Module 1-Introduction to Digital Forensic
Module 1-Introduction to Digital Forensic
PRACTICES
MODULE- 1
ABOUT COURSE COVERAGE
&
INTRODUCTION TO DIGITAL FORENSIC
■ Non-Volatile Information
– This includes information, configuration
settings, system files and registry settings
that are available after reboot
– Accessed through drive mappings from
system
– This information should investigated and
reviewed from a backup copy
Computer Forensic
Requirements
■ Hardware
– Familiarity with all internal and external
devices/components of a computer
– Thorough understanding of hard drives and
settings
– Understanding motherboards and the various
chipsets used
– Power connections
– Memory
■ BIOS
– Understanding how the BIOS works
– Familiarity with the various settings and
limitations of the BIOS
Computer Forensic
Requirements (cont)
■ Operation Systems
– Windows 3.1/95/98/ME/NT/2000/2003/XP
– DOS
– UNIX
– LINUX
– VAX/VMS
■ Software
– Familiarity with most popular software
packages
such as Office
■ Forensic Tools
– Familiarity with computer forensic techniques
and the software packages that could be used
Anti-Forensics
■ Software that limits and/or corrupts
evidence that could be collected by an
investigator
■ Performs data hiding and distortion
■ Exploits limitations of known and used
forensic tools
■ Works both on Windows and LINUX based
systems
■ In place prior to or post system
acquisition
Evidence Processing
Guidelines
■ New Technologies Inc. recommends
following 16 steps in processing evidence
■ They offer training on properly handling
each step
– Step 1: Shut down the computer
■ Considerations must be given to volatile
information
■ Prevents remote access to machine and
destruction of evidence (manual or ant-forensic
software)
– Step 2: Document the Hardware Configuration
of The System
■ Note everything about the computer
configuration
prior to re-locating
Evidence Processing
Guidelines (cont)
– Step 3: Transport the Computer System to A
Secure Location
■ Do not leave the computer unattended unless it
is locked in a secure location
– Step 4: Make Bit Stream Backups of Hard
Disks and Floppy Disks
– Step 5: Mathematically Authenticate Data on
All Storage Devices
■ Must be able to prove that you did not alter
any of the evidence after the computer
came into your possession
– Step 6: Document the System Date and Time
– Step 7: Make a List of Key Search Words
– Step 8: Evaluate the Windows Swap File
Evidence Processing
Guidelines (cont)
– Step 9: Evaluate File Slack
■ File slack is a data storage area of which most
computer users are unaware; a source of
significant security leakage.
– Step 10: Evaluate Unallocated Space (Erased
Files)
– Step 11: Search Files, File Slack and
Unallocated Space for Key Words
– Step 12: Document File Names, Dates and
Times
– Step 13: Identify File, Program and Storage
Anomalies
– Step 14: Evaluate Program Functionality
– Step 15: Document Your Findings
– Step 16: Retain Copies of Software Used
Methods Of Hiding Data
■ Covert Channels – Hiding in Transmission
– Take advantage of timing or shared storage to
pass data through unsuspected channel
Windows forensics;
Covers the different types of volatile and nonvolatile
information an investigator can collect from a
Windows system
Discusses collecting and analyzing data in memory,
the registry, and files in detail
Network Forensics
Definition
Forensic:
“…a characteristic of evidence that satisfies its suitability for admission as
fact and its ability to persuade based upon proof (or high statistical
confidence).”
1980s
PCs gained popularity and different OSs emerged.
Disk Operating System (DOS) was available.
Forensics tools were simple, and most were generated by government
agencies.
Mid-1980s
Xtree Gold appeared on the market able to recognize file types and retrieve
lost or deleted files.
Norton DiskEdit soon followed and became the best tool for finding deleted
files.
History of Computer/Digital
Forensics
1984
Scotland Yard: Computer Crime Unit
FBI computer forensics departments
Early 1990s
Tools for computer forensics were available
International Association of Computer Investigative Specialists (IACIS)
Training on software for forensics investigations
IRS created search-warrant programs
ExpertWitness for the Macintosh
First commercial GUI software for computer forensics Created by ASR
Data. Recovers deleted files and fragments of deleted files
1990
Computer Misuse Act (CMA)
USES OF DIGITAL FORENSICS
Digital forensics can be used in a variety of
settings, including
■criminal investigations,
■civil litigation,
■intelligence, and
■administrative matters.
Criminal investigation
(BTK), murdered ten people in Kansas from 1974 to 1991. Rader managed to avoid capture for more than
30 years until technology betrayed him.
After years of silence, Rader sent a letter to the Wichita Eagle newspaper declaring that he was
responsible for the 1986 killing of a young mother. The letter was received by the Eagle on March 19, 2004.
After conferring with the FBI’s Behavioral Analysis Unit, the police decided to attempt to communicate with
BTK through the media. In January 2005, Rader left a note for police, hidden in a cereal box in the back of a
pickup truck belonging to a Home Depot employee. In the note, he said:
“Can I communicate with Floppy and not be traced to a computer. Be honest. Under Miscellaneous Section,
494, (Rex, it will be OK), run it for a few days in
case I’m out of town-etc. I will try a floppy for a test run some time in the near future-February or March.”
CIVIL LITIGATION
■ The use of digital forensics in civil cases is big business. In 2011, the
estimated total worth of the electronic discovery market was somewhere
north of (780 million (Global EDD Group). As part of a process known as
electronic discovery (eDiscovery), digital forensics has become a major
component of much high-dollar litigation.
■ eDiscovery “refers to any process in which electronic data is sought,
located, secured, and searched with the intent of using it as evidence in a
civil or criminal legal case” (TechTarget, 2005).
