannot be altered or erased.
This changed with the advent of CD-R and CD-RW formats.
✓ FAT12. The oldest and original type of FAT, it uses a 12-bit binary number to hold the
cluster number. FAT12 can only be used on storage volumes of 16MB or less. It is there-
fore most suitable for very small volumes and is used on floppy disks and hard-disk
partitions smaller than about 16MB. (The latter being rare today.)
✓ FAT16. Using a 16-bit binary number to hold cluster numbers, FAT16 is used by older
systems and for small partitions on modern systems. A hard disk using FAT16 can only
hold a maximum of 65,526 clusters. FAT16 is used for hard-disk volumes ranging in size
from 16MB up to 2GB (two billion bytes). The Virtual File Allocation Table (VFAT)
system, used by Windows 95 and later, is a variant of FAT16 that allows the operating
system to circumvent the old 8.3 file-name limitation (for example, autoexec.bat where
an eight-letter file name is followed by the DOS three-character extension) that plagued
DOS and permits the use of file names up to 255 characters long.
✓ FAT32. The most recent version of FAT, FAT32 is supported by newer versions of
Windows beginning with the Windows 95 SR2 release. FAT32 actually uses a 28-bit, not
a 32-bit, binary cluster number. This is because the commonly used ATA hard-drive
interface that accesses the data on a hard drive is limited to 28-bit addressing. However,
28 bits is still enough to permit enormous hard-disk volumes of up to 2TB (two trillion
bytes) in size. In addition, FAT32 uses space more efficiently. FAT32 uses smaller clusters
(for example, 4K clusters for drives up to 8GB in size), resulting in 10 to 15 percent
more efficient use of disk space relative to large FAT drives.
The number of data bits used by the FAT file system is what gives it its name. Another impor-
tant feature of the FAT file system is that FAT disks usually contain two copies of FAT (the second
copy of FAT immediately follows the first one). In both FAT12 and FAT16 systems, all copies of FAT
are kept in sync with each other, but only the first copy is ever read. Microsoft claims that the next
copies of FAT are used when the first one is physically unusable, but this does not appear true for
all versions of their operating systems. In FAT32 there exists a field in the BPB (BIOS Parameter
Block) that tells the operating system which copy to use and whether to synchronize all copies.
The BPB stores a lot of information about the volume itself, like its size, the number of bytes per
sector, the number of sectors per cluster, and several other items of information. In summary,
FAT32 uses the BPB to know how to deal with a FAT volume.
that it works on hard disks of any size. While there is a maximum physical size limit of the NT file
system, that number is so large that it will be decades before hard-drive technology exceeds its
capability.
At the heart of NTFS is the Master File Table or MFT. The MFT is analogous to the FAT file sys-
tem’s File Allocation Table because the MFT maps all the files and directories on the drive. The
MFT is divided into discrete units known as records. In one or more MFT records, NTFS stores the
metadata. The metadata is data that describes a file or directory’s characteristics (security settings
and other attributes such as read-only or hidden) and its location on the disk.
For each local hard disk on the user’s computer, a hidden folder named Recycled is created.
This folder contains files deleted using My Computer, Windows Explorer, and some Windows
applications. The Windows OS keeps track of any files sent by the user to the Recycle Bin by gen-
erating temporary Info files. When a file or folder is deleted, the complete path, including the
original file name, is stored in a special hidden file called Info in the Recycled folder. The deleted
file is renamed, using the following syntax:
As mentioned earlier in this section, each local hard drive has its own Recycled folder. Files
deleted from many Windows applications are also moved to the Recycled folder on the drive from
which they are deleted. Double-clicking the Recycle Bin icon displays the folder listing of all
deleted files that are available for restoration. By right-clicking the file and choosing Restore, the
original file is renamed and restored to its original name and location.
For those conducting a forensic investigation, Recycle Bin Info files serve as a window to the
past by documenting a user’s file deletion activities. The Windows OS contains numerous Recycle
Bin Info files spread throughout hidden areas of the hard drive. Even after the Recycle Bin has
been emptied, traces of the temporary Info files remain. By using readily available freeware
programs like PC Inspector File Recovery by Convar Deutschland GMBH, an investigator can
b526367 Ch04.qxd 3/21/03 3:37 PM Page 85
often determine when a user deleted particular files, even if those files were long since emptied
from the Recycle Bin (see Figure 4-7). For more information about PC Inspector File Recovery or
to download a copy, visit www.convar.de.
The previously mentioned Info file records help to tell stories about file histories and even a
user’s emotional state. As files automatically deleted by the OS do not leave a record in the Info
file, an Info file record indicates that a user knowingly deleted a file in question. It is not uncom-
mon to find files deleted during a certain time period, such as when the user may have felt that
suspicion was focused upon him. A skilled computer forensic investigator is able to recover these
Info files, which are often vital for creating a convincing case.
As mentioned earlier in this chapter, when the Recycle Bin is “full” — no longer able to hold
deleted data — the oldest files are purged first. While it is possible to bypass the Recycle Bin by
holding down the Shift key when deleting a file, the actual file data will yet remain. When files are
deleted under the FAT file system, Windows modifies the deleted data’s FAT entry by indicating
that those entries are now available for reuse. Under NTFS, the process is similar. Only the file’s
directory entry, data clusters, and MFT entry are marked as available. The file’s data remains,
though, until the clusters are recycled to store some other file. In either case, once the disk
clusters that were originally occupied by a deleted file have been overwritten by new data, the file
is gone forever.
When computer files are created, their length varies depending upon the content of the data
being stored. In DOS and Windows, files are stored in blocks of data of fixed length, called clusters.
Since file sizes rarely match the size of one or multiple clusters perfectly, data storage space,
known as file slack, exists from the end of one file to the end of the last cluster assigned to that file.
Cluster sizes vary in length depending upon the operating and file systems involved. Larger clus-
ter sizes mean more file slack and also more waste of storage space, particularly when Windows 95
is involved. However, this shortcoming can be useful for the computer forensics investigator since
file slack can be a significant source of evidence.
File slack has the potential to contain randomly selected bytes of data from computer memory.
This occurs because DOS/Windows normally stores data in 512-byte blocks known as sectors.
Clusters are made up of groups or blocks of sectors. If there is not enough data stored to com-
pletely fill the last sector in a file, the DOS and Windows operating system will pad the remaining
space with data taken from the computer’s memory buffers. This randomly selected data from
memory is called RAM slack since it is extracted from the random access memory of the computer.
RAM slack may contain any information that has been created, downloaded, copied, viewed, or
modified since the computer was last booted. If the computer has not been shut down for an
extended period of time, the data stored in file slack can come from work sessions that occurred in
the past. Because file slack potentially contains random data “borrowed” from the computer’s
memory, it is possible to identify network logon names, passwords, and other sensitive informa-
tion associated with everyday computer usage. It is important not to forget that file slack can also
exist on floppy disks, Zip disks, and other removable media devices.
Any data written to the file system containing the deleted file (either by you or by any other
note process running on your machine) has the potential to overwrite some of the data you hope to
recover. If you are unable to unmount the file system because the deleted file was located on
your root file system, for example, you may wish to consider removing the hard drive and
reinstalling it into another Unix or Linux machine as a nonroot drive.
Using e2undel
The fundamental procedure for recovering data in ext2 involves finding the deleted data on the
raw partition device and then making it visible again to the operating system. There are two ways
to accomplish this. The first method is to remove the delete flag from the inodes of the deleted
data. This approach is somewhat complicated because it requires some programming knowledge
and the use of debugging tools. The preferred and safer process is to ferret out where the data lies
in the partition, and then copy that data into a new file on another file system.
The best method for recovering deleted data under the ext2 file system is to use a handy freeware
utility called e2undel. This handy program recovers the data of deleted files on computers using the
ext2 file system. Among its features is a built-in library that allows you to recover deleted files by
name. One of the biggest benefits of this utility is that it does not require an extensive knowledge of
the ext2 file-system commands in order to use it. The basic syntax for recovering data using
ex2undel is as follows:
The following shows what the commands in the above line mean:
-d is the file system location where you wish to search for the deleted files (for
example, /dev/hd0 for the first partition on the primary IDE drive).
-s is the directory where you wish to save recovered files.
-a recovers all deleted files, not just those listed in the undel log file.
-t attempts to determine the type of deleted files without names (this option
works only in conjunction with the -a command).
note
While the -a option should always be used, the -t option is not mandatory. For additional
information about e2undel commands or to download a copy of this utility, visit http://
sourceforge.net/projects/e2undel.
b526367 Ch04.qxd 3/21/03 3:37 PM Page 89
Chapter Summary
While most organizations employ firewalls and intrusion detection systems to protect their net-
works, they still fall victim to successful attacks by technologically savvy network intruders. In
order to combat modern-day network marauders, network personnel must be trained in inves-
tigative techniques, incident response tactics, and the legal procedures for collecting evidence.
Because Windows is the most widely used operating system, it is also the most popular target for
hackers, crackers, and users of malicious code. Network attacks may come from either external
sources or internal personnel. Two common targets are the Windows Registry and data storage
systems. While network intruders often attempt to cover their tracks by deleting certain files, a
number of methods and software tools are available to help in retrieving this ostensibly lost data.
Key points covered in this chapter include
✓ How to view, edit, preserve, and protect the Windows Registry data
✓ How to collect evidence from deleted files via the Windows Recycle Bin
✓ Procedures for recovering deleted data under FAT and ext2 file systems
b526367 Ch04.qxd 3/21/03 3:37 PM Page 90
b526367 Ch05.qxd 3/21/03 3:38 PM Page 91
Chapter 5
THE INTERNET HAS ALTERED THE WAY BUSINESS IS CONDUCTED. Nearly everything is accessible
with the click of a mouse. While individuals and organizations use the Internet daily for e-mail
messaging, e-commerce, or instant messaging, rarely do we consider the dangers posed by hack-
ers, viruses, worms, and Trojan horses as we click away from Web site to Web site. We place trust
in our computers and assume that they offer protection for our sensitive information. The largely
unregulated Internet harbors numerous threats. While hackers, crackers, and law-abiding citi-
zens all live together in the cyber world, the average Internet user is usually unaware of the pres-
ence of malevolent individuals. Malicious code in the form of viruses, worms, and Trojan horses
traverses the Internet, exploiting flaws that exist in the operating systems and applications of
many an innocent user.
Because of these cyber threats, individuals and organizations need to change the way they
operate and manage their networks. Security training frequently is focused on basic security
issues and not on responding to Internet threats. During typical user awareness training the
specifics of e-mail message attachments (and their ability to hide malicious code or masquerade
as legitimate documents or graphics files) are not addressed sufficiently. We cannot blame com-
puter users for virus proliferation if they are thrust into a computerized environment without
first having been exposed to some incident response basics. This chapter focuses on detecting,
analyzing, and responding to threats posed by intruders and malicious coders.
91
b526367 Ch05.qxd 3/21/03 3:38 PM Page 92
System Processes
Simply put, a process is an executing program. Oftentimes a thread is confused with a process.
Similar to a process, a thread is the unit of execution to which the operating system assigns pro-
cessing time (a time slice), and it consists only of data flow and control. Threads provide a useful
programming technique for dividing work into separate pieces. Thread execution is monitored
and scheduled solely by the operating system, and every process is started with the execution of a
single thread, usually called the primary thread. Even where there are multiple threads, they still
use only the address space of a single process.
Every program running on a computer uses at least one process, consisting of the memory
address (space) allocated to the process by the computer to run the program and the ability of the
computer’s OS to monitor the program throughout the execution process. In modern-day 32-bit
multitasking operating systems, processes are managed for the most part as isolated entities so
that if one process crashes, the others are generally not affected. The resources they use (memory,
disk, I/O, and CPU time) are virtual in nature, meaning that every process has its own set of virtual
resources, untouched by other processes. Even when several programs are running at the same
time, each process has its own address space and flow of control. Thus, a process is a place to work
and a way to keep track of what a program is doing.
✓ Missing processes
✓ Added processes
✓ Processes that have unusual user identification associated with them (such as an ID
belonging to someone not employed by an organization)
As mentioned in Chapter 1, log files should be checked for connections from unusual locations
or for any unusual activity. All versions of Windows NT have a built-in Event Viewer that allows
you to check for unusual logon entries, failures of services, or abnormal processes. Data collected
from log files can help in the analysis of the process behavior.
These include the following:
When reviewing operating system or network logs, look for the following:
✓ Processes consuming excessive resources (for example, memory, disk, or CPU time)
✓ Processes starting or running at unexpected times
✓ Unusual processes not the result of normal authorized activities (for example, packet
sniffing, password cracking, and so on)
✓ Processes that prematurely terminate
✓ Previously inactive user accounts that suddenly begin to spawn processes and consume
computer or network resources
✓ Unexpected or previously disabled processes, which may indicate that a hacker or
intruder has installed his own version of a process or service
✓ A workstation or terminal that starts exhibiting abnormal input/output behavior
✓ Multiple processes with similar names (for example, when a computer virus runs
Explorer.exe using a capital letter to disguise itself rather than the actual process, which
is called explorer.exe by the operating system)
✓ An unusually large number of running processes
b526367 Ch05.qxd 3/21/03 3:38 PM Page 94
To create a desktop shortcut to the taskmgr.exe program, you first need the location of this file in
tip
the Windows OS. The default location is C:\winnt\system32 for Windows NT and 2000 and
c:\windows\system32 for Windows XP.
✓ System Idle Process. This process is a single thread running on each processor. Its sole
task is accounting for processor time when the system isn’t processing other threads.
Process-Monitoring Programs
In the nonvirtual world, when a complex task must be carried out, tools are available to make the
job easier. The same principal applies in the virtual world of computers. As mentioned earlier in
this chapter, monitoring system processes can be time-consuming and complex. Most Unix oper-
ating systems ship with a command-line tool called ps. The ps command allows you to list what
processes are being executed by the machine on which the command was entered. Administrators
b526367 Ch05.qxd 3/21/03 3:38 PM Page 97
can use it along with the -ef option (for example, ps -ef) to get a full listing of all processes on
the Unix system. While Windows NT, 2000, and XP come with Task Manager, they don’t offer a sig-
nificant level of detail about individual processes. Luckily, there are several programs available
that can make the job of monitoring system processes less onerous. At the Sysinternals Web site
(www.sysinternals.com) there is a downloadable suite of advanced freeware utilities called
PsToolscoded by Mark Russinovich. It can assist in the monitoring and gathering of detailed infor-
mation about system processes under the Windows operating system. The PsTools suite includes
the following tools, which can be downloaded individually or as a package:
✓ PsUptime shows how long a system has been running since its last reboot.
Since all of the PsTools are command-line tools, they must be run from a command (DOS)
prompt. You will need to add the folder that they are stored in to your system’s path in order to
run them from any directory other than the directory or folder in which they were placed. By plac-
ing these tools in your Winnt directory (Windows NT/2000) or your Windows directory (Windows
XP), they will automatically be included in your system’s Path statement. If you wish to place
these tools in their own directory (for example, C:\PsTools) yet still have Windows locate them
automatically, perform the following steps.
Under Windows NT 4.0, do the following:
1. Right-click the My Computer icon. (In Windows XP, the My Computer Icon may be
located in the Start menu.)
2. Select Properties from the context menu.
3. Select the Advanced tab.
4. Click the Environment Variables button.
5. From the System Variables window, highlight Path entry and then select Edit.
6. Add (append) the location of the PsTools directory to the list of directories in the Path by
using a semicolon directly after the last statement in the Path, then adding the location
of the PsTools Directory (see Figure 5-4).
Another useful tool from the Sysinternal Web site is Process Explorer (see Figure 5-5) by Mark
Russinovich. With this powerful point-and-click, Windows-based, freeware utility, you can find
out who owns each process, and, for each of these processes, what files, Registry keys, and other
objects are open. In addition, Process Explorer shows which DLLs have loaded and which handles
opened with each process. This makes it a powerful tool for understanding the internal behavior
of applications, as well as for tracking down handle leaks and DLL version mismatches.
b526367 Ch05.qxd 3/21/03 3:38 PM Page 99
tip In all versions of Windows you can view hidden files at the command prompt by typing
dir /ah.
Another favorite hacker ploy is to exploit SUID root programs. (SUID root refers to Set User ID
root.) SUID root allows the program to carry out functions that only system administrators with
full root privileges would be permitted to perform. Programs that run as root have complete
access to a Unix system, and SUID programs run as root regardless of who is executing them.
Programs that run low-level networking routines and control functions such as graphical display,
changing passwords, and logging in are all examples of programs that require a user with full root
privileges to execute them. Intruders often leave behind SUID copies of /bin/sh or /bin/time to
allow them to gain root access later. Find all SUID programs on your system and keep track of
what they are. By doing so, you will be aware of any changes, which could indicate a potential
intruder. Use the following command to find and print a list of all programs or files that are SUID
root:
You may also wish to browse through the list of all SUID programs and locate those that you
seldom or never use. You can turn off (disable) the SUID bit using the chmod (change mode) com-
mand. Essentially, chmod refers to setting the access privileges for a file. To execute chmod on a file
or directory, you must be its owner or a superuser with root privileges. The next step in control-
ling SUID root programs is to analyze which programs should not be SUID root or those that can
be removed without impeding system functionality. The list of programs that should not be SUID
root varies from system to system. In general, before turning off the SUID root, you should first
determine the program’s function and then decide if it is an essential program or if it must be
SUID root.
b526367 Ch05.qxd 3/21/03 3:38 PM Page 102
note A superuser account is a privileged account with unrestricted access to all files and commands.
Many administrative tasks can only be performed by a superuser account. By convention, the
username for the superuser account is root.
The exact syntax for removing SUID root varies depending upon which files you wish to
modify. Assuming that you want to remove the SUID bit on /usr/bin/passwd, the syntax is
chmod -s / usr/bin/passwd
The guiding tenet common with SUID root programs is to limit them to only those that are
necessary. System administrators are encouraged to examine the function of each program to
determine whether it needs to be set as SUID root or not.
A rootkit comes by its name not because the toolbox is composed of tools to crack root, but
instead because it is comprised of tools to maintain or keep root. Under both Unix and Linux, root
is the highest privilege granted. Users with root privileges have access to all aspects of the operat-
ing system because root access implies complete control of a machine.
Rootkits are used by intruders to hide and secure their presence on a computer system. While
there are rootkits available for the Windows operating system, Windows rootkits are currently not
as widespread as their Unix counterparts and are usually detected by any reputable antivirus soft-
ware. Under Unix and Linux, network administrators generally trust the ps command to display a
list of all system processes and the ls command to list all files located on a hard drive directory.
A rootkit generally contains a suite of hacker utilities, such as log clean-up scripts and network
packet sniffers. In addition, rootkits contain specialized replacements of core Unix and Linux util-
ities, such as netstat, ifconfig, ps, and ls. Even though hackers must first gain access to
b526367 Ch05.qxd 3/21/03 3:38 PM Page 103
victim systems before they can install their rootkits, their ease-of-use, widespread availability, and
the amount of destruction they are able to cause make rootkits a serious threat for computer net-
work administrators. Inevitably, most computer systems will be infiltrated by an intruder or
infected by some type of malicious code. The following U.S. Department of Justice public press
release demonstrates that even government agencies like NASA are not immune to rootkit
exploits:
December 1, 2000
News Release
Hacker Pleads Guilty in New York City to Hacking into Two NASA Jet Propulsion Lab Computers
Located in Pasadena, California
MARY JO WHITE, the United States Attorney for the Southern District of New York, announced
that RAYMOND TORRICELLI, a/k/a “Rolex,” a member of a hacker group known as “#conflict,” pled
guilty today in Manhattan federal court to charges of breaking into two computers owned and main-
tained by the National Aeronautics and Space Administration’s Jet Propulsion Laboratory (“JPL”),
located in Pasadena California.
According to a previously filed Complaint, TORRICELLI used one of those computers to host an
Internet chat-room and installed programs designed to obtain usernames and passwords from the
other computer.
In pleading to a five-count Information, TORRICELLI admitted that, in 1998, he was a computer
hacker, and a member of a hacking organization known as “#conflict.” TORRICELLI admitted that,
operating from his residence in New Rochelle, he used his personal computer to run programs
designed to search the Internet, and seek out computers which were vulnerable to intrusion; once
such computers were located, TORRICELLI’s computer would then obtain unauthorized access to the
computers by uploading a program known as “rootkit.” According to the Complaint, “rootkit” is a pro-
gram which, when run on a computer, allows a hacker to gain complete access to all of a computer’s
functions without having been granted these privileges by the authorized users of that computer.
According to the Information and Complaint, one of the computers TORRICELLI accessed was
used by NASA to perform satellite design and mission analysis concerning future space missions;
another was used by JPL’s Communications Ground Systems Section as an e-mail and internal
Web server. After gaining this unauthorized access to computers, he intruded and loading “rootkit,”
TORRICELLI under his alias “Rolex,” used many of the computers to host chat-room discussions.
In his plea allocution, TORRICELLI admitted that, in these discussions, he invited other chat par-
ticipants to visit a Web site which would enable them to view pornographic images, and that he earned
$0.18 for each visit a person made to that Web site. According to the Complaint, TORRICELLI earned
approximately $300 to $400 per week from this activity.
TORRICELLI also pled guilty to intercepting usernames and passwords traversing the computer
networks of a computer owned by San Jose State University, and to possession of stolen passwords and
usernames which he used to gain free Internet access, or to gain unauthorized access to still more
computers. TORRICELLI admitted, as part of his plea allocution, that he when he obtained passwords
which were encrypted, he would use a password-cracking program known as “John-the-Ripper” to
decrypt the passwords.
In addition, TORRICELLI pled guilty to possessing stolen credit card numbers. As part of his plea,
TORRICELLI admitted that he used one such credit card number to purchase long distance telephone
service. As alleged in the Complaint, TORRICELLI obtained these credit card numbers from other
individuals and stored them on his computer.
b526367 Ch05.qxd 3/21/03 3:38 PM Page 104
As described in the Complaint, much of the evidence obtained against TORRICELLI was obtained
through a search of his personal computer. According to the Complaint, in addition to thousands of
stolen passwords and numerous credit card numbers, investigators found transcripts of chat-room
discussions in which TORRICELLI and members of “#conflict” discuss, among other things, (1) break-
ing into other computers (a practice known as “hacking”); (2) obtaining credit card numbers belong-
ing to other persons and using those numbers to make unauthorized purchases (a practice known as
“carding”); and (3) using their computers to electronically alter the results of the annual MTV Movie
Awards.
Chief United States District Judge MICHAEL B. MUKASEY set sentencing in the case for March 7,
2001, at 9:15 A.M. At sentencing, TORRICELLI faces up to 10 years in prison and a $250,000 fine each
on the credit card fraud and password possession charges; 5 years in prison and a $250,000 fine on the
password interception charge; and 1 year in prison and a $100,000 fine on each of the charges involv-
ing his unauthorized access of the two NASA computers.
Ms. WHITE praised the investigative efforts of the National Aeronautics and Space Administration,
Office of the Inspector General, Computer Crimes Division; the New Rochelle, New York, Police
Department; and the Federal Bureau of Investigation.
Ms. WHITE stated: “The Internet is not a safe haven for criminals. As this case demonstrates, hack-
ers who use the Internet to commit credit card fraud, steal private passwords and usernames, and gain
access to restricted Government computers, thereby damaging those computers, are not harmless
pranksters — they are criminals, and will be dealt with vigorously.”
In a written statement to the court, Torricelli said he broke into NASA computers known as
HEIDI.JPL.NASA.GOV between April 17 and 25, 1998 with a rootkit tool that could give him root
access to all files on that computer. At the time the rootkit was installed, Torricelli stated, “I did
not know that it was being installed on computers belonging to NASA; I did know it was being
installed on computers that I was not authorized to access.”
On September 5, 2001, Raymond Torricelli was sentenced to four months in prison and four
months of home confinement. In addition, Torricelli was ordered to pay $4,400 in restitution to
NASA.
components that allow them to regain entry at a later date. A careful and sophisticated hacker will
not leave any evidence to find. Others may leave traces that can be picked up, but only by those
familiar with operating system details and network layout.
With hard-disk drives becoming larger and operating systems more complex, it is not uncom-
mon to have tens of thousands of files and numerous processes running. This can make locating
or detecting a rootkit analogous to finding a needle in a haystack. As mentioned earlier in this
chapter, the majority of modern-day rootkits merely replace standard utilities with “specialized”
versions. Furthermore, rootkit installations often forge time-stamp and file-size information in an
effort to prevent system administrators from visually confirming the integrity of the utilities via
the Unix/Linux ls command.
MANUAL INSPECTION
One way to detect the presence of a rootkit is via manual inspection, which is typically carried out
using the strings command. The strings utility, which is standard on all modern Unix/Linux
platforms, merely displays the readable portions of a binary file. The strings utility looks for
printable strings in regular files and writes those strings to standard printer output. A string is
any sequence of four or more printable characters that end with a new-line or a null character. For
the experienced systems administrator, the strings command can produce readable data such as
the names of files where intruder passwords are kept, library versions with which the rootkit was
compiled, and other information that does not normally correlate with the original data in the
target file. The exact syntax used with the strings command varies depending upon which
version of Unix or Linux is used. In general, the syntax for the strings command is as follows:
-a or - This flag searches the entire file (not just the data section) for printable strings.
-n (number) This flag is identical to the -number flag and specifies a minimum string length other than
the default of four characters. The maximum value of a string length is 4,096.
-o This flag is identical to the -t o flag and lists each string preceded by its octal offset in
the file.
-t (format) This flag lists each string preceded by its offset from the start of the file. The format is
dependent on the character used as the format variable, some of which are listed below:
d writes the offset in decimal format.
Continued
b526367 Ch05.qxd 3/21/03 3:38 PM Page 106
Note: When the -o and the -t format flags are defined more than once on a command
line, the last flag specified controls the behavior of the strings command.
-number This flag specifies a minimum string length other than the default of four characters. The
maximum value of a string length is 4,096. This flag is identical to the -n (number) flag.
file This flag identifies the file to be searched.
1. Getting back into the system with the least amount of visibility. Most backdoors provide
a way to avoid being logged, and many times a machine may appear to have no one
online even while an intruder is using it.
2. Getting back into a machine even if the administrator tries to secure it (for example, by
changing all the passwords).
3. Permitting the hacker to regain entry into the system in the least amount of time. Most
intruders seek to get back into the machine easily, without having to redo all the work of
exploiting a hole to gain access.
Using a backdoor to reenter a system is a popular technique used by hackers. Because backdoor
tools are available at hacker Web sites, even juvenile hackers use them to gain entry. Using a back-
door is a threat to information infrastructure and a crime that the U.S. government takes seri-
ously. How the government considers that threat is evidenced by the following U.S. Department
of Justice press release:
September 21, 2000
JUVENILE COMPUTER HACKER SENTENCED TO SIX MONTHS IN DETENTION FACILITY
Case marks first time a juvenile hacker sentenced to serve time
WASHINGTON, D.C. — The Justice Department announced today that a 16-year-old from Miami
has pleaded guilty and been sentenced to six months in a detention facility for two acts of juvenile
delinquency. Under adult statutes, those acts would have been violations of federal wiretap and com-
puter abuse laws for intercepting electronic communications on military computer networks and for
illegally obtaining information from NASA computer networks.
