1 Digital Forensics 02
1 Digital Forensics 02
• Binary to text
• ASCII (128 characters / 94 printable)
• File Carving
• File carving requires to locate and mine out files from amorphous blobs
of data (e.g., unallocated space) The first step in the file carving process
is to identify the potential file (normally from the header, if it has one).
Once the footer is found, the file can be extracted through a simple
copy and paste as long as it is continuous.
FIGURE 3.1
One of the workstations in the West Virginia State Police Digital Forensics Lab located at the Marshall
University Forensic Science Center. (Courtesy of Cpl. Bob Boggs).
Hardware & Software in a digital forensics Lab
Table 3.2 Some hardware and software tools that may be found in a digital
forensics laboratory
Tool Use URL
Forensic Toolkit Multipurpose tool (acquisition, http://accessdata.com
Access Data Group, LLC verification, searching,
reporting, wiping, etc.)
EnCase Multipurpose tool (acquisition, http://www.guidancesoftware.com
Guidance Software, Inc. verification, searching,
reporting, wiping, etc.)
SMART & SMART for Linux Multipurpose tool (acquisition, http://www.asrdata.com/forensic-
ASR Data, Data Acquisition verification, searching, software/
and Analysis, LLC reporting, wiping, etc.)
X-Ways Forensics Multipurpose tool (acquisition, http://www.x-ways.net/forensics/
X-Ways Software verification, searching,
Technology AG reporting, wiping, etc.)
Helix3 Pro Multipurpose tool (acquisition, http://www.e-fense.com/products.php
e-fense, Inc. verification, searching,
reporting, wiping, etc.)
Softblock, Macquisition, Multiple Macintosh forensic https://www.blackbagtech.com/
Blacklight tools forensics.html
BlackBag Technologies, Inc.
Mac Marshall Multiple Macintosh forensic http://www.macmarshal.com/
Architecture Technology tools
Corporation
Raptor Linux-based acquisition and http://www.forwarddiscovery.com/
Forward Discovery, Inc. preview tool Raptor
Dossier Hardware acquisition http://www.logicube.com/
Logicube, Inc.
Forensic hardware tools Write blockers, bridges, http://www.tableau.com/
Tableau storage, acquisition
Wiebetech Storage, write blockers, etc. http://www.wiebetech.com/home.php
Preparing a Computer Investigation
• Your role as a computer forensics professional is to
gather evidence from a suspect’s computer and
determine whether the suspect committed a crime or
violated a company policy.
• You need to follow a well-defined methodology to
prepare the case
• By approaching each case methodically, you can evaluate the
evidence thoroughly and document the chain of evidence, or
chain of custody, which is the route the evidence takes from
the time you find it until the case is closed or goes to court.
Sample Crime Scene
• The police raided a suspected drug dealer’s home and found a
computer, several floppy disks and USB drives, a personal digital
assistant (PDA), and a cell phone in a bedroom.
2
Systematic Approach
• Make an initial assessment about the type of case you’re investigating
• Determine a preliminary design or approach to the case
• Create a detailed checklist (estimate amount of time for each step)
• Determine the resources you need
• Obtain and (forensics) copy an evidence drive
• Identify the risks
• Mitigate or minimize the risks
• Test the design (e.g., check that media are correctly copied)
• Analyze and recover the digital evidence
• Investigate the data you recover
• Complete the case report
• Critique the case (i.e., self-evaluation)
Case assessment
• Outline the case details systematically, including the nature of
the case, the type of evidence available, and the location of
the evidence
• Sample case (Company Policy Violation):
• Manager Steve Billings has been receiving complaints from customers
about the job performance of one of his sales representatives, George
Montgomery. George has worked as a representative for several years.
He’s been absent from work for two days but hasn’t called in sick or told
anyone why he wouldn’t be at work. Another employee, Martha, is also
missing and hasn’t informed anyone of the reason for her absence. Steve
asks the IT Department to confiscate George’s hard drive and all storage
media in his work area. He wants to know whether there’s any
information on George’s computer and storage media that might offer a
clue to George’s whereabouts and job performance concerns.
Sample assessment (con’t)
• Steve Billings had the IT Department confiscate all of George’s storage media that might contain
information about his whereabouts. After talking to George’s co-workers, Steve learned that
George has been conducting a personal business on the side using company computers.
Therefore, the focus of the case has changed from a missing person to a possible employee
abuse of corporate resources.
• Preliminary Assessment:
• Situation—Employee abuse case.
• Specifics of the case—The employee is reportedly conducting a side business on his employer’s
computer that involves registering domain names for clients and setting up their Web sites at local ISPs.
