DigitalForensics 09 NOV2011
DigitalForensics 09 NOV2011
Competition!
Win 3 Digital Forensics
books from Syngress
ISSUE 09
November 2011
INSIDE
/ Using Wireshark
/ Deep Packet Inspection
/ Cryptanalysis
/ Social Network
Monitoring
BIG BROTHER
FORENSICS
Chad Tilbury takes a look at the
rise of Geo Location data and how 04
EDITORIAL
Digital Forensics Magazine is a quarterly magazine, published by
TR Media Ltd, registered in the UK. It can be viewed online at:
www.digitalforensicsmagazine.com
Editorial Board
I
Roy Isbell, Alastair Clement, Scott C Zimmerman, Rob Lee,
Angus Marshall & Sean Morrissey
t is a very interesting time for Acquisitions
digital forensics, everywhere I look Roy Isbell, Sean Morrissey, Rob Lee & Scott Zimmerman
I find numerous organisations and
Editorial
individuals who are doing great things Roy Isbell
to establish standards and codes of
News Desk
practice that will ensure that all of us Matthew Isbell
who adhere to them operate at the
Sales & Marketing
pinnacle of professionalism in all that
Matthew Rahman
we do. Rob Lee takes a look at one
Production and Design
single organisation which is attempting to unite the work that
Matt Dettmar (www.freelancemagazinedesign.co.uk)
is being done, I am sure that we will hear more from them and
Contributing Authors
we will be following their progress.
Angus Marshall, Chad Tilbury, Charmaine Anderson,
This issue we take a look at all things GEO! With the number
Christiann Beek, Curt Schwaderer, Mark Osborne, Rob Harriman,
of news items over the recent months that have raised concerns Rob Lee, Ronnie Smyth, Scott C. Zimmerman, Sean Morrissey,
over the information that Google’s mapping activities may have Sian Haynes, Ted Smith, Willem Knot
collected along with what Microsoft is purported to be collecting/ Technical Reviewers
recording with respect to geo-location data and local WiFi Dr. Tim Watson, Scott C. Zimmerman, Sean Morrissey, Rob Lee
information, it was only right that we took a look at what this & Angus Marshall
could mean to the digital forensic investigator. Once again we
are likely to be faced with protecting the privacy of the individual CONTACT DIGITAL FORENSICS MAGAZINE
whilst looking for geo-location artifacts that might just help solve Editorial
a serious crime. We hope you find the articles useful in your work. Contributions to the magazine are always welcome; if you are
Whilst watching a well known UK crime scene forensics interested in writing for Digital Forensics Magazine or would
program called “The Body Farm”, followed a few days later by like to be on our technical review panel, please contact us on
news reports of two very high profile and widely publicised [email protected]
court cases, reminded me of an article we had been sent Alternatively you could telephone us on:
some time ago regarding what is seen by some, as a huge Phone: +44 (0) 844 5 717 318
miscarriage of justice. The first of the cases was the appeal News
by Amanda Knox of her conviction for the murder of Meredith If you have an interesting news items that you’d like us to cover,
Kercher. Figuring largely in this trial was the forensic evidence, please contact us on: [email protected]
not only the analysis and results but also the way that the Advertising
evidence was handled. The second case was that of Dr. Conrad If you are interested in advertising in Digital Forensics Magazine
Murray and the death of the singer Michael Jackson this case or would like a copy of our media kit, contact the marketing team
on: [email protected].
recently included evidence collected from an iPhone.
The article that I was reminded of is not a digital forensics Subscriptions
article; however, it does have lessons that can be learnt by For all subscription enquiries, please visit our website at
www.digitalforensicsmagazines.com and click on subscriptions.
those practicing digital forensics. The article looks at the case
For institutional subscriptions please contact our marketing
of James Hanratty and the evidence used to convict him; he
department on [email protected].
was hanged for murder in April 1962. Subsequent appeals
Feedback
looked in detail at the forensic evidence, especially DNA
Feedback or letters to the Digital Forensics Magazine editor
evidence and upheld the conviction. It is not our intention to
should be sent to [email protected].
pass judgement in any way, however it is important that we
look at these cases and identify any lessons that can be learnt
Copyright and Trademarks
as we carry out investigations, analyse the results and present Trademarked names may appear in this magazine. Rather than
the results as expert witness testimony. I think that not only use a trademark symbol with every occurrence of a trademarked
will you enjoy the article but it will prove thought provoking name, we use the names only in an editorial fashion and to the
enough to relate the case to your own work. The article is a benefit of the trademark owner, with no intention of infringement
long one and whilst we have contained the bulk of the article of the trademark.
in this issue, we have saved some good bits for next issue. Digital Edition Provider
Digital Forensics Magazine uses ZMags for its Digital Editions,
/ ROY ISBELL allowing the creation of carbon neutral publications.
CONTENTS
/ DIGITAL FORENSICS MAGAZINE ISSUE 09
REGULARS
/ NEWS
/ 360°
06
14
16
/ ROBSERVATIONS 28
/ LEGAL EDITORIAL 31
/ COMPETITION 37
/ APPLE AUTOPSY 47
/ BOOK REVIEWS 80
/ IRQ 82
FEATURES
/ Hunting Malware with a (Wire)shark 09
Using Wireshark to detect if Malware is on your system
/ Big Brother Forensics 16
Device tracking using browser-based artifacts
/ Social Network Monitoring 22
63
Monitoring socal networks to support law enforcement
/ Meet the DF Professionals 38
An interview with Dr Andrew (Andy) Jones
/ Management of Knowledge Based Grids 42
Managing security in Knowledge Based Grids
/ Geo Tagging the Mac 48
42
Sean Morrissey looks at Geo-tagging in the Mac world
/ Cryptanalysis Using Distributed Systems 58
Investigating a project to create middleware for
distributed cryptanalytic applications
/ Digital Archiving and Data Recovery
Archiving data at The National Museum of Computing
63 24
/ Deep Packet Inspection 68
How to build DPI devices on High-speed networks
/ A Case of Forensic Uncertainty 75
75
Rob Harriman takes a look into the Hanratty conviction
LEGAL
/ Geo-location and Privacy in the EU 32
Taking a legal look at the implications for geo-location
NEWS
DHS claims Cyber Crime rate on the increase Windows 8 Secure Boot Blocks Secondary OS’s
Cyber experts working on the In the past month there has been great controversy over the
Control System Security claim that Windows 8, certified 64bit hardware, will carry
Program, for the Department a specific security measure that prevents the installation
of Homeland Security of secondary operating systems (such as Linux) until the
(DHS), have so far software is regarded as trusted by Microsoft.
tackled more than 300 The newest version of Microsoft’s Operating System will
requests for assistance use the Unified Extensible Firmware Interface (UEFI) and a
this year, compared secure-boot feature to boot Windows 8 rather than the more
to last year’s figure commonly used BIOS boot facility.
of 116. The Emergency The decision to use UEFI has been described by Microsoft
Response Team has had Programmers as being based on security, with the organisation
to be deployed seven times hoping to reduce the amount of malicious software (malware),
so far this year, but was only such as rootkits, infecting PC’s that use Windows.
deployed twice in 2010. However, the decision to choose the new boot method will
According to Greg Schaffer, Deputy Undersecretary of the mean that a secondary operating system or even a second copy
DHS, in a comment to All Voices Global News, most of the of windows is increasingly difficult to install and any software or
requests came from Utilities and Industries, which are now hardware must be previously signed by Microsoft or the original
more vulnerable after linking systems to the Internet. The equipment manufacturer in order to work as intended.
systems that are now at risk are considered to be part of the
critical infrastructure, which could account for the dramatic
increase in cyber attacks.
“We are connecting equipment that has never been
connected before to these global networks,” Schaffer said.
“Disgruntled employees, hackers and perhaps foreign
governments are knocking on the doors of these systems, and
there have been intrusions.”
Hackers are becoming increasingly more deceptive and are
using much more sophisticated attacks as security software
tries to keep up with the influx of new cyber threats, and
many of these attacks are beyond the resources available
to the DHS.
Most attacks consisted of monitoring personal
information of a consumer and then exploiting the
consumer’s power and Internet access. The biggest
problem is that, once compromised, these systems provide
access to a high degree of highly confidential data but also
allows for storage and transfer of illegal content through
use of covert channels.
The increase in sophisticated cyber attacks is costing
governments millions in losses each year and this figure
is ever increasing until something is done to prevent
further attacks.
The Pentagon is aiming to extend a pilot program in
the hopes that it will make networks more secure by
sharing intelligence with the private sector. This could
prove beneficial with at least twenty defence companies
already involved.
6 Digital / ForensicS
DF9_08_Ad.indd 8
Ad_A4_DigitalForensics_Apress.indd 1 11/10/2011 10:25
12/3/10 1:49 PM
/ FEATURE
HUNTING MALWARE
WITH A (WIRE)SHARK
The malware threat landscape has changed. How agile is your defence and how
can you detect if malware used in a targeted attack is present on your network?
by Christian Beek
/ ADVANCED
O
ver the years use of malware has dramatically Social media sites like Facebook and Twitter are explored for
changed, ranging from programmers exploring the their functionality and the malware authors adopt these into their
malicious possibilities of their programming code, malware design. Twitter botnets along with malware infections
copycats trying to combine code snippets, through to caused by adding a friend in Facebook are known to be in use.
organized crime and governments using custom made Platforms of choice are also shifting from desktops, servers and
malware for their purposes. Where financial gratification is laptops to mobile smartphones with Android in the lead.
the main motivator for cybercrime, it seems that espionage Authors also hide malware traffic within regular traffic and
i.e. the hunger for secrets and intellectual property is use encrypted communications to circumvent detection by
significantly on the rise. Examples include: Operation Aurora, Internet Gateway security devices, IDS/IPS or Content filters
Night-Dragon and recently Shady-RAT. These investigations (figure 1). Recent examples of malware using encrypted
started with the detection of unknown customized communication over http are TDSS and RimeCud.
malware, hiding on corporate networks and ended in large
investigations regarding Data Loss.
So how is it possible that this malware was undetected?
All companies connected to the Internet have Intellectual
Property (IP), Personal Identifiable Information (PII) or
other interesting/sensitive data stored or used in their
systems and are therefore potential targets for criminals.
Almost all organisations today need or use Internet and
email connectivity. This means that network ports Figure 1. Malware using encrypted URL’s
regarding Internet traffic, DNS and email are open to at
least a part of the network or in some cases direct to the IF YOU DO NOT HAVE THESE
desktop without any filtering or layered defence. Many
companies have their network defence technology, like a DEPLOYED AND YOU ARE
firewall, poorly configured to monitor outgoing traffic for POTENTIALLY FACING A MALWARE
suspicious patterns.
Those organisations that do monitor outgoing internet INCIDENT, HOW COULD YOU
traffic mainly monitor and filter based upon categories, but USE THE OPEN SOURCE TOOL
what if the malware uses the Internet Relay Chat traffic over
http, or is using encrypted URL’s? Malware authors know how WIRESHARK TO INVESTIGATE,
business operates and are using these channels to infect MITIGATE AND CREATE FIREWALL
or create a backdoor that allows communication with the
Command and Control servers, or sites that host multiple RULES TO DETECT AND BLOCK
malware samples.
Using spear phishing (targeted), drive by downloads / Wireshark
(opportunistic) and many other techniques, the Malware There are many security technology vendors offering in-line
authors try to infect the end-user. In addition they make devices that scan for malware threats on the network. But if
detection or reverse engineering difficult. Blocking access you do not have these deployed and you are potentially facing
to security-vendor websites, encrypting the malware source a malware incident, how could you use the Open Source tool
code, VM detection, DNS changer component, timing Wireshark to investigate, mitigate and create firewall rules
mechanisms, URL generators and hiding malware traffic in to detect and block this traffic? Once familiar to the basic
‘regular traffic’ are just some of the techniques used. workings of Wireshark, many options become available.
10 Digital / ForensicS
11
PROTECTED ACCOUNTS
ARE EXECUTIVES, LOCAL
ADMINISTRATORS AND DOMAIN
ADMINISTRATORS, PEOPLE WHO
WILL BE THE POINT OF INTEREST Figure 5. Morto Binary Download
DURING A TARGETED ATTACK
/ Summary
Protected accounts are executives, local administrators The battle for malware creating versus detection and
and domain administrators, people who will be the point of prevention has been going on for years; do not believe that
interest during a targeted attack. Controlled access methods you’re network is malware proof. The tool Wireshark may
like RDP, VNC, Shell or CMD are not monitored by IDS/IPS. be used for several purposes including troubleshooting
Custom rules regarding this inbound traffic should be created. network related failures. In this article we have discussed
Since we are talking about Open Source tools, let’s have using it for detection of malware. For this purpose it should
a look at Snort. To monitor traffic from the Internet facing be part of any malware incident responder’s kit and be part
internal regarding RDP and VNC the following Snort rules of a malware behaviour analysis lab. It is important to keep
could be used for detection: a learning mind and most of all share your knowledge with
RDP = “|43 6f 6f 6b 69 65 3a 20 6d 73 74 73 68 61 73 68|“ the community.