“Breaking into someone else’s property, whether it is a robbery or a computer intrusion, is a seri-
ous crime,” said Attorney General Janet Reno. “This case, which marks the first time a juvenile hacker
will serve time in a detention facility, shows that we take computer intrusion seriously and are work-
ing with our law enforcement partners to aggressively fight this problem.”
The juvenile, who is known on the Internet as “c0mrade,” admitted today in U.S. District Court in
Miami that he was responsible for computer intrusions from August 23, 1999, to October 27, 1999,
into a military computer network used by the Defense Threat Reduction Agency (DTRA). DTRA is an
agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from
nuclear, biological, chemical, conventional and special weapons.
In pleading guilty, “c0mrade” also admitted that he gained unauthorized access to a computer
server, known as a “router,” located in Dulles, Va., and installed a concealed means of access or “back-
door” on the server. The program intercepted more than 3,300 electronic messages to and from DTRA
staff. It also intercepted at least 19 user names and passwords of computer accounts of DTRA employ-
ees, including at least ten usernames and passwords on military computers.
“The Department of Defense takes seriously any threats against its information infrastructure,”
said Joseph A. McMillan, Special Agent in Charge of the DOD Mid Atlantic Field Office. “Any segments
b526367 Ch05.qxd 3/21/03 3:38 PM Page 108
of society, be they adults or juveniles, which are intent on threatening DOD’s information infrastruc-
ture, should be aware that steps will be taken to identify and thoroughly investigate their activities and
seek the necessary judicial actions.”
In addition to the computer intrusions at DOD, on June 29 and 30, 1999, “c0mrade” illegally
accessed a total of 13 NASA computers located at the Marshall Space Flight Center, Huntsville, Ala.,
using two different ISPs to originate the attacks. As part of his unauthorized access, he obtained and
downloaded proprietary software from NASA valued at approximately $1.7 million. The software sup-
ported the International Space Station’s (ISS) physical environment, including control of the temper-
ature and humidity within the living space.
As a result of the intrusions and data theft, the NASA computer systems were shut down for 21 days
in July 1999. This shutdown resulted in a delivery delay of program software costing NASA approxi-
mately $41,000 in contractor labor and computer equipment replacement costs.
In addition to serving six months in a detention facility, as conditions of his guilty plea, “c0mrade”
will write letters of apology to the Department of Defense and NASA and has agreed to the public
disclosure of information about the case.”
As disturbing as the preceding press release is, it doesn’t reflect another alarming characteris-
tic of backdoors. Backdoors are, by design, difficult to detect. A common scheme for masking their
presence is to run a server for a standard service (such as TELNET, for example) but on an undis-
tinguished port rather than the well-known port associated with the service, or perhaps on a
well-known port associated with a different service.
DETECTING BACKDOORS
A good number of backdoors are implemented by a type of malicious code called a Trojan horse. In
fact many rootkits contain “Trojanized” versions of commonly used programs and system utilities.
Two popular Trojan horse applications are BackOrifice and SubSeven, with both operating as a
server on the system they infect. This server opens a backdoor, making access from the outside
possible, and this permits the infected system to be accessed by hackers who can then do virtually
anything on a system, including stealing or deleting files. Some of the capabilities possessed by
backdoor Trojans are listed here:
✓ Execute programs
✓ Close connections
b526367 Ch05.qxd 3/21/03 3:38 PM Page 109
There are numerous backdoor Trojans circulating in the wild. While most are detected by
antivirus products, it proves helpful to know a little about each of them. Following is a short list
of backdoor Trojans:
Given that backdoors are accessed from a remote location outside an organization’s network,
detecting them is achieved by monitoring connections to various system ports. Since firewalls are
supposed to monitor and limit port activities, they are the natural choice for detecting the pres-
ence of a backdoor. However, since Trojan horse applications often masquerade as legitimate
applications, using a firewall does not guarantee that the presence of a backdoor will be detected.
b526367 Ch05.qxd 3/21/03 3:38 PM Page 110
x-ref
Appendix B provides a list of the ports commonly used by rootkits and backdoor Trojans.
Since most reputable antivirus products are able to detect any one of the aforementioned
Trojan horse applications, they are considered mandatory for Internet security. Antivirus software
is not without faults, however. Most antivirus products rely on users to regularly update their viral
signatures to aid in the detection of backdoor Trojans (or any malicious code for that matter).
Computer viruses are made up of strings of self-replicating code, which is called its binary signa-
ture. Antivirus software works by comparing the binary signatures of any incoming files against
any known viral binary signatures stored in its database in order to determine if that code looks
suspect or dangerous.
x-ref
For more on viral signatures, check out another book I wrote, Securing the Network from
Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans (2002,
Wiley).
Unfortunately, they sometimes fail to detect new variants for which a signature is not yet avail-
able. A more effective means to determine if a Trojan or backdoor has been installed on a system
is to gather specific information from the infected system itself. There are several freeware tools
that can be employed to collect this information. Here are some personal favorites:
✓ Fport.exe. Fport is a Windows-only utility by Foundstone, Inc. Fport not only reports all
open TCP/IP and UDP ports, but also traces them back to the owning application. While
this same information could be obtained by using the Windows netstat -an command,
it goes a step further by tracing those ports to running processes with the process ID,
name, and path. Fport can be used to quickly identify unknown open ports and their
associated applications. For additional information or to download a copy at no cost,
visit www.foundstone.com.
✓ Superscan. Also by Foundstone, Inc., SuperScan is a powerful TCP port scanner, pinger,
and hostname resolver. This program is extremely fast and versatile and can connect to
any open ports discovered using built-in user-specified helper applications.
✓ Nmap. Nmap (Network Mapper) is an open-source utility useful for exploring network
connections and security auditing. Nmap determines what hosts are available on the
network as well as which ports they are using. Nmap runs on most types of computers
using Unix and Linux operating systems. It comes in both console and graphical ver-
sions. Nmap is free software, available with full source code under the terms of the GNU
General Public License (GPL) at www.insecure.org/nmap.
b526367 Ch05.qxd 3/21/03 3:38 PM Page 111
1. Isolate the affected machine. (Disconnect it from the network and/or Internet.)
2. Determine the severity of the compromise. (Are other networked computers also
infected?)
3. Begin the cleanup by reinstalling the operating system and applications from a trusted
(clean) backup.
tip
Oftentimes, backdoor Trojans can be detected by simply updating your antivirus software
signatures.
In light of the fact that a promiscuous sniffer can only sniff the data traffic being shared on its
segment of the local area network, promiscuous sniffing can be prevented by using network
switches rather than standard network hubs.
A standard Ethernet hub operates by retransmitting any data it receives to all computers also
connected to the hub. In such an environment packets meant for one machine are received by all
the other machines, as well. This is different from a switch that can identify the specific computer
on the LAN segment for which any received data is destined. A switch retransmits any received
data only on the LAN segment containing the intended receiver. In other words, a switch is an
“intelligent” device that sends packets to the destined computer only and does not broadcast it to
all the machines on the network, as is done on Ethernet hubs. When switches are used instead of
hubs, each machine occupies its own LAN segment, and that segment only carries data traffic
intended for that machine. Such LAN segmentation renders promiscuous-mode packet sniffers
completely ineffective in cases where the sniffer is not connected to the same network.
Chapter Summary
Because the cyber threats that come from individuals and malicious code are constantly chang-
ing, organizations need to alter the way they approach the protection of their networks.
Unfortunately, security training is frequently focused on the more localized and basic security
issues and not on the response to outside threats, such as hackers and malicious coders. Rootkits
are one of the tools used by intruders to hide and secure their presence on your system, and back-
doors, one of the components of a rootkit, are used by hackers to regain entry into a system.
Often, an intruder achieves complete cloaking capability by relying on an administrator to trust
the output of various system programs. For example, when a rootkit is properly installed, the
administrator will not be able to tell the difference between the original and the modified ver-
sions, making them difficult to detect. This chapter focused on the tools, techniques, and basic
methodologies that can be used by system administrators to detect the presence of rootkits, back-
doors, and network sniffers.
Key points covered in this chapter include
✓ The role of system processes and their importance in detecting hidden programs
✓ How to detect unusual and hidden files, which are often the sign of a system
compromise
✓ The tools and techniques for detecting and eliminating rootkits and backdoors
✓ The threats posed by network sniffers and how to detect and eliminate them
b526367 Ch05.qxd 3/21/03 3:38 PM Page 114
b526367 Ch06.qxd 3/21/03 3:38 PM Page 115
Chapter 6
IN THE PAST, THE VAST MAJORITY OF CRIMES WERE SOLVED USING EVIDENCE, such as fingerprints,
footprints, paper documents, and other tangible items, extracted from the crime scene. While
these types of evidence continue to provide law enforcement with important facts, technology has
now added another element for examination: digital evidence. More information can sometimes
be gained from the analysis of a computer and its contents than from a fingerprint. As in the case
of the Sharon Guthrie murder mentioned in the Introduction of this book, sometimes the story of
a crime may be told through the recovery of files forgotten or thought to have been deleted.
Fortunately, law enforcement and legal professionals are quickly beginning to recognize that
computer forensics provides vital evidence and may possibly hold the key to solving certain
crimes. With a greater importance now being placed on digital evidence, it has become crucial
that the evidence be handled and examined properly.
As computers become more widespread in the corporate environment, employers must safe-
guard critical business information. A major concern today is the possibility that data could be
damaged, destroyed, or stolen by a disgruntled employee. If there is a computer at the crime
scene, there is a good chance that valuable evidence is stored on that computer. An ever-growing
proportion of criminal activity, including white-collar crime, is being committed with the aid of
computers. There is no doubt that the collection of evidence is both a time-consuming and com-
plex process. This chapter centers on the tools and procedures for retrieving and analyzing digital
clues.
115
b526367 Ch06.qxd 3/21/03 3:38 PM Page 116
note Before conducting a search of any computer, you should first review the legal procedures for
searching and seizing computers and obtaining electronic evidence. In the U.S. this can be found
at www.cybercrime.gov. Without proper training, you may inadvertently destroy critical
evidence. In addition, you may also be held criminally or civilly liable for your actions if you do
the search without proper authority.
✓ To locate occurrences of words or strings of text in data stored in files or slack and unal-
located file space
✓ Internal audits to identify violations of corporate policy
✓ To find evidence in corporate, civil, and criminal investigations, which involve computer-
related evidence
✓ To find embedded text in formatted word-processing documents or fragments of such
documents
Due to the enormous size of the modern hard disk, it is exceedingly difficult to manually assess
every file stored on the drive. Consequently, forensic text search tools are available to help quickly
and easily ferret out relevant evidence. Using automated software, keywords can be used in the
search of all types of computer storage media including hard-disk drives, floppy/removable disks,
and CD-RW discs. When performing a keyword search, the word list should be kept as short as
possible and using common words or words that are a part of other words should be avoided. In
such cases, the words should be surrounded with spaces. For example, the word “copyright” is
embedded in virtually every executable file within Windows. If you search on it, you will get liter-
ally thousands of hits.
✓ BinText by Foundstone, Inc. (currently in Version 3.0) is a small, fast, and powerful text
extractor. BinText can extract text from any kind of file, such as plain text, Unicode, and
resource strings. In addition, this handy utility provides both detailed information for
each item by using an optional (advanced) view mode and keyword filtering to help pre-
vent any unwanted text from being listed. The gathered list can be searched and saved to
a separate file either as a plain text file or in a tabular format. For more information or
to download a copy, visit www.foundstone.com.
✓ Disk Investigator by Kevin Soloway (www.theabsolute.net/sware/) is another foren-
sic freeware utility than can gather a variety of information from a user’s hard disk. Disk
Investigator helps discover all that is “hidden” on a computer hard disk, aids in locating
sensitive data with search-viewing functions, and displays the drive’s true contents. By
bypassing the operating system and directly reading raw drive sectors, Disk Investigator
helps the user search files and clusters for specific keywords or content.
✓ SectorSpyXP by Nick McCamy of Lexun Freeware (see Figure 6-1) is a powerful com-
puter forensic tool that can be used by law enforcement or anyone wishing to search for
and retrieve evidence left on computer hard drives and diskettes. While not as powerful
or flexible as EnCase (the leading tool for such purposes), SectorSpyXP is still quite
powerful and free. SectorSpyXP examines all data on a hard drive or diskette at the sec-
tor level and even contains detailed documentation on how to use it to perform a key-
word search to find and retrieve incriminating evidence. It can be used to retrieve lost
information, text that has been deleted and removed from the Recycle Bin, and even
information not found by other file-retrieval programs. This program works on Windows
2000 and XP operating systems. For additional information about SectorSpyXP, includ-
ing links to Web sites where you may download a copy, visit http://home.carolina.
rr.com/lexunfreeware.
b526367 Ch06.qxd 3/21/03 3:38 PM Page 118
3. Always remember to put the last \ at the end of the path name.
4. Do not include the name of the text file.
5. Save the file and copy it to a floppy disk.
6. Make sure the floppy disk is inserted when you start up SectorSpyXP.
7. You may remove the floppy disk once you’ve started SectorSpyXP. You cannot change
the evidence file path name without restarting SectorSpyXP.
If you are analyzing a floppy disk, you do not want to write the evidence file to it. Follow the
note
directions above to write the evidence file to another location. Insert the disk with the
SectorSpyXPFilePath.txt key file, and then start up SectorSpyXP. Remove the disk and replace it
with the one you wish to analyze.
METHOD 1 Type in the text you would like to search for and click the Find Next button (for the
example shown in Figure 6-1, the search text is “Lexun Freeware”). Find Next finds the first
occurrence of “Lexun Freeware” within a sector, starting at the currently displayed sector, and
highlights the text in red. It does not highlight subsequent occurrences of “Lexun Freeware”
within the same sector. When you click Find Next again, it looks for the first occurrence of “Lexun
Freeware” within the next sector. This avoids having to repeatedly click Find Next when the text
“Lexun Freeware” exists many times within a sector. Explained in another way, Find Next seeks
the first occurrence of “Lexun Freeware” within the next sector that it encounters and stops look-
ing for “Lexun Freeware” in the current sector once it has found the first occurrence of it. Note
that you may search only in the forward direction.
The Case Sensitive button, of course, determines if the search text is case sensitive or not. In
our example, the Case Sensitive button is pressed, and searches for “Lexun Freeware” succeed
only if any capitalization (or lack thereof) matches exactly. For example, “Lexun freeware” would
not be a hit in this example, but it would be if the Case Sensitive button was not pressed.
METHOD 2 A search can be made for a list of keywords that have been entered in a text file by
following this procedure:
1. Create a text file called findnextlist.txt, and within that file, type keywords, one per line.
For example:
keyword1
keyword2
keyword3
2. Place that file where the evidence file will be written.
3. To use the list in searches, type findnextlist in the Find Next edit box as described in
Method 1.
4. SectorSpyXP stops and displays any one of the keywords it finds.
b526367 Ch06.qxd 3/21/03 3:38 PM Page 120
Hard-disk removal is also necessary when a suspect’s computer has a boot-sector password initi-
ated in the BIOS, preventing the computer from booting via floppy disk, CD-ROM, or hard disk.
If done properly (as outlined in Chapter 3), the cloned or imaged drive will be a sector-by-sec-
tor copy (as mandated by NIST) of the original hard drive. This preserves the state of the original
hard drive, while allowing detailed forensic examination of the data contained in the reproduction
using either the BinText or SectorSpy programs.
For individuals or organizations wishing to make a fast clone or copy of a hard drive partition for
tip
their own personal or an organization’s internal purposes, a handy utility called DrvClonerXP is
available from Lexun Freeware at http://home.carolina.rr.com/lexunfreeware.
Once the copy or clone of a suspect’s hard drive has been made, the original should not be
touched. Always study the secondary copies. Any changes made to originals affect the outcome of
analysis later done to copies. Make sure you don’t run any data extraction or copy programs that
have the potential to modify the access times of files such as tar (Unix/Linux) and xcopy
(DOS/Windows). Finally, be sure to remove any external opportunities for change and in general
analyze the evidence only after it’s been collected.
x-ref
Chapter 5. Once Windows has been set up to view hidden system files, you simply start the Search
utility and type the name of the swap file for which you wish to search (for example,
pagefile.sys) and allow Windows to locate it for you (see Figure 6-3).
Specific keywords or strings of readable text stored in the Windows Swap File can be located with
tools like SectorSpy, as mentioned earlier in this chapter.
E-Mail as Evidence
Before the invention of the telephone, letter writing was the primary means for communication
across large geographical distances. Today, people commit a good deal of revealing material to
written text in the form of electronic mail (e-mail) messages. Whether the messages involve ter-
rorists, crooked CEOs, or local drug dealers, the overabundance of e-mail messages and electronic
files that circulate the globe or become stored in computers represents a treasure trove of evi-
dence for the forensic investigator or law enforcement official.
E-mail messages sent or received on an employer’s computer system are subject to discovery
and review by law enforcement officials in criminal investigations; however, proper procedures
must be carefully followed under the Federal Rules of Evidence. (In fact, much of the evidence
that the Justice Department presented to the court with regard to Microsoft’s anticompetitive
b526367 Ch06.qxd 3/21/03 3:38 PM Page 124
activities was based on intra-company e-mail messages that officials within the company sent to
each other.)
When searching for e-mail evidence, the most important rule to remember is that privacy laws
still apply, and the legal aspects are complicated. E-mail messages that have not yet been sent may
become evidence from a suspect’s computer if there are valid grounds to search for them.
Incoming e-mail messages, however, are treated in a different manner. They must first be down-
loaded by the recipient from a mail server (whether located at the ISP or on an organization’s local
server) before they can be accessed as evidence and used against the recipient. To view or remove
them from the mail server before the recipient has downloaded them violates federal law, even
when a valid reason exists to conduct a search. Federal law strictly prohibits a third party from
accessing e-mail messages before they’ve been downloaded from a server. Conversely, several
recent court cases have upheld that checking e-mail after transmission is legal, since it is viewed
as similar to searching through a file in an employee’s drawer.
note
It is strongly advised that you consult with legal counsel before undertaking any search.
x-ref
Locating E-Mail
As we saw in Chapter 4, deleting something doesn’t mean it has been permanently erased. When
you delete an e-mail message, you’re really just telling your computer that the space the e-mail
once occupied is now available to be overwritten by new data. However, with hard drive sizes now
reaching mammoth proportions, it may take months or even years before deleted data has been
completely overwritten by any new data. Even when files are overwritten, fragments of documents
can continue to exist (sometimes in several places on a computer) due to fragmentation of the
data stored on hard drives.
Fragmentation occurs when a data file changes size and then doesn’t fit back into the area of a
hard disk from where it was retrieved. When hard drive data has become larger, such as when you
add text to a word-processing document, some of it will be saved in its original location while data
that does not fit there is saved elsewhere. Therefore, if you do a lot of file creation — copying,
deleting, and overwriting — files tend to get divided into pieces in order to fill in all the empty
spaces of a hard disk.
The use of e-mail messaging as important (and possibly damning) evidence made worldwide
headlines when Kenneth Starr released supporting evidence in his investigation of President
Clinton that included deleted e-mail messages retrieved from Monica Lewinsky’s computer. Many
users continue to think of e-mail messaging as private and secure, as long as it doesn’t leave their
b526367 Ch06.qxd 3/21/03 3:38 PM Page 125
company’s internal communications (or their personal home) network. There have been count-
less incidents of employees circulating e-mail messages consisting of off-color jokes, racial slurs,
defamatory remarks, gender-related remarks, age-related remarks, and other inappropriate con-
tent that have subjected them and their employers to liability as a result.
Given the nearly universal use of e-mail messaging as the communication tool of choice within
most organizations, it is not surprising that many investigators specifically focus on e-mail during
the discovery process. However, e-mail poses the forensic investigator with several challenges.
✓ E-mail messages often have attachments, which may also contain vital evidence.
✓ E-mail messages can be found in a number of different places, such as the sender’s
e-mail Inbox/Outbox, on a network server’s mailbox, or in backup media.
✓ The high volume of e-mail messages often necessitates the use of keywords to focus a
review.
Because of these challenges, locating e-mail messages and attachments, if any, for use as evi-
dence depends on whether the e-mail message was sent, received, or deleted. If the message has
not been deleted, locating it is of course not difficult. While individual programs vary, most e-mail
message programs include the following storage locations:
✓ Inbox. Storage for e-mail messages once they have been received
✓ Outbox. Storage for e-mail messages that have been sent to their destination or recipient
✓ Draft. Storage for unfinished e-mail messages that have not yet been placed in the
Outbox for delivery
✓ Sent Messages. A copy of all messages that have been sent to a recipient, stored by the
e-mail client for future reference
only moved to the Deleted Items folder. Until this folder is permanently emptied, you can move
items back from it into your Inbox or any other folder in the Move Items dialog box (see Figure
6-4).
To restore a deleted e-mail message under Outlook or Outlook Express (XP), follow these steps:
The ability to retrieve deleted data becomes more complicated once the e-mail message has
note
been permanently deleted. Once this has occurred, you need to use the data recovery procedures
outlined in Chapter 4 and/or use programs such as SectorSpy or Disk Investigator to perform a
keyword search to attempt to recover any specific e-mail text.
accessed subsequently, because they have already been loaded once and stored in the browser
cache. For example, when a user requests a Web page that he or she has visited before, the browser
first looks in the cache; if it finds that page there, it loads the cached page rather than connecting
to the Web to download a new one. Web caches reveal a lot about which Web sites a user has vis-
ited. Most contemporary Web browsers (for example, Internet Explorer and Netscape Navigator)
perform Web caching.
You can sort the history list by clicking one of the categories (for example, Location, Title, and so
on) in ascending, descending, or alphabetical order.
For Internet Explorer, there are several ways to locate Web sites and pages you’ve recently
viewed. To find recently viewed pages, follow these steps:
1. On the toolbar, click the History button. A History bar appears on the left, containing
links for Web sites and pages visited in previous days and weeks.
2. Under the History bar, click on a day or week to expand the list.
3. Select a Web site folder by clicking it; this displays individual pages.
4. Next, click the page icon to display the Web page.
The following procedures will only display the history for the currently logged on user and if you
note
boot the computer via the operating system. This will not work if you’ve mounted the image disk
as a secondary hard drive (the recommended method to avoid changing the data during the
examination process).
b526367 Ch06.qxd 3/21/03 3:38 PM Page 128
tip To sort or search the History bar, click the arrow next to the View button at the top of the History
bar.
After determining the exact location of the hard drive cache file, navigate to the cache folder to
view its contents or copy the files to a disk for forensic review.
To manage Microsoft Internet Explorer (6.0) cache settings, follow these steps:
3. Under the General tab, select the Settings button under Temporary Internet Files. (By
default, Explorer stores cached pages on your hard drive in a folder called Temporary
Internet Files.)
4. Select View Files to display the contents of the Web cache.
As with many aspects of computer forensics, freeware tools are available that can simplify oth-
erwise complicated tasks. When it comes to the viewing of browser cache files under Windows,
one of my favorite freeware tools is CacheMonitor II by David M. Pochron of Enigmatic Software.
CacheMonitor displays the contents of the entire browser cache in a convenient list window,
including changes to the cached files in the Status column (in the monitor). Another nice feature
of this program is that it allows you to easily export the entire contents of the cache (in text for-
mat) for preservation to removable media such as a Zip disk or CD-R disc. This handy freeware
tool can be downloaded at www.mindspring.com/~dpoch/enigmatic/cachemonitor2.html
and at several freeware Web sites.
1. Click the Windows Start button and navigate to Printers and Faxes.
2. In Printers and Faxes, right-click on the Printer Icon with the check mark (this is the
default printer) and select Properties.
3. If “Keep printed documents” is selected in the Printer Properties screen (see Figure 6-5),
then Windows is set to save print spooler files.
b526367 Ch06.qxd 3/21/03 3:38 PM Page 130
Under these circumstances, a simple search of the user’s hard drive for *.emf files (using the
built-in Windows search utility) will find, display, and even let you copy print spooler EMF files to
removable media for preservation and/or later analysis.
Steganography
Steganography is the practice of hiding a message or file within another message or file known as
a carrier file. Steganography is a way to hide a message in such a way that anyone can see it but
only a select few know what to look for to successfully decode or receive the hidden message.
Steganographers can hide a message or image in any one of the following:
✓ Another image
✓ An audio file
In addition, an audio or video file can be hidden inside another media file such as a large
graphic file. Steganography differs from cryptography in that while cryptography works to mask
the content of a message, steganography works to mask the very existence of the message itself.
Unfortunately, most steganographic methods in use today are invisible to the observer’s senses,
and there are currently few tools available to the public to detect the use of steganography. If you
suspect that a perpetrator has hidden a text file, image, or other content within an image, a handy
freeware program does exist that can help you detect if that file is using steganography. The auto-
mated tool, Stegdetect, is capable of detecting several different steganographic methods used to
embed hidden information in JPEG images. Stegdetect can be found at www.outguess.org/
detection.php with versions available for Unix/Linux and Windows.
If you wish to try cracking the password yourself, hundreds of shareware/freeware programs
are available. The following programs are among the most popular:
Chapter Summary
Computer forensics frequently involves the use of computer technology to uncover electronic evi-
dence. The ability to retrieve sought-after information is increasingly important, as many busi-
ness and financial records now exist only in electronic format. Using computer forensic tools and
techniques, an investigator can uncover many different types of data, even password-protected
documents and deleted files, hidden on computers. Electronic discovery involves analyzing a sus-
pect’s computer systems and storage media to locate such evidence as old e-mail messages, hidden
files, and deleted files and documents. Computer forensic investigators also can break passwords
as part of their investigations. The key is being able to gain access to the necessary electronic
media and having the know-how to uncover the relevant evidence once you have the equipment.
Key points covered in this chapter include
✓ The relevance of the Windows swap file when conducting a forensic investigation
✓ How to extract information from print spooler files even when documents were not
saved by the user
✓ How to locate and recover hidden and password-protected data
b526367 Ch06.qxd 3/21/03 3:38 PM Page 134
b526367 Ch07.qxd 3/21/03 3:38 PM Page 135
Chapter 7
IT IS IMPORTANT TO REMEMBER ONE OF THE BASIC PRINCIPLES OF THE U.S. LEGAL SYSTEM; that
without evidence of a crime, there is no crime. Actions taken at the crime scene at the onset of an
investigation may play a critical role in the resolution of a case. Careful, thorough investigation is
critical to ensure that potential physical evidence is not tainted or destroyed or that possible wit-
nesses are not overlooked. It is of paramount importance that utmost care is taken in the collec-
tion and preservation of evidence.
