Introduction To Computer Forensics and Hashing
Introduction To Computer Forensics and Hashing
What is Forensics?
Forensics is the art and study of argumentation and formal debate. It uses the application of a broad spectrum of sciences to answer questions of interest to the legal system. Forensic Science is the science and technology that is used to investigate and establish facts in criminal or civil courts of law.
2
Computer forensics is forensics applied to information stored or transported on computers It involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis Procedures are followed, but flexibility is expected and encouraged, because the unusual will be encountered.
4
Child Pornography/Exploitation Threatening letters Fraud Embezzlement Theft of intellectual property Incident Response Security Breach
Can be anything!
As small as a few bytes Could be, and hopefully will be complete files
Could be Deleted Could be Encrypted A few Words A couple of sentences Hopefully some paragraphs
Storage Media
Might be plain data with no hidden agenda The data could be encrypted Data could be hidden Could be hostile code
Data Encryption
Encrypting data could guard the data in two ways.
Protect data
Use of Ciphers Files might need to be decrypted Decryption program generally stored fairly close to the file to be decrypted. Probably password protected.
Prove integrity
Data Hiding
Data could be compressed Data could be hidden in plain sight innocent looking data has alternate meaning Data could be hidden within File system
10
Removable Media
11
Hostile Code
Any code used by an unauthorized person to gain advantage or power over someone else should be considered hostile.
Remote access Data gathering Sabotage Denial-of-service Eluding detection Resource theft Circumvention of access control mechanisms Social status
12
Prove that the evidence is indeed what the criminal left behind.
Contrary to what the defense attorney might want the jury to believe, readable text or pictures dont magically appear at random. Calculate a hash value for the data
MD5
SHA-1,SHA-256,SHA
-512
15
Analysis
Always work from an image of the evidence and never from the original.
Prevent damage to the evidence Make two backups of the evidence in most cases.
Analyze everything, you may need clues from something seemingly unrelated.
16
Tools
Fdisk on Linux
Viewers
QVP Diskview
Safeback Linux dd
Forensic Software
Forensic Toolkit The Coroners Toolkit Sleuth Kit Encase ILook
18
Room
Label all wires and connections. Bag and Tag all evidence.
20
Evidence Preservation
Seize all hardware that is necessary to reconstruct evidence Jam or disable all wireless connections if possible Make 2 (3) copies of all media Authenticate all copies of media with MD-5 and SHA-1 hash algorithms
21
Evidence Preservation
The data has to be protected physically and logically. Physically, make sure when transporting hard drives that it is stabilized and is not damaged by excessive vibrations. Another thing to look out for is static electricity. Logically preserving evidence means that that the information contained on the drive down to the last bit never changes during seizing, analysis and storage.
22
28
29
32
If you are looking for web activity, look in web files; history, cache, cookies, etc.
33
34
General Guidelines
Use a write-blocking device to prevent accidentally writing to the suspect media. Always work from a copy, not from the original. Authenticate the copy so that you can prove that evidence discovered was on the original media. Minimize file creation on working media to prevent over-writing of free space. Be especially careful of opening files, especially without a write-blocker, because CMA times will change.
35