TPKT (RDP) = “|03 00 00 0b 06 e0|”; “|b8 e5 0d 3d 16 00|“ Sharing and a learning attitude will bring us more together
VNC = “|52 46 42 20 30 30 33 2e 30 30|” to win the battle against malware. /
12
360°
Your chance to have your say …
H
ere at digital forensics magazine we welcome feedback
and are using email and social media to allow you to / TWITTER
let us know your thoughts. The following has been
Our Twitter following has now reached over
extracted allowing us to respond and let you know what we the 2100 mark and the growth from 1750 last
are doing to answer your concerns. quarter is a testament to the tweets that we are
Send your letters and feedback to: putting out there, we are obviously providing a service that
you want to receive. Almost every day we try and tweet the
[email protected]
latest news and comment from our comprehensive newsfeed
monitoring facility allowing us to identify what is hot and what
is not in digital forensics and related subjects
Letters & Emails
FBI & Facial Recognition
Attenex Document Mapper – Update
We recently tweeted the following “FBI to launch nationwide facial
In issue 08 August ‘11 the article by Andrew Pimlott mentioned recognition service bit.ly/r41axI Upgrade and add on to AFIS”
a bit of kit called “Attenex Document Mapper”. This product which prompted the following response from @cybertheorist; I
no longer exists as a standalone product and hasn’t for a mean, really, what could go wrong? “FBI to launch nationwide
facial recognition service” and this was not the only comment.
couple years. They were bought by FTItech and integrated Clearly many of you foresee some dangers and problems with
into Ringtail, which is very expensive. what the FBI is planning and rightly so. However what I will
Brian Martin say is that this technology has been deployed in the UK for
Digital Trust, LLC some time and to date we have not heard of any miscarriages
of justice, indeed during the recent riots it is our belief that the
system came in very handy!
Thanks for the update. Whilst we do technical reviews it is
not possible for us to check every fact, especially regarding Research, Tools & Alerts
software mergers and acquisitions and we rely on our authors We often do not get direct responses to our tweets but know we
have struck a cord when we see a large number of those following
to make sure that this sort of information is as up to date as is us re-tweeting something we have put out there. By looking
possible when submitting an article. at these responses we see that many of your are interested in
information relating to new research, tools and especially any
Secure Subscrition tweets that provide in-depth information on attacks.
This prompts us to look specifically for these types of news
I would like to subcribe to your online magazine but I noticed story and tweet all that we find. To find out more you will just
that your subscription page connection in not encrypted. have to follow us “@dfmag”.
Don’t you think that is a little bit strange for a forensic and
security magazine? Is there a secure way to send my personal
information for the subscription? LinkedIn
Wilko van der Maas The DFM LinkedIn Group now
has over 880 members, an increase of over 130 since last
Thanks for pointing this out to us. Rest assured that this issue and new members are joining almost daily. Every day
has been rectified and all links to the subscription pages are members of this group post interesting news items, job
now linking securely. We do take the whole process seriously prospects and start discussions related to our industry. Here
and have spent some time ensuring that the whole system are a few of the more interesting ones:
is as secure as we can make it, so it did come as a surprise
when you pointed this out. As with any online service we PhD Programs in Digital Forensics
are at the mercy of those who wish to exploit weaknesses I am hunting down Phd programs in digital forensics in Europe;
in our systems and it is an ongoing task to make sure that possibly online. Can anyone who has “been there”, “done that”,
we are as secure as possible and respond quickly when give me some recommendations please?
vulnerabilities are identified. Donald Tabone
14 Digital / ForensicS
15
/ INTERMEDIATE
T
he trend towards mobile computing is unmistakable, be adapted to mobile computers. However, devices can be
with laptop computers outselling desktops for several geo-located and can store location artifacts even if they
years. Forrester Research estimates tablets, netbooks, do not contain a GPS capability. In fact, in urban locales
and laptops to be 73% of computer sales in 2011. While an and particularly indoors, GPS can be highly unreliable.
increasing number of smartphones contain Global Positioning Technologies like WiFi network positioning and cell tower
System (GPS) radios, the technology has been slower to triangulation are commonly used to augment or replace GPS.
/ An Inside Look at a
Geo-location Service
Google Latitude is a free, popular geo-location service used to
pinpoint locations. The host device first collects environmental
information about itself, including IP address and any GPS,
cell tower, and WiFi information available. This information
is formatted into a Javascript Object Notation (JSON) file and
sent to Google. The more distinct data provided, the higher
accuracy the location estimate will be.
The initial POST request includes data collected from the host:
the SSID and MAC address for two wireless access points
along with their relative signal strengths. Google Latitude will
perform database lookups using the provided data and return
an approximate location. Notice that coordinates, a street
address and estimated accuracy (in meters) are returned.
16 Digital / ForensicS
17
1. The browser notifies the user that location data has been
requested. If the user previously shared location information
with the application, this step may be skipped.
2. Assuming the user gives permission, the browser queries the
host device using javascript and the getCurrentPosition() function.
3.The host device returns available data, including IP address, GPS
data, nearby cell towers, WiFi access points, and signal strengths.
4.Information collected is sent to a geo-location service
Image 1 for database lookups. In this example, the Firefox browser
defaults to Google Latitude. Data is sent to Google via Secure
Socket Layer (SSL) by default.
5.The geo-location service returns an approximate longitude
and latitude, which is stored in the browser document object
model (DOM) as position.coords.longitude and position.coords.
latitude and made available to the requesting application.
Image 2
often ignored; with today’s dynamic web pages, the vast / Geo-location via Mapping Services
number of web page requests goes unrecorded. When a A vast number of websites utilize mapping services from
user visits a website, a multitude of requests are completed Google, Yahoo & Microsoft for visually displaying locations.
in the background to retrieve images and advertisements, The HTML5 geo-location features allow further customization
populate web analytics, and load content from third parties. of these maps and sites are increasingly using it to identify
The content retrieved from these requests is stored within visitor locations. Instead of a hamburger franchise showing
the cache, and an entry within the cache database is created. all of its locations on a map, it can first determine the visitor’s
While the browser history database may only show the page location and show only the closest locations. Only a few lines
visited, the cache holds most of the components retrieved to of code are required to make this change; hence we should
dynamically build that page. expect to see an increasing number of geo-artifacts during
As it turns out, most browser-based geo-location artifacts our examinations. If we can find the co-ordinates used by the
are not stored within the browser history. Looking back at site to create its map, then that information can be used to tie
the HTML5 standard, this makes perfect sense. The fact that that device to a location at a specific time, with some degree
the API is JavaScript dependent is the first clue. Also, the of accuracy. These co-ordinates are routinely found as URL
multiple steps and asynchronous nature of a geographical parameters within the browser cache.
lookup indicate a lot is going on behind the scenes when In an ideal world, we would be able to determine the device
that initial web page is accessed. Luckily, data collected from location via the initial communication with the geo-location
the host must be passed to a geo-location service and those service. In practice, little of this is stored on the host system
interactions are often recorded within the browser cache. because it is conducted via the HTTPS protocol, which
When content is cached, the URLs associated with the web explicitly does not cache data. Thus we are required to analyze
request are also stored. It is within these requests that we can the by-product of the geo-location, which are the changes
mine geo-location parameters and coordinates passed to third made to the page as a result of the new location information
parties such as Google Maps. (such as a new map being drawn). The difficult part of this
18 Digital / ForensicS
19
address can be wildly inaccurate, so we would prefer to have more obvious than in the latest web standard, HTML5, which
additional artifacts to help bolster that claim. includes native support for device geo-location. With the major
It turns out that Twitter also makes web requests using URL browser’s adoption of HTML5, nearly every Internet connected
query string parameters like we have seen previously. You device on Earth can transmit its location. Taking advantage of the
might find any of the following supporting information in the artifacts left behind will give forensic analysts tremendous new
browser cache database: resources to track devices and build cases with stronger user
attribution. This article represents just a sliver of the currently
• http://api.twitter.com/1/geo/search.json?ip=66.169.216.161 available geo-location artifacts and I look. /
• http://api.twitter.com/1/geo/nearby_places.json?
• http://api.twitter.com/1/geo/reverse_geocode. REFERENCES
json?lat=33.0227&long=-97.2324 http://dataplusinsight.com/general/the-us-personal-computer-
• http://twitter.com/#!/search/realtime/ consumer-market-in-2015/
place%3Adallas%2Btexas http://www.w3.org/TR/geo-location-API/
http://mapki.com/wiki/Google_Map_Parameters
If no evidence was found in the cache, our next step might http://code.google.com/apis/maps/documentation/javascript/
be to review a memory dump or unallocated space. Similar to basics.html#Geo-location
Google Maps, Twitter can transmit geo-location data via JSON http://www.maxmind.com/app/locate_demo_ip
and HTTP Post requests, circumventing our ability to spy data http://www.parosproxy.org/
in the cache. The following keyword search terms have shown
success at finding Twitter data in unallocated space:
/ Author Bio
• “coordinates”:[[[ Chad Tilbury, M.S, GCFA, ENCE, has spent
• geo_enabled over twelve years conducting computer
crime investigations ranging from hacking
• screen_name
to espionage to multi-million dollar
fraud cases. Formerly a Special Agent
Thus, even a small-scale location aware implementation like the with the US Air Force Office of Special
one in Twitter can reap very useful artifacts to the investigator. Investigations, he currently works as a
computer forensic and incident response consultant. Chad
Our computing devices are becoming increasingly more
serves as a certified instructor with the SANS Institute for the
mobile, and software applications are evolving to take advantage digital forensics track. Find him on Twitter @chadtilbury or at
of this. As a result, geo-location artifacts are permeating http://ForensicMethods.com
operating systems, applications and file formats. Nowhere is this
20 Digital / ForensicS
Computer
forensics
Audio
visual
Questioned
documents
Mobile
phone
forensics
DF9_21_Ad.indd
LGC_Digital 21 - CB2.indd 1
A4 Ads-v5 11/10/2011
07/04/2010 10:28
13:07:45
/ FEATURE
SOCIAL NETWORK
MONITORING
LEARNING TO DRINK FROM THE FIRE HOSE
/ INTERMEDIATE
S
ocial networking may have started as a vehicle underlying protocols are changing. There’s a period of time
for casual chatter among friends, but it has gone when law enforcement personnel need to be able to capture
mainstream over the past few years as a communication messages sent the old way and the new way. Since the
vehicle for businesses to interact with their customers. It has networks are growing organically, with no specifications being
also emerged as a new way for bad guys to communicate their published, companies involved in social network surveillance
plans of destruction. With the increasing use of the medium need to reverse engineer the way that the systems work.
for illegal activity comes the need to monitor the channel Another challenge that must be met relates to how the
when appropriate to facilitate law enforcement. social media applications are growing together. In the past
communications would be made through discrete vehicles;
/ Why Monitor Social Networking Services? a bulletin board, an audio conference, email or a chat
A social network service is an online service, platform, service. Now the applications are becoming intertwined, and
or site that focuses on building and reflecting relations following multiple communication sessions is difficult. Viewed
among people who share interests and/or activities. Social independently, a particular communication stream could look
network services essentially consist of a representation of innocuous, but looking at multiple related streams together
each user (often a profile), his/her social links, and a variety could reveal dangerous information. Effective surveillance
of additional services. Most are web-based and provide requires correlation between the channels that a single source
several means for users to interact, such as email and is emanating. The bad guys are now clever enough to use
instant messaging. The combination of an easily accessible, multiple types of communication platforms in parallel.
widely-used medium (the Internet) and a ‘social’ culture of
like-minded individuals has created an effective forum for / Common Techniques for Monitoring
criminal and terrorist networks, propaganda broadcasting, as Social Networking Services
well as yet another means for sensitive information to escape There are a few popular techniques for monitoring social
protected/secure networks. network services. Here’s a look at three of them:
Here are a few examples of potentially dangerous outcomes
of improper social networking use: Open Source Intelligence (OSINT)
Open Source Monitoring (no relation to Open Source
• A clerk with access to sensitive information unwittingly Software) is essentially finding, selecting and acquiring
communicates a seemingly innocent ‘status update’: “…gotta information from publically-available sources. Applied to
work late tonight…this Egyptian embassy situation is breaking social networking services, this means monitoring/inspecting
my back …” the information on social networking sites, which could
• A terrorist group creates a Facebook page with video include ‘friending’ or ‘following’ specific users or groups.
instructions of how to use and repair AK47’s This type of monitoring can yield everything from simply
• An insider purposely leaks secrets by using private determining relationships (“Sally is friends with Rita”) to real-
messages or sending files using an instant messaging client time location information (“Sally checked in at Starbucks on
10th and Grand”).
/ Challenges in Keeping up with There are some key advantages to this method. Since the
Social Network Changes information is public, there are no jurisdiction/authority issues.