Incident investigations are carried out to discover the cause(s) of an incident. If the investiga-
tion is done soundly, it points out crucial information for preventing the event from happening
again. To achieve this, investigators must maintain the skills and knowledge to plan and conduct
an effective investigation. Even under the best of circumstances, evidence may be difficult to col-
lect. When the evidence is in electronic format, the investigator faces another layer of complexity;
such evidence has none of the permanence of conventional evidence and is even more difficult to
form into easily explainable evidence. This chapter focuses on the basic procedures of evidence
collection and preservation.
simple reasons for this: accountability and prevention. The attacker is responsible for the damage
done, and the only way to bring him or her to justice or to seek remuneration is with adequate evi-
dence to demonstrate that the attack was the result of his or her action.
The victim, on the other hand, has a responsibility to the general public. Information gathered
after a compromise can be examined and used by others to prevent further attacks. Victims may
also have a legal obligation to perform an analysis of evidence collected, for instance if the attack
on their system was part of a larger attack committed against several different companies’ systems.
When the time arrives to begin the collection of evidence, the first rule that must be followed is to
not hurry. Anxiety levels are certain to be high, and a knee-jerk reaction will cause people to look
for answers as rapidly as possible. However, if the investigator rushes through the data collection
procedures, evidence may be overlooked, tainted, or lost. A mistake in collecting and preserving
the evidence is often irreversible.
3. Edit the Value Name by typing LegalNoticeCaption. (This contains the caption text for
the dialog box, which will be presented to the user.)
4. Edit the Value Name by typing LegalNoticeText. (This contains the text, which will
appear within the dialog box.)
5. Exit the Registry Editor and restart the computer for the change to take effect.
b526367 Ch07.qxd 3/21/03 3:38 PM Page 137
Windows 2000/XP does not use the LegalNoticeCaption or LegalNoticeText Registry settings.
Instead, you need to use the Local Security Policy console to set a legal notice as shown in the fol-
lowing steps:
**WARNING**WARNING**WARNING**WARNING**WARNING**WARNING
This is a {Organization Name Here} computer system, which may be accessed and
used only for business by authorized personnel. Unauthorized access or use of
this computer system may subject violators to criminal, civil, and/or
administrative action.
Any information on this computer system may be intercepted, recorded, read,
copied, and disclosed by and to authorized personnel for official purposes,
including criminal investigations. Access or use of this computer system by
any person, whether authorized or unauthorized, constitutes consent to these
terms.
**WARNING**WARNING**WARNING**WARNING**WARNING**WARNING
b526367 Ch07.qxd 3/21/03 3:38 PM Page 138
Expectation of privacy is not based upon specific facts and circumstances, but upon whether
the expectation of privacy is one which society in general recognizes. Policies of the organization
may remove any expectation of privacy. For example, if the organization’s workplace policy states
that an employee’s desk (or computer) can be searched at any time or if a copy of the key to the
desk is kept by management, then there is no reasonable expectation of privacy.
An employer-issued computer is a part of the workplace because, although it is primarily used
by the employee, it is owned and under the control of the employer. The computer remains part of
the workplace even when the employee has placed personal information on it and also when the
employee’s employment is terminated. Although the employee may have some degree of expecta-
tion of privacy, a public employer may search the contents of an employee’s computer without a
warrant when confronted with an alleged violation of its Acceptable Usage Policy (AUP) provided
the search is reasonable at its inception and in its scope, and it is work-related. When a workplace
search is not work-related, any attempt to acquire evidence of criminal activity or a search of an
employee’s personal property at the workplace without consent requires a warrant.
The Fourth Amendment to the U.S. Constitution governs the issue of privacy. One pivotal
court case that addresses the issue of workplace privacy is O’Connor v. Ortega, 480 U.S. 709 (1987)
in which the United States Supreme Court held that the public employer’s search of the
employee’s office was reasonable at its inception because its purpose was to find evidence of the
employee’s alleged misconduct and to retrieve work-related materials. As an employee of a state
hospital, Dr. Ortega had the primary responsibility of training physicians in the psychiatric resi-
dency program. Hospital officials became worried about a lack of decorum in his management of
the program, mainly due to charges against him concerning sexual harassment of female hospital
employees and inappropriate disciplinary action against a resident. Pending an investigation of
these complaints, Dr. Ortega was placed on administrative leave. While on leave, hospital officials
searched his office and seized personal items from his desk and file cabinets that were later used
in administrative proceedings resulting in his discharge from the hospital. Dr. Ortega filed an
action against hospital officials in Federal District Court under 42 U.S.C. 1983, alleging that the
search of his office violated the Fourth Amendment. The Hospital maintained the search was jus-
tified in order to protect state property and to investigate charges of Dr. Ortega’s misconduct.
Dr. Ortega argued the search violated his Fourth Amendment rights, as it was an attempt to dis-
cover and collect evidence to be used against him in an administrative proceeding.
Furthermore, Justice O’Connor, joined by Chief Justice Rehnquist, Justice White, and Justice
Powell, concluded that:
Searches and seizures by government employers or supervisors of the private property of their
employees are subject to Fourth Amendment restraints. An expectation of privacy in one’s place of
work is based upon societal expectations that have deep roots in the history of the Amendment.
However, the operational realities of the workplace may make some public employees’ expectations of
privacy unreasonable when an intrusion is by a supervisor rather than a law enforcement official.
Some government offices may be so open to fellow employees or the public that no expectation of pri-
vacy is reasonable. Given the great variety of work environments in the public sector, the question
whether an employee has a reasonable expectation of privacy must be addressed on a case-by-case
basis. Because the record does not reveal the extent to which hospital officials may have had work-
related reasons to enter respondent’s office, the Court of Appeals should have remanded the matter to
the District Court for its further determination. However, a majority of this Court agrees with the
determination of the Court of Appeals that respondent had a reasonable expectation of privacy in his
b526367 Ch07.qxd 3/21/03 3:38 PM Page 139
office. Regardless of any expectation of privacy in the office itself, the undisputed evidence supports
the conclusion that respondent had a reasonable expectation of privacy at least in his desk and file
cabinets.
Once you are certain that all legal procedures have been adequately covered, the next step is to
actually collect the evidence. Following are general steps that should be followed for evidence
collection:
The 4th Amendment constraints apply only to government organizations and their agents. There
note
1. Find the evidence. Figure out where the evidence you are seeking is being stored on the
system. Making a checklist can help you in the collection process, and you can use it to
double-check that everything you are looking for is there.
2. Determine data relevance. As you uncover evidence, you must decide what parts of it are
relevant to the case at hand. To be safe, you should overcollect rather than exclude possi-
ble evidence. Keep in mind, however, that you need to work fast; don’t waste time col-
lecting information that will be of no use to your case.
3. Rank volatility. Once you’ve determined which items to collect, you must decide in
which order to gather them. The main determining factor is that items that are most
likely to be volatile (those items that can degrade or become unusable) should be col-
lected first. Using and sticking to the order once you’ve established it ensures that the
loss of usable (for example, uncorrupted) evidence remains minimal. Begin with the
items you’ve ranked as most volatile and follow with those categorized as less so.
(Volatility is explored in more detail in the next section.)
4. Eliminate outside interference. It is crucial that you avoid altering original data because
it is far easier to prevent tampering than it is to rectify the consequences of tampering.
As only unaltered data may be entered as evidence, utmost care must be taken to thwart
any possible outside contamination. Knowledgeable attackers have been known to install
a dead-man switch, which can delete evidence once a computer is disconnected from the
network or from the Internet.
5. Collect the evidence. You may now begin the collection process. Use all the tools you
have available for this task. As you gather evidence, continue to examine the items
b526367 Ch07.qxd 3/21/03 3:38 PM Page 140
you’ve already collected, as new pieces you collect may influence what you consider wor-
thy information. You may come to realize that you’ve overlooked something. Now is the
time to get it.
6. Document everything. Your method of collecting the evidence you present may be called
into question later, so be sure to maintain a record of everything that you’ve done in the
collection process. Timestamps, digital signatures, and signed statements will serve you
well later; include all the substantiation you can.
✓ Admissible. The evidence must conform to certain legal rules before it can be put before
a court. This is covered later in this chapter.
✓ Authentic. It must be possible to positively tie the evidentiary material to the incident
by showing that the evidence relates to the incident in a relevant way.
✓ Complete. It must tell the whole story and not just one particular perspective. Not only
should you collect evidence that can prove the attacker’s actions, but also evidence that
could prove his or her innocence.
✓ Reliable. There must be nothing about how the evidence was collected and subsequently
handled that casts doubt about its authenticity and veracity.
✓ Believable and understandable. The evidence must be readily believable and understand-
able by a court of law. There’s no point in presenting the output of a memory dump if a
jury will have no idea what it means.
Volatile evidence is evidence that can quickly disappear or is only temporary in nature. This
type of evidence needs to be collected before the machine is disconnected from the network and
powered down. When collecting evidence you should proceed from the most volatile to the least
volatile. The following is an example of the order of volatility for a typical system.
b526367 Ch07.qxd 3/21/03 3:38 PM Page 141
It’s all too easy to inadvertently destroy volatile evidence. When you are in the process of col-
lecting volatile evidence, always remember to take the following precautions:
✓ Do not power down the system until you have completed all the evidence collection
procedures for volatile evidence. Much evidence may be lost when a system is powered
down, and the attacker may have altered the startup and shutdown scripts and services
to destroy evidence.
✓ Don’t trust the programs on the system. Intruders have been known to replace system
commands. Run your evidence-gathering programs from appropriately protected media
(see the next section, “Creating a Real-Mode Forensics Boot Disk”).
✓ Don’t run programs that modify the access time of all files on the system (for example,
tar or xcopy).
✓ When removing outside interference, keep in mind that simply disconnecting from the
network may trigger a dead-man switch that can detect when the computer is discon-
nected from the network and quickly delete evidence.
way, memory is protected in the sense that only the operating system will allow access to it. All
modern-day operating systems operate in this mode. A true real-mode boot disk will start a com-
puter in its most basic state (the DOS level) and does not load any advanced protected mode device
drivers. This helps to preserve the state of the operating system. Once loaded via the real-mode
boot disk, forensic utilities may then be run in DOS (real) mode to collect evidence.
Many forensic toolkits such as The Forensic Toolkit v2.0 by Foundstone, Inc. (www.
foundstone.com) are small enough for the entire forensic suite of utilities to be placed on a sin-
gle boot floppy. After booting a Windows NT machine from the boot floppy disk, appropriate tools
can be run directly off the floppy, helping the investigator to collect and preserve evidence.
✓ IO.SYS
✓ MSDOS.SYS
✓ COMMAND.COM
These files must reside in the disk’s boot sector, or the disk will not be bootable. The most com-
mon way of creating a boot disk is by typing SYS A: at the command prompt to transfer the oper-
ating system boot files to the floppy disk’s boot sector in drive A:. However there is another
slightly more complicated way to create a bootdisk.
1. First you boot Windows to the DOS prompt, and insert a blank, formatted floppy disk
into drive A:.
2. Now at the command prompt, type the following lines, hitting Enter at the end of
each line:
attrib io.sys -r -h -s
copy io.sys a:
b526367 Ch07.qxd 3/21/03 3:38 PM Page 143
attrib io.sys +r +h +s
attrib a:\io.sys +r +h +s
attrib msdos.sys -r -h -s
copy msdos.sys a:
attrib msdos.sys +r +h +s
attrib a:\msdos.sys +r +h +s
attrib command.com -r -s
copy command.com a:
attrib command.com +r +s
attrib a:\command.com +r +s
Once completed, the floppy boot disk you created can be used to start a computer in real mode
(DOS) allowing you to conduct a forensic examination of the computer’s hard drive using any util-
ities you may have placed on the floppy disk.
The kernel version will display and should look something like this: 2.4.12.
3. Insert a blank (empty) floppy disk into the floppy drive. (Under Linux drive A is
called fd0.)
4. At the prompt, type mkbootdisk --device /dev/fd0 2.4.12.
note
The example here uses kernel version 2.4.12; however, you will need to substitute your kernel
version as determined in step 2.
5. You should have a boot disk within about one minute. All previous data on the floppy
will be erased.
b526367 Ch07.qxd 3/21/03 3:38 PM Page 144
Keep in mind that this boot floppy disk is intended primarily to allow you to get access to the
Linux partitions from which you need to recover data or information and will allow you access to
the Linux partitions only.
✓ Snort. Snort is an open-source (freeware) network intrusion detection system for Unix
and Linux systems, and it is capable of performing real-time traffic analysis and packet
logging on IP networks. While it excels as an intrusion detection system, it can also be
used as a straight packet sniffer. For additional information or to download a copy, visit
www.snort.org.
✓ NGSSniff. NGSSniff is a small, easy-to-use network packet capture and analysis pro-
gram. It requires Windows 2000 or XP to operate and allows users to capture, save,
and analyze traffic on their network. This small packet sniffer can be downloaded at
www.nextgenss.com/products/ngssniff.html.
✓ Ethereal. Ethereal is a freeware network protocol analyzer with versions for both the
Unix and Windows operating systems. It allows you to examine data from a live network
or from a capture file on disk. You can interactively browse the captured data, viewing
summary and detail information for each packet. It can be downloaded from www.
ethereal.com.
b526367 Ch07.qxd 3/21/03 3:38 PM Page 145
✓ AnalogX PacketMon. AnalogX PacketMon, available for Windows 2000/XP only, allows
you to capture IP packets that pass through a network interface even if they originate
from a remote computer on the network. Once the packet is captured, you can use the
built-in viewer to examine the header as well as the contents. You can even export the
results into a standard ASCII text file for viewing with your favorite text-editing pro-
gram. AnalogX PacketMon can be downloaded from www.analogx.com.
Once they are captured, you can easily search for specific strings of readable text in any packets
by using the search capability that is built into many packet-capturing programs. For example,
let’s say you suspect a worker of visiting inappropriate Web sites violating the company’s Internet
policy. If that worker is savvy enough to erase temporary Internet files and delete all entries in the
browser history, it would be difficult to gather sufficient evidence. While you could use a program
like PC Inspector File Recover to uncover the deleted data, an easier and quicker method would be
to capture and preserve network packets in real time. Using a program like AnalogX PacketMon,
for example (see Figure 7-1), you can scan through each individual captured packet looking for
signs of incriminating strings of text (see Figure 7-2). In addition, many of the aforementioned
packet sniffers can be configured so that when the software sees a packet that fits certain criteria,
it will log (preserve) that data to a file. The most popular use of packet sniffing by forensic investi-
gators is for capturing packets that contain key words that are of benefit to the investigation.
✓ A tool to capture network traffic for analysis (for example, a network sniffer)
✓ A tool that reports open TCP/IP ports and then maps them back to their owning process
✓ A utility that displays any network shares including local and remote
✓ A tool that displays open files, object processes, Registry keys, DLLs, and owners of
object processes
note
✓ Command-line tools are best here; avoid tools that use a Windows (GUI) interface.
✓ Create several floppy disks containing your most important data collection tools.
✓ reconfig. This program tries to find all the appropriate files on the current system.
✓ strip_tct_home. This program is used internally by TCT and strips out a variable from
various files.
Using Grave-robber
Grave-robber is TCT’s main data collection tool. There are several command options available to
the user when using Grave-robber that can specify what type of information Grave-robber should
collect and where to save the information once it has been collected. For simplicity’s sake, the fol-
lowing examples will run Grave-robber in both default configuration and with commands to collect
the maximum amount of data. Grave-robber is a powerful tool and can perform the following tasks:
✓ Save open files that have been unlinked since the system compromise
✓ Gather information such as ssh keys and rhosts and host.equiv files
Running Grave-robber
Although the Grave-robber tool does not require root privileges to run, it should be run under
root in order to retrieve root and other processes for further analysis. Start Grave-robber to collect
the default set of data by typing as follows:
# /grave-robber
✓ If you want to gather the maximum amount of data, you also need to provide option -E,
as shown here:
# /grave-robber -d -E -v /
✓ In this line, option -d directs the tool to use the actual directory (/tct-data) as the
location (directory) to store all output. Option -v directs the tool to create a more
verbose (detailed) explanation of its progress. The last argument, /, controls which
directory is used as the starting point for any disk analysis.
b526367 Ch07.qxd 3/21/03 3:38 PM Page 149
note The preceding two lines assume you are already at the directory (or floppy disk) where the Grave-
robber program is located.
Learning to use all of TCT’s tools correctly requires a great deal of time and effort. You must
carefully review all documentation and test all components before using them so that you under-
stand and take full advantage of all their features.
✓ Notes on the evidence found, which will go into your final report in more detail. These
would essentially be notes that anyone could pick up and, at a glance, know exactly
where you left off in your assessment of the seized computer and media.
b526367 Ch07.qxd 3/21/03 3:38 PM Page 150
✓ Special techniques (for example, sniffers, password crackers, and so on.) used above and
beyond normal processes.
✓ Outside sources used (for example, third-party companies or products that helped to
provide assistance and information)
In addition, it is important that the notebook used to record information be of the type that
does not permit any pages to be removed. You will need to record the who, what, where, when, and
how of the investigation process. Since this notebook is an essential component in maintaining
the chain-of-custody, any information recorded must be as detailed as possible. Items to be
recorded in the notebook should include the following:
✓ The names of all personnel involved in the investigation including a list of administrators
responsible for the routine maintenance of systems
✓ A record of all applications running on the suspect’s computer
✓ A list of who had access to the collected evidence including date and time of access, as
well as the date and time of any actions taken by those with access. In addition, the clock
of the affected system must be compared with the actual current time and any discrepan-
cies must be noted with the system clock left unchanged. Adjustment of the clock may
subsequently be considered data tampering, leaving the resultant evidence inadmissible.
✓ Details of the initial assessment leading to the formal investigation
✓ Circumstances surrounding the suspected incident including who initially reported the
suspected incident along with date and time
✓ A complete list of all computer systems included in the investigation along with system
specifications
✓ A printed copy of any organizational policies and logon banners that relate to accessing
and using computer systems
✓ A comprehensive list of steps used to collect and analyze evidence
Authentication
Over the past few years, the personal computer has become a powerful tool used in the perpetra-
tion of nearly all types of criminal activity. The atrocious acts of September 11, 2001 proved that
criminal and terrorist activity can easily be coordinated on a worldwide scale using encrypted
Internet communications, concealed from government and law enforcement officials. The use of
a computer to create and store information often leaves behind electronic “fingerprints” that can
in fact make or break a criminal case. Fortunately for law-enforcement computer-evidence spe-
cialists, personal computers were not designed to be secure. As a result, passwords, time- and
date-stamps, and other forensically valuable information are written to various locations on com-
puter hard disk drives during normal operating system activity.
Unfortunately, computer records can be easily modified, and defense attorneys often claim that
computer records lack authenticity because they may have been tampered with or changed after
they were created. Authentication of computer evidence has thus far been governed by laws in
existence long before computer use became so widespread. Authentication of computer evidence
poses unique problems in cases involving computer-related crime. You must be able to prove that
you did not alter any of the evidence after the computer came into your possession. Such proof
will help you rebut allegations that you changed or altered the original evidence.
When duplicating and storing data captured from a suspect’s computer, the authenticity of the
original data must be retained with a proven method to ensure that the copied data is identical to
the original. The best way to authenticate data evidence is through the use of mathematical
checksums, which are a popular and legally accepted way to check the validity of the copy from
the original data. Checksums are advanced mathematical algorithms, applied to the information
stored on a drive or file, which generate a unique numerical output. The result is that a compari-
son may be made between the original and the copy. Identical checksums between the original
and a copy show that an exact copy has been produced. It is impossible to change the information
on the drive without changing the checksums.
The majority of law-enforcement computer-forensic specialists rely upon authentication via
mathematical checksums to verify that restored bit-stream mirror images of a computer disk
drive and relevant files exactly match the contents of the original computer. Such comparisons
help resolve questions that might be raised during litigation about the accuracy and authenticity
of the restored mirror image. They also protect the computer-forensic specialist from any allega-
tions that data was altered or planted by law enforcement officials or other involved parties during
the processing of the computer evidence.
The hard disk drive should always be imaged using a specialized bit-stream backup product.
Computer forensic utilities like those offered by Guidance Software (www.guidancesoftware.
com), X-Ways Software (www.sf-soft.de), and New Technologies (www.forensics-intl.com)
offer bit-stream hard-drive-imaging software that provide the necessary mathematical authentica-
tion of copied data, allowing that data to be used as evidence in a court of law.
Issues regarding authentication of computer records are usually in the form of disputes over
the accuracy of documents retrieved from computers. According to the Federal Rules of Evidence,
the proponent of computer-generated evidence should produce evidence “describing the process
or system used to produce the evidence” and “showing that the process produces an accurate
result.”
b526367 Ch07.qxd 3/21/03 3:38 PM Page 152
There are three phases where errors can be introduced regarding authentication of evidence:
The most important rule in analyzing computer evidence is to never use the suspect’s com-
puter to view data. Instead, you should always use a separate computer to view or analyze a copy
of the data. Another important rule to follow in the retrieval and/or analysis of computer data is to
make sure a clean (forensically sterile) designated computer is used. Otherwise, you might
encounter the argument that data on the computer used for analysis has contaminated the data
seized from the suspect. When possible, you should not examine the target computer directly. It is
best to first make a copy of the disk and then perform all examinations against the copy because
the act of looking at the disk may modify it by changing file dates and times.
The authenticity of computer-generated records sometimes implicates the reliability of the com-
note
puter programs that create the records. For example, a computer-generated record might not be
authentic if the program that creates the record contains serious programming errors. When per-
forming a hard drive image, it is best to use a reputable product.
Public records — if they’ve been produced through normal business activities and if they’ve
been established as authentic — are admissible as evidence in U.S. state and federal court systems,
even when those records are produced by automated systems.
x-ref
Evidence Preservation
Preservation of evidence is the key concern of any criminal investigation, and computer evidence
is certainly no exception. Destructive Trojan horse programs, for example, can permanently destroy
computer evidence in a matter of seconds. Because electronic evidence can be altered without a
trace, original copies of evidentiary data should be placed in secure storage. Imaged evidence
must be stored into appropriate media or reliable mass storage such as optical media.
Because they are fast and reliable and offer a long life span, CD-R discs can be used as mass
storage media. In five to ten years time, floppy or proprietary media, like Zip disks, may no longer
be widely available. In addition, data stored on magnetic media disks tends to degrade over time.
This means that evidence could at some point fail to be recoverable. Since computer crime cases
may take several years to come to trial, secure storage media and space to store the original evi-
dence is vitally important to avoid any contamination or alteration of data.
The investigator must be sure to preserve all systems logs, including those that are current and
any logs that were archived previously. Subsequent comparison of these logs might even uncover
the presence of previously undetected incidents. Logs can offer proof of the type of intrusion made
to the system as well as the source of the intrusion and its ultimate destination.
b526367 Ch07.qxd 3/21/03 3:38 PM Page 154
Chapter Summary
In this ever-changing, high-tech world, the collection and preservation of evidence of a computer
crime can be a tedious task. Some of the most common reasons for improper evidence collection
are lack of written policies, lack of incident response training, and a broken chain-of-custody.
Establishing reliability and authenticity depends on the accuracy of the process used to produce
the record, the source of information in the record, and the method and time of its preparation.
This chapter reviews the basic procedures for collecting and preserving computer-related evidence.
Key points covered in this chapter include
✓ How to create a real-mode boot disk and its role in computer forensics
Chapter 8
✓ Changing passwords
✓ Eradication of vulnerabilities
COMPUTER SECURITY INCIDENT HANDLING CAN BE DIVIDED INTO SIX GENERAL PHASES: preparation,
identification, containment, eradication, recovery, and follow-up. Appreciating what can go wrong
in each of these phases will help you respond quickly and efficiently to each incident. As we’ve
already established, responding to computer security incidents is generally not an easy endeavor.
Incident response requires a blend of technical knowledge, communication, and coordination
among the personnel who respond to the incident. Even the incidents themselves are becoming
increasingly more complex. New security vulnerabilities that expose systems and networks to
unauthorized access or deny service are constantly being discovered.
With ever-increasing demands for timely processing of greater volumes of information comes
an increased threat of information-system disruption. In some instances, interruptions of only a
few hours are unacceptable. The impact resulting from an inability to process data must be
assessed, and actions should be taken to assure the availability of those systems considered essen-
tial to an organization’s normal operation. Those in management are obliged to identify critical
computer applications and develop contingency plans so that the probability of loss of data pro-
cessing and telecommunications support is minimized.
The aftereffects of an incident are frequently debilitating, requiring weeks or even months
before the integrity of compromised systems is reestablished. In addition, if the perpetrator is
caught and prosecution sought, it’s reasonable to anticipate that the defense will do everything in
155
its power to cast a shadow of uncertainty and unreliability over the prosecution. For this reason, a
b526367 Ch08.qxd 3/21/03 3:38 PM Page 156
clear and effective incident-handling methodology must be in place, particularly when law
enforcement is going to be brought in. This chapter focuses on the containment and eradication
phases of the incident response model.
✓ Be discreet and avoid looking for the attacker using obvious methods.
✓ Avoid using potentially compromised applications since intruder(s) may have installed
or hidden Trojan horses or similar malicious code in place of system files.
✓ Back up the system and Registry (Windows). It is important to obtain a full backup of
the system in order to acquire evidence of illegal activity. Back up to new (unused)
media and store backup tapes in a secure location.
✓ Determine the risk of continuing operations (covered in the next section).
✓ Change passwords on compromised systems and on all systems that regularly interact
with the compromised systems.
note
any viruses without having to shut down the infected system entirely. However, if the system con-
tains classified or sensitive information, or if critical programs risk becoming corrupted, it is gen-
erally advised that the system be shut down or is at least temporarily disconnected from the
network. On the other hand, if there is a reasonably good chance that a perpetrator can be identi-
fied and caught by letting a system continue to run as normal, that tactic may be considered.
Allowing a system to run in these circumstances, however, must be weighed against the risk of
disrupting or compromising data. Again, work within your organizational chain of command in
order to reach this type of critical decision.
Preserving Integrity
Information has integrity when both it and the systems that have manipulated it are deemed
trustworthy. For systems to be trustworthy, errors must have been (and continue to be) curtailed
at every possible juncture. This includes inaccuracies that are the result of both intentional
exploitation as well as those that stem from inadvertent mishandling.
Audit Mechanisms
When atypical activity is detected on your organization’s computer system, security personnel
should be alerted to it by system audit mechanisms. Unusual activity may be in the form of
repeated (unsuccessful) attempts to gain access to the system. The audit mechanism can be set to
make its notification after a predetermined number of failed attempts have been made to access
the system. The audit mechanism will sound different alarms depending upon the degree and sig-
nificance of the security incident or system compromise.
✓ How to exploit the vulnerability (including special conditions under which the vulnera-
bility occurs)
The following is an example of a “Vulnerability Reporting Form” used by the U.S. military. It is
not intended as an all-inclusive example, but it can be used as a template for constructing your
own form suitable for your organization’s specific needs:
b526367 Ch08.qxd 3/21/03 3:38 PM Page 158
B. Describe the nature and effect of the vulnerability in as general terms as possible:
____________________________________________________________
____________________________________________________________
____________________________________________________________
1. A scenario that describes specific conditions to demonstrate the weakness or design defi-
ciency. The description should sufficiently describe the conditions so that the weakness
or design deficiency can be repeated without further information. This scenario may
include source or object code.
