0% found this document useful (0 votes)
19 views84 pages

Chap 3.2 ComputerForensics

The document provides an overview of computer forensics, defining it as the process of preserving, identifying, extracting, documenting, and interpreting computer data for legal purposes. It outlines various types of computer crimes, methodologies for forensic investigations, and the importance of handling evidence properly to ensure its admissibility in court. Additionally, it discusses the roles of different stakeholders in computer forensics and the steps involved in processing digital evidence.

Uploaded by

A0554
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views84 pages

Chap 3.2 ComputerForensics

The document provides an overview of computer forensics, defining it as the process of preserving, identifying, extracting, documenting, and interpreting computer data for legal purposes. It outlines various types of computer crimes, methodologies for forensic investigations, and the importance of handling evidence properly to ensure its admissibility in court. Additionally, it discusses the roles of different stakeholders in computer forensics and the steps involved in processing digital evidence.

Uploaded by

A0554
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 84

CYBER FORENSICS

Dr.K.Suresh Babu
Professor Of CSE
University College of Engineering Science & Technology
JNT University Hyderabad
Computer Crime
 Computer crime is any criminal offense, activity or
issue that involves computers
(http://www.forensics.nl).
 Computer misuse tends to fall into two categories:
 Computer is used to commit a crime
 Computer itself is a target of a crime.
 Computer is the victim.
Computer is Used to
Commit a Crime
 Computer is used in illegal activities: child
pornography, threatening letters, e-mail spam or
harassment, extortion, fraud and theft of
intellectual property, embezzlement – all these
crimes leave digital tracks.
 Investigation into these types of crimes include
searching computers that are suspected of being
involved in illegal activities
 Analysis of gigabytes of data looking for specific
keywords, examining log files to see what
happened at certain times
Computer Security Incident
 Unauthorized or unlawful intrusions into
computing systems
 Scanning a system - the systematic probing of
ports to see which ones are open
 Denial–of–Service (DoS) attack - any attack
designed to disrupt the ability of authorized users to
access data.
 Malicious Code – any program or procedure that
makes unauthorized modifications or triggers
unauthorized actions (virus, worm, Trojan horse)
Computer Forensics
 Computer Forensic Analysis
 Electronic Discovery
 Electronic Evidence Discovery
 Digital Discovery
 Data Recovery
 Data Discovery
 Computer Analysis
 Computer Examination
Definitions
 Computer Forensics involves the preservation,
identification, extraction, documentation and
interpretation of computer data
 Computer Forensics is the application of science and
engineering to the legal problem of digital evidence. It is a
synthesis of science and law.
 Computer Forensics, still a rather new discipline in
computer security, focuses on finding digital evidence
after a computer security incident has occurred
(http://www.forensics.nl)
Definitions
 Computer Forensics is the process of methodologically
examining computer media (hard discs, diskettes, tapes,
etc.) for evidence.
 Computer Evidence is often transparently created by the
operating system (OS) without the knowledge of the
computer user. The information may be hidden from
view. To find it, special forensic software tools and
techniques are required.
 Computer Forensics is about evidence from computers
that is sufficiently reliable to stand up in court and be
convincing
Methodology
 Treat every case as if it will end up in the court
 Forensics Methodology :
 Acquire the evidence without altering or damaging
the origin
 Authenticate that your recovered evidence is the
same as the originally seized data
 Analyze the data without modifying it
 There are essentially three phases for recovering evidence
from a computer system or storage medium. Those phases
are: (1) acquire, (2) analyze, and (3) report
(http://www.forensics.nl).
The Goal
The goal of computer
forensics is to do a structured
investigation and find out
exactly what happened on a
digital system, and who was
responsible for it.
(http://www.forensics.nl)
The Goals of Incident Response

 Accumulation of accurate information


 Establishment of control for proper retrieval and handling of
evidence
 Protection of privacy rights established by law and policy
 Minimization of disruption to business and network operations
 Preparation of accurate reports and useful recommendations
 Minimization of exposure and compromise of proprietary data
 Protection of organization reputation and assets
 Education of senior management
 Promotion of rapid detection/or prevention of such incidents in
the future (via lessons learned, policy changes, etc)
Definition

 What is Computer Forensics??