There are a multitude of challenges for agencies that are Since this is often done manually, there is little technological
chartered with analyzing social network communications in investment required. Finally, this method can lead to an ‘active’
pursuit of law enforcement. As the technologies evolve, the monitoring, including gaining the target’s trust and getting
22 Digital / ForensicS
Figure 1
23
24 Digital / ForensicS
25
Table 3
/ Author Bio
• Keyword/signature in a specific application
(e.g., webmail, email, etc)
• Application-level criteria can optionally include an IP/ Curtis Schwaderer is the Chief Software
subnet/DHCP/RADIUS pre-filter, giving flexibility to further Architect and cofounder of IP Fabrics,
segment/qualify the monitored network responsible for the DeepSweep™ and
DeepProbe™ network surveillance
The probe should also be able to be configured to deliver and data retention product lines.
varying amounts of intercepted information, including the Curt has over 25 years of experience
complete application flow with related content such as in the design, implementation, and
attachments, a summary of the content, IRI (Pen-Register deployment of networking hardware, software,
equivalent) or just the application session events. and multimedia systems technologies. Curt has spent
For IP traffic intercepts, the probe should be able to the last 12 years focusing on multicore processor software
qualify the intercepted traffic by layer 4 ports or application technologies and the last 6 on Deep Packet Inspection
identifiers and will monitor all subsequent dynamic IP address (DPI) and Deep APplication Inspection (DAPI)
(re)assignment. For email interception, the probe should be technologies relating to internet communications
able to deliver the entire email, even if the email address applications. Curt holds two patents in the area of
identifier was discovered after the first packet(s) in the email multimedia networks and multicore software processing
flow. Or, in IPDR applications, the probe should generate and and holds bachelor and master degrees in Computer
deliver complete IPDRs. Engineering from Iowa State University.
26 Digital / ForensicS
ROBSERVATIONS
Our Profession: The Launch of CDFS
by Rob Lee
T
his past month saw the launch of the Consortium of Digital
Forensic Specialists (CDFS – www.cdfs.org), an organisation
formed to help professionalise the field of Digital Forensics
and Incident Response. The CDFS mission statement:
“Serving the profession, our membership, and the
community by providing leadership and advocacy as the
global representative of the digital forensics profession”.
CDFS is trying to help shape the future of digital forensics
by helping unite industry groups and organizations so that
all parties have a say in the direction of the profession. The
stated aims of CDFS is to help influence agreed upon ethical
and technical standards in the community and consequently
help to shape the future of the digital forensics profession.
Unfortunately, some form of digital forensic licensing will be I started working with CDFS as a board member as I
barrelling down on our profession. There are proposed bills believed that many industry groups had a lot in common
in U.S. congress as well as legislative actions that are taking already. While many competed with each other, I also
place in many states and countries around the world that will saw unified approaches to the profession. I also saw a
begin to regulate the digital forensic profession to ensure potential misunderstanding among lawmakers over what
a common standard that all must attain in order to perform digital forensics is and how best to regulate and manage
their jobs. In many countries, you need a license to cut hair, professionals making a living performing these services
be a plumber or to babysit. As a result, an alarming trend has for the information security, legal, and law enforcement
developed in several states regarding legislation of licensing communities. As a result, I pushed to get myself more
for digital forensic specialists as private investigators involved with the fledging organization as a whole as my
without regard to digital forensics qualifications. Many in views were aligned with the other members of the board
our profession would rather have practitioners develop the regardless the organization that we represented. If many
standards than another group such as private investigators. different organizations have different, competing standards,
CDFS started through a discussion amongst HTCIA, SANS, there are, in fact, no standards at all. The goal is to bridge the
HTCC, ISCFE, and many other groups leaning on one another gap between organizations to develop a cohesive standard
to help ensure that the profession would not be held hostage appropriate to diverse sectors of the profession. Further, our
to someone else’s standards. It is human nature to become mission is to speak on behalf of digital forensic practitioners
complacent with the status quo when it does not affect one to achieve self-regulation by professionals who understand
personally and immediately; however, regulation is coming the industry and its needs.
and it will affect you, if it has not already. So do you want to We would like to encourage you and your organization
have a voice in the outcome of such pending initiatives? to consider joining CDFS to help form the correct ethical,
professional, and technical standards. Without a group such
as CDFS, we will have many independent groups trying to
CDFS STARTED THROUGH A describe the elephant by describing the only way that they see
DISCUSSION AMONGST HTCIA, the elephant. By working together though a single umbrella
organization and maintaining the smaller groups we will be
SANS, HTCC, ISCFE, AND MANY able to form a consistent approach to Digital Forensics and
OTHER GROUPS LEANING ON ONE Incident Response across all communities. It will also allow
us to help guide the profession properly. We would like to get
ANOTHER TO HELP ENSURE THAT in front of the challenge. Licensing discussions has created
THE PROFESSION WOULD NOT a great debate in our profession on what is appropriate and
who writes the standards. I would prefer the standards to
BE HELD HOSTAGE TO SOMEONE originate from true practitioners. Have a voice… participate;
ELSE’S STANDARDS join CDFS today at www.cdfs.org and help shape the future of
our profession. /
28 Digital / ForensicS
Attending a Review
Seminar online
/ Cyber terrorism
/ Law from the UK and rest of the world
/ Management issues
/ Investigation technologies and procedures
/ Tools and techniques
/ Hardware, software and network forensics
/ Mobile devices
/ Training
/ eDiscovery
/ Book/product reviews
CHECK OUT
digitalforensicsmagazine.com
for all the latest news and views on the world
of digital forensics (special feature articles are
available for registered users).
LEGAL EDITORIAL
The difficulty in prosecuting malware authors
by Scott C Zimmerman
S
eptember 18th, 2011 is the ten-year anniversary of
the release of the Nimda worm. This worm suddenly
appeared on the technology scene in the aftermath of
the Code Red epidemic of August 2001. The precise point of
origin of Nimda has not been identified and the identity of
the original author remains a mystery. Why is it that malware
authors seem never to be caught and prosecuted?
Consider the difficulties involved in catching a traditional
intruder; we’ll use the example of an individual attacking
and compromising a single remote system owned by
another entity.
in the way of any investigator. Since there is no clear path
• There must be sufficient evidence captured on the from the malware author to the destination system, how can
compromised system or on network devices near the investigators even begin to determine what happened? They
compromised system. can look at the malware itself.
• There must be clear indicators of which source machine(s) Each piece of compiled malware, distinct from something
interacted with the compromised system. like Javascript or HTML, is based on source code.
• Once the source machine has been identified, the Source code is what the program author actually types to
geographic location must be determined. A source machine create a piece of software; the source code is then passed
in a country that does not cooperate diplomatically with through a compiler that creates the binary. The binary
the country hosting the compromised system, one having may also be called the executable, since it can be run on a
no extradition treaty for example, is unlikely to provide any particular type of system. The binary is not a human-readable
assistance to the investigators. chunk of data, but it can be reverse-engineered into source
• If the source machine can be identified, then ownership code that humans can read. Clues in the binary can be used
must be clearly established. If the IP address of the machine as bases for additional searches: if there are unique markers
belongs to an ISP that allocates addresses dynamically, the in code that can be linked to a particular individual, the
ISP’s cooperation will be necessary. Without it, ownership investigators may have a place to start. However, a sufficiently
cannot be established. sceptical examiner will be inclined not to treat such markers
• If ownership can be established, the next step is to as infallible truth.
determine who was operating the computer at the time of the As an example, a number of computer systems at Mitsubishi
attack. If the source machine is not logging or tracking such Heavy Industries of Japan were recently infected with some
activity, the identity of the operator cannot be confirmed. unusual malware variants. Close examination of the incidents
revealed the presence of simplified Chinese characters [text]
If any of these steps breaks down, the investigation into the in the attack payload. The presence of the Chinese language
attack-and-compromise is very likely doomed to failure. brings up two questions:
One of the major differences between prosecuting a
traditional intruder and prosecuting a malware author is • Did the malware actually originate in mainland China?
the fact that there need be no direct connection between • Did the author simply wish to give the impression that the
the author and the affected remote system. The traditional malware originated in mainland China?
attacker who operates over the Internet creates a temporary
path between his machine and the destination machine: The answer is this: no one knows. It is impossible to identify
even if he is using another host as a jumping-off point, the authoritatively the country of origin without a significant
commands and instructions he uses must trace a path from quantity of additional, and reliable, evidence. Please do wish
the source to the destination. The malware author has no such any malware investigators all the luck in the world, for they
requirement: he can develop malware, attach it to a bogus shall need it.
email message, and relay the message through a poorly
configured SMTP server in an unfriendly country. In one fell I hope you enjoy the Legal Section and I would love to hear
swoop he has placed essentially insurmountable hurdles your thoughts and comments via 360. /
31
MOBILE PHONES,
GEO-LOCATION, AND
PRIVACY IN THE EU
A look at mobile phone positioning systems and their legal standing in the EU
by Scott Zimmerman
/ INTERMEDIATE
M
any current smartphone models – including but The aforementioned action was brought against Microsoft
not limited to those from Apple and Microsoft – are by a citizen of the United States within the United States.
capable of acquiring and storing location information. The US does not have the same legislative approach to
Global Positioning System (GPS) satellites may provide this user privacy that is found in the EU. The US does have the
information or it may be derived from the mobile phone tower Fourth Amendment to the Constitution, but that is applicable
from which the handset receives its signal. Whatever the generally to information control between individuals and the
method involved, the end result is that the location of the US government (including law enforcement).
handset may be tracked. In some cases this capability may In the EU, the sort of privacy under examination in the
be desirable, as when a parent wishes to monitor a child who Microsoft case is governed by a document titled Directive
has borrowed the car. However, in this case the features are 2002/58/EC of the European Parliament and of the Council of
enabled with the user’s knowledge and consent. (“User” here 12 July 2002 concerning the processing of personal data and
refers to the parent who owns the mobile service plan.) the protection of privacy in the electronic communications
Mobile phone manufacturers recognize the user’s desire to sector (Directive on privacy and electronic communications),
control the generation and use of such information, and most hereafter simply called the “Directive”.
(if not all) current phone models provide an option for the user
to disable any geo-location utilities. This will of course prevent
some applications, such as street-by-street navigational
guidance, from working but this is the tradeoff for preserving
some of the user’s privacy.
Problems arise when a device’s behavior does not match
what the user expects. Normally this phenomenon is
demonstrated by a device that simply does not function when
the user expects it to do so; a crash or freeze for example.
However, there is another set of circumstances that is
arguably more problematic; when the device ignores user-
selected options and functions in an undesirable manner,
either through a malfunction or through a configuration set by
the manufacturer. We will examine the latter.
In the Legal News section of Issue 8, we saw that Google
was sanctioned by a French body for gathering unauthorized
information through the use of its Street View vehicles. They
experienced similar roadblocks in Germany over the same sort
of privacy violations against EU citizens. Now a lawsuit has
been filed against Microsoft, alleging that Windows Phone 7
devices continue to transmit geo-location data back to the
manufacturer when the camera is activated, even if the user
has disabled all such functionality. Microsoft has denied the
claims; it’s still early days, but at the time of writing it appears
that the litigation will proceed.
32 Digital / ForensicS
33
The first part of (35) describes the need for the mobile Let us look at (35) in the context of the Microsoft case and
phone provider to know which communications tower the consider a user who has not given (or has revoked) permission
user’s phone is accessing; this is necessary for the provider to share geo-location data from his phone. According to the
to route voice and data traffic appropriately and does not EU Directive, the only such data that should be generated or
pinpoint the user’s location to any significant degree. The processed is that of the phone’s connection to a particular
user’s general location could be determined, possibly to a tower, i.e. the minimum required for successful mobile phone
circular area a half-kilometer in diameter in the case of a tower operation. The user’s precise latitude and longitude should
in a city, and a somewhat larger area in the country since not be calculated, let alone transmitted to another party
towers there are farther apart. without the user’s consent.
The second part of (35), after “However”, alludes to more (36) Member States may restrict the users’ and subscribers’
precise geo-location mechanisms such as GPS, though it does rights to privacy with regard to calling line identification
not do so by name. The mobile phone service provider does where this is necessary to trace nuisance calls and with regard
not need to know that the user is on the corner of X Street and to calling line identification and location data where this is
Y Avenue in order to deliver voice and data traffic. The key necessary to allow emergency services to carry out their tasks
differentiator here is the Directive’s use of the word “processing”. as effectively as possible. For these purposes, Member States
“Processing” in the data context is generally understood to may adopt specific provisions to entitle providers of electronic
mean accessing, storing, or performing operations on data. communications services to provide access to calling line
The value added service provider described above, offering identification and location data without the prior consent of
discounts at restaurants, would be processing the user data. the users or subscribers concerned.
It is important to note that in this clause of the Directive,
the geo-location information is reserved for the use of the
Member States and then only for emergency services, e.g. to
respond to a traffic collision. Readers should also note that
user permission to make use of the information under these
very limited circumstances is not required if the Member State
should request geo-location information from the mobile
phone service provider. The manufacturer of the handset has
no privileges in this area.
Clause 36 goes on to provide some definitions to ensure
all readers of the Directive are using common language (so to
speak), I have extracted one of specific interest.
The following definitions shall also apply:
(c) “location data” means any data processed in an
electronic communications network, indicating the geographic
position of the terminal equipment of a user of a publicly
available electronic communications service;
/ CONCLUSION
The European Union is very clear about how the data
relating to mobile phone users may be handled. Aside from
knowing which tower a user’s phone is accessing, any and
all user location information is under the strict control of
the user. Without consent, mobile phone providers may
not track users by latitude and longitude. If the user give
consent to have detailed location information generated,
the holder of that data may not share it with any other entity
(outside of law enforcement) without the user’s consent.
Any third parties to whom the user has given consent to
process the location data may do so only in the fashion
to which the user has consented. Finally, at all times any
organization to which the user has given such consent must
provide a timely and no-cost method for the user to revoke
said consent.