___________________________________________________________
___________________________________________________________
___________________________________________________________
2. Describe the specific impact or effect of the weakness or design deficiency in terms of
the following: (1) denial of service, (2) alteration of information, and/or (3) compromis-
ing of data. Cite specific examples as appropriate.
___________________________________________________________
___________________________________________________________
___________________________________________________________
b526367 Ch08.qxd 3/21/03 3:38 PM Page 159
D. Suggested Fixes: Describe any code or procedures you may have discovered that when imple-
mented may reduce the impact of the defined technical vulnerability.
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
E. Additional Information:
1. System Specifics:
a. Location: _____________________________________________
b. Owner: _______________________________________________
c. Network connections: ___________________________________
d. Account or Serial Number(s): _____________________________
2. System use and highest classification of data on system:
________________________________________________________
________________________________________________________
3. Additional clarifying information: ____________________________
________________________________________________________
________________________________________________________
The next decision during quarantine and containment concerns the operational status of the
compromised system itself. Should the system be shut down entirely, disconnected from the net-
work, or be allowed to continue to run in its normal operating condition so that activity on it can
be monitored? The answer depends on the type and magnitude of the incident. In the case of a
nondestructive (for example, nuisance) type of virus, it is almost certainly best to use up-to-date
antivirus software to quickly eradicate that virus without shutting the infected system down. If
the system contains sensitive data, that information may be at risk, and it is generally best to shut
the system down (or at least temporarily disconnect it from the network or Internet).
Examples of serious computer security incidents include break-ins where privileged accounts
(for example, Unix root accounts or NT Administrator accounts) are used without authorization,
incidents where network traffic is monitored without authorization, and incidents where comput-
ers or networks are either the source or the target of a Denial of Service attack. In addition, if a
serious virus is suspected, such as a fast-spreading worm or dangerous Trojan horse, you should
immediately disconnect the infected computer from the network. If the computer is connected to
the network via an Ethernet connection, simply removing the Ethernet cable from the Ethernet
wall socket will immediately sever the connection. If you use dial-in via a modem, remove the
cable connecting the modem to the telephone socket. Users should then refrain from using the
computer for Internet/e-mail access until that computer has been scanned with up-to-date
antivirus software and you are sure it is no longer infected by malicious code.
After severing the connection, you can then examine log file information for connection and
login attempts, and compare any original (vendor provided) applications to those currently resid-
ing on the system. This allows you to detect if any files have been modified by the hacker, perhaps
for use as a backdoor to permit later access to the network to perform malevolent deeds.
If you have shared files or folders, disable them. Once you have completed the removal proce-
dure, if you later decide to reenable file sharing, it is advised that you do not share the root of drive
C but instead, share specific individual folders. These shared folders must be password-protected
with a secure password.
1. Double-click on My Computer.
2. Right-click on drive C, then select the Sharing option under the drop-down menu.
3. Check the Share name. The drive will normally be shared as C$, which is the default
share required for system administration. If you click the Permissions button, you
should see the message “This has been shared for Administrative purposes. The permis-
sions cannot be shared.”
4. Click on the drop-down menu for the Share name to determine if the drive is shared
with any other names.
5. If the drive is not shared with any other names, then you need not proceed any further.
If the drive is shared with a name other than the default C$, then you have to either
remove or modify any specific folders you do not wish to share by following Steps 6
through 8.
6. Select a specific folder and right-click on it, then select “Do not share this folder.”
7. If you do not want to completely remove a shared resource, you can increase security by
selecting Permissions and then modify the settings so that only certain users and/or
groups may write to it.
8. For each shared file or folder, individually check permissions to verify that only required
users have write access.
b526367 Ch08.qxd 3/21/03 3:38 PM Page 162
note For those who are comfortable using the command line under Windows NT, 2000, or XP, there is an
alternate option for deleting Windows shares. At the command (DOS) prompt, type net share.
The resulting output returns a list of all the shares currently present on the hard drive. Note that
the default share names like C$, Admin$, and IPCS$ should be ignored. However, any other
shares in the list may be deleted by using the following syntax: net share sharename
/delete.
Figure 8-1: The Sharing tab of Disk Properties for Windows XP Pro
b526367 Ch08.qxd 3/21/03 3:38 PM Page 163
Once Simple File Sharing has been disabled, you can modify the specific sharing options for
any folder located under My Computer by doing the following:
1. Right-click on the folder, and then select Sharing and Security from the drop-down
menu.
2. Select the Sharing tab, then select the “Share this folder” option, and enter a share
name. In this example, the folder is called Doug’s Documents (see Figure 8-4).
3. You may add a comment (if desired), which describes the share and appears in My
Network Places on other computers.
4. You may leave the “User limit” option alone. On XP professional, the default maximum
limit is 10.
5. Click on the Permissions button (See the “Creating Access Control Lists” section below)
and proceed to make any adjustments you wish regarding how this folder is shared with
other users (see Figure 8-5).
b526367 Ch08.qxd 3/21/03 3:38 PM Page 165
1. With the Permissions window open, click the Add button, and then choose Object Types.
2. Deselect the “Built-in security principals” option and the Groups option (see Figure
8-6), since you wish to view Users only.
3. Click OK, then choose Advanced, and click Find Now.
4. Click on the users who should have access to this share (see Figure 8-7).
5. Click OK, and the users are added. You may repeat this to add additional users.
6. When done, click OK.
By default, any new users added have read-only access. If you want them to have read/write
note access, then click the Change box. You will need to do this for each user by selecting each user in
the list, and then specify Change permission. To prevent Guest access to this share, you must
remove the Everyone group. Select it, and click the Remove button.
1. On the Windows desktop, right-click the Network Neighborhood icon and select
Properties.
2. Click on the Configuration tab, and then select Client for Microsoft Networks.
3. Click on File and Print Sharing.
4. Deselect both boxes, and then select OK.
If you do not wish to disable file and print sharing, follow these steps:
confidence. Having a complete trust model provides a greater awareness of the risks posed by vul-
nerabilities and threats. The information provided by a trust model will allow your organization to
assess its vulnerabilities and threats and find solutions to either mitigate that risk or choose to
accept it.
Traditionally, stand-alone computers and small networks rely on some type of user authentica-
tion and access control to provide security. Authentication is accomplished via a control mecha-
nism, which verifies the identity of a system user. Once identified, that user is permitted to use,
change, or view certain computer resources. Currently, several different approaches are being
used in the attempt to reliably authenticate users. These include passwords, digital signatures,
smart cards, and biometrics, to name a few.
problem worse. Many people have compensated for this problem by writing down their password and
keeping that information in an unsecured area, like stuck to a computer screen.
One of the first things a hacker will attempt to do against a system is run a program that will
attempt to guess the correct password of the target machine. These programs can contain entire dic-
tionaries from several different languages. In addition to words found in dictionaries, these programs
often contain words from popular culture such as science fiction movies and novels.
Hackers like to attack people’s weaknesses. One of the major weaknesses is the reluctance to
remember several, long, difficult to guess words such as passwords. Therefore, once one is chosen, the
likelihood that the same password is used for several accounts is very high. This is similar to the prob-
lem with default passwords because users have a tendency to keep the same password for a long period
of time, thereby allowing the attacker that much more time to gain access to a system.
What You Can Do?
Remembering long passwords can be difficult, but there are some basic techniques users can employ
to lessen the pain. First, choose a phrase that you will remember. As an example, we will use the
phrase “The pearl in the river.” You can then take a number that you are familiar with, such as a birth-
day. For this example we will use 7/4/01. Next, you can take the first letter of your phrase and interlace
it with the chosen date to make something similar to t7p4i0t1r. This method creates a password that
won’t be found in any dictionary and is unique to the person who created it.
It is important to remember though, that any password can be guessed if given enough time.
Therefore, it is important to change your password within the amount of time it would take an
attacker to guess it. For example, with the previous password it may take an attacker 60 days on a very
fast computer to guess what it is. In order to ensure your system’s safety then, a user must change
their password before those 60 days come to an end.
While password security is a very important deterrent to hackers gaining access to your system, it
is only one component to the “defense in depth” principle. What this means, is passwords need to be
used along with other measures such as updated antivirus software and a personal firewall such as
Zone Alarm.
Remember that the first line of defense in computer system trust is the protection of passwords
and user IDs.
note
With the increase in computing power, it takes less time than ever to guess passwords. Therefore,
strong passwords need to be combined with account lockouts (lock the account after some num-
ber of incorrect guesses) or the attacker can eventually guess it.
Unfortunately, system administrators are often unaware that unneeded services — which can be
exploited by hackers — are left running on the system, leaving them vulnerable to attack.
The easiest way to mitigate these operating system risks is to minimize the amount of services
you run, for example, by only running the services that are needed on your workstations and
servers. The Code Red Bug, for example, successfully overwhelmed many networks because
employees had installed Web services on their individual workstations. While there will be occa-
sions when certain individuals may be required to run Web servers on their workstations for
development and testing, more often than not, these Web server services provide little function
other than creating a potential jump-off point for a worm or other hostile attack. For those in
charge of managing large numbers of workstations, it becomes an onerous task to eliminate select
services from each and every workstation.
While reducing the amount of services running on a computer limits functionality, it does
harden the system in terms of security. Hardening your servers and workstations is just a first step
in preventing hackers from breaking into a computer system by limiting what the attacker is able
to exploit and utilize. While some services — such as the WWW service on a Web server — are
required, it is important to also keep abreast of the updates, patches, and hot fixes on all services.
On Windows-based computers, you can easily detect running services by using a program like
Process Explorer. With Process Explorer up and running, select the Options → Highlight Services
menu item. You can then click on any of the highlighted services to see service details, which
appear in the lower pane of Process Explorer (see Figure 8-8). Process Explorer can be down-
loaded from www.sysinternals.com.
(b) Training Objectives. — Training under this section shall be started within 60 days after the
issuance of the regulations described in subsection (c). Such training shall be designed
1. to enhance employees’ awareness of the threats to and vulnerability of computer systems; and
2. to encourage the use of improved computer security practices.
(c) Regulations. — Within six months after the date of the enactment of this Act, the Director of the
Office of Personnel Management shall issue regulations prescribing the procedures and scope of the
training to be provided Federal civilian employees under subsection (a) and the manner in which such
training is to be carried out.
Security awareness may be presented in many forms, such as logon banners that remind com-
puter users about security each time they start their computers to audio and video documenta-
tion. Whatever methods are employed, the main objective is to enhance continued employee
awareness of the threats to and vulnerability of computer systems; and to encourage the use of
improved computer security practices within the organization.
Bear in mind that since you are able to reuse the video, a computer security-related video
would be an outstanding tool in your security awareness program.
b526367 Ch08.qxd 3/21/03 3:38 PM Page 173
✓ Nessus by Renaud Deraison is a freeware software security scanner that audits a speci-
fied network remotely and determines whether hackers could compromise or exploit it
in some fashion. For additional information or to download a copy, visit
www.nessus.org.
b526367 Ch08.qxd 3/21/03 3:38 PM Page 174
Chapter Summary
The repercussions of a computer security incident often require a significant amount of time and
peoplepower before the integrity of compromised systems can be reestablished. The primary goal
of incident response is to first limit the effects of a computer security incident and then to quickly
restore business continuity. Immediate decisions must be made regarding a number of issues,
such as whether to shut down a system, disconnect a system from the network, or simply monitor
the system for suspicious activity. Incident containment and eradication of vulnerabilities are two
important, critical phases of an organization’s overall incident response plan.
b526367 Ch08.qxd 3/21/03 3:38 PM Page 175
✓ The pros and cons of severing network and Internet connections during the contain-
ment phase of the incident response model
✓ An overview of the risks of using network and file shares under Windows-based net-
works, including steps on how to mitigate those risks
✓ The importance of understating the computer security trust model and its role in an
organization’s overall incident response plan
✓ Proper password procedures and the importance of frequent password changes
Chapter 9
Disaster Recovery
and Follow-Up
In This Chapter
WITH THEIR INCREASED RELIANCE ON THE INTERNET, organizations around the globe routinely
face threats from hackers, crackers, computer viruses, and network worms, which often exploit a
variety of weaknesses in computer systems and cause significant damage. Due to the rise in con-
nectivity brought about by the Internet, damage caused by seemingly isolated computer security
incidents can rapidly spread to other Internet-enabled computer systems, causing widespread
financial losses. A disaster recovery plan should be tailored to fit your organization’s exposure to
risk and should provide concrete information and procedures to guide decisions and operations in
times of crisis.
Disaster recovery procedures should include the following:
✓ Restoring the system after compromise. Once a compromise has been eradicated, the
next logical step is to restore the system to its precompromise fully operational state.
✓ Validating the system. Once the system has been restored, verify that the operation was
successful and the system is back to its normal operating condition.
✓ Deciding when to restore operations. Management may decide to leave the system
offline while operating system upgrades and patches are installed.
✓ Monitoring the systems. Once the system is back online, continue to monitor for back-
doors that may have eluded detection.
177
b526367 Ch09.qxd 3/21/03 3:39 PM Page 178
Knowing how to react properly in an emergency is critical to making decisions that will mini-
mize resultant damage and quickly restore operations. In their December 7, 2001 Highlights
Bulletin, the National Infrastructure Protection Agency posted the following:
September 11, 2001
Terrorist Incidents Lessons Learned: New Approaches Needed for Disaster Recovery and Business
Continuity Planning
Three major themes can be noted in the many articles in which technical professionals have been
discussing the impacts of the September 11 incidents.
Emerging Lessons
First, the disaster recovery plans of most organizations tend to focus on information system avail-
ability (“up-time”) issues. Second, the evolving understanding of the scope of the impacts has resulted
in a fundamental reassessment by both private sector and government organizations of the meaning
of “worst-case scenario.” Third, and most important, there appears to be an emerging synthesis of the
two first themes: the incidents have resulted in an increasing awareness of the need for business con-
tinuity plans and disaster recovery plans to complement each other.
Financial Services Infrastructure
Many large financial service organizations quickly restored their information systems at alternate
sites. The systems demonstrated stability under high transaction volumes as markets reopened and
business resumed. Factors contributing to successful resumption of operations include investments
in real-time data backup and full hot site capabilities, frequent disaster plan testing and updates,
lessons learned during Y2K remediation and other plans for critical functions such as NASDAQ’s dec-
imalization conversion plan.
Traditional Disaster Recovery Services Pushed to New Limits
Companies offering disaster recovery services have reported record numbers of organizations sub-
mitting disaster alerts and disaster declarations. Furthermore, in many cases the nature of the ser-
vices required is also significantly broader than in previous disasters such as Hurricane Floyd in 1999
and the 1993 World Trade Center attack.
Need to Reevaluate Risk Issues
During the last 15–20 years, focus on cost-cutting and productivity increases has contributed to
consolidation of organizational operations, information, people, processes, and supply chain relation-
ships. The September 11 incidents show these trends present new potentials for failures that have not
been reflected in many disaster recovery and business continuity plans. Additionally, the incidents also
point out risk factors related to close proximity to other “high value targets” and cross-infrastructure
dependencies on telecommunications, power, and transportation.
Critical Infrastructure and Enterprise Network Implications
The basic principles of emergency readiness have been used for decades and can continue to be a
basis for addressing new challenges. However, two new planning approaches need to be addressed.
First, the scope of disaster recovery planning must be broadened beyond its traditional focus on pri-
marily operational issues to include backup security measures as well. Second, business continuity
planning combined with disaster recovery planning needs to be approached as an enterprise-wide
business operation requirement.
In this bulletin, the NIPC stresses the need to have disaster recovery and business continuity
procedures that complement each other. No matter how many precautions are employed and
b526367 Ch09.qxd 3/21/03 3:39 PM Page 179
enforced, most people in the field of computer security would agree that there are no completely
secure computers. When the unthinkable happens, a well-designed disaster recovery plan
describes the preparation and action required to effectively respond to the disaster, assigns and/or
delegates responsibilities, and even describes the procedures for testing and maintaining the plan.
In addition, a disaster recovery plan needs to be frequently tested and updated to reflect current
hardware, software, procedures, critical applications, and personnel. The type and extent of test-
ing adopted by an organization will depend on the following factors:
✓ Budget availability
✓ Complexity of information system and components
In today’s business climate, any long-term computer disruptions have a dramatic impact on an
organization’s bottom line. Recovery strategies should therefore incorporate both information
technology assets and management personnel who have responsibility for protecting those assets.
In addition, organizations need to train their employees to execute recovery plans by doing the
following:
✓ Making employees aware of the need for a disaster recovery/business resumption plan
✓ Informing all employees of the existence of the plan and providing procedures to follow
in the event of an emergency
✓ Training all personnel with responsibilities identified in the plan to perform the disaster
recovery and business continuity procedures
✓ Providing the opportunity for recovery teams to practice their disaster recovery and
business continuity skills
b526367 Ch09.qxd 3/21/03 3:39 PM Page 180
✓ Provide management with an understanding of all the resources needed to develop and
maintain an effective disaster recovery plan. In addition, the organization should have
the committed support from all group members (for example, management or IT
personnel) to help support and participate in the effort.
✓ Assemble an incident response team that includes representatives from every key
division of the organization.
✓ Define recovery requirements from the perspective of business functions.
✓ Identify the risks. Every risk must be identified along with what steps would be neces-
sary to thwart it happening in the first place. Avoiding a crisis is likely cheaper than
repairing it after the fact. All disaster plans must start with a focus on prevention.
✓ Document the impact of an extended loss to operations and key business functions. It is
impossible for a disaster recovery plan to justify each expense included in every business
process and application in the recovery process. The organization should therefore
inventory and prioritize critical business processes.
✓ Select recovery teams to oversee the disaster recovery process and ensure that the
required proper balance is maintained for disaster recovery plan development.
✓ Develop a contingency plan that is understandable, easy to use, and easy to maintain by
all organization members.
✓ Define how contingency planning considerations are to be incorporated in your ongoing
business planning. System development procedures must also be defined in order for the
plans to remain viable.
For those wishing to construct their own computer disaster recovery plan, the following con-
tingency and disaster recovery plan guidelines from the Virginia Community College System
b526367 Ch09.qxd 3/21/03 3:39 PM Page 181
demonstrate the steps required to create a computer disaster recovery plan. These guidelines are
not meant to be all-inclusive but rather should be used as a template:
I. ASSUMPTIONS
List and describe the things that could be assumed from the plan. The list of assumptions will not
be all-inclusive. Some assumptions could be:
Electronic Recordkeeping
Computers produce electronic records, including numeric, graphic, and text information, which
may be stored on any storage medium capable of being read by a computer. This includes, but is
not limited to, magnetic media, such as tapes and disks, and optical disks.
The creation of electronic records is dependent on the software applications, hardware, operating
system, media, and file formats that make up the type of computer system used. The personnel in
your organization who are responsible for records should be concerned with — and help other
employees understand — the methods used to create your records and the documentation of the
system that created the records in order to ensure the ability to retrieve, read, and use those
records in the future.
b526367 Ch09.qxd 3/21/03 3:39 PM Page 184
Each electronic storage medium can be classified into two types, magnetic media and optical
media. Each type has certain benefits and drawbacks. For example, information stored on mag-
netic media (for example, hard and floppy disks) is more prone to corruption by outside sources
(such as strong magnetic fields). Optical media (such as CD-ROMs) are not prone to magnetic cor-
ruption but can be damaged by deep surface scratches that prevent the laser from reading the data
stored on the disc.
Examples of commonly used storage media include
✓ Hard disks
✓ Flash memory
✓ Tape cartridges
The above are just a few of the many types of electronic storage media currently in use. Storage
technology is always evolving; new media and formats are constantly being developed and intro-
duced. Users, network administrators, and security management personnel should jointly and
periodically reevaluate electronic media suitable for business or archival purposes. Each storage
medium has a different life span. Because of this, recorded data may need to be transferred to a
new type of storage medium or format to extend its preserved life.
The proper selection of software, media, and file formats to be used for creating electronic
records ensures that those records are adequately readable, retrievable, and duplicated until such
time as they are no longer needed. Instructions for retrieval or preservation must be documented
in a manner to ensure long-term usage. This should include physical attributes of the records,
hardware, and software platforms required to retrieve the records.
Implementing and maintaining an effective records security program should incorporate the
following:
✓ Provide for backup and recovery of records to protect against information loss
✓ Ensure that appropriate personnel are trained to protect sensitive or classified electronic
records
✓ Minimize the risk of unauthorized alteration or erasure of electronic records
visible on the front of the record. Methods for the authentication of electronic records, however,
are more diverse. These methods include, but are not limited to, the following:
✓ A hard copy of a document that accompanies the electronic media containing informa-
tion about the electronic record that can be used for identifying, retrieving, or indexing
✓ Attaching an authentication label to the media
✓ Document that similar kinds of records generated and stored electronically are created
by the same processes each time and have a standardized retrieval approach.
✓ Substantiate that security procedures prevent unauthorized addition, modification,
or deletion of a record and ensure system protection against such problems as power
interruptions.
✓ Identify the electronic media on which records are stored throughout their life cycle,
and the maximum time that records remain on each type of storage medium.
✓ Coordinate all of the foregoing with appropriate senior management staff and legal
counsel.
Records Security
Those who create malicious code are finding more effective ways to circumvent such security
measures as antivirus programs, intrusion detection systems, and firewalls. To make matters
worse, new forms of malicious code are beginning to appear that ensure that attachments need
not be opened in order to infect a computer. In addition, viruses, worms, and Trojan horses can
search out the most damaging information (for example, files containing words such as “confi-
dential,” “private,” “privileged,” “clinical,” or “password”) to send out to selected e-mail addresses
found in the infected computer’s memory or to predetermined e-mail addresses.
When it comes to information security, the more levels of protection your organization
employs, the tougher it is for a hacker, cracker, or malicious agent to compromise your system or
steal critical data. For example, you may find it beneficial to keep critical or sensitive data in
encrypted form on a removable medium (for example, floppy, Zip, or CD-RW disk), rather than on
the system hard drive. This permits you to keep the media stored safely in a secure area. Using
antivirus programs with frequently updated virus definitions, installing an appropriate firewall,
keeping sensitive data on floppies, disconnecting the computer when it is not in use, using sophis-
ticated password systems and encryption, and applying other, similar approaches all contribute to
b526367 Ch09.qxd 3/21/03 3:39 PM Page 186
preventing sensitive data from being compromised. Additionally, your organization should imple-
ment and maintain an effective records security program that incorporates the following:
Standby UPS systems are commonly found in the small-office/home-office (SOHO) environ-
ment because they cost far less than the continuous type of UPS. While more costly than the
standby type, the continuous UPS does provide extremely clean, stable power and as such is more
likely to be used with critical applications.
UPS Benefits
Regardless of which type of UPS is employed, when a sudden loss of AC power occurs, the battery in
the UPS will supply power long enough for your personnel to save and close files, and to properly
power down their computers. UPS protection ensures that equipment will not be damaged and that
valuable data and personalized settings will be preserved. Many UPS system have audible alarms
that alert users to changes in the operating environment and battery conditions. In addition, some
UPS systems offer unattended safe shutdown of many operating systems in the event a power fail-
ure occurs while the computer or server is unattended, for example at night or on weekends.
Purchasing a UPS
Before purchasing a UPS, you must first decide on the level of protection required to meet your
organization’s specific needs. A UPS should be able to supply power to the computer long enough
to facilitate a smooth and orderly shutdown, thus avoiding the normal file corruption and other
problems associated with a sudden interruption in service. In general, a UPS should provide
power for at least 10 to 20 minutes to allow users enough time to save their work and terminate
running programs. Since the majority of power problems last only a short duration, UPS protec-
tion should eliminate loss of service for the majority of the electrical problems encountered in
most office environments. The size of the UPS you need depends on the amount of power your
computer consumes. If you have a standard desktop computer with only one internal hard drive,
a small UPS (such as the popular APC Back-UPS 300) should suffice. For a computer or server
with several hard drives or numerous peripherals, a larger UPS will be required. For more infor-
mation on UPS performance and sizing, visit the American Power Conversion Corporation UPS
selector Web site at www.apcc.com/template/size/apc for further details.
✓ Normal: Normal backups copy all selected files and then mark all the files as backed up.
The advantage to this type of backup is that it allows you to quickly restore files with a
minimal amount of data loss because all current files are on the backup. The drawback
to this type of backup is that it is very time-consuming.
✓ Differential: Differential backups copy only files that have been added or changed since
the last differential backup was performed but do not mark the files as backed up.
Restoring files only requires that you start with the last full backup, then move directly
on to the last differential backup. The advantage to this type of backup is that it is faster,
while the disadvantage is that it requires longer file restoration because files are not in
one continuous piece.
✓ Incremental: Very similar to differential backups, incremental backups copy only files
that were added or changed since the last full or incremental backup. Conversely, unlike
differential backups, they do mark the files as backed up. To restore files one only needs
to start with the last full backup, then perform the increments in their respective order.
The advantage to this type of backup is that it consumes the least amount of time and
space.
✓ The method used for backing up data along with a checklist of procedures
The backup programs provided by later versions of Windows — like 2000 and XP — have dra-
matically improved over earlier versions. In Windows XP for example, the built-in backup soft-
ware is located in the System Tools folder under Accessories in the Start menu. For other
Windows versions, users need to check their manuals for the exact location of the backup pro-
gram. Once activated, the Backup and Restore Wizard queries the user as to whether a backup or
restoration of data is desired (see Figure 9-1). The next screen prompts users to select which files
on their computer they wish to back up (see Figure 9-2). There are several options here. However,
if users select the last option, “Let me choose what to back up,” they are then provided with a
screen that requires them to select which files they wish to back up (see Figure 9-3). After select-
ing the appropriate files, users are then prompted to choose a destination for their backup data
(see Figure 9-4). In this illustration, the recipient of the backup data is an Iomega ZIP drive.
Backups can be written to other media types, as well, such as a tape drive or a CD-R disk.
After an incident has been resolved, a postmortem should be conducted so that the organiza-
tion can learn from the experience and, if necessary, update its procedures. The following types of
incident information should be examined:
As a result of a post-incident analysis, computer security personnel may need to issue alerts or
warnings to all organization employees about actions to take to reduce vulnerabilities that were
exploited during the incident. The organization may also need to update any computer operations
manuals to reflect new procedures. In addition, computer security personnel should use a post-
incident analysis to ascertain its impact on the organization in handling and resolving the incident.
social engineering, hackers can install backdoors or guess passwords to surreptitiously gain ille-
gal entry into an Internet-connected system. In extreme cases, attacks have caused entire systems
and networks to crash, denied computer service to legitimate users, or resulted in the theft of
large sums of money. The following press release from the U.S. Department of Justice shows just
how easy it is for hackers located halfway around the globe to access and defraud, in this instance,
online monetary exchange systems.