Co-workers have complained that he’s been spending too much time on his own business and not
performing his assigned work duties. Company policy states that all company-owned computing assets
are subject to inspection by company management at any time. Employees have no expectation of
privacy when operating company computer systems.
• Location of evidence—One USB drive recovered from the employee’s assigned computer.
Assessment (con’t)
• Case requirements:
• You now know that the nature of the case involves employee abuse of company
assets, and you’re looking for evidence that an employee was conducting a side
business using his employer’s computers. On the USB drive retrieved from
George’s computer, you’re looking for any information related to Web sites,
ISPs, or domain names. You know that the computer OS is Windows XP, and the
USB drive uses the FAT16 file system. To duplicate the USB drive and find
deleted and hidden files, you need a reliable computer forensics tool. Because
the USB drive has already been retrieved, you don’t need to seize the drive
yourself
• This is case the Domain Name case. Your task is to gather data from the storage
media seized to confirm or deny the allegation that George is conducting a side
business on company time and computers.
• Remember that he’s suspected only of asset abuse, and the evidence you obtain
might be exculpatory—meaning it could prove his innocence. You must always
maintain an unbiased perspective and be objective in your fact-findings.
Planning the Investigation
• You have already determined the kind of evidence you need; now
you can identify the specific steps to gather the evidence, establish a
chain of custody, and perform the forensic analysis.
• Acquire the USB drive from George’s manager.
• Make a forensic copy of the evidence drive (in this case, the USB drive).
• Process the copied evidence drive with your computer forensics tools.
Evidence Custody Form
• 34
Case number—The number your organization assigns when an investigation is initiated. Chapter 2
• Investigating organization—The name of your organization..
• Investigator—The name of the investigator assigned to the case. If many investigators are
assigned, specify the lead investigator’s name.
• Nature of case—A short description of the case. For example, in a corporate environment,
it might be “Data recovery for corporate litigation” or “Employee policy violation case.”
• Location evidence was obtained—The exact location where the evidence was collected. If
you’re using multi-evidence forms, a new form should be created for each location.
• Description of evidence—A list of the evidence items, such as “hard drive, 20 GB” or
“one USB drive, 128 MB.” On a multi-evidence form, write a description for each item of
evidence you acquire.
• Model number and/or serial number—List the model number or serial number (if
available) of the computer component. Many computer components, including hard drives,
memory chips, and expansion slot cards, have model numbers but not serial numbers.
• Evidence recovered by—The name of the investigator who recovered the evidence. The
chain of custody for evidence starts with this information. If you insert your name, for
example, you’re declaring that you have taken control of the evidence. It’s now your
responsibility to ensure that nothing damages the evidence and no one tampers with it. The
person placing his or her name on this line is responsible for preserving, transporting, and
securing the evidence.
• Date and time—The date and time the evidence was taken into custody. This information
establishes exactly when the chain of custody starts.
• Page—The forms used to catalog all evidence for each location should have page numbers. Figure 2-2 A sample multi-evidence form used in a corporate environme
List the page number, and indicate the total number of pages for this group of evidence.
Securing Evidence
• To secure and catalog the evidence contained in large computer components,
you can use large evidence bags, tape, tags, labels, and other products available
from police supply vendors or office supply stores.
• Be cautious when handling any computer component to avoid damaging the component or
coming into contact with static electricity, which can destroy digital data. (anti-static bags,
antistatic pad with an attached wrist strap).
• Be sure to place computer evidence in a well-padded container. Padding prevents damage to
the evidence as you transport it to your secure evidence locker, evidence room, or computer
lab.
• If the computer component is large and contained in its own casing, such as a CPU cabinet, you
can use evidence tape to seal all openings on the cabinet. Placing evidence tape over drive
bays, insertion slots for power supply cords and USB cables, and any other openings ensures
the security of evidence.
• As a standard practice, you should write your initials on the tape before applying it to the evidence. This
practice makes it possible to prove later in court that the evidence hasn’t been tampered with because the
casing couldn’t have been opened nor could power have been sup- plied to the closed casing with this
tape in place
• REMEMBER! Computer components require specific temperature and humidity ranges. If it’s
too cold, hot, or wet, computer components and magnetic media can be damaged.
Sample Formal Procedures
Internet Abuse Investigation: Misuse of an Organization’s internal private network
• Elements to consider:
• The organization’s Internet proxy server logs
• Suspect computer’s IP address obtained from your organization’s network administrator
• Recommended processing:
• Use standard forensic analysis techniques and procedures for the disk drive examination.
• Use specific tools such as DataLifter or Forensic Toolkit’s Internet keyword search option, extract all Web page URL
information.