There will be a number of industries, inter alia IT, mobile
communications, legal etc. who are all waiting with great
interest to see how the current action against Microsoft
might proceed. /
34 Digital / ForensicS
36 Digital / ForensicS
COMPETITION
/ This issue we have 3 books to give away courtesy
of Syngress: Digital Forensics with Open Source Tools,
Windows Registry Forensics & Penetration Tester’s Open Source Toolkit
/ Question
TERMS AND CONDITIONS
This competition is open to anyone aged 18 or over, except for
employees of TR Media Ltd and their immediate families. Only
As we’re focussing on Geo-location in this issue, one entry is permitted per person. Entries can be submitted
we thought we’d ask a geography question – by email only to competition@digitalforensicsmagazine.
What famous building is located at: com. TR Media shall not be responsible for technical errors in
telecommunication networks, Internet access or otherwise,
preventing entry to this competition. Closing date for all entries
/ To Enter
the magazine and on the Digital Forensics Magazine website.
Submitting your entry constitutes your consent for us to use
your name for editorial or publicity purposes, should you be
To enter the competition all you need to do is send an one of the winners. TR Media Ltd reserves the right to change or
email to: [email protected], withdraw the competition and/or prize at any time. By entering
writing ISSUE9COMP in the subject line, include your the competition, entrants are deemed to have accepted these
terms and conditions.
name address and phone number with your entry.
Digital Forensics with Open Source Tools Windows Registry Forensics Penetration Tester’s Open Source Toolkit,
By Cory Altheide, Harlan Carvey By Harlan Carvey Third Edition By Jeremy Faircloth
Digital Forensics Harlan Carvey Great commercial
with Open Source brings readers an penetration
Tools is the advanced book on testing tools can
definitive book Windows Registry. be very expensive
on investigating Windows Registry and sometimes
and analyzing Forensics provides hard to use or
computer systems the background of questionable
and media using of the Registry to accuracy. This
open source help develop an book helps
tools. The book understanding solve both of
is a technical of the binary these problems.
procedural guide, and explains the use structure of Registry hive files. Approaches The open source, no-cost penetration
of these tools on Linux and Windows to live response and analysis are included, testing tools presented do a great job
systems as a platform for performing and tools and techniques for postmortem and can be modified by the user for
computer forensics. analysis are discussed at length. each situation.
37
MEET THE DF
PROFESSIONALS
Dr Andrew Jones
Interviewer: Roy Isbell
/ Interviewee Bio reservations that some of the courses are being offered as
Dr. Andy Jones joined Khalifa University of Science Technology digital forensics or computer crime are actually re-branded
and Research (KUSTAR) in August 2009 to set up and manage security courses.
the MSc in Information Security and Computer Crime. Prior On the training side, courses are delivered to meet specific
to this he had been at British Telecommunications (BT) as needs, normally based around the tools that the vendor
the head of security technology research. He also holds a provides. It is almost a moot point with many of the tools
post as a visiting Professor at Edith Cowan University and the that the providers will potentially gain significantly more
University of South Australia. revenue from the training courses than they will from the
Previously he was a principal lecturer at the University sale of the tool. This begs the question as to whether it is
of Glamorgan in Wales where he created a digital forensics actually in their interest to provide good robust forensic
research laboratory and lectured on Information Security tools that have an intuitive and well-documented GUI and
and Computer Crime. His background prior to this was 25 a respectable user manual. In many cases, the only way to
years in Military Intelligence during which time he was obtain a decent manual for the product is to attend the range
awarded the MBE. of courses offered.
Andy has a PhD in Information Security from the As to accreditation, I am all in favour and have spent
University of Glamorgan and is a member of MENSA, the some time over the last few years working with Edith Cowan
British Computer Society, the High Tech Crime Consortium University and the Australian Federal and Local police trying
and the Institute of Information Security Professionals. He to map out the requirements for qualifications and training
has published numerous articles on information security for the digital forensic environment. As to who should own
and computer forensics and five books on information the accreditation, in the UK this should be the Forensic
warfare, information risk management computer crime and Science Regulator. It cannot be the vendors, academia or the
digital forensics. practitioners, all of who have a vested self interest and must
Andy is 59 years old, is married with two grown children and be independent and at a high level.
is currently residing in Abu Dhabi in the United Arab Emirates.
His interest include, sub aqua, reading and, strangely enough, How do you see the future of your research as it relates to
computer forensics. digital forensics?
My main research interests are in residual data and the
What got you involved in digital forensics? recovery of information from ‘dead’ disks, however some
I first got into the world of digital forensics while still serving of the research that I am undertaking is to gain knowledge,
in the Army. I was running the information security inspection not of the technologies involved, but of the reasons for
team and felt that I needed to know what actions I should the failure of the user to understand the risks. Through the
take if, during a security investigation, I needed to preserve research we are trying to understand why the systems that
evidence for a potential criminal action. After much asking should be in place to prevent the exposure are not working
around, I was eventually pointed to the then Metropolitan and find processes, procedures and tools that will improve
Computer Crime Unit, run by John Austen, the only such unit in the situation. The dead disk study is in the very early stages
the country at the time. but has huge potential for the recovery of data from media
that that has been damaged or failed. I am also looking to
What are your thoughts on the current state of education extend this to investigating solid-state memory.
and training, accreditation of courses etc. as they relate to
digital forensics? What are your views on the industry standard tools used
This is a subject close to my heart, as you might imagine. to investigate digital forensics and the fact that so few are
On the education side, there has been significant progress actually validated other than by mass use?
and there are now a number of universities and colleges The tools that are available vary considerably in quality
that offer academic courses at all levels to meet the ever- and scope. On the one hand you have the universal toolkit
growing need. While this is to be applauded, I do still have type tool that carries out all of the major functions that
38 Digital / ForensicS
39
MANAGEMENT
OF KNOWLEDGE
BASED GRIDS
Using a combination of public and private keys and X.509 certificates
to manage security in knowledge-based grids
by Sian Haynes & Stilianos Vidalis
/ INTERMEDIATE
F
ujitsu is set to bring high-performance computing (HPC) Going back to the HPC Wales Project the project is planned
to Wales. They are to provide a distributed grid under a to use a minimum of nine sites including Swansea, Cardiff,
project that is expected to take over five-years and cost Aberystwyth, Bangor, Glamorgan, Swansea Met, Newport,
up to £40 million. The grid will include over 1400 nodes spread Glyndwr and a number of other sites. The grid will allow all
across more than eight sites, linked using Fujitsu’s middleware of the sites to share and distribute resources freely and a
technology SynfiniWay that will deliver an aggregated number of pilot applications will be sponsored via HPC Wales
performance of more than 190 petaflops. to test the capabilities of the grid; for example in Newport we
Grid computing is a technology that enables people and are considering a Grid for Crime Prevention (G4CP).
machines to effectively capture, publish, share and manage
resources. There are several types of grids but the main types
are; data grids, computational grids and knowledge grids.
Data and computational grids are quite similar in
that they are used to manage and analyse data. With
technology increasing and developing at such a dramatic
rate, average computers cannot cope with the amount of
data or the calculations they are being asked to perform.
For example if a scientist is doing research about cancer
cells and their development, using conventional methods
on one machine, it could take years to complete the
calculations. However, if a grid were used to perform
the calculation, its combined computational power
would significantly reduce the time frame. To analyse a
complicated set of data could take a standard computer
a few days or even weeks to analyse. Whereas if a
grid was used to perform the same analysis it would
take considerably less because it would harness the
computational power available on the grid, parallelise the
load and allow the calculations to be performed with a
small turnaround time.
Knowledge grids are self-explanatory; their purpose is
to share knowledge. In this day and age we have come to a
point where we are using computers to create vast amounts
of data. The information overload is so big that human
beings are not able to absorb and analyse the data in a
timely manner and extract the much sought after knowledge
that will further science and better our lives. We are now at a
point where we now have to teach computers how to extract
knowledge from raw data.
42 Digital / ForensicS
/ Grid for Crime Prevention establishment of global standards in the areas of cybercrime
The Grid for Crime Prevention, also known as G4CP will prevention, identification and prosecution.
stimulate, promote and develop horizontal methods and The centre of gravity of G4CP is to design and implement
tools for strategically preventing and fighting cybercrime an application that promotes collaborative working, using
and guaranteeing security and public order in the Welsh data fusion and data mining techniques, and allow knowledge
cyberspace. Furthermore, G4CP will promote a coherent Welsh discovery from raw security incident data. The application
strategy in the fields of cyber security through the exploitation was originally called Inter-Organisational Intrusion Detection
of the project’s artefacts, it will also play an active role in the System (IOIDS).
Trying to defend European cyberspace against organised
cybercrime can be seen as a complex problem with one of the
problems being that companies are afraid to report security
incidents because they feel their reputation will be damaged.
This results in many private organisations and law enforcement
agencies being forced to tackle cybercrimes with next to no
help from other organisations in the same supply chain. The
G4CP project felt that there was a need for the defenders of the
European Information Infrastructure to come together to form a
number of virtual communities in order to take action collectively
against the perpetrators of cybercrime and promote a culture of
security amongst and across the members of these communities.
The communities should allow for secure information
sharing and facilitate organisations to be proactive in
defending their networks against on-going cyber attacks.
G4CP will make grid technology attractive to those
establishments fighting cybercrime. It will also help the
uptake of grid type architectures and extend their concept
from computation grids to knowledge grids.
43
THERE ARE TWO METHODS, keep the information available for a short period of time and
if the query was not called for during that time frame then to
WHICH CAN CONTROL AND delete the query. If it occurs again outside of the time frame
HELP, MONITOR USERS ON THE then the query will be developed again and held on the server.
The demand for information and harnessing the power of the
GRID AND THEIR SECURITY; grid to deliver information and knowledge faster is the key.
PUBLIC & PRIVATE KEY / Managing a Knowledge Grid
CRYPTOLOGY ALONG WITH In a communication network, a node is a connection point,
X.509 CERTIFICATES either a redistribution point or a communication end point.
However, the definition of a node does depend upon the
network and protocol layer referred too. The main goal of grid
management is to measure and publish the state of resources
at a particular point in time. To be effective, monitoring must
be done from end to end, meaning that the entire environment
and its components must be monitored.
Understandably this is no easy task, if we take HPC Wales
for example; it will provide to G4CP, 1400 nodes located
across 9 different sites. It is a huge task on its own just to
manage all the components that are required to control that
grid and its environment.
/ User Management
There has to be some form of security and authentication on
the grid to ensure that the users on the grid are accessing
material that is appropriate to them. There are two methods,
which can control and help, monitor users on the grid and
their security; public and private key cryptology along with
X.509 certificates.
Public and private key cryptology is used regularly in many
different kinds of computing projects and environments for a
secure authentication method. The main reason it is still in use is
that it helps indicate the true authors of a piece of information.
E.g. If Sian wanted to send a message to Stelios, she would
encrypt it with her private key so that when Stelios received
the message he would be able to unlock it with his public key
and read the message but because Sian encrypted it with her
private key he knows it is from Sian. There are flaws in public and
private key cryptology along with all methods of authentication,
however; this method of secure authentication is put in place as
a ‘contract’ of trust between the user and the manager of the grid.
44 Digital / ForensicS
45
APPLE AUTOPSY
As Apple loses its greatest innovator and
co-founder, Steve Jobs, new CEO, Tim Cook,
takes over the reins to introduce the new
iPhone 4S… What does this latest model
tell us about the company’s future?
by Sean Morrissey
T
he Apple world lost its greatest innovator, Steve Jobs.
His long battle with cancer came to an end on October
5, 2011. Steve had influenced generations of people and
created magical products for the world to use. His business
style, his outlook on technology was far beyond us mere
mortals. Steve revived a failing Apple and rebuilt it to become
the technology giant that it is today. But does Steve Jobs The new iPhone 4S has the dual core A5 processor, CMDA
passing signal the end of Apple, as we know it? and GSM, which gives it truly world phone capabilities.
In some ways yes, but Apple is more than one man and it The iPhone 4S has a redesigned 8-megapixel camera and
will move on. I did read that some commentators thought Apple have now added a 64GB variant to the fold; this with
that Steve believed he was immortal; the reality is quite the addition of iOS 5 and the improvements the upgraded
the contrary. Steve Jobs was cognizant enough to know his operating system brings, most notably notifications, game
mortality and therefore surrounded himself with some of the play and web browsing are faster as is the speed of the
greatest designers, innovators, managers, and engineers camera and associated functionality.
in the world. They are leaders in their respective fields, and Then there is “Siri”, an awesome application that just adds
are still hard at work at Apple innovating, designing and another dimension of getting information, dictating just about
producing some of the most anything. Siri uses Artificial
sort after technology products Intelligence (AI) to create
in the world today, building and send texts and e-mails,
upon the legacy left by Steve. set reminders, schedule
Tim Cook has been passed meetings, place phone calls,
the torch from Steve, and in get directions, play music
Steve’s first leave of absence, and is believed to be able
we saw Apple stock just to answer context sensitive
continue to grow. Tim Cook questions, like “will I need a
will be a great steward of raincoat today?”. The Siri app
Apple. I have to wonder what was originally a spinoff of a
was going through his mind project co-developed by SRI
as he launched the iPhone Ventures and the Department
4S knowing that Apples co- of Defense’s innovation arm,
founder was in his final hours. the Defense Advanced
He can surely be forgiven if his Research Projects Agency,
mind was elsewhere. or DARPA and was launched
On October 4, 2011 Tim Cook as an iPhone app in February
the new CEO of Apple introduced 2010. Apple bought the app
the iPhone 4S and not the some two months later for an
iPhone 5 as some pundits undisclosed sum. All in all, this
thought would be announced. is something really impressive.