 Computer forensics involves the preservation,
identification, extraction, documentation, and
interpretation of computer media for evidentiary and/or
root cause analysis.
 Evidence might be required for a wide range of
computer crimes and misuses
 Multiple methods of
 Discovering data on computer system
 Recovering deleted, encrypted, or damaged file
information
 Monitoring live activity
 Detecting violations of corporate policy
 Information collected assists in arrests, prosecution,
termination of employment, and preventing future
illegal activity
Definition (cont)

 What Constitutes Digital Evidence?


 Any information being subject to human intervention or not, that
can be extracted from a computer.
 Must be in human-readable format or capable of being interpreted
by a person with expertise in the subject.
 Computer Forensics Examples
 Recovering thousands of deleted emails
 Performing investigation post employment termination
 Recovering evidence post formatting hard drive
 Performing investigation after multiple users had taken over the
system
Reasons For Evidence

 Wide range of computer crimes and misuses


 Non-Business Environment: evidence collected by Federal,
State and local authorities for crimes relating to:
 Theft of trade secrets
 Fraud
 Extortion
 Industrial espionage
 Position of pornography
 SPAM investigations
 Virus/Trojan distribution
 Homicide investigations
 Intellectual property breaches
 Unauthorized use of personal information
 Forgery
 Perjury
Reasons For Evidence (cont)

 Computer related crime and violations include a range of


activities including:
 Business Environment:
 Theft of or destruction of intellectual property
 Unauthorized activity
 Tracking internet browsing habits
 Reconstructing Events
 Inferring intentions
 Selling company bandwidth
 Wrongful dismissal claims
 Sexual harassment
 Software Piracy
Who Uses Computer Forensics?

 Criminal Prosecutors
 Rely on evidence obtained from a computer to prosecute
suspects and use as evidence
 Civil Litigations
 Personal and business data discovered on a computer can be
used in fraud, divorce, harassment, or discrimination cases
 Insurance Companies
 Evidence discovered on computer can be
used to mollify costs (fraud, worker’s
compensation, arson, etc)
 Private Corporations
 Obtained evidence from employee computers can
be used as evidence in harassment, fraud, and embezzlement
cases
Who Uses Computer Forensics? (cont)

 Law Enforcement Officials


 Rely on computer forensics to backup search warrants and post-
seizure handling
 Individual/Private Citizens
 Obtain the services of professional computer forensic specialists
to support claims of harassment, abuse, or wrongful termination
from employment
FBI Computer Forensic Services

 Content
 Comparison again known data
 Transaction sequencing
 Extraction of data
 Recovering deleted data files
 Format conversion
 Keyword searching
 Decrypting passwords
 Analyzing and comparing limited source code
Steps Of Computer Forensics

 According to many professionals, Computer Forensics is a


four (4) step process
 Acquisition
 Physically or remotely obtaining possession of the computer, all
network mappings from the system, and external physical storage
devices
 Identification
 This step involves identifying what data could be recovered and
electronically retrieving it by running various Computer Forensic tools
and software suites
 Evaluation
 Evaluating the information/data recovered to determine if and how it
could be used again the suspect for employment termination or
prosecution in court
Steps Of Computer Forensics (cont)

 Presentation
 This step involves the presentation of evidence discovered in a
manner which is understood by lawyers, non-technically
staff/management, and suitable as evidence as determined by
United States and internal laws
Handling Evidence

