Forensic Module
Forensic Module
tutorial
MODULE 1
OMPUTER FORENSIC TODA
Cont..
Goal of Forensics Readiness
To collect acceptable evidence without
interfering with the business process
To gather evidence targeting the potential
crimes and disputes impact an
organization
To ensure that evidence makes a positive
impact on the outcome of any legal action
To allow an investigation to proceed at a
cost in proportion to the incident.
Cont..
Cont..
Cybercrime
Cont..
Cont..
Cont..
Cont..
MODULE 02
OMPUTER FORENSICS
VESTIGATION PROCESS
Management Aspects
Cont..
Cont..
Cont..
Cont..
3. 1. Collect the Physical Evidence:o Electronic devices, physical evidence
(Removable media, cables, all computer
equipment, miscellaneous item, items
taken from the trash), detailed
information about the evidence,
o Handled carefully and
o Objects identified a evidence should be
tagged.
Cont..
3. 2. Collect electronic Evidence
List the systems involved incident from systems evidence
can be collected.
Obtain the relevant order of volatility
Record the extent of the systems clock drift.
Collect the evidence from the people who are part of the
incident
Capture the electronic serial number of the drive & other
user-accessible, host-specific data
Write protect and virus check all media to maintain the
integrity of the media
Cont..
Cont..
5. Acquire the Data:- Duplicate the data bit by bit to preserve the original
data.
- The duplicated data is sent to the forensic lab for
further analysis.
- The data can be duplicate either through hardware or
software.
- Verify Image Integrity MD5, hashcalc, Md5sum,
etc
- Recover lost or deleted data
- Software's like Recover my files, digital rescue
premium etic.
Cont..
6. Analyze the Data:- Data analysis techniques depends on the scope of
the case or Clients requirements.
- Identify and categorize data in order of relevance.
- Data analysis tools forensic tools help in
sorting and analysis of a large volume of data to
draw meaningful conclusions.
- Example:- accessDatas FTK, Guidance
softwares EnCase forensics, The sleuth Kit,
etc.
Cont..
7. Assess Evidence and Case:o Evidence Assessment:
The digital evidence should be methodically
assessed with respect to the scope of the case to
determine the course of action.
Conduct a methodical assessment by reviewing the
search warrant or other legal authorization, case
detail, nature of the hardware and software,
potential evidence wanted, and the circumstances
surrounding the acquisition of the evidence to be
examined.
Cont..
o Case Assessment:
Review the case investigators request for service
Identify the legal authority for the forensic
examination request.
Document the chain of custody.
Discuss whether other forensic processes need to
be performed on the evidence ( e.g. DNA analysis,
fingerprint, tool marks, trace and questioned
documents)
Determine the potential evidence being required
(e.g.: photographs, spreadsheets, documents,
databases and financial records)
Cont..
Discuss the possibility of pursuing other investigative
avenues to obtain additional digital evidence (e.g.:
sending a preservation order to an internet service
provider (ISP), identifying remote storage locations,
obtaining email).
Consider the relevance of peripheral components to
investigation; e.g: in forgery or fraud cases, consider
non-computer equipment such as laminators, check
paper, scanners and printers(in child pornography
cases, consider digital cameras)
Determine additional information regarding the case :
e.g aliases, email accounts ISP used, names, network
configuration, system logs, passwords which may be
obtained through interviews with the system
Cont..
Cont..
8. Prepare the Final Report
1. Documentations in Each phase
Access the Data
o An initial estimate of the impact of he
situations
o Summaries of interviews with users and
system administrators
o Outcomes of any legal and third-party
interactions
o Reports and logs generated by tools used
during assessment phase
o A proposed course of action.
Cont..
Acquire the Data
o Create a check-in/check-out list of information
such as the name of person examining the
evidence, the exact date and time check out the
evidence and the exact date and time they return
it.
Analyze the Data
o Document the information regarding the number
and type of OS.
o Document the file content.
o Document the result of correlation of files to
installed applications.
o Document the users configuration settings.
Cont..