October 4, 2002 U.S. Department of Justice
United States Attorney
Western District of Washington
RUSSIAN COMPUTER HACKER SENTENCED TO THREE YEARS IN PRISON
John McKay, United States Attorney for the Western District of Washington, and Charles E. Mandigo,
Special Agent in Charge, Seattle Division, Federal Bureau of Investigation, announced today that Chief
United States District Judge John C. Coughenour has sentenced VASILIY GORSHKOV, age 27, of
Chelyabinsk, Russia, to serve 36 months in prison for his convictions at trial last year on 20 counts of
conspiracy, various computer crimes, and fraud committed against Speakeasy Network of Seattle,
Washington; Nara Bank of Los Angeles, California; Central National Bank of Waco, Texas; and the
online credit card payment company PayPal of Palo Alto, California. GORSHKOV also was ordered to
pay restitution of nearly $700,000 for the losses he caused to Speakeasy and PayPal.
According to evidence presented at trial and other court records:
GORSHKOV was one of two men from Chelyabinsk, Russia, who were persuaded to travel to the
United States as part of an FBI undercover operation. The operation arose out of a nationwide FBI
investigation into Russian computer intrusions that were directed at Internet Service Providers, e-
commerce sites, and online banks in the United States. The hackers used their unauthorized access to
the victims’ computers to steal credit card information and other personal financial information, and
then often tried to extort money from the victims with threats to expose the sensitive data to the pub-
lic or damage the victims’ computers. The hackers also defrauded PayPal through a scheme in which
stolen credit cards were used to generate cash and to pay for computer parts purchased from vendors
in the United States. The FBI’s undercover operation was established to entice persons responsible for
these crimes to come to U.S. territory.
As part of the operation, the FBI created a start-up computer security company named “Invita” in
Seattle, Washington. Posing as Invita personnel, the FBI communicated with GORSHKOV and the
other man, Alexey Ivanov, by e-mail and telephone during the summer and fall of 2000. The men
agreed to a face-to-face meeting in Seattle. As a prelude to their trip to the United States, the FBI
arranged a computer network for the two men to hack into and demonstrate their hacking skills. The
men successfully broke into the test network.
GORSHKOV and Ivanov arrived in Seattle, Washington, on November 10, 2000, and a meeting was
held at the office of Invita. Unbeknownst to the Russian men, the participants in the meeting were
undercover FBI agents and the meeting was recorded on audio and video tape. During the meeting,
GORSHKOV discussed their hacking prowess and took responsibility for various hacking incidents and
activities. GORSHKOV shrugged off any concern about the FBI, explaining that the FBI could not get
them in Russia. When asked about their access to credit cards, GORSHKOV declined to talk about it
while they were in the United States and added that “this kind of question is better discussed in Russia.”
At the conclusion of the Invita undercover meeting, the two men were arrested. Ivanov was trans-
ported to the District of Connecticut to face charges for a computer intrusion at the Online
b526367 Ch09.qxd 3/21/03 3:39 PM Page 193
Information Bureau of Vernon, Connecticut. GORSHKOV and Ivanov were charged in the Western
District of Washington with conspiracy and 19 additional crimes involving Speakeasy, Nara Bank,
Central National Bank — Waco, and PayPal.
A few days after the two men were arrested, the FBI obtained access via the Internet to two of the
men’s computers in Russia. The FBI copied voluminous data from the accounts of GORSHKOV and
Ivanov and examined the data pursuant to a search warrant issued by a United States Magistrate Judge.
GORSHKOV’s pretrial challenge to the FBI’s copying and search of the Russian data was denied by
Chief Judge Coughenour in a written order dated May 23, 2001.
The data copied from the Russian computers provided a wealth of evidence of the men’s computer
hacking and fraud. They had large databases of credit card information that was stolen from Internet
Service Providers like Lightrealm of Kirkland, Washington. More than 50,000 credit cards were found
on the two Russian computers. The Russian computers also contained stolen bank account and other
personal financial information of customers of online banking at Nara Bank and Central National
Bank — Waco.
The data from the Russian computers revealed that the conspirators had gained unauthorized con-
trol over numerous computers — including computers of a school district in St. Clair County,
Michigan — and then used those compromised computers to commit a massive fraud involving PayPal
and the online auction company e-Bay. The fraud scheme consisted of using computer programs to
establish thousands of anonymous e-mail accounts at e-mail web sites like Hotmail, Yahoo!, and
MyOwnEmail. GORSHKOV’s programs then created associated accounts at PayPal with random iden-
tities and stolen credit cards. Additional computer programs allowed the conspirators to control and
manipulate e-Bay auctions so that they could act as both seller and winning bidder in the same auc-
tion and then effectively pay themselves with stolen credit cards.
The case was investigated by FBI Special Agents Marty Prewett and Michael Schuler, who were
awarded the Director’s Annual Award for Outstanding Criminal Investigation by the Director of the
FBI for their work on the case.
Any number of flaws or weaknesses can leave computer systems vulnerable to attack.
Remember, they are most vulnerable in the following situations:
Attackers employ a variety of different methods to exploit vulnerable computer systems. Here
are some examples:
✓ Sendmail. A common type of attack in which the attacker installs malicious code in an
electronic mail message that adds a password into the system’s password file, thereby
giving the attacker total system privileges
✓ Packet sniffing. A technique in which attackers surreptitiously insert a software program
that captures passwords and user identifications
Once access has been gained, hackers use the computer system as though they were legitimate,
authorized users. Employing a variety of techniques, hackers often attempt to cover their tracks
to avoid detection and then steal information both from the systems compromised as well as the
systems connected to them.
Chapter Summary
No single disaster recovery plan will fit every organization’s needs. Disaster recovery plans should
be tailored to fit your organization’s security requirements and exposure to risk. Since disaster
recovery plans provide detailed information and well-defined procedures, they act as blueprints to
guide critical decisions and operations in times of emergency. Disaster recovery procedures can
include any number of events including post-compromise restoration, validation, and monitoring
of network computer systems. Knowing how to react properly in an emergency is critical to mak-
ing quick decisions that mitigate damage and quickly restore operations.
Key points covered in this chapter include
✓ The importance of incident recordkeeping and its overall role in an organization’s busi-
ness continuity planning
✓ Why uninterruptible power supply (UPS) and backup procedures are indispensable to an
organization’s disaster and business continuity plan
✓ How examining previous attacks can help shape future incident response and business
continuity planning
✓ Why anticipating and planning for unforeseen disruptions to business operations helps
organizations remain competitive in today’s business climate
b526367 Ch10.qxd 3/21/03 3:39 PM Page 195
Chapter 10
Responding to Different
Types of Incidents
In This Chapter
PREPARING TO HANDLE A COMPUTER SECURITY INCIDENT HAS NOW BECOME A TOP PRIORITY for
many computer system administrators. With virus attacks and stories of hackers abounding, orga-
nizations are becoming more diligent about protecting their information assets than ever before.
As organizations increase their Internet presence and dependency on information technology
assets, the number of computer incidents will rise. After an incident occurs is, of course, too late
to begin planning how to address the situation. A computer security incident can occur at any
time of the day or night, although most hacker/cracker incidents occur during off-hours when
hackers do not expect system managers to be tending their flock. In contrast, worm and virus
incidents can occur any time of the day. Thus, time and distance considerations in responding
to incidents are very important. This chapter focuses on various types of common computer secu-
rity incidents and the basic procedures to contain and mitigate their damage.
Of the three, an active hacker session is the most severe and must be dealt with as soon as pos-
sible. There are two basic methods for handling an active hacking incident. The first method is to
quickly lock the hacker out of the system. To do this, you must first identify the hacker’s point of
entry into the system. Here are some common entry points that hackers look for when seeking to
gain a way in:
The second method is to allow the hacker to continue his or her attack while you attempt to
collect potential information that could lead to identification and possible criminal conviction of
the hacker. One method for identifying the source of an attack(s) is by carefully examining system
log files and active network connections. Be sure to make copies of all audit trail information.
Capture system process and status information in a separate file, and then store that file in a safe
place. Programs like Process Explorer, by Mark Russinovich (www.sysinternals.com), are excel-
lent for this task.
b526367 Ch10.qxd 3/21/03 3:39 PM Page 197
5. Some leads go through foreign countries, not all of which consider hacking a crime.
Treaties, conventions, and agreements are in place with some countries, and there are
“24/7” contacts in dozens of countries around the world who can be contacted for help.
When a lead points to a foreign country, the investigator should contact a CTC or CCIPS
attorney at www.cybercrime.gov.
Some of the information investigators need to track a hacker might be readily available to the
general public on the Internet. No special restrictions apply to an investigator’s access to and use of
such information — in the same way that information available in a public library can be used by
investigators without special authorization. Common search engines such as www.dogpile.com,
www.lycos.com, www.excite.com, www.google.com, or www.netscape.com may be used to
find information about a username or nickname of the person or group claiming credit for a computer
intrusion.
As mentioned earlier in this chapter, when active hacker activity is discovered, one of two deci-
sions must be made. Your organization can either allow the activity to continue while you gather
evidence or sever the hacker’s access thereby effectively locking the hacker out of the system.
Since a hacker can cause a significant amount of damage in a very short time, it is critical that a
quick reaction be taken when responding to active hacker attacks. If a decision is made to remove
that hacker from the system, the following steps should be taken:
✓ Lock out the hacker. Kill all active or running processes that the hacker is using and
remove any files or programs that he or she may have left on the system. Change pass-
words on any accounts accessed by the hacker/cracker and be sure to keep a log of all
actions taken.
✓ Restore the system. Restore the system to a normal state, and restore any data or files
that the hacker/cracker may have modified. Install patches or fixes to close any security
vulnerabilities that the hacker/cracker may have exploited. Also, install patches for other
vulnerabilities of which the hacker may not have taken advantage, and inform the appro-
priate people. All actions taken to restore the system to a normal state should be docu-
mented in the logbook for this incident.
b526367 Ch10.qxd 3/21/03 3:39 PM Page 199
✓ Notify authorities. Once the incident has been contained and the hacker removed from
the system, the next step is to contact the appropriate authorities. Several agencies
(see Table 10-1) can be called upon once an incident has occurred and been detected.
✓ Follow-up. After the investigation is complete, a report describing the incident should be
written and distributed to all incident response and security personnel. It should include
all actions that were taken by the organization in response to the incident.
Previous Incidents
Occasionally, there are cases where a computer security incident is discovered after the fact. When
this happens, there is not always a lot of evidence available to identify who infiltrated the system
or how they gained access to the system. When an employee discovers that someone successfully
hacked into the organization’s computer system, he or she should notify incident response team
personnel within one working day.
Follow-Up
After the investigation is complete, a report describing the incident and actions that were taken
should be written and distributed to all computer security personnel in your organization.
✓ It must be self-executing.
✓ It must self-replicate.
Some viruses are designed to disrupt normal computer operations by damaging applications,
deleting files, or, in extreme cases, reformatting the hard disk. Others are better classified as nui-
sances and are not designed to cause any real lasting harm. Instead of causing damage, benign
viruses simply replicate themselves and make themselves known by presenting users with audio,
video, or text messages. Even these so-called “harmless” viruses, however, can create problems for
an organization’s network by occupying computer memory used by legitimate programs and
slowing down system operations.
Trojan Horses
While they are more sophisticated than a simple computer virus, Trojan horses are destructive
programs that masquerade as harmless applications. Unlike viruses, Trojan horses do not self-
replicate; however, they can be equally caustic. One of the most insidious types of Trojan horse is
a program that claims to rid your computer of viruses but instead introduces viruses onto your
computer.
Internet Worms
Computer worms pose a serious threat to the Internet, because they are self-replicating and self-
sustaining programs — often transmitted via e-mail messages — that infect vulnerable systems,
sometimes with disastrous results, other times with minimal impact. Their automatic nature
b526367 Ch10.qxd 3/21/03 3:39 PM Page 202
makes them powerful, fast-spreading, and destructive. A worm is comparable to a virus in many
aspects, except that it is a self-contained program that is able to rapidly spread functional copies of
itself — or its segments — to other computer systems over networks without depending upon
other programs to host its code. Viruses, on the other hand, typically need to attach themselves to
host programs in order to spread.
resources must be used in an ethical and responsible manner. Use of information technology
resources can be broadly categorized as acceptable, tolerable, or prohibited:
✓ Acceptable use of information technology resources is legal use consistent with the
organization’s acceptable computer use policies.
✓ Tolerable use is legal use for other purposes that do not impinge on the organization’s
acceptable use policy.
✓ Prohibited use is illegal use and all other use that is neither acceptable nor tolerable.
The following guidelines are intended to help organizations understand and respond to various
levels of inappropriate computer use.
✓ Nuisance. These offenses generally show a lack of consideration of other computer users,
but do not threaten privacy or computer integrity or violate any ethical principles. In
other words, the individual simply showed poor judgment. The organization should
respond by issuing the user a verbal, e-mail, or hardcopy warning that his or her actions
were not acceptable.
✓ Questionable Ethics. These offenses often involve violations where the ethics of actions
are in question or when a person’s privacy or computer integrity was violated. The orga-
nization could respond by suspending the user’s account or computer access until a
formal session with an Information Technology staff member has been attended. A copy
of the organization’s Internet access policy should be handed to the user with the spe-
cific area or offense highlighted.
✓ Criminal. This is when a user commits an offense that requires investigation by local,
state, or federal law enforcement. Any user committing a criminal offense should forfeit
all rights to the organization’s computer privileges. Any and all information requested
by local, state, or federal law enforcement must be provided. If the user is found guilty of
the offense(s) under investigation, his or her employment with your organization should
be terminated.
Types of Harassment
The U.S. courts define two categories of sexual harassment, quid pro quo sexual harassment and
hostile environment sexual harassment. Quid pro quo occurs when the victim suffers concrete,
physical, or economic consequences; for example, an employee being fired, demoted, or failing to
receive a promotion for rejecting the sexual harassment. The second type, hostile environment
sexual harassment, occurs when there have been unwelcome advances that have been sufficiently
“severe or pervasive” so as to alter the terms and conditions of employment, even in the absence
of any monetary or economic consequences.
Sexual harassment is unwanted attention of a sexual nature by a person or persons who know-
ingly or should have reasonably known that the attention is unwelcome to the recipient or recip-
ients. Sexual harassment includes unwelcome advances, requests for sexual favors, or any other
unwelcome conduct of a sexual nature (including those via e-mail, instant messaging, and so on).
These actions may be in the form of:
✓ Suggestive behavior
✓ Prolonged staring or leering at a person
✓ Jokes containing sexual content in front of people who find them offensive
Most people think that sexual harassment involves interpersonal relationships in the work-
place. Nevertheless, sexual harassment also covers uses of electronic technology, including e-mail
correspondence. Electronic mail usage continues to grow and expand. E-mail messaging is par-
ticularly prevalent in the workplace, where most major employers have e-mail systems. This
persistent use of e-mail messaging, coupled with the perception that e-mail is temporary, confi-
dential, and informal, results in some shocking and amazing e-mail messages being sent in the
workplace. The same holds true for instant messaging. Instant messaging is a type of communi-
cations service that enables a user to conduct a private chat with another individual. Typically, the
instant messaging system alerts a user whenever somebody on the user’s contact list is online.
A user can then initiate a chat session with that particular individual. This type of communication
constantly searches the Internet or company intranet looking for persons on the contact list.
The rapid growth in instant messaging is causing equally rapid growth in risk for any business
with employees who use it. Instant messaging, or IM, is another way for employees to get into
trouble by posting offensive or inappropriate messages or even as a means to sexually harass
another individual.
In 1998, the U.S. Supreme Court increased the liability faced by employers for incidents involv-
ing sexual harassment. Two landmark 1998 Supreme Court decisions (one involving the use of
e-mail messaging) addressed the issue of an employer’s responsibility when one or more supervi-
sors conducts him or herself outside the scope of the employee’s authority and creates a sexually
hostile work environment for another employee. In these two decisions, the Supreme Court clar-
ified that “An employer is subject to vicarious liability to a victimized employee for an actionable
hostile environment created by a supervisor with immediate (or successively higher) authority
over the employee. When no tangible employment action is taken, a defending employer may
raise an affirmative defense to liability or damages, subject to proof by preponderance of the
b526367 Ch10.qxd 3/21/03 3:39 PM Page 205
✓ A special hotline
In addition, the employee should have the option of talking with a male or female organization
representative. The organization should ensure that supervisors and managers understand their
responsibilities under the organization’s anti-harassment policy and complaint procedure.
Periodic training of those individuals can help achieve that result. Such training should explain
the types of conduct that violate the employer’s anti-harassment policy, the seriousness of the
policy, the responsibilities of supervisors and managers when they learn of alleged harassment,
and the prohibition against retaliation.
Management should undertake whatever measures are necessary to ensure that retaliation does
not occur. For example, when management investigates a complaint of harassment, the official who
interviews the parties and witnesses should remind these individuals about the prohibition against
retaliation. Management also should scrutinize employment decisions affecting the complainant and
witnesses during and after the investigation to ensure that such decisions are not based on retaliatory
motives.
Effective Complaint Process
An employer’s harassment complaint procedure should be designed to encourage victims to come
forward. To that end, it should clearly explain the process and ensure that there are no unreasonable
obstacles to complaints. A complaint procedure should not be rigid, since that could defeat the goal of
preventing and correcting harassment. When an employee complains to management about alleged
harassment, the employer is obligated to investigate the allegation, regardless of whether it conforms
to a particular format, or is made in writing.
The complaint procedure should provide accessible points of contact for the initial complaint. A
complaint process is not effective if employees are always required to complain first to their supervi-
sors about alleged harassment, since the supervisor may be a harasser. Moreover, reasonable care in
preventing and correcting harassment requires an employer to instruct all supervisors to report com-
plaints of harassment to appropriate officials.
It is advisable for an employer to designate at least one official outside an employee’s chain of com-
mand to take complaints of harassment. For example, if the employer has an office of human
resources, one or more officials in that office could be authorized to take complaints. Allowing an
employee to bypass his or her chain of command provides additional assurance that the complaint will
be handled in an impartial manner, since an employee who reports harassment by his or her supervi-
sor may feel that officials within the chain of command will more readily believe the supervisor’s
version of events.
It also is important for an employer’s anti-harassment policy and complaint procedure to contain
information about the time frames for filing charges of unlawful harassment with the EEOC or state
fair employment practice agencies and to explain that the deadline runs from the last date of unlawful
harassment, not from the date that the complaint to the employer is resolved. While a prompt com-
plaint process should make it feasible for an employee to delay deciding whether to file a charge until
the complaint to the employer is resolved, he or she is not required to do so.
Confidentiality
An employer should make clear to employees that it will protect the confidentiality of harassment
allegations to the extent possible. An employer cannot guarantee complete confidentiality, since
it cannot conduct an effective investigation without revealing certain information to the alleged
harasser and potential witnesses. However, information about the allegation of harassment should be
shared only with those who need to know about it. Records relating to harassment complaints should
be kept confidential on the same basis.
A conflict between an employee’s desire for confidentiality and the employer’s duty to investigate
may arise if an employee informs a supervisor about alleged harassment, but asks him or her to keep
the matter confidential and take no action. Inaction by the supervisor in such circumstances could
lead to employer liability. While it may seem reasonable to let the employee determine whether to pur-
sue a complaint, the employer must discharge its duty to prevent and correct harassment. One mech-
anism to help avoid such conflicts would be for the employer to set up an informational phone line
which employees can use to discuss questions or concerns about harassment on an anonymous basis.
b526367 Ch10.qxd 3/21/03 3:39 PM Page 208
There are numerous products available that offer Internet content filtering. Two popular
content-filtering programs are Net Nanny by BioNet Systems, LLC (www.netnanny.com) and
CyberPatrol by Surf Patrol plc (www.cyberpatrol.com). Each offers numerous content filtering
features, such as
✓ Support for the latest Internet browsers from Microsoft and Netscape
✓ Expanded filter support for Web-capable e-mail clients
While beneficial, content filters can sometimes pose problems by preventing legitimate searches
from occurring. For example, a content filter might stop a Web page from loading because it con-
tained the word “hardcore” even when not used in a sexual context.
Industrial Espionage
Industrial espionage is an extension of the competitive intelligence gathering seen among corpo-
rations and other organizations, even national governments. The reasons for taking part in indus-
trial espionage range from a desire to gain superiority and dominance in a particular industry
to seeking to simply achieve a better level of security within one’s own organization. Monetary
gain is another strong motivation for organizations and knowledgeable individuals to engage in
industrial espionage.
Those conducting industrial espionage through transgression into computer systems and
networks — cyber spies — often have substantial monetary backing from businesses and even
governments. As opposed to run-of-the-mill joyriding hackers, these cyber spies often have at
their disposal state of the art equipment and even personnel wherever and whenever they might
need it.
The Internet and networked computer systems have facilitated the occupation of these cyber
spies, regardless if they are working from within or from without the systems they are attacking.
Networked computer security systems may be breached — and spied upon — from sites anywhere
in the world, including sites within the organization itself. (More about insider attacks is included
in the next section.) Unlike the spies of even the recent past, today’s spy needs only to be present in
a cyber sense, not necessarily in a physical sense.
Regardless of from where the attack comes, the high-tech gear used today sometimes leaves
organizations unaware that their system has been penetrated without authorization. Even when
an organization does know its computer system has been compromised, they may not be able to
b526367 Ch10.qxd 3/21/03 3:39 PM Page 211
quantify how much, if any, revenue was lost as a result. When material items have been stolen
(disks, documents, and so on) those offenses are sometimes only reported as robberies or burglar-
ies, with the value of the information lost not realized and not included in the tally.
Organizations must remember that former employees, both those who leave on good terms
and those who are disgruntled, may remain a threat to system security. Whether they are fueled by
a desire for revenge, they are approached by a third party with monetary incentive, or they’re
starting their own business in the same industry, former employees may have enough knowledge
to seriously impact your organization’s assets, productivity, and even client confidentiality.
Former employees are not the sole risk to your organization’s computer system security.
Security incidents may arise from current employees, as well. Temporary personnel, subcontrac-
tors, and longstanding company employees all may have enough access to privileged and valuable
organization information. Some employees deliberately reveal classified information (again, for
profit or out of malice); however, others might reveal such information inadvertently. Those
engaged in industrial espionage have been known to pose as in-house technicians and request
passwords in order to do their job maintaining or repairing a company computer. Misguided
employees willingly help by relaying such information. Sometimes, employees simply give out
information — such as passwords — after receiving an official or important sounding phone call
requesting it.
monitor, and obtained material that included Cisco proprietary materials relating to both released
Cisco products and then-ongoing developmental projects.
note
The use of strong passwords can help prevent the insider — and others — from guessing
passwords.
The organization’s security personnel must be diligent in the way they manage and monitor
the logging of networked systems. Security personnel routinely face the time-consuming task of
collecting, analyzing, and deciphering multiple systems’ log files. Even simple carelessness might
be the cause of a security breach. This could happen in a number of ways, such as when a system
administrator forgets to log out of a management console, when someone brings an infected lap-
top into the office from home, or via a security hole created by a misconfigured wireless access
point.
Fortunately, most of the more advanced intrusion detection systems, like Tripwire and
CyberCop, focus on both external and internal attacks. Because insider attacks can come from so
many potential directions, these products tackle the insider problem using a variety of
approaches.
Since the best defense is a good offense, vulnerability scanning is one of the best ways for an
organization to find and plug security holes in their network. Vulnerability scanning is beneficial
for preventing both external and internal attacks. Two popular network vulnerability scanners
used today are SAINT and ISS Internet Scanner:
✓ SAINT. SAINT is the Security Administrator’s Integrated Network Tool. In its default
mode, it gathers as much information about remote hosts and networks as possible.
The information gathered includes the presence of various network information ser-
vices, which are potential security flaws. These flaws often appear in the form of incor-
rectly configured network services, well-known bugs in system or network utilities, or
weak policy configuration settings.
✓ ISS Internet Scanner. Those in charge of their organization’s network security often
choose ISS Internet Scanner for analyzing their network’s vulnerabilities. ISS Internet
Scanner focuses on the single most important aspect of organizational network risk
management: the identification and correction of technical vulnerabilities. Internet
Scanner performs scheduled and selective probes of your network’s communication ser-
vices, operating systems, key applications, and routers in search of those vulnerabilities
most often used by unscrupulous threats (to probe, investigate, and attack your net-
work). Internet Scanner then analyzes your vulnerability conditions and provides your
organization with a series of corrective actions.
b526367 Ch10.qxd 3/21/03 3:39 PM Page 213
It’s an unfortunate fact that most devastating security incidents originate from within your
own organization. Proactive security scanning provides a meaningful assessment of your organi-
zation’s system security against known threats. Security scanning can offer suggestions for effec-
tive countermeasures, further improving security. Proactive scanning can also lead to faster
detection of, and perhaps reduced damages to, breached systems. With vulnerability scanning
conducted at regular intervals, your organization can be made aware of potential security vulner-
abilities as they occur.
Chapter Summary
The old adage states that an ounce of prevention is worth a pound of cure. Computer security is
no exception to this maxim. Whenever possible, you want to take a proactive stance and prevent
security incidents from happening in the first place. Unfortunately, we do not live in a perfect
world. It is virtually impossible to prevent all security incidents. However, when a security inci-
dent does come about, you need to ensure that its impact is minimal. There are various response
measures your organization can take to minimize the number and impact of security incidents
that do take place. This chapter focused on understanding various types of computer security inci-
dents faced by organizations and the basic procedures for responding to those incidents and
limiting their impact.
Key points covered in this chapter include
✓ Basic procedures for responding to hacker, cracker, and malicious code attacks
Chapter 11
THE COMPUTER NETWORK IS A KEY TOOL IN TODAY’S BUSINESS WORLD. However, with hackers,
crackers, and malicious code abounding, the need for increased security awareness and counter-
measures has become imperative. Computer criminals come in many varieties, from hackers to
coworkers. Many company security officers believe that the weakest link in the computer security
chain is the employee — either disgruntled or simply lazy.
One critical component of incident response is the audit trail. Auditing helps define events that
permit security managers to determine exactly what has happened in their network. When a sys-
tem is breached, the system administrator needs to know what has happened to repair the breach
and formulate a plan to prevent future attacks. The hardest part of responding to a network
breach is tracing the criminal and assessing damages. A comprehensive security audit evaluates
your organization’s network and operating practices to ensure that your systems are secure from
both internal and external threats. A security audit of the network should include the following:
✓ A vulnerability assessment
✓ Penetration testing
215
b526367 Ch11.qxd 3/21/03 3:39 PM Page 216
Security audits can help your organization develop a comprehensive report suitable for both
management and technical staff. Such a report should include the following information:
✓ A list of vulnerabilities found, including the risk and probability of malicious users,
hackers, customers, and business partners exploiting these flaws
✓ Recommendations given for patching and repairing of vulnerabilities
In short, security audits help your organization minimize the risk of unscheduled outages,
damage or destruction of your information assets, financial losses, and the other detrimental
effects of security breaches. This chapter focuses on audit process and procedures, HIPAA compli-
ance issues, the benefit of penetration testing and their role under incident response planning.
