Cips 2014 0152
Cips 2014 0152
06/12/2013 CERT-India 2
Digital Evidence
06/12/2013 CERT-India 3
Digital Evidence
06/12/2013 CERT-India 5
Legal Issues
• MAC details of the files as digital
evidence in the seized original hard disk
(hence its image too) must be earlier
than the noticing / reporting of criminal
incident as well as the date & time of its
seizure.
• If it is not so, digital evidence will be
diagnosed as a tampered evidence and
court can not accept it as an admissible
evidence.
06/12/2013 CERT-India 6
Sources of Digital Evidence:
06/12/2013 CERT-India 7
Digital Evidence - Types
• Volatile (Non-persistent)
Memory that loses its contents, as soon as
power is turned off; e.g. Data stored in RAM
(semiconductor storage)
(System BIOS: CMOS RAM - battery powered)
• Non-volatile (Persistent)
No change in contents, even if power is turned
off; e.g. Data stored in a tape / hard disk
(magnetic storage), CD / DVD (optical storage),
data cards, USB Thumb Drives – Flash
memory).
06/12/2013 CERT-India 8
Volatile Digital Evidence
(may be in main memory)
Order of Volatility :
06/12/2013 CERT-India 9
Volatile Data from a live system:
Why it is so much important?
• Current running state & system configuration
details
• Activities performed / in progress
• Root cause of the incident
• Timeline of the incident
• Time, date, user responsible for the incident
• Network connection details
• Once system is shutdown / rebooted, volatile
data is lost for ever
06/12/2013 CERT-India 10
Tools for acquisition of
Physical Memory (RAM) Dump
• dd (fau)
[ex C:\>dd if=\\.\PhysicalMemory of=e:\ramdump.img conv=noerror]
• Win32DD, Win64DD
• WinEN (Helix 3)
• Nigilant32
• FTK Imager (AccessData)
– Easiest to use (GUI), freeware
06/12/2013 CERT-India 11
Digital Evidence:
Volatile Active System Information
06/12/2013 CERT-India 12
System Profile by ‘Systeminfo’ (Win)
06/12/2013 CERT-India 14
Digital Evidence:
Volatile N/w connectivity
Information
06/12/2013 CERT-India 15
System Time v/s Std. Time
• Always compare suspected system time with the
standard time; is there any time difference?
• Difference, if noticed, must be recorded
• Same process must be carried out for the other
associated systems and servers providing the
logs
• Photograph the system monitor showing the
system time along with a watch having standard
time
• By the above, reconciliation of access logs from
the servers and suspected system will be easier
06/12/2013 CERT-India 16
Digital Evidence may be in form of …
• Email messages • Web history
(deleted too) • Cache files
• Office files • Cookies
• Deleted files of all • Registry
kinds • Unallocated Space
• Encrypted Files • Slack Space
• Compressed Files • Web/e-Mail Server
• Temp files access logs
• Recycle Bin • Domain access logs
06/12/2013 CERT-India 17
Volatile Data Collection Process
• Collect system uptime, incident’s date & time, and
command history from the suspicious system.
• Run forensic tools or OS commands, to know date
and time of actions to establish a timeline / trail of
events.
• Document all forensic collection activities including
s/w tools / commands used in logbook.
• Collect all types of volatile information from system
and network.
• End the forensic collection by recording the used
commands along with date and time of use.
06/12/2013 CERT-India 18
Scenario 1:
If computer is in ON state, then -
1. Must have the RAM dump using tools (will be
used to extract user-ids & passwords)
2. Note the System H/w, N/w configuration
3. Note the Processes / Applications running
4. Note the documents / files – open / being
accessed or accessed after system up
5. Note Network connectivity details
6. Pull the power chord (laptop – remove battery)
to power OFF the system
7. Now follow as given in Scenario 2
06/12/2013 CERT-India 19
Scenario 2:
If computer is already OFF, then -
• Disconnect all the Hard Disks, except CD/DVD
Drive (to boot from it)
• Label the connections (for later restoration)
• Ensure that any of the connected drives is not
having any CD, DVD or USB Drives, etc
• Power ON the system and enter into BIOS?