 Admissibility of Evidence
 Legal rules which determine whether potential evidence can be
considered by a court
 Must be obtained in a manner which ensures the authenticity and
validity and that no tampering had taken place
 No possible evidence is damaged, destroyed, or
otherwise compromised by the procedures used to
search the computer
 Preventing viruses from being introduced to a computer
during the analysis process
 Extracted / relevant evidence is properly handled and
protected from later mechanical
or electromagnetic damage
Handling Evidence (cont)

 Establishing and maintaining a continuing chain of


custody
 Limiting the amount of time business operations are
affected
 Not divulging and respecting any ethically [and legally]
client-attorney information that is inadvertently acquired
during a forensic exploration
Initiating An Investigation

 DO NOT begin by exploring files on system randomly


 Establish evidence custodian - start a detailed journal
with the date and time and date/information
discovered
 If possible, designate suspected equipment as “off-
limits” to normal activity. This includes back-ups,
remotely or locally scheduled house-keeping, and
configuration changes
 Collect email, DNS, and other network service logs
Initiating An Investigation (cont)

 Capture exhaustive external TCP and UDP port scans of


the host
 Could present a problem if TCP is wrapped
 Contact security personnel [CERT], management,
Federal and local enforcement, as well as affected sites
or persons
Incidence Response

 Identify, designate, or become evidence custodian


 Review any existing journal of what has been done to
system already and/or how intrusion was detected
 Begin new or maintain existing journal
 Install monitoring tools (sniffers, port detectors, etc.)
 Without rebooting or affecting running processes, perform
a copy of physical disk
 Capture network information
Incidence Response (cont)

 Capture processes and files in use (e.g. dll, exe)


 Capture config information
 Receipt and signing of data
Handling Information

 Information and data being sought after and collected in


the investigation must be properly handled
 Volatile Information
 Network Information
 Communication between system and the network
 Active Processes
 Programs and daemons currently active on the system
 Logged-on Users
 Users/employees currently using system
 Open Files
 Libraries in use; hidden files; Trojans (rootkit) loaded in system
Handling Information (cont)

 Non-Volatile Information
 This includes information, configuration settings, system files
and registry settings that are available after reboot
 Accessed through drive mappings from system
 This information should investigated and reviewed from a
backup copy
Computer Forensic Requirements

 Hardware
 Familiarity with all internal and external devices/components of a
computer
 Thorough understanding of hard drives and settings
 Understanding motherboards and the various chipsets used
 Power connections
 Memory
 BIOS
 Understanding how the BIOS works
 Familiarity with the various settings and limitations of the BIOS
Computer Forensic Requirements (cont)

 Operation Systems
 Windows 3.1/95/98/ME/NT/2000/2003/XP
 DOS
 UNIX
 LINUX
 VAX/VMS
 Software
 Familiarity with most popular software packages
such as Office
 Forensic Tools
 Familiarity with computer forensic techniques and the software
packages that could be used
Anti-Forensics

 Software that limits and/or corrupts evidence that could


be collected by an investigator
 Performs data hiding and distortion
 Exploits limitations of known and used forensic tools
 Works both on Windows and LINUX based systems
 In place prior to or post system acquisition
Evidence Processing Guidelines

 New Technologies Inc. recommends following 16 steps


in processing evidence
 They offer training on properly handling each step
 Step 1: Shut down the computer
 Considerations must be given to volatile information
 Prevents remote access to machine and destruction of evidence
(manual or ant-forensic software)
 Step 2: Document the Hardware Configuration of The System
 Note everything about the computer configuration
prior to re-locating
Evidence Processing Guidelines (cont)

 Step 3: Transport the Computer System to A Secure Location


 Do not leave the computer unattended unless it is locked in a secure
location
 Step 4: Make Bit Stream Backups of Hard Disks and Floppy Disks
 Step 5: Mathematically Authenticate Data on All Storage Devices
 Must be able to prove that you did not alter
any of the evidence after the computer
came into your possession
 Step 6: Document the System Date and Time
 Step 7: Make a List of Key Search Words
 Step 8: Evaluate the Windows Swap File
Evidence Processing Guidelines (cont)