Some critics think this was a let Apple is alive and well and
down; my opinion is that as the I am sure that we will see
iPhone 4 sold so well, why not more innovation and “cool
just improve what is there? “If it products” from this company
aint broke don’t fix it”! in the future. /
47
FOOTPRINTS ON MACS –
GEOGRAPHIC ARTIFACTS
The apple world can be both stationary and mobile; from the Mac Pro to the iPhone all
have one thing in common, the Apple universe. Apple has given its customers the ability
to do many things including the ability of devices to become interconnected with ease.
This facility provides users an intuitive ability to save all kinds of data. With the coming
iCloud, more and more content will be moved to the cloud; however the move of the
content does not eliminate geographic data from the content
by Sean Morrissey
/ ADVANCED
T
oday we have OS X and iOS as the two operating • Navigate to the following path, ~/username/pictures/
systems; OS X for Apple personal computers and iOS iPhoto Library.
for the Apple mobile devices. The interoperability of the • Copy the entire file from the suspects system and then paste
two operating systems provides the facility to store the same it to the same path on your system, ~/username/pictures/
data on multiple devices. Before the rise of iOS, the Apple iPhoto Library.
universe consisted of the MacBook, iMac, and the Mac Pro. • Open iPhoto and view the results.
These all had the ability to store geographic data, mainly from
cameras that had included the Geo Positioning System data iPhoto is an application that provides the examiner a lot
(GPS) in picture files. of information about a particular image. This may be done
This was first associated with high-end cameras, but from a forensic workstation or other system connected to
today relatively cheap mobile devices can embed GPS the Internet. The following procedure will provide the same
data. Unbeknownst to Apple they also gave digital forensic information both online and offline except for geo-mapping
examiners a free forensic utility to examine this data from which will require access to the Internet.
within the operating system; that utility is Preview. The
Preview application is, by default, located on the dock • Use the copy over technique from the previous step action to
(task bar). transfer data from a locked .dmg to the same location on the
The preview application can be used to view all “exif ” forensic workstation.
(Exchangeable Image File Format) and GPS data from images • Scroll through the images until an image of relevance
that contain such. is seen.
On most newly purchased Mac devices the iLife application • Click on the image to highlight it.
suite is included; the iLife suite includes the iPhoto • At the bottom of the window to the right, is seen an “info”
application and just like Preview it is installed by default in the button. Click on this button to see the information pane as
task bar. shown in Figure 1.
iPhoto is the default container application used by Apple for
all images & video that is imported either from an iDevice, or From the Info pane the following artifacts are identified:
other source.
From within iPhoto, there is a facility called “Places”. • First the Camera model is shown, in the example above, this
In order to utilize places, the system however needs to be image came from an iPhone 4
connected to the Internet to view the pins on a map. What this • Underneath the camera model, is the EXIF data from the device
provides an examiner is a visual representation of all geo- • Next one can see the filename and MAC timestamps.
tagged data identifying the areas of the world that a suspect • Date and time when the photo was taken
may have travelled. • Last Modified date and time
From a locked .dmg (disk image) the iPhoto library may • Date and time that the image was imported.
be exported from the suspect system and copied over to • Below the MAC times, is a pinpoint on a map where the
another system that has access to the Internet to mimic image was taken; this information is gathered from the GPS
the user’s system and places within iPhoto using the data of the image. (Again the system needs to be connected to
following steps: the Internet to populate this data.)
48 Digital / ForensicS
49
50 Digital / ForensicS
51
/ INTERMEDIATE
T
he Gallery View is like no other gallery system! Not
only can the size of the pictures be resized as already
mentioned (via the General Options), but they can be
sorted by colour detection (using the ‘SC’ filter) for skin tone
or the volume of black and white pixels in the image; this is
especially useful for fraud or pornography related investiga-
tions because you can sort by skin tone for nudity or black
and white for scanned typed documents. Not only that, but
the whole file item pane can be docked or undocked from the
main interface so if you have a dual screen system you can
drag the pane (with Gallery button selected) across to one Figure 16. [Un] Dock the File Item Pane
screen and maximise it to show a larger list of graphics, leav-
ing the other screen with the remaining XWF panes. To [un]
dock, click the 3 vertical dots to the left of the ‘Preview’ button
in the bottom right pane, see Figure 16.
Like all areas of XWF, what the gallery view shows you
depends on the options and filters you have set. If you right
click a folder to recursively explore its content, but don’t
have any other filters enabled, the Gallery View will attempt
to show you a thumbnail of every file, and it will obviously
succeed if the file is a picture, whereas it will fail if it is not as
shown in Figure 17.
Based on what you have read so far, you have probably
realised that the Gallery View can be further refined to not
show files that are known system files, duplicate files, already
viewed files, and so on, so that you are then only shown Figure 17. Gallery View with no file filters enable
pictures that are actually pictures in the Gallery view, Figures
18 and 19. The list of display options is practically endless. the image into a new case has facilitated everything you have
seen so far. With other tools, it would have taken hours to
/ Refine the Volume Snapshot (RVS) have arrived at this point, or it may even have required the
At this point, readers who routinely use XWF will be installation and configuration of huge database systems
wondering why I have not yet covered the central aspect of the requiring a considerable installation and configuration effort,
tool called the ‘Volume Snapshot’, and the refinement of it, not to mention a restriction on case portability; something
which is found via the ‘Specialist > Refine Volume Snapshot’ that is no issue with XWF.
menu. I have left the explanation of it until now because I The RVS is effectively a built-in ‘pre-processing’ facility
wanted to demonstrate to you just how much you can do that allows you to specify how the data in your case is further
with XWF in just a couple of minutes, without actually having refined and/or expanded, following that initial and brief file
processed much more of the forensic image. Just dropping system traversal of the image when it was first added.
53
/ Disk Imaging
Besides the obvious benefits of using XWF for analysis, it also
makes for a superb imaging system. So much so that the stripped
down “Imaging Only” version is not free of charge (though it only
costs about £100), despite many mainstream digital forensics
outfits releasing free imaging solutions. The reason it is not free,
I expect, is because it blows the socks off every other Windows
based imaging system that I know of. As with most aspects of
XWF, I can’t explain all of its advantages and features here, but I
encourage you to explore it and the help manual.
Without creating a case, you can simply add any connected
Figure 18. Changing the filter to show files of type ‘Pictures’ device by either pressing F9 (or ‘Tools > Open Disk’ and then
selecting either the logical or physical device to add. Once
The options are fairly self-explanatory, see Figure 20; suffice chosen, simply press Ctrl + C to capture an image (or ‘File>
to say that it conducts a sequence of further analysis across Create Disk Image’). You are then presented with the dialogue
the image, such as examining and expanding all compressed box shown in Figure 21.
archives (zip, tar etc) and e-mail cabinets (pst, dbx, edb etc), Just as with most tools, you can choose either the raw or
files are hashed using one of many hashing algorithms and E01 image formats; both have various options but I’ll discuss
matched against any hash set you wish, a thorough search for the commonly chosen E01 format here.
lost partitions and files along with data carving if requested You can define the sector range to capture (useful if you
and, as usual, you can dictate whether to apply the refinement have a problematic disk), you can choose what hash algorithm
to all files, files that meet a certain filter criteria, just files that to use, whether to encrypt the image or not, how much to
have not already been excluded/hidden or a list of selected/ split the image by (if at all) but most impressive of all are the
tagged files. The ability to then go straight on and conduct compression options.
indexing is also available and files that you have already Most forensic tools utilise the open-source gzip
compression system that provides the familiar “1 to 9” scale
but XWF have devised their own levels of compression and
they are very effective indeed at intelligently compressing
only data that can be compressed in accordance to the level
you specify, as opposed to blindly compressing everything, or
not, to a specified level, regardless of whether it can actually
be compressed, or not. I conducted some tests of the imaging
speeds at various levels of compression and compared it to
FTK Imager and the Tableau Imager (TIM). I found it to be the
most versatile and efficient of them, only losing out to TIM
when using the very highest compression option that XWF
allows, and even then, the generated image was the same size
as the one created by TIM.
Figure 19. Gallery view with ‘Pictures’ filter enabled
54 Digital / ForensicS
/ Evidence Containers
Lastly, this article would be incomplete without mention of the
evidence containers of XWF, which incorporate their own file
system that is optimised for the number of files to be added to it.
Those of you who attend large business addresses will often
be in a situation where you cannot conduct a full disk image but
will instead opt to capture a certain directory or directories of
files. Though all mainstream tools have incorporated this idea
in some way, XWF does it very well! It is specifically designed
for capturing variable amounts of live files in a very robust
and rapid way. Very recently a practitioner on our team had to
capture 12Gb of live files from a running server. Having started
this process using the AD1 custom image format of FTK Imager
and it reporting that the expected time remaining was three
hours, he tried using XWF. The resulting time taken was just 62
minutes. FTK Imager might be free, but if you work in an arena
where the option of capturing live files much faster is appealing,
Figure 20. The ‘Refine Volume Snapshot’ dialogue then I suggest you invest in XWF and use their evidence
container format. The only ‘issue’ is that you have to use XWF to
In addition to the imaging aspects, you can also ‘simply’ examine the evidence container, but this is no different from the
clone a disk. With version 16.0 onwards, not only can you other forensic tools that incorporate the idea.
clone from the start to the end of the disk, but you can also To create a container, Specialist –> Evidence File Container
clone backwards! To clone a disk, add the media in the same > New. Select or deselect the options you require (including
way as before but choose ‘Tools > Disk Tools > Clone Disk’ a decision as to how many files you want to optimise the
and select, or deselect, the option you require (Figure 22, from container to hold), add some additional metadata and click
XWF 15.9). “Next” (Figure 23). Having given XWF a location to save the
Our team has encountered many disks over the years container to, you then just continue to work in the program as
that can only be imaged from the start to a certain point on normal until you find files that you want to add to the container.
the disk; perhaps 75% through. At that point the imaging As and when you want to add folders or files to
process may fail. Using most forensic imaging and analysis the container, just right click them and select “Add to
tools, you have to accept that the evidence might be lost ContainerName.ctr” and you are presented with options for
from that disk because the partial image cannot be used due the folder(s) and file(s) you have selected (Figure 24). As
to being incomplete. However, with XWF, not only will it (in usual, select or deselect the options you want (the lesser the
most instances) still be able to open the partial E01 image options, the faster the process) to use and click “OK” to start
and present you with the majority of the data but you can the acquisition process.
then go on to clone the remaining area of the disk beyond
the damaged region and then add the “mini image” into your / RAID Analysis
case to conduct a file carve using the “RVS > Particularly XWF is famous for its ability to reconstruct RAIDs. It’s a huge
thorough file system search” to recover any other remaining topic and I cannot cover it here and do it justice, but trust me
files. In a case we had recently, a further 20K files were if you need to rebuild a RAID (any RAID), try XWF. I have even
recovered in this way beyond a damaged area of the disk, used it to add two physical disk RAID components connected
not to mention the ability to examine the partitions, folders via write blockers to XWF, reconstructed the striped RAID as a
and files of the partial incomplete image. Something that new evidence object within XWF, and then captured a physical
was not possible without XWF. image of that reconstructed RAID, as a complete and single
55
E01, that can then easily be used with any forensic tool of
your choice, EnCase, XWF, FTK and so on without any further
rebuilding. This is as opposed to imaging each disk separately
and then having to use XWF to piece them together as a RAID;
it’s all about providing options. My colleagues and I have had
great success in this area with XWF.
To rebuild a RAID, just add the images of your physical
disks, go to ‘Specialist > Reconstruct RAID System’, enter the
images in the order you suspect them to be (you can re-order
them as many times as needed), select the RAID type and then
the stripe size. If successful, a new evidence object will appear Figure 22. Cloning a disk
with your directory structure for the RAID.
/ Memory Analysis
If you capture the RAM of a running computer using a tool like
“DumpIt” (http://www.moonsols.com/2011/07/18/moonsols-
dumpit-goes-mainstream), you can add the image to XWF as
a logical image and it will recognise it as a memory image and
parse for you! You can conduct a header search for complete
files by again using the RVS feature.
/ Summary
XWF is fast, portable and powerful requiring minimal hardware
to run well and it’s a fraction of the cost of most mainstream
applications. Though powerful hardware is not essential
to run and use XWF, if it is used on powerful hardware with
plenty of RAM, it will process a case of dozens of images Figure 23. Preparing an XWF Evidence Container
containing millions of files and not even break a sweat.
Recently introduced features include the long awaited ability
to examine Microsoft Exchange e-mail systems (16.1-SR6 or
above recommended).
The X-Ways Software Technology team are hugely
responsive to feedback and ideas and generally respond to
support requests within a day or less (www.winhex.net) and
often provide individual replies to specific users who have
reported problems.
Once learnt, it is a tool for everyday forensics; more so than
most, in fact. Of course, you can also use it for all the in-depth
stuff, just as everyone knows.