Cont..
e) Detail
o Detailed description of what evidence was
analyze & the analysis method were used &
explain the findings of the analysis.
o List of procedures were followed during the
investigation & any analysis techniques that were
used.
o Include proof of your findings, such as utility
reports & log entries.
f) Conclusion
o Summarize the outcome of the investigation
o Cite specific evidence to prove the conclusion
o The conclusion should be clear and
unambiguous
Cont..
g) Supporting documents
o Include any background information such as
network diagrams, documents that describe
the computer investigation procedures used
and overview of technologies that are
involved in the investigation.
o It is important that supporting document
provides enough information for the report
reader to understand the incident as
completely as possible.
Cont..
9. TESTIFY AS A EXPERT WITNESS
An expert witness is a person who has a thorough
knowledge of a subject & whose credentials can
convince others to believe his or her opinions on that
subject in a court of law.
The role of an Expert Witness
Investigate a crime.
Evaluate the evidence.
Educate the public and court.
Testify/give evidence in court.
MODULE 03
SEARCHING AND SEIZING COMPUTER
1.Searching and seizing computer without
a warrant.
2.Searching and seizing computer with a
warrant.
3.The Electronic Communications privacy
Act.
4.Electronic Surveillance in
communication Network .
5.Evidence.
Module 04
Digital Evidence
Anti-digital forensics
Overwriting data and metadata(wiping).
Obfuscation of data intended to confuse the forensic
analysis.
Exploitation of bugs in forensic tools forensic
imaging and analysis tools are programmed to misread
the files.
Hiding data (steganography, cryptography and lowtech methods) through low tech methods, data or
information is hidden from an examiner.
Volatile Data
Non-volatile Data
Transient Data such as open network connection,
user logout, programs that reside in memory and
cache data.
Fragile Data information that is temporarily saved
on the hard disk and can be changed.
Temporarily accessible Data like encrypted file
system information
Active Data using the current system
Archival Data archival data manages data longterm storage & maintains records.
Backup Data copy of the system data.
Residual Date when ad document is deleted is
called residual data.
Rule of Evidence
Prior to the investigation process, it is
important that the investigator understands
the rules of evidence.
Rules of evidence govern whether, when,
how and for what purpose proof of a case
may be placed before a trier of fact for
consideration.
The trier of fact may be a judge or a jury,
depending on the purpose of the trial and
the choices of the parties.
Cont..
LAN Evidence is found on MAC
Routers, Hubs, and switches:
Router evidence is found in the configuration files.
Hubs and switches Evidence found on the devices themselves.
Network cable and connector evidence is found on the devices
Server evidence found on the computer systems.
Pager : It is a handheld and portable electronic device for sending and
receiving electronic messages that may be in the numeric form or
in alphanumeric form.
It contains Volatile evidence such as address information, text
messages, e-mails, voice messages and phone numbers,
Printer: Evidence is found through usage logs, time and date information
and network identity information, ink cartridges, and time and
date stamp,
Cont..
Evidence Assessment
Evidence Acquisition
Evidence preservation
Evidence Examinations and analysis
Evidence Documentation and Reporting
Cont..
Analysis of Extracted Data
Timeframe analysis
Date and time stamp contained in the file system metadata
(i.e. last modified, last accessed, created, changed, etc.)
Reviewing the system and application logs that present ,
these may included error logs, installation logs, connection
logs, security logs etc.
Data hiding analysis detecting and recovering such data
Data hiding analysis methods
1. Correlating the file headers to corresponding file
extensions to Identify any mismatches.
2. Presence of mismatches may indicate that the user
intentionally hid the data.
3. Gaining access to all password-protected, encrypted ,
and compressed files,
4. steganography
Cont..
Cont..
Cont..
Cont..
8
6
9
9.
1
9.
2
Cont..
9.
3
9.
4
Cont..
1
0
10.
1
10.
2
Cont..
1
1
1
2
Chapter 5
First responder
First responder :
a person who arrives first at the crime scene and
accessed the victims computer system after
incident.
He/ she may be network administrator, law
enforcement officer or investigation officer
Cont..
3
Cont..