 Step 9: Evaluate File Slack


 File slack is a data storage area of which most computer users are
unaware; a source of significant security leakage.
 Step 10: Evaluate Unallocated Space (Erased Files)
 Step 11: Search Files, File Slack and Unallocated Space for Key
Words
 Step 12: Document File Names, Dates and Times
 Step 13: Identify File, Program and Storage Anomalies
 Step 14: Evaluate Program Functionality
 Step 15: Document Your Findings
 Step 16: Retain Copies of Software Used
Methods Of Hiding Data

 Covert Channels – Hiding in Transmission


 Take advantage of timing or shared storage to pass
data through unsuspected channel

 EXAMPLE: IP datagram – Header Redundancy


 Known Maximum Transfer Unit (MTU)
 A datagram (IP) is encapsulated into frame (header, datagram,
trailer). MTU is the max total size of this datagram.
 To make IP independent of physical network, MTU = 65,535
bytes to give it more efficiency.
 If the physical layer doesn’t support that MTU, the datagram
must be fragmented
Methods Of Hiding Data (cont)
• EXAMPLE: Continued…
– Flags: 3 bits
• 1st bit: reserved (always 0)
• 2nd bit: Do not fragment (DF): if 1, can’t be
fragmented. If it is too large to pass through any
available physical network, it is discarded
• 3rd bit: More fragment (MF): if 1, the datagram is
not the last fragment of the original datagram, if 0,
it is last one or there is only 1 fragment (the
original datagram)
Methods Of Hiding Data (cont)
• EXAMPLE – TCP/IP Continued…
– An un-fragmented datagram has all 0’s in the flag fields
• Redundancy condition: the DF bit can be 1 or 0 if no fragment
• From network perspective: Datagram 1 is not allowed to fragment (1
bit), datagram 2 is allowed but does not because it is under the
maximum MTU size.
Methods Of Hiding Data (cont)
 To human eyes, data usually contains known
forms, like images, e-mail, sounds, and text.
Most Internet data naturally includes gratuitous
headers, too. These are media exploited using
new controversial logical encodings:
steganography and marking.
 Steganography: The art of storing information
in such a way that the existence of the
information is hidden.
Methods Of Hiding Data (cont)
 To human eyes, data usually contains known
forms, like images, e-mail, sounds, and text.
Most Internet data naturally includes gratuitous
headers, too. These are media exploited using
new controversial logical encodings:
steganography and marking.