It allows you to get things done quickly and effectively. Yes,
there is a learning curve to begin with that exceeds that of Figure 24. Adding files to an XWF Container
most forensic tools but only due to the immense features and
options provided. If you are reading this then you should not
be someone who is averse to learning. There is a saying in / Author Bio
the Linux community “When we are children, we look at the Ted Smith has been attached to HM
pictures. As we grow up, we learn to read”. In other words, just Revenue & Customs, Criminal Investigation
Directorate in the United Kingdom as a
because something is a little more difficult to use initially does digital forensics investigator for 9 years.
not mean we should shy away from learning how to use it at all. His work entails the examination of digital
I recommend the official training course delivered by evidence for a range of subjects from
X-Ways Software Technology AG that really enables you to various tax and VAT related frauds to the
importation of indecent images and other border offences.
use the tool at its best. Also, Jens Kirschner provides training He has sat on the committee of ‘F3 – The First Forensic
classes for budding XWF users; he delivered a course to my Forum’ since 2005 and has conducted in-depth studies
colleagues and I recently, and we were very satisfied with the of Linux cryptographic filesystems whilst conducting
standard of training (http://www.jens-training.com/). Other postgraduate education at Cranfield University
He is also a freelance photographer (www.
than that, the best way to learn anything is “by doing” so I tedsmithphotography.com) and, for fun, dabbles in
encourage you all to just keep using XWF, read the manual, programming. Contact him at [email protected]
and you’ll soon be hooked. /
56 Digital / ForensicS
Forensic Computing
12-month student placements
Undergraduates: Postgraduates:
August 2010–July 2011 June 2010–May 2011
CRYPTANALYSIS USING
DISTRIBUTED SYSTEMS
A project to create middleware for distributed cryptanalytic applications
by Charmaine Anderson & Stilianos Vidalis
/ INTERMEDIATE
N
ormally if you ask a person “what is a password?” all Computation to merge DNA with Frontier Grid. This product
they can tell you is that it is something you need to log is now used within the United States Ministry of Defence and
into a computer, email account or social networking various businesses across the country.
site. Although passwords are one of the most common
phenomena in the computing world, not many people can fully / Cryptanalytic Algorithms
appreciate what they are or why they are needed. Due to the different types of cryptography available, there
A password is a form of user authentication, they are are number of different attacks that can be used in brute-
assigned to a user through a ‘unique identifier’ (UI), such as a force applications:
username or email address, and are only associated with that
UI. The user is then able to input the UI and password, the • Ciphertext-only
computer or website will check these against each other and • Known-plaintext
decide whether or not they are associated with each other, • Chosen-plaintext (chosen-ciphertext)
which then allows or denies access. • Related-key attack
Within Windows, this is known as an NTLM or SAM Hash.
This is an encryption scheme created by Microsoft which There are a great variety of attacks that fall under the categories
will make a password ‘unreadable’. This is stored within mentioned above, some of the more popular attacks are:
the registry and/or SAM File (a username and password
storage file for every account on the machine); when a user • Differential Cryptanalysis (mathematical)
inputs the password, Windows will encrypt it and check it • Linear Cryptanalysis (mathematical)
against what has been stored. Under Linux, passwords are • Exhaustive Key Search (trial-and-error)
stored within the “.passwd” file (similar to the SAM File
found in Windows). There is one significant difference that separates hashes
There are many password crackers and brute-forcers that from all other encryption methods; in an encryption, it is
have been made available over the years, such as: possible to encrypt plaintext to ciphertext and back again,
whereas once plaintext has been hashed to ciphertext it
• Brutus is not possible to retrieve the original plaintext from the
• Cain and Abel resulting value. Therefore, mathematical attacks on these
• John the Ripper are not possible; the only attack that can be used is the
• L0phtcrack exhaustive key search.
• RainbowCrack Exhaustive key search is a term used by cryptographers,
otherwise known as a brute force attack. A simple description
However, these tools use the processing power from a of the attack is that it is “a trial and error method of trying
single node or computer in order to crack the passwords; every possible combination of characters against the
this can often become time consuming depending upon the encrypted data in an attempt to discover the key” (Cobb,
strength of the password under scrutiny. 2004). However, Ferguson et al. (2010) say that it is used on a
The solution to this is to utilise the method of parallelism “target object”, this is usually the key but the generalisation
found under the subject area of distributed systems. So leaves this open for other forms of data as well.
far, I have only come across a few tools which utilise this It is possible to say that this attack is a simple yet effective
method. An example is Distributed Network Attack (DNA), it method of cryptanalysis that is confirmed successful when
was created by AccessData in order to utilise the processing “the resulting plaintext is meaningful” (Schneier, 1996); on
power of many nodes for the purpose of speeding up the other hand, “in practice, a brute-force attack can be more
password and data recovery. After having some trouble complicated because incorrect keys can give false positive
managing the parallelism they teamed up with Parabon results” (Paar and Pelzl, 2010).
58 Digital / ForensicS
Paar and Pelzl (2010) also state “It is important to note Supercomputers can also be found under the title of
that a brute-force attack against symmetric ciphers is always distributed systems; although a supercomputer sounds like
possible in principle. Whether it is feasible in practice depends a single machine, it is in fact made of a variety of different
on the key space ... If testing all the keys on many modern components in a cluster. However, this method can be quite
computers takes too much time, the cipher is computationally expensive, therefore newer methods of distribution and
secure against a brute-force attack.” parallelism are being utilised across the globe. Grids and
It is for this reason that Schneier (1996) states that “without virtualisation are being used in order to reduce procurement
special purpose hardware and massively parallel machines, and power costs.
brute-force attacks are significantly harder” (Schneier, 1996). Over time, it has become the ‘norm’ to test crypto-systems
Cobb (2004) is able to back this up with her statement that using various methods of distributed computing and parallelism.
“in some cases, computers working in parallel can be more Providing more computational power to solve the various
powerful than one of the most powerful computers used by the algorithms and equations that are available enables researchers
NSA”. She also provides the example of RSA Laboratories RC5 to quickly and efficiently find weaknesses; which in turn allows
competitions when, in 1997, a ‘distributed computing effort’ for the recommendation of new and improved ciphers.
was able to crack the 56-bit encryption in less than 250 days.
/ Middleware
/ Distribution Using a distributed system to perform the complex
It is very difficult to define a distributed system; Oxford calculations works by taking a large task and splitting it into
Dictionaries (2010) use the definition of “a number of independent smaller, more manageable tasks for each machine to perform.
computers linked by a network”. Although this is true, it does not The results are then relayed back to a server and stored ready
explain the purpose. Professionals and practitioners in the area for the ultimate task to be complete. Middleware is used
argue that there is no single universal definition of a distributed in order to manage the smaller tasks and provide a reliable
system, there are too many grey areas that cause confusion; method of message passing between the nodes.
instead, it is best to define these through their properties: We are designing a multi-server distributed application,
which runs on a client-server environment and brute-forces
• Several independent ‘computational entities’ where each passwords. Brute-force refers to a style that does not include
has its own local memory any shortcuts to improve performance, but instead relies on
• Communication is made through message passing sheer computing power to try all possibilities until the solution
• Failure toleration of individual computers by the system to a problem is found. The application, named ‘Vrutos’, will
• The structure of the system may change during the be designed for implementation within a new Government
execution of a distributed program due to different kinds of initiative named ‘High Performance Computing Wales’, or
computers and network links existing on the system HPCW, in which 1,400 nodes across Wales will be utilised to
• Each computer has a limited, incomplete view of the system, create an easily accessible Network Grid; the aim of which is
and may know only part of the input to provide a high-performance computing infrastructure to
• There are different elements and objects of a program being education, businesses and a variety of research areas.
run or processed using different computer processors Vrutos is making use of a three-tier architecture. Three-tier
architecture introduces a server (or a “controller”) between
Distributed systems cover a wide variety of computational the client and the server. The controller can provide translation
networks such as the Internet or more localised computer clusters. services, metering services, or intelligent controller services (as
There are systems available that connect computers together to in mapping a request to a number of different servers, collating
work as one, traditionally for scientific or mathematical research the results, and returning a single response to the client).
that is far too complicated and time consuming for a single This three-tier architecture is part of the Multi-tier
machine to calculate in a reasonable amount of time. model, they are incredibly useful for flexible and reusable
59
applications; by breaking an application up into tiers it The application can be controlled by the user to add or
is possible to modify specific layers as opposed to entire remove machines within the host pool; single-CPU machines
applications. The three-tier architecture that we used for the and hardware multiprocessors can be used. The ability to add
pilot consists of the following layers: and remove machines is an important feature of fault tolerance.
Applications running in the PVM may view the hardware
Presentation environment as an “attributeless collection of virtual
• Providing the user interface, processing elements” or the environment may be viewed
• Communicating with the middle layer, to allow for selection of appropriate hardware for specific
• Logic/Data Access: tasks. “The PVM system supports heterogeneity in terms of
• Authenticating the Clients, machines, networks, and applications” (netlib, 2011).
• Maintaining and managing history and back-up logs, The programming languages that are supported are C, C++
• Maintaining system and data integrity, and FORTRAN. New applications can be written using available
• Analyzing, fragmenting and assigning to nodes PVM libraries, or existing commercial software may be altered
brute-force requests. in order to support the use of PVM (the aim of which is to
utilise the shared resources within the virtual machine).
Data
• Consists of database servers / Benchmark
• Information is stored and retrieved RSA Laboratories held a number of competitions during a
• Improves scalability and performance ten-year period starting in 1997. There were different cipher
messages that each used an RC5 encryption key, the purpose
/ Experiment was to find the correct key by deciphering the message. The
In order to prove this concept, a research cycle was conducted keys for the ciphers increase in size, which in turn increases
to create the pilot application so that it could be tested the time taken to solve each:
against a benchmark. The pilot application was not designed Over the 10 years that the competitions were run, only 4 were
to break passwords, but instead to perform cryptanalysis on completed. Distributed.net is currently still running the 72-bit
a well researched cipher; this ensured that all features of the competition, having completed only 1.527% of the key search in
application were working correctly. March 2011; the time that this has been running has totalled 3,023
days so far with an estimation of a further 31,113 days before
/ Platform completion. The estimated completion is based on the number
After careful research and consideration it was decided that of keys that need to be examined (4.722 x1021) and how many
a Distributed Virtual Machine (DVM) would be used as the keys are examined per second (2.76 x1011), as this a volunteer
platform from which to work; an open source platform known distributed computing effort the number of keys per second varies
as Parallel Virtual Machine (PVM) was selected. depending on the number of nodes connected at any one time.
The terms DVM and PVM can be used interchangeably;
some may describe this form of middleware as Distributed / Test algorithm
Parallel Virtual Machine (DPVM). PVM is a project that aims RC5 is a block cipher designed by Ron Rivest in 1994, RC is
to create middleware for use in parallel computing; it is sometimes known as Rivests Cipher; it was given patent in
designed to “Allow a network of heterogeneous Unix and/or 1998 by RSA laboratories. It consists of variable parameters
Windows machines to be used as a single distributed parallel for block size, key size and number of rounds, presented as
processor... The software is very portable; the source code, RC5-w/r/b where w is the word size (not to be confused with
available free through netlib, has been compiled on everything block size), r is the number of rounds and b is the key length
from laptops to Crays” (ORNL, 2011). (in bytes) (Schneier, 1996). The number of rounds can range
60 Digital / ForensicS
61
DIGITAL ARCHIVING
AND DATA RECOVERY
The challenges facing a computer museum in their attempt to preserve and archive digital data
by Ronnie Smyth
/ ENTRY
D
uring World War II a manor house and associated huts The museum starts its history of computing with a rebuild of
in Buckinghamshire, England was home to the Gov- the very first computer, Colossus. Again, this was the machine
ernment Codes and Cypher School. This organisation that was developed in secrecy to crack the German Lorenz
developed into what is more commonly known today as the code. Next is the Harwell Dekatron computer or “WITCH” as
Government Communications HeadQuarters (GCHQ). Bletch- it became known. This is believed to be the oldest working
ley Park was the primary decryption centre for intercepted original computer in the world. It is a machine that was
communications from German and other Axis countries. The originally designed to process complex maths equations for the
work done here provided vital information for the war effort physics department and works using decimal based Dekatron
and saw phenomenal advances in technology including the valves rather than binary. Continuing on we move into the
creation of Colossus, the first electronic programmable digital mainframe era of computing when massive machines would
computer, designed to crack the German Lorenz codes. service multiple users at a time. As examples the museum has
a working Elliot 803, an ICL 2209 and currently in the process
/ The National Museum of Computing of being restored is an Elliot 903. Moving on from mainframe
Important work continues at the Bletchley Park site and computers we move into the personal computing era starting
is currently home to The National Museum of Computing. from the PDP8 through BBC microcomputers, Amiga, Spectrum,
Its mission is to preserve and archive the development Dragon, Atari and Macintosh. There are also examples of
of computing from the Colossus computer onwards for specialist machines designed to assist industry such as the Cray
future generations to enjoy. The museum is run entirely by Supercomputer, Air Traffic Control, and analogue computers.
volunteers on a shoestring budget with the aim to get as
many working examples as possible to create an interactive
experience rather than a dead box display.
THE WORK DONE HERE
So much can be learnt from the previous experiments in the PROVIDED VITAL INFORMATION
early days of computing when there were no standards and so
many different approaches were taken. It is possible that the
FOR THE WAR EFFORT AND SAW
next brilliant idea and step forward in computing is lurking in PHENOMENAL ADVANCES
one of these ideas but sadly at the time the technology was
not available to make it work properly. We are already seeing
IN TECHNOLOGY
a flow back to previous ways of thinking with the movement
from a standalone PC to working on the cloud. This is only
one step away from multiple dumb terminals working from a
single central mainframe computer. A further example is the
movement towards Solid State Drives, which is based on the
core memory storage technologies of the 60’s. Without the
preservations of these machines it would be impossible to
make the comparisons or learn from past experience. Often on
the very early machines we come across undocumented hacks
that have been developed by the engineers to get a little more
out of the limited technologies of the time. This makes it even
more important to preserve the original machines rather than
the associated documentation.