The chapter concludes with how the lessons learned from the Honeynet Project are helping to
shape the future of incident response.
✓ Establish policies to protect your organization’s networks and computer systems from
abuse and inappropriate use.
✓ Establish methods that will aid in the identification and prevention of abuse of the
organization’s networks and computer systems.
✓ Provide an effective method for responding to questions and complaints regarding
abuses — real or unconfirmed — of the organization’s networks and computer system.
✓ Establish procedures that will protect your professional reputation while allowing you
to meet the organization’s responsibilities (legal and ethical) regarding the computer
system’s Internet connection.
b526367 Ch11.qxd 3/21/03 3:39 PM Page 217
A well-designed information security policy is the key to the success of any information
security-related actions. Since policies have a profound impact on all security efforts, they should
be well developed, enforced, maintained, and periodically audited. Policies need periodic review to
ensure that they continue to reflect your organization’s overall security strategy. A weak policy
can leave a company vulnerable to all kinds of human errors, from selecting a too-easily-guessed
password to installing software that may cause security gaps.
When assessing a security policy, be sure to include the following:
✓ The regulations and laws upon which the policy is based (including the in-house regula-
tions of your organization)
✓ Which information assets must be protected
✓ The methods and procedures that personnel are to follow for reporting security
violations (whether real or unsubstantiated)
Rapid advancements in information technology require that your organization’s security poli-
cies be frequently reviewed. The frequency of those policy audits depends on the organization’s
security needs as well as the technological knowledge of your personnel. Generally, however, each
new technological change has the potential to require a corresponding policy change. As a result, a
good rule of thumb is to review all organizational policies (security or otherwise) at least annually.
✓ Have the needs and expectations of your organization been communicated to your
personnel both initially and in an ongoing manner?
✓ Have your personnel received security training specifically tailored to the needs of their
position?
✓ Are all new employees sufficiently trained regarding their security roles, responsibilities,
and expectations?
✓ Are appropriate opportunities provided for personnel to voice security concerns and ask
questions about security policies and procedures?
✓ Is adequate time provided for reading and reviewing security agreements before employ-
ees and outsiders are required to sign and submit them?
✓ Have your policy developers reviewed the policies (security-related practices) of other
organizations in the same line of work or those with whom you will conduct business?
Cooperation at this juncture ensures that all the engaged parties will be satisfied with
future transactions.
✓ Has news of your organization’s commitment to security been shared with the public?
✓ Have policy goals and objectives been translated into organizational security rules that
are designed to modify staff behavior?
✓ Has an administrator been specifically appointed to be responsible for your organization’s
security?
✓ Are these security regulations enforced equally at all levels of your organization?
✓ Are outsiders (for example, repair technicians and outside organizations) required to
sign a contract acknowledging that they are aware of their responsibilities and that they
will abide by your organization’s security rules and regulations?
✓ Are security policies reviewed — and if need be, revised — at least on an annual basis?
will help you to prioritize and fix problem areas, minimizing the risk of unforeseen outages, dam-
age or theft of sensitive information assets, damage to your reputation, and financial loss. Anytime
a system is modified or reconfigured, security holes may be opened, allowing the network to
become vulnerable to attack. Even when there have been no changes made to your organization’s
network, you may still fall victim to an attack that exploits a newly discovered vulnerability, con-
firming that even static systems require periodic auditing.
When developing a security policy for your organization, be sure to include details on how you
will test your network(s). Once the initial security audit has been completed, any deficiencies
found need to be quickly fixed. In addition, your security policy should detail how you will ensure
that new flaws or security holes will be handled.
The following steps outline the basic six-step computer security audit process:
Analyzing Workstations
When conducting your organization’s computer network assessment, be sure to examine individ-
ual workstations for the following:
✓ Are unnecessary services, such as IIS (Microsoft’s Internet Information Server), pre-
vented from running on the workstation?
✓ Is virus protection installed, updated, and running?
✓ Are any unnecessary files and folders precluded from being shared on the workstation?
✓ Has the operating system been updated and patched against known vulnerabilities?
✓ Have the servers been located in a secure area that prevents unauthorized access?
✓ Have any shared folders been given unique permissions for any individual users?
✓ Have service packs and security patches been installed when available?
✓ Has your network administrator created and securely stored emergency repair disks?
✓ Have password-cracking tools been used to detect weak or easily guessed passwords?
✓ Has auditing been enabled for the backup and restoration of data?
✓ Have NetBIOS null sessions been disabled? (See detailed procedure below.)
✓ If appropriate, has the SAM password database been encrypted with 128-bit encryption?
(Use syskey.exe for NT4.0.)
✓ Have procedures and guidelines been established for responding to incidents?
Null sessions take advantage of flaws in the structure of the Common Internet File System/
Server Messaging Block (CIFS/SMB). You can establish a null session with a Windows NT/2000/XP
host by simply logging on with a null username and password. Using a null connection allows you
to gather important information from the host, such as the following:
In other words, null sessions enable an unauthenticated user to get a list of valid user accounts
and the groups to which those users belong. Access to such information greatly simplifies a brute-
force password attack against user accounts. The best defense against this type of attack is to dis-
able NetBIOS null sessions within the Windows OS itself. The following steps show you how.
FOR WINDOWS XP
To disable NetBIOS null sessions within Windows XP, do the following:
Figure 11-1: The Security Options folder within Windows XP Professional’s Local Policies folder
b526367 Ch11.qxd 3/21/03 3:39 PM Page 223
FOR WINDOWS NT
Unfortunately, in Windows NT 4.0, you will need to edit the Registry in order to disable NetBIOS
null sessions. Following the Registry editing and backup procedures outlined in Chapter 4, edit
the following Registry key as follows:
HKEY_LOCAL_MACHINE/System/CurrentControlSet/Control/LSA/RestrictAnonymous=1
Blocking the following ports at the router or firewall can also help defend against NetBIOS
null-session attacks:
Penetration Testing
Penetration testing is the process of analyzing, probing, and identifying security vulnerabilities in
a network to the extent to which they might be exploited by outside parties. By simulating a real-
world malicious attack, you can quickly know if your network is secure or not. Penetration testing
b526367 Ch11.qxd 3/21/03 3:39 PM Page 224
is an important and necessary tool for determining the status of the current security policies and
procedures of your organization because it can:
✓ Create the foundation for building a secure and protected environment in which to
conduct business
✓ Discover any weaknesses in your network allowing your organization to address them
before a malicious attacker can exploit them
✓ Profile the weaknesses based on risk levels, severity, and the skill required to carry out
exploits
✓ Identify vulnerabilities, including any misconfiguration, that can be exploited by a
remote attacker
✓ Provide specific recommendations to strengthen your security and to mitigate the risks
discovered
Hackers routinely spend their time searching computer systems for security holes in the form
of vulnerabilities. These security holes can be caused by a number of issues, such as misconfigu-
ration and/or programming flaws. To protect your organization’s computer systems from hackers,
crackers, script kiddies, and malicious code, you need to check for known vulnerabilities and
exploits within your networks’ systems. Vulnerabilities can be comprised of bugs, application
backdoors, or spyware (computer code used to monitor, log, or thwart activity on a computer sys-
tem unbeknownst to its user(s)) that have entered applications or operating systems in the form
of malicious code.
When it comes to network security, there is no better way to find weaknesses than by perform-
ing penetration testing on a regular basis. There are compelling reasons to perform penetration
testing regularly:
✓ With OS and application upgrades, the possibility of a new breach being introduced
may occur.
✓ To determine the degree of system vulnerabilities that might not be detected through
the use of in-house audits
✓ As a prelude to restructuring the organization’s security system and for enhancing the
perceived value of the organization’s reputation
✓ To show customers how safely they can perform e-commerce transactions over the
Internet
The biggest benefit to outsourcing penetration testing is the use of a no-knowledge attack. The
no-knowledge attack, when performed by testers who have no factual information about the target
location, is designed to provide the most realistic penetration test possible and usually includes
gathering a significant amount of information about the target system before launching an attack.
It is almost always best if a third party performs this type of exercise because internal security
personnel are too knowledgeable about their organization’s environment to be sufficiently objec-
tive. A full-knowledge attack, on the other hand, is performed with testers having exceeding
amounts of information about targeted environments. Such testing is designed to simulate an
attacker who has intimate knowledge of the target organization’s systems — such as a real
employee.
Only trained and experienced professionals should carry out penetration testing. While third-
party testing can often provide objective results, organizations sometimes become the victim of
hackers who will use a simulation to find vulnerabilities for their own purposes. To combat this,
some organizations try to insulate themselves against unscrupulous penetration testers by having
their security staff monitor the penetration-testing procedures.
When searching for a third-party provider for penetration/vulnerability testing, it is best to use
a well-established organization with a known good track record. Following is a short list of several
popular providers:
✓ ITSecure (www.itsecure.com.au/)
✓ VIGILANTe (www.vigilante.com/)
x-ref
For more on third-party vendors who provide penetration/vulnerability testing, check out the
Information Security Magazine’s list of vendors at www.infosecuritymag.com/
vendor_links.shtml.
b526367 Ch11.qxd 3/21/03 3:39 PM Page 228
✓ Procedures to guard the integrity, confidentiality, and availability of data. These are
documented, formal practices for selecting and carrying out security measures to pro-
tect data as well as the conduct of personnel in relation to the protection of data.
✓ Physical safeguards. These relate to the protection of your organization’s computer sys-
tems, buildings, and equipment from fire and other natural and environmental hazards
as well as from intrusion. Physical safeguards also cover the use of locks, keys, and
administrative measures used to control access to computer systems and facilities.
✓ Technical security services. These include the processes that are put in place to protect
and to control and monitor information access.
✓ Technical security mechanisms. These include the processes that are put in place and
carried out to prevent unauthorized access to data transmitted over your organization’s
network.
The preceding procedures should be adapted to the individual needs of your organization. They
need not necessarily be presented in the same format or broken down into four categories.
x-ref
HIPAA Compliance
The Centers for Medicare & Medicaid Services (CMS) are responsible for implementing various
provisions of HIPAA. The Administrative Simplification provisions of the Health Insurance
b526367 Ch11.qxd 3/21/03 3:39 PM Page 229
Portability and Accountability Act of 1996 (HIPAA, Title II) require the Department of Health and
Human Services to establish national standards for electronic healthcare transactions and
national identifiers for providers, health plans, and employers and offer the following guidelines
addressing the security and privacy of health data for covered entities:
A. Certification Each organization would be required to evaluate its computer system(s) or net-
work design(s) to certify that the appropriate security has been implemented. This evaluation
could be performed internally or by an external accrediting agency.
We are, at this time, soliciting input on appropriate mechanisms to permit independent assess-
ment of compliance. We would be particularly interested in input from those engaging in health
care electronic data interchange (EDI), as well as independent certification and auditing organi-
zations addressing issues of documentary evidence of steps taken for compliance; need for, or
desirability of, independent verification, validation, and testing of system changes; and certifica-
tions required for off-the-shelf products used to meet the requirements of this regulation.
We also solicit comments on the extent to which obtaining external certification would create
an undue burden on small or rural providers.
B. Chain of Trust Partner Agreement If data are processed through a third party, the parties
would be required to enter into a chain of trust partner agreement. This is a contract in which the
parties agree to electronically exchange data and to protect the transmitted data. The sender and
receiver are required and depend upon each other to maintain the integrity and confidentiality of
the transmitted information. Multiple two-party contracts may be involved in moving informa-
tion from the originating party to the ultimate receiving party. For example, a provider may con-
tract with a clearinghouse to transmit claims to the clearinghouse; the clearinghouse, in turn,
may contract with another clearinghouse or with a payer for the further transmittal of those
claims. These agreements are important so that the same level of security will be maintained at all
links in the chain when information moves from one organization to another.
C. Contingency Plan We would require a contingency plan to be in effect for responding to sys-
tem emergencies. The organization would be required to perform periodic backups of data, have
available critical facilities for continuing operations in the event of an emergency, and have disas-
ter recovery procedures in place. To satisfy the requirement, the plan would include the following:
D. Formal Mechanism for Processing Records There would be a formal mechanism for process-
ing records, that is, documented policies and procedures for the routine and nonroutine receipt,
b526367 Ch11.qxd 3/21/03 3:39 PM Page 230
E. Information Access Control An entity would be required to establish and maintain formal,
documented policies and procedures for granting different levels of access to health care informa-
tion. To satisfy this requirement, the following features would be provided:
Access control is also discussed later in this document in the personnel security requirement
and under the physical safeguards, technical security services, and technical security mechanisms
categories.
F. Internal Audit There would be a requirement for an ongoing internal audit process, which is
the in-house review of the records of system activity (for example, logins, file accesses, and secu-
rity incidents) maintained by an entity. This is important to enable the organization to identify
potential security violations.
G. Personnel Security There would be a requirement that all personnel with access to health
information must be authorized to do so after receiving appropriate clearances. This is important
to prevent unnecessary or inadvertent access to secure information. The personnel security
requirement would require entities to meet the following conditions:
✓ Ensure that operating, and in some cases, maintenance personnel have proper access.
✓ Ensure that system users, including technical maintenance personnel, are trained in
system security.
✓ Documentation
✓ Hardware/software installation and maintenance review and testing for security features
✓ Inventory procedures
✓ Security testing
✓ Virus checking
I. Security Incident Procedures There would be a requirement to implement accurate and cur-
rent security incident procedures. These are formal, documented instructions for reporting secu-
rity breaches, so that security violations are reported and handled promptly. These instructions
would include the following:
✓ Report procedures
✓ Response procedures
J. Security Management Process A process for security management would be required. This
involves creating, administering, and overseeing policies to ensure the prevention, detection, con-
tainment, and correction of security breaches. We would require the organization to have a formal
security management process in place to address the full range of security issues. Security man-
agement includes the following mandatory implementation features:
✓ Risk analysis
✓ Risk management
✓ A sanction policy
✓ A security policy
L. Training This proposed rule would require security training for all staff regarding the vulner-
abilities of the health information in an entity’s possession and procedures which must be fol-
lowed to ensure the protection of that information. This is important because employees need to
b526367 Ch11.qxd 3/21/03 3:39 PM Page 232
understand their security responsibilities and make security a part of their day-to-day activities.
The implementation features that would be required to be incorporated follow:
✓ Awareness training for all personnel, including management (this is also included as a
requirement under physical safeguards)
✓ Periodic security reminders
Chapter Summary
The U.S. government estimates that recovery costs from reported cyber attacks in 2001 alone was
$13 billion nationwide. The best means for avoiding these costs is to protect critical information
assets and resources. Security audits are designed to find vulnerable areas where hackers, crackers,
and insiders can gain unauthorized access to your computer systems. A comprehensive security
b526367 Ch11.qxd 3/21/03 3:39 PM Page 233
audit evaluates your organization’s network and operating practices to ensure that your systems
are secure from both internal and external threats. Detecting vulnerabilities and intrusions
through security audits helps determine if security infrastructures, policies, and procedures con-
tinue to provide the level of protection required by their organizations. Some industries — such
as governmental and healthcare institutions — are already required to undergo comprehensive
security audits that check traditional security on systems. This chapter focused on understanding
such basic auditing procedures as the assessment of current security policies, procedures, and
practices; vulnerability assessment; and penetration testing.
Key points covered in this chapter include
✓ The procedures for assessment of security policies and procedures and how computer
security audits help mitigate risks to information assets
✓ How to develop and implement security policy checklists
✓ An overview of the security audit process and its role in incident response
✓ The basic steps to conduct workstation and server audits and their importance in the
overall computer security process
✓ The pros and cons of in-house penetration testing and when and why outsourcing is
sometimes superior
✓ Understanding HIPAA compliance issues for covered entities and how they relate to
incident response preparation
✓ A brief overview of the Honeynet Project
b526367 Ch11.qxd 3/21/03 3:39 PM Page 234
b526367 Ch12.qxd 3/21/03 3:39 PM Page 235
Chapter 12
ON FEBRUARY 7, 2000, THE NIPC RECEIVED REPORTS THAT YAHOO had experienced a Denial of
Service attack. In the days that followed, several other companies (including Cable News Network,
eBay, Amazon.com, Buy.com, and ZDNET) also reported Denial of Service outages to the NIPC
and FBI field offices. Unfortunately, the attackers used spoofed IP addresses, meaning that the
address that appeared on the target’s log was not the true address of the system that sent the mes-
sages. In addition, many of the victims had not kept complete network logs. These DoS attacks
resulted in millions of dollars in lost revenue. The corporate sector, the media, and even govern-
ment agencies were left exasperated.
A Denial of Service (DoS) attack is not a virus (as some people assume) but a method used by
hackers to prevent or deny legitimate users access to a computer. DoS attacks are typically exe-
cuted using specially designed tools that flood a computer with so many requests for data that the
computer ceases to function and cannot provide information to legitimate users. The attack effec-
tively shuts down the affected computer, hence the Denial of Service moniker. An analogy would
be someone launching an automated program to have hundreds of phone calls placed simultane-
ously to an organization’s switchboard. Coping efforts on the part of the organization’s staff would
be overcome in no time, and many callers would receive busy signals due to the high volume of
telephone traffic.
235
b526367 Ch12.qxd 3/21/03 3:39 PM Page 236
It’s a regrettable fact that essentially any Internet-connected computer can become the target
of an attack from any point across the globe. The following public press release demonstrates that
even the U.S. military can fall victim to a malicious hacker attack from a foreign land.
November 12, 2002 U.S. Department of Justice
United States Attorney
Eastern District of Virginia
2100 Jameison Avenue
Alexandria, VA 22314
London, England Hacker Indicted Under Computer Fraud
and Abuse Act for Accessing Military Computers
Paul J. McNulty, United States Attorney for the Eastern District of Virginia, announced that Gary
McKinnon, of London, England, was indicted in Alexandria today by a federal grand jury on seven
counts of computer fraud and related activity. McKinnon faces on each count a maximum sentence of
10 years of imprisonment and a $250,000 fine. The United States intends to formally request that the
United Kingdom extradite McKinnon.
According to the indictment, between March of 2001 and March of 2002, Gary McKinnon accessed
and damaged without authorization 92 computers belonging to the United States Army, Navy, Air
Force, Department of Defense, and NASA, and 6 computers belonging to a number of private busi-
nesses. One count charges McKinnon with accessing and damaging without authorization a computer
used by the military for national defense and security. Other computers hacked by McKinnon include
computers located at military bases throughout the United States and the Pentagon. The indictment
alleges that Gary McKinnon scanned a large number of computers in the .mil network, was able to
access the computers and obtained administrative privileges. Once he was able to access the comput-
ers, McKinnon installed a remote administration tool, a number of hacker tools, copied password files
and other files, deleted a number of user accounts, and deleted critical system files. Once inside a net-
work, McKinnon would then use the hacked computer to find additional military and NASA victims.
Ultimately, McKinnon caused a network in the Washington D.C. area to shut down, resulting in the
total loss of Internet access and e-mail service to approximately 2,000 users for three days.
The estimated loss to the various military organizations, NASA, and the private businesses is
approximately $900,000.
The case was indicted as the result of a 17-month investigation by the U.S. Army Criminal
Investigation Command’s Computer Crime Investigative Unit (CCIU), NASA Office of the Inspector
General, Naval Criminal Investigative Service, 902nd Military Intelligence Group-Information Warfare
Branch, Defense Criminal Investigative Service, the Air Force Office of Special Investigations, and the
United Kingdom’s National High Tech Crime Unit. Also assisting in the investigation were the U.S.
Army Computer Emergency Response Team located at Fort Belvoir, VA., the Army Regional Computer
Emergency Response Team at Fort Huachuca, the Naval Computer Incident Response Team, and the
Department of Defense Computer Emergency Response Team.
act as a cautionary warning to future computer security personnel. By reviewing some common
information-security mistakes, for example, incident response personnel can refine security poli-
cies to correct shortcomings. Here are some common mistakes:
✓ Not installing antivirus software and keeping its virus patterns current
propagating more rapidly than ever before. The brief interval between the Code Red worm and the
release of the Nimda worm continued the long-established trend of malicious code packages being
modified based on lessons learned from previous malevolent attacks. This resulted in even more
advanced malicious code packages.
It is important to remember that your organization should always treat information assets as it
would treat any other valuable asset. Just as you would not walk away from your desk leaving cash
or other valuables unattended, you should take care to similarly protect your information assets.
Always remember to take the following precautions:
Whether security incidents come from computer viruses, hacker attacks, or computer mischief
initiated by disgruntled employees, appropriate response demands that your organization con-
tinue operations while reversing damages, investigating causes, communicating with customers,
and even launching investigations and seeking legal recourse. While the basic principles of emer-
gency readiness have been used for decades — and will continue to be the basis for addressing new
challenges — two new planning approaches must also be addressed. First, the scope of disaster
recovery planning must be broadened beyond its traditional focus on primarily operational issues
to include backup security measures, as well. Second, business continuity planning combined
with disaster recovery planning needs to be approached as a corporate-wide business operation
requirement.
Chapter Summary
As a result of the aftermath of September 11, society has now begun to take strong interest in
security awareness and terrorism. Individuals and organizations are realizing that having in place
basic infrastructures and standard processes for vulnerability management, crisis management,
and incident handling are a necessity for mitigating risk, damage, and business interruption.
Overall, basic security awareness and computer security has improved drastically when compared
with the security policies in place only a few years ago. Response times — to attacks, emergencies,
and serious new remote vulnerabilities — have improved measurably, particularly in business
enterprises and large organizations. However, experience reminds us that hackers, crackers, and
malicious code will continue to proliferate on the Internet of the future, and they will use sophis-
ticated and novel methods of attack. This will force the computer security community to counter-
act by developing new tools and methods to combat those threats and capture evidence to
prosecute cyber criminals.
Key points covered in this chapter include
✓ The analysis of several real-world attack methods and how a lack of preparation and fail-
ure to update and patch vulnerable systems can have devastating effects
✓ How lessons learned from others can help shape future incident response procedures
and computer security in general
✓ Popular Web sites where up-to-date information can be found regarding computer secu-
rity incidents and forensics
✓ An overview of some future trends in information security technology
b526367 Ch12.qxd 3/21/03 3:39 PM Page 246
c526367 AppA.qxd 3/21/03 3:39 PM Page 247
Appendix A
✓ System requirements
✓ What’s on the CD
✓ Troubleshooting
System Requirements
Make sure that your computer meets the minimum system requirements listed in this section. If
your computer doesn’t match up to most of these requirements, you may have a problem using
the contents of the CD.
For Windows 9x, Windows 2000, Windows NT4 (with SP 4 or later), Windows Me, or Windows XP:
✓ At least 32MB of total RAM installed on your computer; for best performance, at least
64MB is recommended
✓ Free disk space of at least 50MB for installation of all utilities
✓ Ethernet network interface card (NIC) or modem with a speed of at least 28,800 bps
✓ A CD-ROM drive
For Linux:
✓ At least 32MB of total RAM installed on your computer; for best performance, at least
64MB is recommended
✓ Ethernet network interface card (NIC) or modem with a speed of at least 28,800 bps
✓ A CD-ROM drive
247
c526367 AppA.qxd 3/21/03 3:39 PM Page 248
If you do not have auto-run enabled, or if the auto-run window does not appear, follow these
steps to access the CD:
1. Log in as root.
2. Insert the CD into your computer’s CD-ROM drive.
3. If your computer has Auto-Mount enabled, wait for the CD to mount. Otherwise, follow
these steps:
a. Command line instructions:
At the command prompt type:
mount /dev/cdrom /mnt/cdrom
(This mounts the cdrom device to the mnt/cdrom directory. If your device has a differ-
ent name, change cdrom to that device name — for instance, cdrom1.)
c526367 AppA.qxd 3/21/03 3:39 PM Page 249
b. Graphical: Right-click the CD-ROM icon on the desktop and choose Mount CD-ROM.
This mounts your CD-ROM.
4. Browse the CD and follow the individual installation instructions for the products listed
below.
5. To remove the CD from your CD-ROM drive, follow these steps:
a. Command line instructions:
At the command prompt type:
umount /mnt/cdrom
b. Graphical: Right-click the CD-ROM icon on the desktop and choose UMount
CD-ROM. This unmounts your CD-ROM.
What’s on the CD
The following sections provide a summary of the software and other materials you’ll find on
the CD.
Author Checklists
Following are the checklists outlining the basic steps and procedures for data collection, evidence
preservation, and incident response. More checklists can be found on the CD.
❑ Make all workstations and servers time-synchronized with a reliable and accurate
Internet timeserver, such as www.time.nist.gov.
❑ Use time-stamping and ensure that the verification of time stamps within your system
cannot be modified or distorted.
❑ Identify network devices by creating a network map to serve as a baseline and graphical
representation of the devices on your network for future reference.
c526367 AppA.qxd 3/21/03 3:39 PM Page 250
❑ Locate rootkits and backdoors in Unix and Linux by using third-party programs like
Intact by Pedestal Software or via manual inspection.
❑ Scan for backdoors and network sniffers using the netstat –n and ifconfig –a
commands.
❑ Locate and examine the Windows swap file for evidence. Under Windows 95/98/ME, the
swap file is called win386.swp, and in Windows NT/2000/XP, it is called pagefile.sys.
❑ Locate and retrieve e-mail evidence. E-mail messages can be found in a number of dif-
ferent places, such as the sender’s e-mail inbox/outbox, a network server’s mailbox, or
backup media.
❑ Recover evidence from Web browser cache and history. Web caches reveal a lot about
which Web sites a user has visited. Most contemporary Web browsers (for example,
Internet Explorer and Netscape Navigator) perform Web caching and maintain browsing
history.
❑ Gather evidence from the Windows print spooler (EMF) files. Even if a user never saved
a word-processing document, temporary versions of word-processing documents some-
times remain on the hard drive.
❑ Locate data in hidden or masked file extensions. Be sure to scan for evidence hidden in
steganographic images and password-protected compressed files.
❑ Build a forensic toolkit. Essential to any computer investigation, toolkits come in two
types; those you assemble yourself and pre-fabricated ones that you download or pur-
chase as a suite from any one of many forensic software vendors.
❑ Follow a chain-of-custody. The chain-of-custody is a record of evidence handling from
the time of seizure to the time evidence is presented in a court of law.
❑ Ensure the admissibility of evidence collected via authentication. Before a computer
record can be used as evidence, it must first be proven to be authentic.
❑ Perform regular backups. When disaster strikes, a backup may be the only hope of
retrieving original data.
❑ After an incident, monitor systems for unusual or suspicious activity. In addition, a post-
mortem examination should be conducted so that the organization can learn from the
experience and, if necessary, update its procedures.
❑ Anticipate and plan for future attacks. Properly anticipating and planning for unforeseen
disruptions to business operations is important for remaining competitive.
Software
The CD contains the following shareware, freeware, and trialware/demo programs for Windows
and Linux platforms. As basic tools for conducting an in-house computer forensic investigation,
these programs help you collect, preserve, and analyze computer-related evidence.
✓ PDA Seizure (demoware), by Paraben, is a comprehensive tool that allows PDA data to
be acquired, viewed, and reported on, all within a Windows environment. For more
information, visit www.paraben-forensics.com/pda.html.