■ In a civil case, both parties are generally entitled to examine the evidence
that will be used against them before trial. This legal process is known as
“discovery.”
■ Previously, discovery was largely a paper-based exercise, with each party
exchanging reports, letters, and memos; however, the introduction of
digital forensics and eDiscovery has greatly changed this practice.
■ Digital evidence can quickly become the focal point of a case, no matter
what kind of legal proceeding it’s used in. The legal system and all its
players are struggling to deal with this new reality.
INTELLIGENCE
Law
Prosecution Post-Mortem
Enforcement
Continuity of Real-Time/Post-
Military IW Ops Prosecution
Operations Mortem
- B. Carrier, 2006
File System Forensic Analysis,
Characteristics of Evidence
Acquisition
Physically or remotely obtaining possession of the computer, all network
mappings from the system, and external physical storage devices
Identification
This step involves identifying what data could be recovered and
electronically retrieving it by running various Computer Forensic tools
and software suites
Investigation Process
Evaluation
Evaluating the information/data recovered to determine if and how it
could be used again the suspect for employment termination or
prosecution in court
Presentation
This step involves the presentation of evidence discovered in a manner
which is understood by lawyers, non-technically staff/management, and
suitable as evidence as determined by United States and internal laws
Tool Requirements
Usability - Present data at a layer of abstraction that is useful to an investigator
Accuracy - Tool output must be able to be verified and a margin of error must be
given
Deterministic - A tool must produce the same output when given the same rule
set and input data.
Verifiable - To ensure accuracy, one must be able to verify the output by having
access to the layer inputs and outputs. Verification can be done by hand or a
second tool set.
Brian Carrier, 2003, Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Challenges
Size of storage devices
Embedded flash devices
Proliferation of operating systems and file formats
Multi-device analysis
Pervasive Encryption
Cloud computing
RAM-only Malware
Legal Challenges decreasing the scope of forensic investigations
■ Store at least one irreplaceable file on it, for which you have no
backup (Unproven, but with strong anecdotal evidence)
Deleting Disk Data
■ “Wiping” a file consists of deleting the file
and overwriting the contents of the
associated clusters
– Random data
– All ones and/or all zeros
– Multiple overwrites
■ Single overwrite seems to be adequate for
modern disk drives
http://www.springerlink.com/content/408263ql11460147/
■ Remnants of the file may still exist in other
parts of the system (e.g., swapfile,
temporary files, registry entries, etc). If so,
data from wiped files can still be recovered.
Protection of evidence is critical
■ Ensure that:
■ no possible evidence is damaged, destroyed, or otherwise
compromised by the procedures used to investigate the computer.
■ no possible computer virus is introduced to a subject computer
during the analysis process.
■ extracted and possibly relevant evidence is properly handled and
protected from later mechanical or electromagnetic damage.
■ a continuing chain of custody is established and maintained.
■ business operations are affected for a limited amount of time, if at
all.
■ any client-attorney information that is inadvertently acquired
during a forensic exploration is ethically and legally respected and
not divulged.
■ Many software tools exist to recover deleted files and find keywords
and other data of interest
■ EnCase is one of the more popular and powerful tools available
■ http://www.youtube.com/watch?v=O4ce74q2zqM
E-mail – The most frequently
smoking gun
■ “You can't erase e-mails, not today…They've gone through too many
servers. Those e-mails are there –”
– Senator Patrick Leahy
Finding lost Emails
■ Emails can be recovered from a number of
different locations
– Local user files
■ POP3 email client protocols copy all email data to the
local disk
– Under many email clients (including Outlook) deleted
emails exist in the local archive even after they are
purged from the deleted mail folder.
■ IMAP email client protocols leave the email on the
server, but local copies are likely to exist in
temporary or swap files
– Servers
■ Mail servers will maintain email records
– Backups
■ Backups of both client and server machines can
provide copies of deleted emails
Encryption/Decryption
■ Data is encrypted before it is stored on the disk
– Without the key, the data cannot be understood
– Deleted file are unreadable
■ Data in memory is not encrypted
– Such data might still be referenced in swap files,
system logs, and registry entries
String Search Techniques
■ http://www.youtube.com/watch?v=JDaicPIgn9U
Implications of the Princeton
Encryption Hack
■ Perhaps computer forensic investigation will no include investigation
of RAM images. The same techniques used for disks can be applied.l
■ Many encryption
Steganography
■ steganography http://en.wikipedia.org/wiki/Steganography
Credibility of Digital Data
The digital forensics practitioner most often plays the role of an expert witness.
What makes this different from nonexpert witnesses?
Other witnesses can only testify to what they did or saw.
They are generally limited to those areas and not permitted to render opinions. Experts, by
contrast, can and often do give their opinion.
What makes someone an “expert”?
In the legal sense, it’s someone who can assist the judge or jury to understand and interpret
evidence they may be unfamiliar with. To be considered an expert in a court of law, one doesn’t
have to possess an advanced academic degree.
An expert simply must know more about a particular subject than the average layperson.
Under the legal definition, a doctor, scientist, baker, or garbage collector could be qualified as
an expert witness in a court of law.
Individuals are qualified as experts by the court based on their training, experience, education,
and so on (Saferstein, 2011).
What separates a qualified expert from a truly effective one? It is the ability to
communicate with the judge and jury. Experts must be effective teachers. The vast
majority of society lacks technical understanding to fully grasp this kind of testimony
without at least some explanation.
Digital forensic examiners must carry out their duties without bias. Lastly, a digital forensics
References
■ John Sammons - The Basics of Digital Forensics, Second Edition_ The
Primer for Getting Started in Digital Forensics (2014, Syngress)
■ Eoghan Casey - Handbook of Computer Crime Investigation_ Forensic
Tools & Technology (2001)