 The duck flies at midnight. Tame uncle Sam


 Simple but effective when done well
Methods Of Hiding Data (cont)
 Watermarking: Hiding data within data
 Information can be hidden in almost any file format.
 File formats with more room for compression are best
 Image files (JPEG, GIF)
 Sound files (MP3, WAV)
 Video files (MPG, AVI)
 The hidden information may be encrypted, but not
necessarily
 Numerous software applications will do this for you:
Many are freely available online
Methods Of Hiding Data (cont)
• Hard Drive/File System manipulation
– Slack Space is the space between the logical end and the
physical end of file and is called the file slack. The logical
end of a file comes before the physical end of the cluster in
which it is stored. The remaining bytes in the cluster are
remnants of previous files or directories stored in that
cluster.
• Slack space can be accessed and written to directly
using a hex editor.
• This does not add any “used space” information to the
drive
– Partition waste space is the rest of the unused track which
the boot sector is stored on – usually 10s, possibly 100s of
sectors skipped
• After the boot sector, the rest of the track is left empty
Methods Of Hiding Data (cont)
• Hard Drive/File System manipulation cont…
– Hidden drive space is non-partitioned space in-between
partitions
• The File Allocation Table (FAT) is modified to remove any
reference to the non-partitioned space
• The address of the sectors must be known in order to
read/write information to them
– Bad sectors occur when the OS attempts to read info from a
sector unsuccessfully. After a (specified) # of unsuccessful
tries, it copies (if possible) the information to another sector
and marks (flags) the sector as bad so it is not read
from/written to again
• users can control the flagging of bad sectors
• Flagged sectors can be read to /written from with direct
reads and writes using a hex editor
Methods Of Hiding Data (cont)
• Hard Drive/File System manipulation cont…
– Extra Tracks: most hard disks have more than the rated # of
tracks to make up for flaws in manufacturing (to keep from
being thrown away because failure to meet minimum #).
• Usually not required or used, but with direct (hex editor)
reads and writes, they can be used to hide/read data
– Change file names and extensions – i.e. rename a .doc file
to a .dll file
Methods Of Hiding Data (cont)
• Other Methods
– Manipulating HTTP requests by changing (unconstrained)
order of elements
• The order of elements can be preset as a 1 or 0 bit
• No public software is available for use yet, but the
government uses this method for its agents who wish to
transfer sensitive information online
• Undetectable because there is no standard for the order
of elements and it is, in essence, just normal web
browsing
– Encryption: The problem with this is that existence of data is
not hidden, instead it draws attention to itself.
• With strong enough encryption, it doesn’t matter if its
existence is known
Methods Of Detecting/Recovering Data
• Steganalysis - the art of detecting and decoding
hidden data
– Hiding information within electronic media requires
alterations of the media properties that may introduce some
form of degradation or unusual characteristics
– The pattern of degradation or the unusual characteristic of a
specific type of steganography method is called a signature
– Steganalysis software can be trained to look for a signature
Methods Of Detecting/Recovering Data (cont)
• Steganalysis Methods - Detection
– Human Observation
• Opening a text document in a common word processor
may show appended spaces and “invisible” characters
• Images and sound/video clips can be viewed or listened
to and distortions may be found
– Generally, this only occurs if the amount of data hidden
inside the media is too large to be successfully hidden
within the media (15% rule)
– Software analysis
• Even small amounts of processing can filter out echoes
and shadow noise within an audio file to search for
hidden information
• If the original media file is available, hash values can
easily detect modifications
Methods Of Detecting/Recovering Data (cont)
• Steganalysis Methods – Detection cont...
– Disk analysis utilities can search the hard drive for hidden
tracks/sectors/data
– RAM slack is the space from the end of the file to the end of
the containing sector. Before a sector is written to disk, it is
stored in a buffer somewhere in RAM. If the buffer is only
partially filled with information before being committed to
disk, remnants from the end of the buffer will be written to
disk. In this way, information that was never "saved" can be
found in RAM slack on disk.
– Firewall/Routing filters can be applied to search for hidden or
invalid data in IP datagram headers
Methods Of Detecting/Recovering Data (cont)
• Steganalysis Methods – Detection cont...
– Statistical Analysis
• Most steganographic algorithms that work on images
assume that the Least Significant Bit (LSB) is random
• If a filter is applied to an image, the LSB bits will produce
a recognizable image, so the assumption is wrong
• After inserting hidden information into an image, the LSB
is no longer non-random (especially with encrypted
data). If you apply the same filter, it will no longer
produce a recognizable image
• Statistical analysis of the LSB will tell you if the LSB bits
are random or not
• Can be applied to audio files as well (using LSB)
– Frequency scanning
• Software can search for high, inaudible frequencies
Methods Of Detecting/Recovering Data (cont)
• Steganalysis Methods – Recovery
– Recovery of watermarked data is extremely hard
• Currently, there are very few methods to recover hidden,
encrypted data.
– Data hidden on disk is much easier to find. Once found, if
unencrypted, it is already recovered
– Deleted data can be reconstructed (even on hard drives that
have been magnetically wiped)
– Check swap files for passwords and encryption keys which
are stored in the clear (unencrypted)
– Software Tools
• Scan for and reconstruct deleted data
• Break encryption
• Destroy hidden information (overwrite)
Computer Forensics
Fundamentals