✓ ProDiscover DFT (demoware), by Technology Pathways, offers forensics examiners an
integrated Windows application for the collection, analysis, management, and reporting
of computer disk evidence at an affordable price. Features include the ability to generate
a bit-stream copy disk to new disk, recover deleted files contained in slack space, and
display data contained in Windows NT/2000 Alternate Data Streams. Since this product
is frequently updated, visit www.techpathways.com for product updates and additional
information.
✓ RegCleaner is an easy-to-use freeware program that allows the user to detect and
remove old and obsolete Registry entries. Features include the ability to remove file
types, old software entries, and unused DLL files. For additional information, visit
www.vtoy.fi/jv16/shtml/regcleaner.shtml.
✓ The @stake Sleuth Kit (TASK) open-source software allows an investigator to examine
the file systems of a computer in a nonintrusive fashion. TASK is a collection of Unix-
based command-line tools that can analyze NTFS, FAT, FFS, EXT2FS, and EXT3FS file
systems. TASK reads and processes the file system structures and therefore does not
require operating system support for the file systems. These can be used during incident
response on live systems to bypass the kernel and view files that are being hidden by
rootkits. For additional information, visit www.atstake.com/research/tools/task/.
✓ Ultimate Zip Cracker (trialware), by VDG Software, is designed for recovering the lost
passwords for several file types such as: MS-Word documents (*.DOC) in Office 97–XP,
MS-Excel documents (*.XLS) in Office 97–XP, and ZIP archives created by PKZIP,
WinZip, and many others. The program utilizes a Password Wizard and provides easy
step-by-step password recovery. For more information, please visit
www.vdgsoftware.com/uzc.html.
Additional shareware, freeware, and trialware/demo computer forensics programs for Windows
and Linux platforms are listed below.
(Continued)
Product Name Company Name Type of software URL
For descriptions of the products listed above, please see the Read Me file on the CD.
Shareware programs are fully functional trial versions of copyrighted programs. If you like
particular programs, register with their authors for a nominal fee and receive licenses, enhanced
versions, and technical support. Freeware programs are copyrighted games, applications, and
utilities that are free for personal use. Unlike shareware, these programs do not require a fee or
provide technical support. GNU software is governed by its own license, which is included inside
the folder of the GNU product. See the GNU license for more details.
Trial, demo, or evaluation versions are usually limited either by time or functionality (such as
being unable to save projects). Some trial versions are very sensitive to system date changes. If
you alter your computer’s date, the programs will “time out” and will no longer be functional.
c526367 AppA.qxd 3/21/03 3:39 PM Page 255
Troubleshooting
If you have difficulty installing or using any of the materials on the companion CD, try the follow-
ing solutions:
✓ Turn off any antivirus software that you may have running. Installers sometimes mimic
virus activity and can make your computer incorrectly believe that it is being infected by
a virus. (Be sure to turn the antivirus software back on later.)
✓ Close all running programs. The more programs you’re running, the less memory there
is available to other programs. Installers also typically update files and programs; if you
keep other programs running, installation may not work properly.
✓ Reference the ReadMe. Please refer to the README file located at the root of the
CD-ROM for the latest product information at the time of publication.
If you still have trouble with the CD, please call the Customer Care phone number: (800)
762-2974. Outside the United States, call 1 (317) 572-3994. You can also contact Customer
Service by e-mail at [email protected]. Wiley Publishing, Inc. will provide technical sup-
port only for installation and other general quality control items; for technical support on the
applications themselves, consult the program’s vendor or author.
c526367 AppA.qxd 3/21/03 3:39 PM Page 256
c526367 AppB.qxd 3/21/03 3:39 PM Page 257
Appendix B
257
c526367 AppB.qxd 3/21/03 3:39 PM Page 258
Appendix C
269
c526367 AppC.qxd 3/21/03 3:39 PM Page 270
Moreover, many of the definitions in section 2703(c) were technology-specific, relating primar-
ily to telephone communications. For example, the list included “local and long-distance telephone
toll-billing records,” but did not include parallel terms for communications on computer networks,
such as “records of session times and durations.” Similarly, the previous list allowed the govern-
ment to use a subpoena to obtain the customer’s “telephone number or other subscriber number
or identity,” but did not define what that phrase meant in the context of Internet communications.
Amendment: Amendments to section 2703(c) update and expand the narrow list of records that
law enforcement authorities may obtain with a subpoena. The new subsection 2703(c)(2) includes
“records of session times and durations,” as well as “any temporarily assigned network address.”
In the Internet context, such records include the Internet Protocol (IP) address assigned by the
provider to the customer or subscriber for a particular session, as well as the remote IP address
from which a customer connects to the provider. Obtaining such records will make the process of
identifying computer criminals and tracing their Internet communications faster and easier.
Moreover, the amendments clarify that investigators may use a subpoena to obtain the “means
and source of payment” that a customer uses to pay for his or her account with a communications
provider, “including any credit card or bank account number” 18 U.S.C. §2703(c)(2)(F). While
generally helpful, this information will prove particularly valuable in identifying the users of
Internet services where a company does not verify its users’ biographical information. (This sec-
tion is not subject to the sunset provision in section 224 of the Act).
Amendment: Section 211 of the Act amends title 47, section 551(c)(2)(D), to clarify that ECPA,
the wiretap statute, and the trap and trace statute govern disclosures by cable companies that
relate to the provision of communication services — such as telephone and Internet services. The
amendment preserves, however, the Cable Act’s primacy with respect to records revealing what
ordinary cable television programming a customer chooses to purchase, such as particular pre-
mium channels or “pay-per-view” shows. Thus, in a case where a customer receives both Internet
access and conventional cable television service from a single cable provider, a government entity
can use legal process under ECPA to compel the provider to disclose only those customer records
relating to Internet service. (This section is not subject to the sunset provision in Section 224 of
the Act.)
Further, because the pen register or trap and trace “device” often cannot be physically
“attached” to the target facility, Section 216 makes two other related changes. First, in recogni-
tion of the fact that such functions are commonly performed today by software instead of physical
mechanisms, the amended statute allows the pen register or trap and trace device to be “attached
or applied” to the target facility. Likewise, Section 216 revises the definitions of “pen register” and
“trap and trace device” in section 3127 to include an intangible “process” (such as a software rou-
tine) which collects the same information as a physical device.
The amendments in Section 216 of the Act also empower courts to authorize the installation
and use of pen/trap devices in other districts. Thus, for example, if a terrorism or other criminal
investigation based in Virginia uncovers a conspirator using a phone or an Internet account in
New York, the Virginia court can compel communications providers in New York to assist investi-
gators in collecting information under a Virginia pen/trap order.
Consistent with the change above, Section 216 of the Act modifies section 3123(b)(1)(C) of title
18 to eliminate the requirement that federal pen/trap orders specify their geographic limits.
However, because the new law gives nationwide effect for federal pen/trap orders, an amendment
to section 3127(2)(A) imposes a “nexus” requirement: the issuing court must have jurisdiction
over the particular crime under investigation.
Amendment: To correct this problem, the amendments in Section 217 of the Act allow victims
of computer attacks to authorize persons “acting under color of law” to monitor trespassers on
their computer systems. Under new section 2511(2)(i), law enforcement may intercept the com-
munications of a computer trespasser transmitted to, through, or from a protected computer.
Before monitoring can occur, however, four requirements must be met. First, section 2511(2)(i)(I)
requires that the owner or operator of the protected computer must authorize the interception of
the trespasser’s communications. Second, section 2511(2)(i)(II) requires that the person who
intercepts the communication be lawfully engaged in an ongoing investigation. Both criminal
and intelligence investigations qualify, but the authority to intercept ceases at the conclusion of
the investigation.
Third, section 2511(2)(i)(III) requires that the person acting under color of law have reason-
able grounds to believe that the contents of the communication to be intercepted will be relevant
to the ongoing investigation. Fourth, section 2511(2)(i)(IV) requires that investigators intercept
only the communications sent or received by trespassers. Thus, this section would only apply
where the configuration of the computer system allows the interception of communications to
and from the trespasser, and not the interception of non-consenting users authorized to use the
computer.
Finally, section 217 of the Act amends section 2510 of title 18 to create a definition of “com-
puter trespasser.” Such trespassers include any person who accesses a protected computer (as
defined in section 1030 of title 18 without authorization. In addition, the definition explicitly
excludes any person “known by the owner or operator of the protected computer to have an exist-
ing contractual relationship with the owner or operator for access to all or part of the computer.”
18 U.S.C. § 2510(21). For example, certain Internet service providers do not allow their customers
to send bulk unsolicited e-mails (or “spam”). Customers who send spam would be in violation of
the provider’s terms of service, but would not qualify as trespassers — both because they are
authorized users and because they have an existing contractual relationship with the provider.
These provisions will sunset December 31, 2005.
Amendment: Section 814 of the Act restructures the statute to make clear that an individual
need only intend to damage the computer or the information on it, and not a specific dollar
amount of loss or other special harm. The amendments move these jurisdictional requirements to
1030(a)(5)(B), explicitly making them elements of the offense, and define “damage” to mean “any
impairment to the integrity or availability of data, a program, a system or information.” 18 U.S.C.
§ 1030(e)(8) (emphasis supplied). Under this clarified structure, in order for the government to
prove a violation of 1030(a)(5), it must show that the actor caused damage to a protected computer
(with one of the listed mental states), and that the actor’s conduct caused either loss exceeding
$5,000, impairment of medical records, harm to a person, or threat to public safety. 18 U.S.C.
§ 1030(a)(5)(B).
of harms typically suffered by the victims of computer crimes, including costs of responding to
the offense, conducting a damage assessment, restoring the system and data to their condition
prior to the offense, and any lost revenue or costs incurred because of interruption of service.
Amendments: Amendments in Section 814 codify the appropriately broad definition of loss
adopted in Middleton. 18 U.S.C. § 1030(e)(11).
Appendix D
and records that are merely computer-stored. See People v. Holowko, 486 N.E.2d 877, 878–79 (Ill.
1985). The difference hinges upon whether a person or a machine created the records’ contents.
Computer-stored records refer to documents that contain the writings of some person or persons
and happen to be in electronic form. E-mail messages, word-processing files, and Internet chat
room messages provide common examples. As with any other testimony or documentary evidence
containing human statements, computer-stored records must comply with the hearsay rule. If the
records are admitted to prove the truth of the matter they assert, the offeror of the records must
show circumstances indicating that the human statements contained in the record are reliable
and trustworthy, see Advisory Committee Notes to Proposed Rule 801 (1972), and the records
must be authentic.
In contrast, computer-generated records contain the output of computer programs, untouched
by human hands. Login records from Internet service providers, telephone records, and ATM
receipts tend to be computer-generated records. Unlike computer-stored records, computer-gen-
erated records do not contain human “statements,” but only the output of a computer program
designed to process input following a defined algorithm. Of course, a computer program can
direct a computer to generate a record that mimics a human statement: an e-mail program can
announce “You’ve got mail!” when mail arrives in an inbox, and an ATM receipt can state that
$100 was deposited in an account at 2:25 pm. However, the fact that a computer, rather than a
human being, has created the record alters the evidentiary issues that the computer-generated
records present. See, e.g., 2 J. Strong, McCormick on Evidence §294, at 286 (4th ed. 1992). The
evidentiary issue is no longer whether a human’s out-of-court statement was truthful and accu-
rate (a question of hearsay), but instead whether the computer program that generated the record
was functioning properly (a question of authenticity). See id.; Richard O. Lempert & Steven A.
Saltzburg, A Modern Approach to Evidence 370 (2d ed. 1983); Holowko, 486 N.E.2d at 878–79.
Finally, a third category of computer records exists: some computer records are both com-
puter-generated and computer-stored. For example, a suspect in a fraud case might use a spread-
sheet program to process financial figures relating to the fraudulent scheme. A computer record
containing the output of the program would derive from both human statements (the suspect’s
input to the spreadsheet program) and computer processing (the mathematical operations of the
spreadsheet program). Accordingly, the record combines the evidentiary concerns raised by com-
puter-stored and computer-generated records. The party seeking the admission of the record
should address both the hearsay issues implicated by the original input and the authenticity
issues raised by the computer processing.
As the federal courts develop a more nuanced appreciation of the distinctions to be made
between different kinds of computer records, they are likely to see that the admission of computer
records generally raises two distinct issues. First, the government must establish the authenticity
of all computer records by providing “evidence sufficient to support a finding that the matter in
question is what its proponent claims.” Fed. R. Evid. 901(a). Second, if the computer records are
computer-stored records that contain human statements, the government must show that those
human statements are not inadmissible hearsay.
A. Authentication
Before a party may move for admission of a computer record or any other evidence, the proponent
must show that it is authentic. That is, the government must offer evidence “sufficient to support
a finding that the [computer record or other evidence] in question is what its proponent claims.”
Fed. R. Evid. 901(a). See United States v. Simpson, 152 F.3d 1241, 1250 (10th Cir. 1998).
c526367 AppD.qxd 3/21/03 3:40 PM Page 283
The standard for authenticating computer records is the same as for authenticating other
records. The degree of authentication does not vary simply because a record happens to be (or has
been at one point) in electronic form. See United States v. DeGeorgia, 420 F.2d 889, 893 n.11 (9th
Cir. 1969); United States v. Vela, 673 F.2d 86, 90 (5th Cir. 1982). But see United States v. Scholle,
553 F.2d 1109, 1125 (8th Cir. 1977) (stating in dicta that “the complex nature of computer storage
calls for a more comprehensive foundation”). For example, witnesses who testify to the authentic-
ity of computer records need not have special qualifications. The witness does not need to have
programmed the computer himself, or even need to understand the maintenance and technical
operation of the computer. See United States v. Moore, 923 F.2d 910, 915 (1st Cir. 1991) (citing
cases). Instead, the witness simply must have first-hand knowledge of the relevant facts to which
he or she testifies. See generally United States v. Whitaker, 127 F.3d 595, 601 (7th Cir. 1997) (FBI
agent who was present when the defendant’s computer was seized can authenticate seized files)
United States v. Miller, 771 F.2d 1219, 1237 (9th Cir. 1985) (telephone company billing supervisor
can authenticate phone company records); Moore, 923 F.2d at 915 (head of bank’s consumer loan
department can authenticate computerized loan data).
Challenges to the authenticity of computer records often take one of three forms. First, parties
may challenge the authenticity of both computer-generated and computer-stored records by ques-
tioning whether the records were altered, manipulated, or damaged after they were created.
Second, parties may question the authenticity of computer-generated records by challenging the
reliability of the computer program that generated the records. Third, parties may challenge the
authenticity of computer-stored records by questioning the identity of their author.
security system was feasible.”). Id. at 559. This is consistent with the rule used to establish the
authenticity of other evidence such as narcotics. See United States v. Allen, 106 F.3d 695, 700 (6th
Cir. 1997) (“Merely raising the possibility of tampering is insufficient to render evidence inadmis-
sible.”). Absent specific evidence of tampering, allegations that computer records have been
altered go to their weight, not their admissibility. See Bonallo, 858 F.2d at 1436.
will also lay the foundation to establish the record’s authenticity. Evidence that a computer pro-
gram is sufficiently trustworthy so that its results qualify as business records according to Fed. R.
Evid. 803(6) also establishes the authenticity of the record. Compare United States v. Saputski,
496 F.2d 140, 142 (9th Cir. 1974).
B. Hearsay
Federal courts have often assumed that all computer records contain hearsay. A more nuanced
view suggests that in fact only a portion of computer records contain hearsay. When a computer
record contains the assertions of a person, whether or not processed by a computer, the record
can contain hearsay. In such cases, the government must fit the record within a hearsay exception
such as the business records exception, Fed. R. Evid. 803(6). When a computer record contains
only computer-generated data untouched by human hands, however, the record cannot contain
hearsay. In such cases, the government must establish the authenticity of the record, but does not
need to establish that a hearsay exception applies for the records to be admissible.
c526367 AppD.qxd 3/21/03 3:40 PM Page 286
the behest of the FBI and with the knowledge that any information it supplied would be used in an
ongoing criminal investigation. . . . In finding this report inadmissible under Rule 803(6), we
adhere to the well-established rule that documents made in anticipation of litigation are inadmis-
sible under the business records exception. Id. at 670. See also Fed. R. Evid. 803(6) (stating that
business records must be “made . . . by, or transmitted by, a person”).
Fortunately, the Blackburn court ultimately affirmed the conviction, concluding that the com-
puter printout was sufficiently reliable that it could have been admitted under the residual
hearsay exception, Rule 803(24). See id. at 672. However, instead of flirting with the idea of
excluding the printouts because Rule 803(6) did not apply, the court should have asked whether
the computer printout from the lens-testing machine contained hearsay at all. This question
would have revealed that the computer-generated printout could not be excluded on hearsay
grounds because it contained no human “statements.”
witness”) that the ISP regularly maintains customer account records for billing and other pur-
poses, and that the records to be offered for admission are such records that were made at or near
the time of the events they describe in the regular course of the ISP’s business. Again, the key is
establishing that the computer system from which the record was obtained is maintained in the
ordinary course of business, and that it is a regular practice of the business to rely upon those
records for their accuracy.
The business record exception is the most common hearsay exception applied to computer
records. Of course, other hearsay exceptions may be applicable in appropriate cases. See, e.g.,
Hughes v. United States, 953 F.2d 531, 540 (9th Cir. 1992) (concluding that computerized IRS
forms are admissible as public records under Fed. R. Evid. 803(8)).
C. Other Issues
The authentication requirement and the hearsay rule usually provide the most significant hurdles
that prosecutors will encounter when seeking the admission of computer records. However, some
agents and prosecutors have occasionally considered two additional issues: the application of the
best evidence rule to computer records, and whether computer printouts are “summaries” that
must comply with Fed. R. Evid. 1006.
Appendix E
Glossary
Audit Examination and/or assessment of actions and records to ensure compliance with policies
and operational procedures. If problems are found, recommendations are made to change policies
or procedures.
Audit Trail A chronological record showing who has accessed a computer system and what opera-
tions were performed during specific time periods. This typically includes file access, user login,
and whether any actual or attempted security violations have occurred.
Authentication The process of verifying that an individual or data really is who or what it is pro-
claimed to be. It is often used as a prerequisite for permitting access to resources in a system.
Backdoor A hole in the security of a computer system deliberately left in place by authorized pro-
grammers or repair personnel, but these can also be left behind by malicious intruders to get back
into a system after having breached it once. Synonymous to a trap door, which is a hidden soft-
ware or hardware apparatus used to circumvent security mechanisms.
Backup A copy of files and programs made to facilitate recovery of lost or corrupted data, if
necessary.
Breach Any prohibited penetration or unauthorized access to a computer system that causes
damage or has the potential to cause damage.
Business Continuity Plan (BCP) A predetermined set of procedures or directives that describe how
an organization’s business functions will continue during and after a system disruption.
Chain-of-Custody Protection of evidence by all individuals with access to ensure against loss,
breakage, alteration, or unauthorized handling. This includes accurately identifying, securing,
and dating all evidence.
Computer Incident Response Team A group of technical investigators and security engineers that
responds to and investigates computer security incidents.
289
c526367 AppE.qxd 3/21/03 3:40 PM Page 290
Computer Security Incident An adverse event wherein some aspect of a computer system is
threatened for example, loss of data confidentiality, disruption of data or system integrity, and
disruption or denial of availability.
Copy The result or action of reading electronic data from a source, leaving that data unchanged,
and writing the same data elsewhere on a medium that may differ from the source.
Cracker An individual who intentionally breaches computer security (usually by using a pass-
word-cracking tool) to infiltrate a computer or network, most often with malicious intent.
Database A collection of information data consisting of at least one file, usually stored in one
location, which may be available to several users simultaneously for various applications.
Denial of Service (DoS) The inability to use system resources due to unavailability stemming
from a variety of causes for example, infiltrations by hackers, the flooding of IP addresses from
external messages, and network worms.
Disaster Recovery Plan A plan (in written form) outlining steps and procedures to be followed
in the event of a major hardware or software failure or destruction of facilities (unlike the
Business Continuity Plan, which focuses primarily on maintaining and regaining normal business
operations).
Discoverable Data Electronic data that can be obtained by an opponent in a litigation process.
Distributed Denial of Service (DDoS) Denial of Service attempts involving multiple Internet-
connected systems launching or being used in attacks against one or more target systems.
Electronic Records Information stored in a format that can only be read and processed by a
computer.
Encryption A technique for scrambling data to prevent unauthorized users from reading or tam-
pering with that data. The data can include messages, files, folders, or disks, and only those with a
password or key can decrypt and use the data.
Enhanced Metafile (EMF) In the Windows operating system, the 32-bit spool file format used in
printing. The EMF format was created to solve the deficiencies of the original Windows Metafile
format in printing graphics from sophisticated graphics programs.
Event A discernible episode or phase of a computer incident investigation that can be documented,
verified, and analyzed.
c526367 AppE.qxd 3/21/03 3:40 PM Page 291
Event Viewer In Windows NT, a utility used to display event logs. With Event Viewer, users can
monitor events recorded in the Application, Security, and System logs.
File Allocation Table An MS-DOS file system located in the boot sector of the disk that stores the
addresses of all files contained on a disk.
File Sharing The sharing of computer data, usually within a network, with users having varying
degrees of access privileges. Users may be able to view, write to, modify, or print information to or
from the shared file.
Firewall Hardware and software devices designed to thwart unauthorized connections to or from
a computer (or network). Firewalls enforce an organization’s network access policies by examin-
ing and evaluating Internet connections as they pass through the firewall.
Forensic Analysis The examination of materials and information to determine their vital features
to discover evidence in a manner that is admissible in a court of law.
Hoax Usually transmitted through e-mail, a hoax contains a message to send the alert to as many
others as possible. Though they are not viruses, hoaxes may cause work disruption through false
scares or provoke a Denial of Service through their proliferation by overloading the e-mail system.
Honeypot A lure set up to trap hackers and users with malicious intent as they attempt to gain
entry into a computer system.
Incident An adverse computer security event or series of events that affects the organization’s
computer security and/or its ability to do business.
Incident Handling The action or actions taken to resolve a computer security incident.
Incident Oversight The ongoing surveillance of networks and systems to uncover deficiencies in
security and take action before incidents can occur.
Incident Reporting The formal acknowledgement that a computer security incident has been
detected.
Incident Response The process of analyzing a security incident how it was able to occur and how
to prevent similar incidents from occurring in the future.
c526367 AppE.qxd 3/21/03 3:40 PM Page 292
Incident Response Plan A documented plan of action directives and procedures for identifying,
countering, and mitigating the damages resulting from malicious attacks against an organiza-
tion’s computer systems.
Intruder A person who is the perpetrator of a computer security incident often referred to as
hackers or crackers (see “Hacker” above). An intruder is a vandal who may be operating from
within the boundaries of an organization or attacking it from the outside.
Intrusion Detection System A security mechanism that monitors and analyzes system events to
provide near real-time warnings to unauthorized access to system resources or to archive log and
traffic information for later analysis.
Level of Consequence The impact an incident has on an organization, including loss of data, neg-
ative consequences to the organization (for example, damage to reputation), and the magnitude of
damage that must be corrected.
Local Area Network (LAN) A group of computers and other network devices that exist in a limited
area such as a single building. These devices are connected by a special communications link that
permits any device to interact with any other device over the network.
Login The act of connecting to a computer system (or network) by a user, usually after entering a
password and user ID.
Malicious Code Programming code designed to damage a computer system or data contained on
a system. It is traditionally classified into three categories: viruses, worms, and Trojan horses,
based upon the behavior of the code.
Media Various formats used for recording electronic data, including disks, film, computer tapes,
and paper.
Misuse The use or exploitation of a computer by an unsanctioned user (either an insider or intruder).
Need-to-Know Basis The need for access to, knowledge of, or possession of sensitive information
in order to carry out required, authorized duties.
Network Port Scanning The process of probing selected service port numbers (for example,
NetBIOS -139, FTP -21, and so on) over an IP network with the purpose of identifying available
network services on that system. Network port scanning is an information-gathering process
often helpful for troubleshooting system problems or tightening system security, but it’s often
performed as a prelude to an attack.
c526367 AppE.qxd 3/21/03 3:40 PM Page 293
New Technology File System (NTFS) The file system used with the Windows NT operating system
for storing and retrieving files on a hard disk.
Packet Sniffer A program or device that captures and analyzes data that travels between networked
computers.
Password A unique sequence of characters that a user types as an authentication code to gain
access to computers and/or sensitive files.
Penetration Testing The attempt to discern the level of security that is protecting a system or net-
work. Such testing includes trying to evade security measures using the same tools and tech-
niques that a potential attacker might use. Penetration testing may be used by a company to
identify and correct security weaknesses.
Physical Security The procedures used by an organization to ensure that material (physical)
resources are protected from both deliberate and unintentional threats.
Port A connecting point (gateway or portal) between a computer and another device. Identified by
numbers ranging from zero to 65,536, ports enable the establishment of a session between a host
and a Web server for network services. Popular services have reserved port numbers: TELNET is at
port 23, and HTTP is at port 80, for example. Ports are usually targeted for attack by hackers and
Trojan horses in order to gain access to a computer system.
Print Spooler File The print spooler is an executable file that manages the printing process and is
responsible for scheduling the print job for printing.
Promiscuous Mode When an Ethernet interface reads all information regardless of its destina-
tion. This is the opposite of normal mode, when the interface reads packets destined for itself only.
Recordkeeping Managing records electronic or otherwise beginning with their inception (or
receipt) through their distribution, processing, and storage to their final destination.
Registry In the Windows operating system, the site where information is kept.
Risk Assessment Determining the efficacy of the security procedures provided for a system or
network. Risk assessment evaluates the likelihood of threats occurring and attempts to estimate
the degree of losses that may be expected by the organization.
Rootkit A collection of software tools that permits a hacker to set up a backdoor into a computer
system. Rootkits collect information about other systems on the network while disguising the fact
that the system is compromised. Rootkits are a classic example of Trojan horse software and are
available for a wide range of operating systems.
SATAN (Security Administrator Tool for Analyzing Networks) A freeware program that remotely
probes networks to identify weaknesses in system security.
c526367 AppE.qxd 3/21/03 3:40 PM Page 294
Script Kiddies Inexperienced, sometimes immature, rookie hackers with little training in mali-
cious code writing and execution who nevertheless seek out and exploit computer security vul-
nerabilities, often using well-known, easy-to-find scripts and programs.
Security Audit An authorized investigation of a computer system to identify its inadequacies and
vulnerabilities.
Security Policies An organization’s documented set of laws, regulations, and directives that stan-
dardizes how the organization controls, guards, and distributes sensitive data.
Slack File Space The empty data storage space that exists from the end of a computer file to the
end of the last cluster assigned to that file.
Social Engineering A hacking technique that relies on weaknesses in people rather than software
with the aim of tricking people into revealing passwords or other information that compromises a
target system’s security.