• Photograph the monitor showing BIOS
• Document the boot sequence
• Change the boot sequence to “boot from CD/DVD”;
and note it. ...cont’d
06/12/2013 CERT-India 20
Scenario 2:
If computer is already OFF, then -
• Save the BIOS & shutdown the system
• Restore all the drive connections
• Connect another hard disk to system disk controller
card as a destination drive for storing the image of
system hard disk
• Insert a bootable CD/DVD, having tools for imaging
and password recovery; and boot the system
• System is ready for imaging the hard disk
• RAM dump is irrelevant in this case
• Document all your actions
06/12/2013 CERT-India 21
Volatile Data Collection Tools
Windows Linux
06/12/2013 CERT-India 22
Tools (Win) for Running Processes
06/12/2013 CERT-India 23
Some Useful Tools
Windows Linux
• Msconfig • Autoruns, autorunsc
• Autoruns, autorunsc • Ls
• Netusers • Chkconfig – list
• PsLoggedOn : • Inittab : run level
local/remote logged • Netusers
users
06/12/2013 CERT-India 24
Tools for network user details
06/12/2013 CERT-India 25
Tools for HW Config’n
Windows Linux
• Fport : open ports • Netstat –anp
• Netstat –anb : TCP/IP • Ifconfig : NIC config’n
connections • Arp –a : IP Addr, MAC
• Net share : network Addr of NIC
shares • Netstat –rn : routing info’n
• Netstat –r : routing info’n
• Arp –a : IP Addr, MAC
Addr of NIC
06/12/2013 CERT-India 26
Digital Evidence Handling at Crime
Site
• Document the Crime Scene - OS (Ver.),
BIOS date & time (and difference, if any),
H/w & S/w Configuration, IP / MAC address
• Computer System : shutdown / power off ?
• Identify Evidence & Authenticate through a
Hashing Algo. (MD5)
• Always make the bit-stream copy (forensic
image) of the seized storage media
06/12/2013 CERT-India 27
Digital Evidence Handling at Crime
Site (contd ..)
06/12/2013 CERT-India 28
06/12/2013 CERT-India 29
Digital Evidence Handling at Crime
Site (contd ..)
• Store the seized org. evidence in a protected
storage (Air bubbled PVC, antistatic bag)
• Transfer the Computer System to a secure
location
“Best Practices for Seizing Electronic
Evidence Ver. 3” may be downloaded from -
http://www.forwardedge2.usss.gov/pdf/bestPr
actices.pdf
06/12/2013 CERT-India 30
References
• “Electronic Fingerprints – computer evidence comes
of Age” by Michael R. Anderson
• “Electronic Crime Scene Investigation – A Guide for
First Responders” by National Institute of Justice,
USA; (http://www.ojp.usdoj.gov/nij)
• “Forensic Examination of Digital Evidence : A guide
for Law Enforcement” by National Institute of
Justice, USA; (http://www.ojp.usdoj.gov/nij)
• “Forensics – Tools”;
http://www.forinsect.de/index.html
• Training Material on Information Security by
Carnegie Mellon University, Pitsburgh, USA
06/12/2013 CERT-India 31
References (contd..)
• Collecting Electronic Evidence After a System
Compromise” by Matthew Braid, SANS Security
Essentials.
• “Computer Forensics – An Overview” by Dorothy
A. Lunn, SANS Institute;
http://www.giac.org/practical/gsec/Dorothy_Lunn
_GSEC.pdf
• “Manual for Investigation of Computer Related
Crimes” by Ashok Dohare
• Course Contents : SANS SEC508
06/12/2013 CERT-India 32
06/12/2013 CERT-India 33
06/12/2013 CERT-India 34