63
64
65
/ ENIGMA
Colossus is often misquoted as being used to crack the enigma
code. Whilst the enigma code was being cracked at Bletchley
Park using the bombe machines, Colossus was being used to
crack the much more difficult Lorenz code. The Enigma was
based on a 3 wheel rotation. After every key stroke the lower
wheel would rotate around a single step. Once in every 26
steps of the first wheel changing it would engage with the
second wheel and the second wheel would rotate. The third
wheel would have the same mechanism with the second
wheel. In the later years of the war the German navy used an
enigma machine with 4 wheels. With every rotation it would
change the pathway through the machine and therefore
the outputted letter. The Lorenz codes worked on a similar
principle but with an encryption machine of 12 wheels making
it far more difficult to crack.
remain in alignment. However if the hard disk was powered techniques. Within this time the standards for backups
up and a read and re-write was performed then I would have may have changed multiple times and the backup media
faith in the medium and any failing devices could be cycled may have degraded. With the higher assurance required of
out. Ultimately as part of the maintenance schedule the data evidential integrity we might find that the backup media that
could be moved on to the larger and better backup systems. are currently in use are not suitable for long-term storage.
A further advantage of a hard disk is it modular design. If There is a requirement for an archiving standard to provide
the main PCB fails it is possible to replace it with another future proofing. This archiving standard should allow for
working PCB. If the heads fail it is possible to replace those easy emulation and lossless compression. There is also
or alternatively if it is found that there is a greater problem is requirement for a tested and trusted medium for which
then the platter could be removed. At all stages the data has the backups should be stored on. This medium should be
a reasonable chance of being recovered should the worst easy to interact with, have well defined standards, be easily
happen, thus preserving the data for future generations. maintainable if maintenance is required and have a modular
approach to assist in data recovery should it be required.
/ Copyright
Copyright laws have posed a problem for the archiving of / Conclusion
digital material for a very long time. This is especially so in the As you have seen there are many challenges being faced in
museum where we are attempting to archive the programs the archiving and preservation of digital media. Whilst many
rather than the data. The current copyright law is based upon of these issues have been resolved through standardisation
the law that has been applied to written works and in some of hardware key questions still remain about how best to
cases musical copyright. This has never really suited the preserve and archive digital material. This has impact on
requirement for digital media and has been very restrictive. digital investigations that are expected to preserve and store
Further complications arise as to who owns the copyright. digital data in evidentially sound conditions for extended
With software companies being acquired all of the time periods of time. These questions require answers now to avoid
and many software companies going bankrupt it is almost serious problems in the future. /
impossible to trace the ownership of the code. Luckily this has
been recognised in parliament and new legislation is being
proposed to exempt museums from copyright liabilities for the / Author Bio
purpose of archiving. Ronnie graduated from De Montfort
University with a First Class Honours in
/ Archiving Evidence Forensic Computing. During that time
he also worked for CY4OR as a Forensic
Whilst this article has focused on the current difficulties faced Computing Technician. He is currently a
in digitally recovering and archiving data from old machines research student at the Centre of Secure
there is a direct implication for the ways in which the industry Computing within De Montfort University
stores its digital evidence. It isn’t unforeseeable that in working towards a PhD. He is also a member of the Royal Corp
of Signals where he is involved in transmitting encrypted data
the future we may be required to reinvestigate computer
for UK Operations. In his spare time he is a volunteer at The
evidence from more than 30 years ago, just as today cases National Museum of Computing.
are reinvestigated due to new evidence or new processing
66
COMING SOON…
A Roundup of Features and Articles for Issue 10
T
he next issue is focussing on mobile phone forensics. The release of many operating systems and the almost weekly
release of new variants, coupled with the ever expanding capabilities of the mobile device make the field of mobile phone
forensics more and more exciting. Here’s what’s coming in Issue 10:
/ Chip-Off Forensics
This article is about the practice of forensic investigations – NEXT ISSUE PUBLISHED
when chips have been removed from the circuit boards, the
investigation becomes a complex and technically challenging FEBRUARY 2012
one. Some of the following areas will be covered; what it is,
how you do it, problems encountered and solutions found. Note: DFMag may change the planned
content of future issues without notice.
PLUS
All of our usual features: Apple Autopsy, 360, IRQ,
Robservations and Legal news & alerts.
67
SIFTER10
PROBES
A successful new approach to building
Deep Packet Inspection devices on
High-speed networks
by Mark Osborne
/ ADVANCED
T
his article describes the current strategies for performing
Deep Packet Inspection functions for security and network
management on high-speed networks; it illustrates the
significant drawbacks of these methods. The paper introduces
CyberSifts’ HANAC architecture and the patented massively
parallel search technology Dynamic Parallel Inspection.
You don’t need to be a technologist to realise that network
usage is escalating rapidly. Smart phones, mobile broadband,
WiFi and high-speed, even fibre-optic broadband in every
home is the cause of this network phenomenon. This massive
demand for cheap network capacity has caused a technology
convergence away from expensive, legacy technology so that
most large backbone networks within network providers,
telecoms companies or large corporate and utilities use TCP/
IP on high-speed 10 Gigabit Ethernet (Gbe).
However, as these technologies have become more ubiquitous,
so has their abuse, whether from malware/spam/phishing, DDoS
attacks, terrorism and or copyright infringement. In the last year
or so, there has been an increasing volume of regulation both in
US and Europe encouraging network providers to counter these
threats to the network economy.
But many practitioners are finding that at the higher
network speeds of 10Gb/s, 40Gb/s or even 100 Gb/s, the
traditional PC server based SPAM/AV UTM appliances, Web
filters and IDS simply can’t keep up; they are just too slow.
/ The problem
How can this be when 10Gb/s routing and switch hardware is
so plentiful and cheap? The answers are the same old story for
IP based networking; it is easier to send (or route) a packet in
the IP/Ethernet world than it is to secure it. Correspondingly,
the devices doing this security work need a lot more muscle.
Most of the security tasks described above, like SPAM
protection or Intrusion monitoring require Deep Packet
Inspection technology. Fundamentally, this means processing
every byte of the transmitted packet and comparing it to a
database of a 1000 security vulnerabilities – whilst a router
typically has to compare the four bytes of the packet address
to usually a much smaller routing database.
68 Digital / ForensicS
69
70 Digital / ForensicS
/ Passive monitoring
The features of HANAC are impressive, but they have been Figure 5. Snort Benefiting from Our Technology
implemented in Linux as a normal network driver. This means
that you don’t need to learn a whole book of commands to
use it; the standard ifconfig that is used for a normal Ethernet THE SIFTER10 RANGE OF PROBES
card works just fine (Note – there are also a full set of web
and gui based management tools for those that don’t like the
ARE ADVANCED APPLIANCES
command line) COMBINING POWERFUL SERVER
Also because the hardware appears as an NIC and uses
standard driver module conventions, we don’t require a
TECHNOLOGY, STATE OF THE ART
special version of the network capture library (libpcap) and we SOFTWARE AND REVOLUTIONARY
have no unusual restrictions on its usage or serialisation. This
means the probes can run virtually any popular, proprietary
HARDWARE ASSISTED NETWORK
Linux or Open-source network applications at these much APPLICATION CO-OPERATION
faster speeds. The bottom-line: you can use free/cheaper/
better tools on your carrier class networks.
(HANAC) SUPPORT
For example, everyone’s favourite open-source software
IDS, Snort, is designed primarily for enterprise networks Without HANAC, the effective bit rate measured at the Linux
and is a typical example of a high quality monitoring interface is about 3.5 Gb/s because some have already been
application. Normally, it can monitor a few hundred lost by the operating system and the hardware. With HANAC,
megabits of traffic with a standard NIC [1]. Using HANAC’s the interface only receives the pre-selected packets, which in
pre-emptive selection technique, Snort can monitor a this case produce a traffic rate below 200Mb/s, well within the
full 10GBps of traffic without modification or the need for safe operating range of most software applications.
clumsy load balancing across the interfaces.
Figure 4 shows attack detection by Snort under increasingly / Co-operative processing
higher loads. Notice that without HANAC, as the packet rate In addition to extending the lifetime of your existing software
per second increases beyond a few hundred Mbps, Snort assets, the Sifter10 has a powerful programming API so
loses more and more attacks, quickly becoming ineffective. advanced server software can task the hardware to collect
HANAC insulates Snort’s performance from extremely high network meta-data or programmatically modify access-lists to
traffic loads. block/forward particular types of traffic.
This isn’t magic; it is because HANAC is using full layer2-7 This cooperative model is exceptionally powerful as
deep packet inspection to pre-emptively select a population of it lets traditional software development technology be
packets or pre-qualify packets that Snort will be interested in. used to develop high-speed real-time network control
The other packets that are of no interest are not captured. This applications. Until now, these types of applications had to
keeps the effective data rate at the operating system much be developed in hardware or relied on indirect/inaccurate
lower and is shown in Figure 5. sampling techniques.
71
/ Packaging
As briefly mentioned above, the Sifter10 comes as a Linux
platform. It has Web based and GUI based rule management
software. This means straight-out of the box, it can be
deployed as a passive monitoring Snort IDS on a high-speed
10Gbe network.
The appliance can also be used to monitor up to about
ten 1Gb/s LAN segments using a hierarchy of aggregation
switches [2]. Also straight out-of-the-box, the unit can be
used as a hardware version of in-line snort. If the uptime is
a particular concern, high availability and cluster options
are available. For event management, the system is fully
integrated with Sguil. As an alternative, many customers
prefer the web-based software BASE.
/ Conclusion
More and more security and network professionals are using
utility hardware in conjunction with standard PC tools to solve
complex problems in a parallel manner but also in a cost
effective manner. CUDA the use of graphics card hardware is
another example of this.
The Sifter10 is the first product that is designed to enhance
PC software with hardware assisted massive parallel packet
inspection processing. It offers the discriminating user:
72 Digital / ForensicS
GET INVOLVED
/ Authors / Technical Tools/Application Developers
As we continue to strive to bring you the latest happenings Have you created a tool or application that you would like to
in the world of digital forensics, we are on the look out for share with others? If so, then contact us immediately.
anyone who has a story to tell or something to share that Many practitioners develop their own tools and applications
would benefit the wider profession. to deal with specific situations that arise. Rest assured that
If you are… you would not be the only one who will meet that situation. So
if you are prepared to share your tools with others, we have
• researching a particular aspect of digital forensics established a tools download section on the DFM website.
• have developed a new tool that you would like to share All tools will come with the normal safety warnings
• been involved in a case that has raised specific issues regarding their use, and using our outlet will get you feedback
from your peers.
…then we want to hear from you.
/ Technical Reviewers
If you have already written an article that has not been Do you have the time and ability to technically review an
published or even one that has been published with a limited article or tool/application? Then we want to hear from you.
distribution and you would like a wider audience, we are At DFM we are always on the look out for people who are
happy to discuss its suitability for any of our publications: willing to carry out technical reviews of articles or tools/
applications. We already have a waiting list of vendors who
• Magazine would like us to provide a technical review of their products,
• Web White Paper if you would like to join our team of technical reviewers; then
• Newsletter contact us now.
Technical reviews will be published on the website and on
/Bloggers occasion in the magazine, with the review fully attributed to
If you want a slightly less formal outlet than the web site or the reviewers, if they so wish. You must not be a competitor
magazine, but still have something to say, we still want to hear or employee of the vendor who is supplying the technology
from you for the DFM Blog and/or newsletter, if you: for review, and you must have the skills and facilities to carry
out any review. This is ideal for universities or those who have
• have an opinion on a recent news item access to labs or those who have their own lab.
• a short story to impart
• need an outlet for your frustration / DO YOU WANT TO GET INVOLVED?
If you would like to get involved in any way, then drop us a line
We are looking to identify a number of you who would like or send an email to [email protected]
to be regular contributors to the Blog or maybe provide less providing a short biography and what aspect of DFM you would
formal articles for the newsletters. like to get involved with. We will then send you further details
on how to proceed, in the area you have chosen.