Steganography The hiding of a covert message within an ordinary message that is decoded at its
destination by the recipient. That the message contains an inserted hidden message remains
unknown to (and therefore undetected by) anyone viewing it who has not been made aware of its
presence.
Suspicious Activity Network traffic patterns that lie outside the usual definitions of standard traf-
fic and which might indicate unauthorized activity on the network.
Swap File Space on a hard disk that is used to extend a computer’s memory. Files not used recently
are temporarily stored on the hard disk, leaving room for new files.
Threat A condition or event that has the potential to cause harm to an organization, its person-
nel, or its property, including computer system resources. Threats include the damage, disclosure,
or alteration of data, as well as Denial of Service attacks, fraud, and other abuses. Network security
threats include impersonation of authorized personnel, eavesdropping, Denial of Service, and
packet modification.
Traceroute A Unix/Linux tool that traces (identifies) the route taken by data packets as they
traverse (hop) across a network connection between two hosts and displays the time and location
of the route taken to reach the destination computer. In Windows, this same utility is known as
tracert.
Trojan Horse A useful and seemingly innocent program containing additional hidden code that
allows the unauthorized collection, exploitation, falsification, or destruction of data. A Trojan
horse performs some unexpected or unauthorized (usually malicious) actions, such as displaying
messages, erasing files, or formatting a disk. A Trojan horse doesn’t infect other host files, thus
cleaning is not necessary.
c526367 AppE.qxd 3/21/03 3:40 PM Page 295
Unallocated File Space Space left behind from an erased file, which may still harbor data.
Unallocated file space may contain a number of files valuable to a forensic investigation such as
intact files, remnants of files, subdirectories, and temporary files created and deleted by computer
applications and the operating system.
Vendor Producer of hardware or software applications that are associated with computer tech-
nology (routers, operating systems, computers, and switches, for example).
Virus A malicious, self-replicating (or in some instances, executable) program with the potential
to leave a computer or entire network inoperable. A virus attaches itself and spreads to files, pro-
grams, e-mail messages, and other storage media and may drain system resources (disk space,
connections, and memory) and modify or wipe out files or display messages.
Vulnerability Scanning The practice of scanning for and identifying known vulnerabilities of
computing systems on a computer network. Since vulnerability scanning is an information-
gathering process, when performed by unknown individuals it is considered a prelude to attack.
Web Cache Web caching is a technique to improve Web browser performance by storing fre-
quently requested Web pages, images, and other Web objects in a special location on the user’s
hard drive for faster access. On subsequent requests for the same object, the cache delivers the
object from its storage rather than passing the request on to the origin server.
Worm A computer worm is a self-contained program (or set of programs) that is able to spread
functional copies of itself or its segments to other computer systems. The propagation usually
takes place via network connections or e-mail attachments.
c526367 AppE.qxd 3/21/03 3:40 PM Page 296
d526367 Index.qxd 3/21/03 3:40 PM Page 297
Index
A print spooler files, 129-130
quarantine and containment, 156
Acceptable Usage Policy. See AUP
audit mechanisms, 157
access control lists, Windows XP, 165-167
determining risk of continuing operations,
AccessData Forensic Toolkit, 117, 146
156
acquisition of digital evidence, 2-4
file-sharing issues, 160-167
admissibility of evidence, 150
preserving integrity, 157
authentication, 151-152
severing network and Internet
best evidence rule, 152-153
connections, 159-160
examining seized computers, 153
user-detected technical vulnerabilities, 157
Frye test, 152
Vulnerability Reporting Form, 157-159
preservation, 153
real-mode forensics boot disks, 141
chain-of-custody, 61-63, 149-150
FAT, 142
custom forensic toolkits, 146-147
Linux, 143-144
e-mail, 123
Windows, 142-143
deleted e-mail, retrieving, 125-126
TCT (Coroner’s Toolkit), 147-149
finding, 124-125
Web browser caching, 126
hidden data, 130
locating browser history evidence, 127-128
password-protected compressed data,
locating Web cache evidence, 128-129
131-132
Windows swap files, 121
steganography, 130-131
locating files, 121-122
keyword searches, 116
viewing contents of swap/page files, 123
BinText, 117
acts
Disk Investigator, 117
Cable, 271
Encase keyword-searching program, 117
Computer Abuse Amendments Act of 1994,
Forensic Toolkit keyword-searching
42-43
program, 117
Computer Fraud and Abuse Act of 1986, 39-42
freeware utilities, 117
Computer Security Act of 1997, 171
hard drive examinations, 120
Crime Control and Safe Streets Act, 28
Maresware Suite keyword-searching
ECPA (Electronic Communications Privacy
program, 117
Act), 29
SectorSpyXP, 117-119
FOIA (Freedom of Information Act), 30
order of volatility, 140-141
HIPAA (Health Insurance Portability and
packet sniffers, 144-146
Accountability Act of 1996), 228-232
postcompromise, 135
USA Patriot Act of 2001, 43-44, 269
legal requirements, 136
authority to intercept voice
logon banners, 136-139
communications in computer hacking
order of collection, 139-140
investigations, 269
297
d526367 Index.qxd 3/21/03 3:40 PM Page 298
298 Index
Index 299
300 Index
best evidence rule, 288, 152-153 USA Patriot Act of 2001, 269
BIA (Business Impact Analysis), 64 authority to intercept voice
Binary value (Windows Registry keys), 71 communications in computer hacking
BinText (Foundstone, Inc.), 117 investigations, 269
BioNet Systems, LLC NetNanny, 209 Cable Act, 271-272
BIOS communications of computer trespasses,
Parameter Block. See BPB interception, 275-276
setup program, 80 cybersecurity forensic capabilities, 280
blocks, ext2 file system, 87 defense to civil actions relating to
boot disks, creating real-mode boot disks, 141 preserving records, 280
FAT, 142 deterrence of cyberterrorism, 277-280
Linux, 143-144 emergency disclosures by communications
Windows, 142-143 providers, 272-273
BPB (BIOS Parameter Block), 82 nationwide search warrants for e-mail,
Branches, Windows Registry Editor, 70-71 276
breaches of security pen register, 273-275
reporting to law enforcement, 30 subpoenas for electronic evidence,
private sector organizations, 32-33 270-271
rationale for not reporting intrusions, 31 trap and trace statute, 273-275
Business Impact Analysis (BIA), 64 voice-mail communications, 270
businesses CD-ROM (accompanying book), 247
anticipating future attacks, 191-194 components of, 249-252
continuity and contingency planning, 63-68 eBook version of incident response, 255
disaster recovery planning, 179 Linux, 248-249
developing a plan, 180-181 requirements, 247
sample contingency disaster recover plan, software, 252-254
181-183 troubleshooting, 255
Windows, 248
C CD-Rs, 81
CD-RWs (rewritable CDs), 81
Cable Act, 271
CDP (Columbia Data Products, Inc.), 61
CacheMonitor II, 129
CDs (compact discs), 81
caching
Centers for Medicare & Medicaid Services. See
Web browsers, 126
CMS
locating browser history evidence,
CERT (Computer Emergency Response Team),
127-128
232
locating Web cache evidence, 128-129
chain-of-custody, evidence collection, 61-63,
Cain & Abel v2.5 beta20, 131
149-150
Carnivore system, 144
chief information officers. See CIOs
CCIPS (Computer Crime and Intellectual Property
CIFS/SMB (Common Internet File System/Server
Section), 281-288
Messaging Block), 221
authentication, 282-285
hearsay, 285-288
d526367 Index.qxd 3/21/03 3:40 PM Page 301
Index 301
302 Index
Computer Fraud and Abuse Act of 1986, 39-42 Coroner’s Toolkit. See TCT
Computer Management tool (Windows), Corporate Evidence Processing Suite (New
monitoring unauthorized user accounts, 8 Technologies, Inc.), 146
Computer Security Act of 1997, 171 crash commands (Unix), 58
computer security awareness, 171 Crime Control and Safe Streets Act, 28
Computer Security Act of 1997, 171 crime investigations, information sharing issues,
multimedia documentation, 172 33-34
Constitution, Fourth Amendment, 28-30, 138-139 criminal offenses, inappropriate computer use,
containment of evidence, 156 203
audit mechanisms, 157 cryptography, 131
computer incident response team, 19-20 custom forensic toolkits, collecting evidence,
determining risk of continuing operations, 156 146-147
file-sharing issues, 160 customer support team (recovery team), 183
configuring Windows, 161-162 CyberPatrol (Surf Patrol), 209
disabling file and print sharing, 167
Windows XP, 162-167 D
malicious code response, 202
damage analysis, computer incident response
preserving integrity, 157
team, 20
preventing workers from viewing
data backup procedures, 187
inappropriate material, 208-210
creating a plan, 188
CyberPatrol, 209
differential backups, 188
Net Nanny, 209
freeware tools, 188
severing network and Internet connections,
incremental backups, 188
159-160
normal backups, 188
user-detected technical vulnerabilities, 157
Windows, 189-190
Vulnerability Reporting Form, 157-159
data collection
contingency planning
preliminary response, 55
business planning, 63
memory dump files, 56-59
IT contingency-planning process, 63-68
order of volatility, 56
sample disaster recover plan, 181-183
preparing operating systems, 45
assumptions, 181
auditing and logging procedures, 46,
data processing/business environment
49-51
description, 181
centralized logging, 51-52
disaster recognition course of actions, 181
enabling auditing and logging on
emergency response procedures, 183
Windows, 47-49
emergency telephone list, 183
log files, 46
maintaining the plan, 183
Registry Editor (Windows), 73
recovery teams, 181-183
InCntrl5 utility, 73-74
continuity, business continuity and contingency
Regmon utility, 73-74
planning, 63-68
volatile data, 73
Control Panel (iProtectYou), 210
data objects, 2
d526367 Index.qxd 3/21/03 3:40 PM Page 303
Index 303
304 Index
Index 305
306 Index
Index 307
308 Index
Index 309
310 Index
Index 311
312 Index
Index 313
personnel, computer incident response team, 17 preparing operating systems for data
assessment and containment, 19-20 collection, 45
damage analysis and determination, 20 auditing and logging procedures, 46-51
damage shutdown procedures, 21 centralized logging, 51-52
recovery operations, 20 enabling auditing and logging on
reporting process, 18-19 Windows, 47-49
securing a scene, 18 log files, 46
physical items, 2 time synchronization, 52-53
pits, CD technology, 81 Automachron, 53
Plan Appendices phase (IT contingency plans), 66 NIST Internet Time Service, 53
Pochron, David M., 129 NTP (Network Time Protocol), 52
policies World Time, 53
assessing security systems, 215-217 time-stamping, 53-54
audit checklists, 217-218 preparing for incidents, 45
goals, 216 business continuity and contingency
overview of audit process, 218-219 planning, 63-68
statements, IT contingency-planning process, chain-of-custody for evidence collection, 61-63
63-64 collecting data from memory, 55
ports memory dump files, 56-59
access entry, hacker incidents, 196 order of volatility, 56
commonly attacked ports, 257-267 data collection, 45
intrusion detection, 13 auditing and logging procedures, 46, 49-51
PortScan, 225-226 centralized logging, 51-52
postcompromise evidence collection, 135, enabling auditing and logging on
190-191 Windows, 47-49
legal requirements, 136 log files, 46
logon banners, 136 developing response capability, 16
Unix/Linux installation, 137-139 alert mechanisms, 17
Windows 2000/XP installation, 137 centralization, 17
Windows NT installation, 136 incident response team, 17-21
order of collection, 139-140 structure, 17
preliminary response, 45 identifying network devices, 54-55
business continuity and contingency imaging hard drives, 59-61
planning, 63-68 security plans, 15
chain-of-custody for evidence collection, centralization, 16
61-63 efficient response, 16
collecting data from memory, 55 enhanced user awareness, 16
memory dump files, 56-59 threat factors, 14-15
order of volatility, 56 time synchronization, 52-53
identifying network devices, 54-55 Automachron, 53
imaging hard drives, 59-61 NIST Internet Time Service, 53
d526367 Index.qxd 3/21/03 3:40 PM Page 314
314 Index
Index 315
316 Index
Index 317
318 Index
Index 319
sexual harassment, inappropriate computer use, staff notification, malicious code response, 202
203-205 standby UPS versus continuous UPS, 186-187
avoiding lawsuits, 205-206 startup folders, monitoring system for
policies on sexual harassment, 206-208 intrusion, 11
Share Permissions Tab (Windows XP), 165 steganography, 130-131
Shared Documents folder (Windows XP), 163 Stegdetect, 131
shared medium networks, Ethernet, 144 storage media, 3, 78, 183-184
shareware, Windows backup procedures, 78 CD-ROMs, 80-81
Sharing and Security Options tab (Disk Properties floppy disks, 79-80
for Windows XP), 162 hard disks, 78-79
Shugart, Alan, 79 Unix/Linux, 87-88
shutdown procedures, computer incident String value (Windows Registry keys), 71
response team, 21 strip_tct_home program (TCT), 148
Simple File Sharing feature (Windows XP), structure
163-165 computer incident response capability, 17
SLAs (service-level agreements), 65 Registry Editor (Windows), 70-72
small memory dumps, 57 subkeys, Windows Registry Editor, 70
SnapBack DatArrest (CDP), 61 summaries of voluminous evidence, 288
Snort, 144 SuperScan (Foundstone, Inc.), 13
software Support Information phase (IT contingency
CD-ROM accompanying book, 252-255 plans), 66
freeware Surf Patrol CyberPatrol, 209
CacheMonitor II, 129 swap files (Windows), 121
Cain & Abel v2.5 beta20, 131 locating files, 122
data backup tools, 188 viewing contents of swap/page files, 123
iProtectYou, 209-210 synchronization, 52-53
keyword-searching programs, 117-119 sysdump command (Unix), 58-59
Nessus, 173 System Administration, Networking, and Security
NetBrute Scanner, 225 Institute. See SANS
Snort, 144 System State backup
Ultimate ZIP Cracker, 131-132 Windows 2000, 75-76
Windows backup and restore Windows XP, 77-78
procedures, 78
ZIP Password Finder, 131 T
in-house penetration testing, 225-226
TCT (Coroner’s Toolkit), 147
Soloway, Kevin, 117
Grave-robber, 148-149
SomarSoft DumpSec, 9
programs, 147-148
special projects team (recovery team), 182
technical support team (recovery team), 182
Spitzner, Lance, 232
technology, CDs, 81
spooling, retrieving print spooler files, 129-130
d526367 Index.qxd 3/21/03 3:40 PM Page 320
320 Index
Index 321
unauthorized applications, monitoring system for UPS (uninterruptible power supplies), 64-65, 186
intrusion, 9 benefits, 187
examining Windows Registry, 9-11 continuous versus standby UPS, 186-187
invalid services, 10 purchasing, 187
network configurations, 13 USA Patriot Act of 2001, 4, 43-44, 269
program file alterations, 13 authority to intercept voice communications
startup folders, 11 in computer hacking investigations, 269
unusual ports, 13 Cable Act, 271-272
unauthorized user accounts, 8 communications of computer trespasses,
checking log files, 9 interception, 275-276
invalid user rights, 9 cybersecurity forensic capabilities, 280
monitoring with computer management tool defense to civil actions relating to preserving
(Windows), 9 records, 280
uninterruptible power supplies. See UPS deterrence of cyberterrorism, 277-280
Uniting and Strengthening America by Providing emergency disclosures by communications
Appropriate Tools Required to Intercept providers, 272-273
and Obstruct Terrorism Act of 2001 (USA nationwide search warrants for e-mail, 276
Patriot Act of 2001) pen register, 273-275
authority to intercept voice communications subpoenas for electronic evidence, 270-271
in computer hacking investigations, 269 trap and trace statute, 273-275
Cable Act, 271-272 voice-mail communications, 270
communications of computer trespasses, user accounts
interception, 275-276 checking log files, 9
cybersecurity forensic capabilities, 280 enhanced user awareness, 16
defense to civil actions relating to preserving invalid user rights, 9
records, 280 unauthorized applications, 9
deterrence of cyberterrorism, 277-280 examining Windows Registry, 9-11
emergency disclosures by communications inspecting network configurations, 13
providers, 272-273 invalid services, 10
nationwide search warrants for e-mail, 276 monitoring system startup folders, 11
pen register, 273-275 program file alterations, 13
subpoenas for electronic evidence, 270-271 unusual ports, 13
trap and trace statute, 273-275 user ID trust, 168-169
voice-mail communications, 270 User Manager tool (Windows NT), 8
Unix user rights
crash commands, 58 logon banners, 136
data storage, 87-88 Unix/Linux installation, 137-139
logon banner installation, 137-139 Windows 2000/XP installation, 137
sysdump command, 58-59 Windows NT installation, 136
Tripwire, 14 monitoring for validity, 9
user-detected technical vulnerabilities, 157
d526367 Index.qxd 3/21/03 3:40 PM Page 322
322 Index
Index 323
1. License Grant. WPI grants to you (either an individual or entity) a nonexclusive license to use one
copy of the enclosed software program(s) (collectively, the “Software,” solely for your own per-
sonal or business purposes on a single computer (whether a standard computer or a workstation
component of a multi-user network). The Software is in use on a computer when it is loaded into
temporary memory (RAM) or installed into permanent memory (hard disk, CD-ROM, or other
storage device). WPI reserves all rights not expressly granted herein.
2. Ownership. WPI is the owner of all right, title, and interest, including copyright, in and to the
compilation of the Software recorded on the disk(s) or CD-ROM “Software Media”. Copyright to
the individual programs recorded on the Software Media is owned by the author or other autho-
rized copyright owner of each program. Ownership of the Software and all proprietary rights relat-
ing thereto remain with WPI and its licensers.
3. Restrictions On Use and Transfer.
(a) You may only (i) make one copy of the Software for backup or archival purposes, or (ii) trans-
fer the Software to a single hard disk, provided that you keep the original
for backup or archival purposes. You may not (i) rent or lease the Software, (ii) copy or repro-
duce the Software through a LAN or other network system or through any computer sub-
scriber system or bulletin-board system, or (iii) modify, adapt, or create derivative works based
on the Software.
(b) You may not reverse engineer, decompile, or disassemble the Software. You may transfer the
Software and user documentation on a permanent basis, provided that the transferee agrees to
accept the terms and conditions of this Agreement and you retain no copies. If the Software is
an update or has been updated, any transfer must include the most recent update and all prior
versions.
4. Restrictions on Use of Individual Programs. You must follow the individual requirements and
restrictions detailed for each individual program in the About the CD-ROM appendix of this Book.
These limitations are also contained in the individual license agreements recorded on the
Software Media. These limitations may include a requirement that after using the program for a
specified period of time, the user must pay a registration fee or discontinue use. By opening the
Software packet(s), you will be agreeing to abide by the licenses and restrictions for these individ-
ual programs that are detailed in the About the CD-ROM appendix and on the Software Media.
None of the material on this Software Media or listed in this Book may ever be redistributed, in
original or modified form, for commercial purposes.
e526367 EULA.qxd 3/21/03 3:40 PM Page 332
5. Limited Warranty.
(a) WPI warrants that the Software and Software Media are free from defects in materials and
workmanship under normal use for a period of sixty (60) days from the date of purchase of this
Book. If WPI receives notification within the warranty period of defects in materials or work-
manship, WPI will replace the defective Software Media.
(b) WPI AND THE AUTHOR OF THE BOOK DISCLAIM ALL OTHER WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING WITHOUT LIMITATION IMPLIED WARRANTIES OF MERCHANTABIL-
ITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH RESPECT TO THE SOFTWARE,
THE PROGRAMS, THE SOURCE CODE
CONTAINED THEREIN, AND/OR THE TECHNIQUES DESCRIBED IN THIS BOOK. WPI DOES
NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET YOUR
REQUIREMENTS OR THAT THE OPERATION OF THE SOFTWARE WILL BE ERROR FREE.
(c) This limited warranty gives you specific legal rights, and you may have other rights that vary
from jurisdiction to jurisdiction.
6. Remedies.
(a) WPI’s entire liability and your exclusive remedy for defects in materials and workmanship shall
be limited to replacement of the Software Media, which may be returned to WPI with a copy of
your receipt at the following address: Software Media Fulfillment Department, Attn.: Incident
Response: Computer Forensics Toolkit, Wiley Publishing, Inc., 10475 Crosspoint Blvd.,
Indianapolis, IN 46256, or call 1-800-762-2974. Please allow four to six weeks for delivery. This
Limited Warranty is void if failure of the Software Media has resulted from accident, abuse, or
misapplication. Any replacement Software Media will be warranted for the remainder of the
original warranty period or thirty (30) days, whichever is longer.
(b) In no event shall WPI or the author be liable for any damages whatsoever (including without
limitation damages for loss of business profits, business interruption, loss of business informa-
tion, or any other pecuniary loss) arising from the use of or inability to use the Book or the
Software, even if WPI has been advised of the possibility of such damages.
(c) Because some jurisdictions do not allow the exclusion or limitation of liability for consequen-
tial or incidental damages, the above limitation or exclusion may not apply to you.
7. U.S. Government Restricted Rights. Use, duplication, or disclosure of the Software for or on
behalf of the United States of America, its agencies and/or instrumentalities “U.S. Government” is
subject to restrictions as stated in paragraph (c)(1)(ii) of the Rights in Technical Data and
Computer Software clause of DFARS 252.227-7013, or subparagraphs (c) (1) and (2) of the
Commercial Computer Software - Restricted Rights clause at FAR 52.227-19, and in similar
clauses in the NASA FAR supplement, as applicable.
8. General. This Agreement constitutes the entire understanding of the parties and revokes and
supersedes all prior agreements, oral or written, between them and may not be modified or
amended except in a writing signed by both parties hereto that specifically refers to this
Agreement. This Agreement shall take precedence over any other documents that may be in con-
flict herewith. If any one or more provisions contained in this Agreement are held by any court or
tribunal to be invalid, illegal, or otherwise unenforceable, each and every other provision shall
remain in full force and effect.
f526367 GPL.qxd 3/21/03 3:40 PM Page 333
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public License is intended to guarantee your freedom to share and
change free software — to make sure the software is free for all its users. This General Public
License applies to most of the Free Software Foundation’s software and to any other program
whose authors commit to using it. (Some other Free Software Foundation software is covered by
the GNU Library General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public
Licenses are designed to make sure that you have the freedom to distribute copies of free software
(and charge for this service if you wish), that you receive source code or can get it if you want it,
that you can change the software or use pieces of it in new free programs; and that you know you
can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these
rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities
for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must
give the recipients all the rights that you have. You must make sure that they, too, receive or can
get the source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license
which gives you legal permission to copy, distribute and/or modify the software.
Also, for each author’s protection and ours, we want to make certain that everyone under-
stands that there is no warranty for this free software. If the software is modified by someone else
and passed on, we want its recipients to know that what they have is not the original, so that any
problems introduced by others will not reflect on the original authors’ reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the
danger that redistributors of a free program will individually obtain patent licenses, in effect mak-
ing the program proprietary. To prevent this, we have made it clear that any patent must be
licensed for everyone’s free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
f526367 GPL.qxd 3/21/03 3:40 PM Page 334
These requirements apply to the modified work as a whole. If identifiable sections of that
work are not derived from the Program, and can be reasonably considered independent
and separate works in themselves, then this License, and its terms, do not apply to those
sections when you distribute them as separate works. But when you distribute the same
sections as part of a whole which is a work based on the Program, the distribution of the
whole must be on the terms of this License, whose permissions for other licensees extend
to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work
written entirely by you; rather, the intent is to exercise the right to control the distribu-
tion of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the
Program (or with a work based on the Program) on a volume of a storage or distribution
medium does not bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in
object code or executable form under the terms of Sections 1 and 2 above provided that
you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code,
which must be distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third
party, for a charge no more than your cost of physically performing source distribu-
tion, a complete machine-readable copy of the corresponding source code, to be dis-
tributed under the terms of Sections 1 and 2 above on a medium customarily used
for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute corre-
sponding source code. (This alternative is allowed only for noncommercial distribu-
tion and only if you received the program in object code or executable form with
such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifica-
tions to it. For an executable work, complete source code means all the source code for
all modules it contains, plus any associated interface definition files, plus the scripts used
to control compilation and installation of the executable. However, as a special exception,
the source code distributed need not include anything that is normally distributed (in
either source or binary form) with the major components (compiler, kernel, and so on)
of the operating system on which the executable runs, unless that component itself
accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a
designated place, then offering equivalent access to copy the source code from the same
place counts as distribution of the source code, even though third parties are not com-
pelled to copy the source along with the object code.
f526367 GPL.qxd 3/21/03 3:40 PM Page 336
4. You may not copy, modify, sublicense, or distribute the Program except as expressly pro-
vided under this License. Any attempt otherwise to copy, modify, sublicense or distribute
the Program is void, and will automatically terminate your rights under this License.
However, parties who have received copies, or rights, from you under this License will
not have their licenses terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However,
nothing else grants you permission to modify or distribute the Program or its derivative
works. These actions are prohibited by law if you do not accept this License. Therefore,
by modifying or distributing the Program (or any work based on the Program), you
indicate your acceptance of this License to do so, and all its terms and conditions for
copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipi-
ent automatically receives a license from the original licensor to copy, distribute or mod-
ify the Program subject to these terms and conditions. You may not impose any further
restrictions on the recipients’ exercise of the rights granted herein. You are not respon-
sible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any
other reason (not limited to patent issues), conditions are imposed on you (whether by
court order, agreement or otherwise) that contradict the conditions of this License, they
do not excuse you from the conditions of this License. If you cannot distribute so as to
satisfy simultaneously your obligations under this License and any other pertinent oblig-
ations, then as a consequence you may not distribute the Program at all. For example, if
a patent license would not permit royalty-free redistribution of the Program by all those
who receive copies directly or indirectly through you, then the only way you could satisfy
both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular cir-
cumstance, the balance of the section is intended to apply and the section as a whole is
intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property
right claims or to contest validity of any such claims; this section has the sole purpose of
protecting the integrity of the free software distribution system, which is implemented by
public license practices. Many people have made generous contributions to the wide range
of software distributed through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing to distribute software
through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence
of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by
patents or by copyrighted interfaces, the original copyright holder who places the
Program under this License may add an explicit geographical distribution limitation
excluding those countries, so that distribution is permitted only in or among countries
f526367 GPL.qxd 3/21/03 3:40 PM Page 337
not thus excluded. In such case, this License incorporates the limitation as if written in
the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General
Public License from time to time. Such new versions will be similar in spirit to the pre-
sent version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a ver-
sion number of this License which applies to it and “any later version”, you have the
option of following the terms and conditions either of that version or of any later ver-
sion published by the Free Software Foundation. If the Program does not specify a ver-
sion number of this License, you may choose any version ever published by the Free
Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distrib-
ution conditions are different, write to the author to ask for permission. For software
which is copyrighted by the Free Software Foundation, write to the Free Software
Foundation; we sometimes make exceptions for this. Our decision will be guided by the
two goals of preserving the free status of all derivatives of our free software and of pro-
moting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT
WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY
KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU
ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUEN-
TIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM
(INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED
INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE
OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH
HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.