Computer Forensics

Military Law Enforcement Private Sector

Standards & Guidelines

Investigation Rules of Evidence Presentation

Criminal Civil
Acquisition FRYE Federal Rules of Civil Procedure Expert Witness
Analysis FRE 702 Sedona Friend of the Court
Examination Daubert/Kumho Rowe Technical Expert
Report

49
Digital Forensic Science
• Digital Forensic Science (DFS):

“The use of scientifically derived and proven methods


toward the preservation, collection, validation,
identification, analysis, interpretation, documentation and
presentation of digital evidence derived from digital
sources for the purpose of facilitating or furthering the
reconstruction of events found to be criminal, or helping
to anticipate unauthorized actions shown to be disruptive
to planned operations.”

Source: (2001). Digital Forensic Research Workshop (DFRWS)

50
Communities
There at least 3 distinct communities within
Digital Forensics
Law Enforcement
Military
Business & Industry
Possibly a 4th – Academia

51
Digital Forensic Science

52
Community Objectives

53
Cyber Forensics
• Includes:
• Networks (Network Forensics)
• Small Scale Digital Devices
• Storage Media (Computer forensics)
• Code Analysis

54
Cyber Forensics
The scientific examination and analysis of
digital evidence in such a way that the
information can be used as evidence in a
court of law.

55
Cyber Forensic Activities

Cyber forensics activities commonly


include:
the secure collection of computer data
the identification of suspect data
the examination of suspect data to
determine details such as origin and
content
the presentation of computer-based
information to courts of law
the application of a country's laws to
computer practice.
56
The 3 As

The basic methodology consists of the 3


As:
– Acquire the evidence without altering or
damaging the original
– Authenticate the image
– Analyze the data without modifying it

57
Context of Cyber Forensics
•Homeland Security
•Information Security
•Corporate Espionage
•White Collar Crime
Digital Forensics
•Child Pornography
Cyber Forensics
•Traditional Crime
•Incident Response
•Employee Monitoring
•Privacy Issues
•????

58
Cyber Crime

1970’s
Legislation

LE Investigative

1980’s
Units

International LE
Meeting
1990’s

1st International
Conference on
CE
IOCE Formed
IOCE &
A Brief Timeline

SWGDE

RCFL in USA
2000

COE
Convention on
2001

Cyber Crime
DFRWS

ASCLD/LAB-
2003

DE USA
ISO 17025
Journals
Conferences

AAFS
2008

Subsection?
Crime Scenes

Physical Crime Scenes vs. Cyber/Digital


Crime Scenes
Overlapping principals
The basics of criminalistics are constant
across both physical and cyber/digital
Locard’s Principle applies
 “When a person commits a crime something is
always left at the scene of the crime that was not
present when the person arrived”

60
Digital Crime Scene

Digital Evidence
 Digital data that establish that a crime has been
committed, can provide a link between a crime and
its victim, or can provide a link between a crime and
the perpetrator (Carrier & Spafford, 2003)
Digital Crime Scene
 The electronic environment where digital evidence
can potentially exist (Rogers, 2005)
 Primary & Secondary Digital Scene(s) as well

61
Forensic Principles
Digital/ Electronic evidence is extremely volatile!
Once the evidence is contaminated it cannot be de-
contaminated!
The courts acceptance is based on the best
evidence principle
 With computer data, printouts or other output readable
by sight, and bit stream copies adhere to this principle.
Chain of Custody is crucial

62
Cyber Forensic Principles
 The 6 Principles are:
1. When dealing with digital evidence, all of the general forensic and
procedural principles must be applied.
2. Upon seizing digital evidence, actions taken should not change that
evidence.
3. When it is necessary for a person to access original digital evidence,
that person should be trained for the purpose.
4. All activity relating to the seizure, access, storage or transfer of
digital evidence must be fully documented, preserved and available
for review.
5. An Individual is responsible for all actions taken with respect to digital
evidence whilst the digital evidence is in their possession.
6. Any agency, which is responsible for seizing, accessing, storing or
transferring digital evidence is responsible for compliance with these
principles.