• Contact the network firewall administrator and request a proxy server log, if it’s available, of the suspect computer’s
network device name or IP address for the dates of interest. Consult with your organization’s network administrator to
confirm that these logs are maintained and how long the time to live (TTL) is set for the network’s
• IP address assignments in case of Dynamic Host Configuration Protocol (DHCP) use.
• Compare the data recovered from forensic analysis to the proxy server log data to confirm that they match.
• If the URL data matches the proxy server log and the forensic disk examination, continue analyzing the suspect
computer’s drive data, and collect any relevant downloaded inappropriate pictures or Web pages that support the
allegation.
• If there are no matches between the proxy server logs, and the forensic examination shows no con- tributing evidence,
report that the allegation is unsubstantiated.
Sample Formal Procedures
E-mail Abuse Investigation: spam, inappropriate message content (harassment, threats)
• Elements to consider:
• An electronic copy of the offending e-mail that contains message header data
• For e-mail systems that store users’ messages on a central server, access to the server
• For e-mail systems that store users’ messages on a computer as an Outlook .pst or .ost file, for example,
access to the computer so that you can perform a forensic analysis on it
• Recommended processing:
• For computer-based e-mail data files, such as Outlook .pst or .ost files, use the standard forensic analysis
techniques and procedures for hard drive examination.
• For server-based e-mail data files, contact the e-mail server administrator and obtain an electronic copy
of the suspect and victim’s e-mail folder or data.
• For Web-based e-mail investigations, such as Yahoo or Gmail, use tools such as Forensic Toolkit’s Internet
keyword search option to extract all related e-mail address information.
• Examine Internet message boards, and search the Internet for any information about the company or product. Use Internet search engines to run
keyword searches related to the company, product, or leaked information.
• Examine proxy server logs to check for log activities that might show use of free e-mail services, such as Gmail. Track back to the specific workstations
where these messages originated and perform a forensic analysis on the drives to help determine what was communicated.
• Examine known suspects’ workstations, perform computer forensics examinations on persons of interest, and develop other leads on possible
associates.
• Examine all company phone records for any calls to known media organizations.
• Recommended processing:
• Interview management privately to get a list of employees who have direct knowledge of the sensitive data.
• Review company phone records to see who might have had contact with the news service.
• From the forensic disk examinations, analyze all e-mail correspondence and trace any sensitive messages to other people who haven’t been listed as
having direct knowledge of the sensitive data.
• Expand the discreet forensic disk acquisition and analysis for any new persons of interest.
• Consolidate and review your findings periodically to see whether new clues can be discovered.
• Report findings to management routinely, and discuss how much further to continue the investigation.
Sample Formal Procedures
Industrial Espionage: beware with cases involving foreign countries! [treated as criminal investigations]
• Elements to consider:
• Determine whether this investigation involves a possible industrial espionage incident, and then determine whether it falls under
specific local regulations.
• Consult with corporate attorneys and upper management if the investigations must be conducted discreetly.
• Determine the goal and scope of the investigation; consult with management and the company’s attorneys on how much work you
should do.
• Initiate the investigation after approval from management, and make regular reports of your activities and findings.
• Recommended processing:
• Examine all e-mail of suspected employees, both company-provided e-mail and free Web-based services.
• Search Internet newsgroups or message boards for any postings related to the incident.
• Initiate physical surveillance with cameras on people or things of interest to the investigation.
• If available, examine all facility physical access logs for sensitive areas, which might include secure areas where smart badges or video
surveillance recordings are used.
• If there’s a suspect, determine his or her location in relation to the vulnerable asset that was compromised.
• Collect all incoming and outgoing phone logs to see whether any unique or unusual places were called.
Interviews and Interrogation
• An interrogation is different from an interview. An interview is usually conducted to collect
information from a witness or suspect about specific facts related to an investigation. An
interrogation is the process of trying to get a suspect to confess to a specific incident or crime.
• If you’re asked to assist in an interview or interrogation, prepare yourself by answering the
following questions:
• What questions do I need to ask the suspect to get the vital information about the case?
• Do I know what I’m talking about, or will I have to research the topic or technology related to the
investigation?
• Do I need additional questions to cover other indirect issues related to the investigation?
• Make sure you don’t run out of conversation topics; you need to keep the conversation friendly
to gain the suspect’s confidence.
• Avoid doubting your own skills, which might show the suspect you lack confidence in your ability.
• Ingredients for a successful interview:
• Be patient
• Repeat or rephrase questions on specific facts
• Be tenacious
Workstation for Computer Forensics
• Workstation running the most appropriate OS
• Write-blocker device
• Computer forensics acquisition tool
• Computer forensics analysis tool
• Target drive(s) with enough storage capacity
• Spare HD ports (e.g., SATA)
• USB ports
• Additional useful components:
• Network interface card (NIC)
• FireWire ports
• SCSI card