Join the virtual team here at DFM and “Get Involved”
73
BACK ISSUES
Digital Digital
The Quarterly Magazine for Digital Forensics Practitioners The Quarterly Magazine for Digital Forensics Practitioners The Quarterly Magazine for Digital Forensics Practitioners The Quarterly Magazine for Digital Forensics Practitioners
ForensicS ForensicS
Books, books and Win one of 3 copies of
yet more books… WinHex Professional
/ magazine / magazine
1 NOVEMBER 2010 1 FEBRUARY 2011 1st may 2011 AUGUST 2011
and training requirements for law enforcement & tools are used as a result of Situational Awareness analysis of large multi lingual
9 772042 061103 9 772042 061110 9 772042 061110 9 772042 061110
Issue 5 / £11.99 TR Media Issue 6 / £11.99 TR Media Issue 7 / £11.99 TR Media
data sets Issue 8 / £11.99 TR Media
/ REGULARS / INTRODUCING / Book Reviews / FROM THE LAB / REGULARS / INTRODUCING / Book Reviews / FROM THE LAB / REGULARS / FROM THE LAB / INTRODUCING / Book Reviews / REGULARS / FROM THE LAB / INTRODUCING / Book Reviews
LEGAL NEWS, 360, Sean Morrissey’s brand 3 great books from Frazer Lewis on LEGAL NEWS, 360, ROB LEE’S brand new Dissecting the Hack George Bailey on more robservations, 360, peter jones looks our new legal editor hacking the human robservations, 360, Ted Smith looks at our new FEATURE ON Digital Forensics
IRQ… AND MUCH MORE new column: Apple Autopsy Syngress and Apress Anti ForensicS Tools IRQ… AND MUCH MORE column: ROBSERVATIONS Pro-Pen Testing Netflow forensics news, irq & more… at cellebrite pa v2 scott zimmerman windows registry forensics news, irq & more… X-Ways Forensics Biometrics & Forensics with Open Source Tools
DF5_OFC_Cover - Online.indd 1 2/11/10 08:00:27 DF6_OFC_Cover - Online.indd 1 29/01/2011 15:22 DF7_OFC_Cover - Online.indd 1 20/04/2011 17:57 DF8_OFC_Cover - Online.indd 1 22/07/2011 10:09
/ The Ideal DF Course / Imaging Tool Performance / Genetic algorithms / Latent Semantic Indexing
/ Training in Law Enforcement / Netflow Forensics & digital forensics / E-discovery tools
/ DFM Training Survey Results / Cyber Security / Commercial grade spyware / Image processing
/ Mac Forensics Training Situational Awareness / Cell site analysis / Hacking the Cloud
/ Ethics in Computer Forensics / WiFi Forensics / Imaging a MacBook Air / Digital forensics in
/ Certiifications and their Role / WARPS – a Framework for / Advanced cyber probes Sri Lanka
/ Criminal Profiling Timely Information / Cellebrite pa v2
/ Effectiveness of Public / Mac OS X Network Primer
Domain Anti-Forensics Tools / Criminal Profiling
/ Steganography Application
/ Artifact Detection
ORDER ONLINE
www.digitalforensicsmagazine.com
/ ENTRY
A
s a digital forensics practitioner you ‘accept’ the and brother and Hanratty’s exhumed body. Ultimately the
evidence presented to you by your tools; as they CCRC endeavours were declared by the Court of Appeal to
say “data cannot lie” as long as your methodology have made “a strong case even stronger” and the CCRC was
adheres to scientific principles, that is. Practising in the US criticised for bringing the case in the first place.
you will observe the ‘Daubert Principles’ [Daubert v. Merrell Yet why, if the case against Hanratty really was so
Dow Pharmaceuticals] so that yours will not be junk science strong, did the CCRC refer it? If the forensic evidence flatly
testimony based on idiosyncratic, invalid, or unreliable contradicted the weight of evidence supporting Hanratty’s
science. Practising in the UK it may be that your concern is innocence how did the Court deal with this conflict? Most
with the weight of the evidence rather than the methodology importantly how careful was the court in 2002 in examining
you have employed. Wherever your location you are properly whether the forensic evidence justified its findings? When
qualified so that the court can have faith in the evidence you I started my analysis I underestimated how little real
present and for all those qualifications you are aware that information exists in the public domain, or how unhelpful
‘facts’ in the courtroom are rarely black or white. As Houdini, the FSS and the Court services would be to my investigation.
you extricate with integrity, from the intentions of lawyers Nevertheless a careful reading of the available documentation
with axes to grind while simultaneously explicating science raises a number of points calling into question the
and technology beyond the normal understanding of jury, surefootedness of the Appeal Court ruling.
judge and learned lawyer. Yours it is to capture truth in a
kernel and with forensics to focus the court upon it. The task
is Herculean, the wages of failure, hopes and reputations lost,
PRACTISING IN THE UK IT MAY BE
perchance life too. So it was not all that long ago in the United THAT YOUR CONCERN IS WITH THE
Kingdom that the directed gaze of the court extinguished the
life of James Hanratty.
WEIGHT OF THE EVIDENCE RATHER
This discussion is not about digital forensics directly but THAN THE METHODOLOGY YOU
focuses on DNA forensics. Nevertheless I hope you will find
it relevant, and thought provoking. The way that evidence is
HAVE EMPLOYED
collected, analysed and reported may have a serious impact
on the life and liberty of individuals and as such deserves all / So What Is This Case All About?
the care and attention we can muster and the avoidance of At approximately 9.30pm in August 1961 near Slough in
certainty where uncertainty exists. Buckinghamshire someone hijacked a car driven by Michael
I came upon the case of R v. Hanratty in 2007 when Gregsten and containing his lover Valerie Storie. About 9 hours
researching for an Honours degree in Forensic Computing. The later Gregsten and Storie were found in a layby. He had been shot
research remit was crime scene protocols and R v. Hanratty twice in the back of the head with a .38 Enfield revolver and was
seemed to provide fertile ground. In this particular case it dead; she was alive but had been raped and shot five times.
appears that due to the intent of the court to focus on one Since Hanratty’s execution for the murder of Gregsten, and
particular aspect of the forensic evidence presented to it that by inference, the rape and shooting of Storie copious copy
other highly relevant and potentially critical decision altering has been produced highlighting areas of dispute between
information was missed. I shall leave it to you to decide if the those believing in Hanratty’s innocence and those believing
decision of the Appeal Court was correct. in his guilt. Elucidatory starting points are the BBC Horizon
Hanratty’s execution in 1962 elicited from the outset program “The A6 Murder” at http://www.bbc.co.uk/science/
claims of a miscarriage of justice. Finally the Criminal Cases horizon/2001/a6murder.shtml., HANRATTY- The Final Verdict
Review Commission (CCRC) in 2002 referred the evidence to by Bob Woffinden, or Paul Foot’s Who Killed Hanratty?
the Court of Appeal. The Forensic Science Service (FSS) in It is important to reiterate that the evidence was deemed
the UK conducted fresh DNA investigations using the latest convincing enough to persuade the CCRC to take it to the
techniques on a handkerchief in which the murder weapon Court of Appeal. For the purposes of this article I am just going
was found and on a piece of semen stained underwear. to concentrate on the handling of the forensic evidence within
Results were compared with DNA from Hanratty’s mother the investigations and by the Court of Appeal.
75
76 Digital / ForensicS
77
78 Digital / ForensicS
79
BOOK REVIEWS
Extrusion Detection: detailed introduction to network forensics and describes it as
Security Monitoring for being different from digital forensics in that it is focused on
Internal Intrusions packet capture, using tools such as Wireshark/Ethereal. The
emphasis here, however, is the network forensics is a valuable
Author: Richard Bejtlich and crucial part in the defence of a network infrastructure
Publisher: Addison-Wesley both from internal and external threats.
Date of Publication: Followers of Richard Bejtlich’s Tao security blog will
8th November 2005 instantly recognise his unique method of describing and
Price: £39.99 (UK), demonstrating the various tools and techniques required to
$54.99 (USA) put extrusion detection into practice. Throughout the book
ISBN: 978-0321349965 there are valuable diagrams, screenshots and actual packet
Reviewer: Willem Knot captures that help the reader to fully understand each point
Verdict: that is made, a feature that is often overlooked in many
security guides.
This book is a valuable read for anyone interested, or
Despite being over six years old now, this book is certainly not working, in the security and forensics industry. Betjlich provides
outdated in the slightest. While most network security books a refreshing approach to defensive methods and illuminates the
and guides would focus on perimeter defence from outsider potential damage of insider threats. Highly recommended as a
threats, Bejtlich concentrates on attacks launched within the partner guide to ‘The Tao of Network Security’, which together
organisation. At the time of publishing, this book was unique provide an ultimate guide to network security.
in its approach to defensive practices and is aimed to go hand
in hand with Bejtlich’s ‘Tao of Network Security’, picking up
where Tao left off and concentrating solely on defence, where XBOX 360 Forensics:
Tao started from the point of view of the attacker. A Digital Forensic Guide
First thing to notice about this book is the foreword by to Examining Artifacts
Marcus Ranum, which, unusual to most books, consists of
an interview with the author and highlights how different Authors: Steven Bolt
extrusion detection is from other network security guides. Publisher: Syngress/Elsevier
The book is aimed at all those who have an intermediate Date of Publication:
to advance knowledge of network security and so should be 7th February 2011
used by those just starting out in the industry, especially as Price: £36.99 (UK), $59.95
Bejtlich talks about tools and techniques that, at the time of (USA)
writing, were not common practices amongst professionals. ISBN: 978-1597496230
However, it holds great potential value as an addition to Reviewer:
anyone’s security/information assurance library. Willem Knot
Traditionally, the main focus of network security has Verdict:
been about keeping the hackers and malicious users out.
The book is split into three specific sections, Detecting and
Controlling Intrusions, Network Security Operations and XBOX 360 Forensics offers a fairly in-depth introduction
Internal Intrusions, taking the reader on a journey from into the world of games console forensics and the tools and
the reasons to look for extrusions through to the various techniques required to carry out investigations into next-
types of extrusion, such as malicious IRC Bots. Bejtlich generation games consoles.
uses various technologies, such as Proxies and IDS/IPS, as As popular gaming platforms become more and more
demonstrations using commands that can easily be adapted sophisticated, using their own operating systems and accessing
into organizations’ own technologies. the Internet for various types of transactions, the potential for
To those specifically interested in network forensics, Bejtlich illegal and malicious activity is dramatically increasing.
devotes an entire chapter to just this and discusses the links Bolt starts the book with a detailed description of the XBOX
between the security practices discussed throughout the book 360 system, the setup process and how to sign up, and connect
and the forensics practices used within the chapter. Incident to, the social aspects of the XBOX 360 gaming experience:
response is also explained prior to forensics. Bejtlich gives a XBOX Live. It is this social outlet that is the main cause of
80 Digital / ForensicS
81
IRQ
Planes, packets and IP mobiles...
A
few years ago, I was called in to help with an interesting addresses as most of it is voluntary, but over the years it has
little job. It’s one of those where it’s probably best not become a bit more reliable and some sensible assumptions
to go into too much detail, but suffice to say we were about associated FQDNs can help in the interpretation. Given
dealing with a fairly serious conspiracy. the nature of the case, I was willing to at least try.
Intelligence had led to successful observation and arrest Most of them related to a common UK mobile phone
of a few suspects and one in particular was thought to be the network and didn’t really help much as they could have
ringleader. The problem was that all the relevant activity was been anyone, but there was a batch of around 150 that
conducted on an online forum, and the suspect had no computer looked useful. They covered a one-month period and were all
with which to access it. However, he did have a mobile phone, associated with a mobile phone network in another country.
which never left his side. Of course, it was a smartphone, running Curiously, the same country that the main suspect had been
Windows Mobile (not that the O/S has any particular relevance). visiting at exactly the same time! Now, of course, that’s not
enough to be conclusive, after all, many people visit other
countries and buy local SIMs to keep costs down while they’re
I’VE ALWAYS BEEN A LITTLE there. Still, it was a nice coincidence.
SUSPICIOUS OF GEO-DATA Then we hit paydirt. A single IP address registered to a civil
aviation authority and clearly labelled in DNS as being for
ASSOCIATED WITH IP ADDRESSES one of their airport “pay as you go” Internet terminals. It had
AS MOST OF IT IS VOLUNTARY, BUT been used right in the middle of the suspect’s time in transit
through that airport on his way back from the other country,
OVER THE YEARS IT HAS BECOME and it never appeared in the forum again. Neither, for that
A BIT MORE RELIABLE AND SOME matter, did any of the other country IP addresses.
Either our man was very unlucky to have travelled at exactly
SENSIBLE ASSUMPTIONS ABOUT at the same time as the real ringleader, or he had a stalker
ASSOCIATED FQDNS CAN HELP IN who was setting him up. Funnily enough, he didn’t suggest
either of those explanations in court and is now spending
THE INTERPRETATION a considerable amount of time in one of Her Majesty’s
establishments for the criminally unlucky.
At the time in question, the agency conducting the investigation What’s the moral of this story? Location in 3D space is nice,
had two separate units – one for mobile phones and one for but it works even better if you can add the 4th dimension. /
computers. The mobile phone unit only dealt with phone activity
(call logs, SMS, cellsite analysis) and the computer unit didn’t do Twitter: marshalla99, Blog: marshalla99.wordpress.com,
mobile phones. Of course, because this was a phone, it had been e-mail: [email protected]
examined as a phone and no one had tried to extract any other
data from it. After a few minutes of incredulity, I asked the obvious
question: “Can anyone get the web cache off this thing? “ / Author Bio
If time had allowed, I was pretty sure that we would have Angus Marshall is an independent digital
found fragments of pages from the forum somewhere in the forensics practitioner, author and researcher,
currently working on the ‘fitness for purpose’
cache. Unfortunately, time didn’t permit. However, we did have challenge. In a past life he was an academic
a copy of the forum, including times, dates and IP addresses course leader in Digital Forensics and Forensic
for all the messages posted by the ringleader under his online Computing and still retains strong links with
academia, professional bodies and regulators.
identity. (Approximately 600 in total) He can be contacted through his company,
So, could I perhaps tell where they came from? Well, I’ve n-gate ltd. (http://www.n-gate.net).
always been a little suspicious of geo-data associated with IP
82 Digital / ForensicS