63
Process/Phases

Identification
Collection
Bag & Tag
Preservation
Examination
Analysis
Presentation/Report

64
Identification

The first step is identifying evidence


and potential containers of evidence
More difficult than it sounds
Small scale devices
Non-traditional storage media
Multiple possible crime scenes

65
Devices Identification

66
Identification

Context of the investigation is very


important
Do not operate in a vacuum!
Do not overlook non-electronic
sources of evidence
Manuals, papers, printouts, etc.

67
Collection

Care must be taken to minimize


contamination
Collect or seize the system(s)
Create forensic image
Live or Static?
Do you own the system
What does your policy say?

68
69
Collection: Documentation

70
Collection: Documentation

 Take detailed photos and notes of the computer / monitor


 If the computer is “on”, take photos of what is displayed on the monitor –
DO NOT ALTER THE SCENE

71
Collection: Documentation

Make sure to take photos and notes of all


connections to the computer/other devices

72
Collection: Imaging
 Rule of Thumb: make 2 copies and don’t
work from the original (if possible)
 A file copy does not recover all data areas
of the device for examination
 Working from a duplicate image
 Preserves the original evidence
 Prevents inadvertent alteration of original
evidence during examination
 Allows recreation of the duplicate image if
necessary

73
Collection: Imaging
Digital evidence can be duplicated with no
degradation from copy to copy
 This is not the case with most other forms of
evidence

74
Collection: Imaging
Write blockers
Software
Hardware
Hardware write blockers are becoming the industry
standard
USB, SATA, IDE, SCSI, SIM, Memory Cards
Not BIOS dependent
But still verify prior to usage!

75
Collection: Imaging
Forensic Copies (Bitstream)
Bit for Bit copying captures all the data on the copied
media including hidden and residual data (e.g., slack
space, swap, residue, unused space, deleted files etc.)
Often the “smoking gun” is found in the residual
data.
Imaging from a disk (drive) to a file is becoming
the norm
Multiple cases stored on same media
No risk of data leakage from underlying media
Remember avoid working for original
Use a write blocker even when examining a copy!

76
Imaging: Authenticity & Integrity

How do we demonstrate that the image is a true unaltered


copy of the original?
-Hashing (MD5, SHA 256)
A mathematical algorithm that produces a unique value (128
Bit, 512 Bit)
 Can be performed on various types of data (files, partitions, physical
drive)
The value can be used to demonstrate the integrity of your
data
 Changes made to data will result in a different value
The same process can be used to demonstrate the image has
not changed from time-1 to time-n

77
Examination
Higher level look at the file system representation of the
data on the media
Verify integrity of image
 MD5, SHA1 etc.
Recover deleted files & folders
Determine keyword list
 What are you searching for
Determine time lines
 What is the timezone setting of the suspect system
 What time frame is of importance
 Graphical representation is very useful

78
Examination

Examine directory Search for relevant


tree evidence types
 What looks out of place • Hash sets can be useful
 Stego tools installed
 Evidence Scrubbers • Graphics

Perform keyword • Spreadsheets


searches • Hacking tools
 Indexed
 Slack & unallocated • Etc.
space Look for the obvious
first
When is enough
enough??

79
Issues
lack of certification for tools
Lack of standards
lack of certification for professionals
lack of understanding by Judiciary
lack of curriculum accreditation
Rapid changes in technology!
Immature Scientific Discipline

80
Careers
One of the fastest
growing job
markets!

81
Paths to Careers in CF
Certifications
Associate Degree
Bachelor Degree
Post Grad Certificate
Masters
Doctorate

82
Job Functions
CF Technician
CF Investigator
CF Analyst/Examiner (lab)
CF Lab Director
CF Scientist

83
Professional Opportunities
Law Enforcement
Private Sector
Intelligence Community
Military
Academia

84

You might also like