5
Module 6
Computer forensic Lab
7
Understanding Hard disks
& File systems
Module
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Cont..
Module 8:
Window forensics
Cont..
Collecting volatile information
Cont..
Cont..
4.
Cont..
Cont..
7. Process-to-port Mapping
Netstat command
Syntax: c:\>netstat o to display the process ID of the
process.
Fport reports all open TCP/IP and UDP ports and maps
them to the owning application
Syntax: c:\> c:\users\...\Desktop\windows forensic tools\ps
tools\Fport.exe
8. Process Memory:- running processes could be suspicious or
malicious in nature, to gather information use tools such as
pmdump, process Dumper, userdump, etc.
Syntax: c:\> :\> c:\users\...\Desktop\windows forensic tools\ps
tools\userDump.exe
Cont..
Cont..
Collecting
Non-volatile information
Cont..
DisableLastAccess windows has ability to disable
updating of the last acces times on files. On windows
2003
HKEY_LOCCAL_MACHINE\System\currentcontrolse
t\control\filesystem\disablelastacess value to 1 and in
window xp & 2003 setting can be queried or enabld via
the fsutil command
AutoRuns registry are referred as autostart locations
to automatically start applications. This application is
start when the system boots, user logs in and the user
takes a specific action. Collect information from specific
keys and values with the help of reg.exe or autoruns
tools,
Cont..
Microsoft security ID the path of access ID is :
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\win
dows NT\currntversion\profileList and Magical jelly
Bean keyfinder reveals window 7 cd-key
Event Logs choose which data have to be collected
depending on the instance that occurred. To retrieve the
event records use psloglist.exe and copy .evt files from the
system.
Index.dat file is used by internet Explorer web browser
as an active database. It is a repository of redundant
information, such as visited web URLs, search queries,
recently opened files, and form auto-complete information.
Separate index.dat files exist for the internet Explorer
history, cache and cookies.
Cont..
3. Devices and other information collect non-volatile
Slack Space :
refers to portions of a hard drive,
non-contiguous file allocation leaves more trailing
clusters leaving more slack space
DRIVESPY tool collects all the slack space.
Virtual memory :
It is logical memory to use a large range of memory
Can be scanned to find out the hidden running process.
Use X-ways forensic tool to scan virtual memory
Cont..
Cont..
7. Collecting hidden partition information:
Hidden partition is a logical section of a disk which is not accessible to the
operating system.
Hidden partition may contains files, folders, confidential data or store backup
Tools like Partition Logic helps to collect information from hidden partition.
Partition ligic can create, delete, erase, format, defrag. Resize, copy and move
partitions.
8. Hidden alternate data stream (ADS ): User can hide data in alternate data streams.
ADS can created by running command like notepad visible.txt:hidden.txt
Use more<visible.txt:hidden2.txt> newfile.txt command to copy the ADS
information into new file.
Use tools streamArmor
Cont..
Cont..
Temporary Files
These files are created by a program when it
cannot allocate enough memory for the tasks or
when the program is working on large set of
data.
In general when a program terminates, temp
files are deleted, some program create temp
files and leave them behind
Cont..
Cont..
Role in the registry function of the system:
1. HKEY_USERS : contains all the actively loaded user profiles.
2. HKEY_CURRENT_USER : It is the active, loaded user profile for the currently
logged on user.
3. HKEY_LOCAL_MACHINE : contains a vast array of configuration information of
hardware and software setting .
4. HKEY_CURRENT_CONFIG : contain the hardware profile information used during
startup.
5. HKEY_CLASSES_ROOT : contain configuration information relating to
application is used to open various files on the system.
Windows
file
analysis
1. Recycle bin it allows user to retrieve and restore files.
Cont..
3. Shortcut Files the files with the extension .lnk. It is created on the system in
the recent folder and it provides information about files or network shares.
4. Word document compound document based on the Object Linking and
Embedding (OLE) technology. Use wmd.pl and oledmp.pl scripts to list OLE
streams.
5. PDF document portable document format files can contain metadata, use
pdfmeta.pl and pdfdmp.pl scripts to extract metadata form pdf files.
6. Image Files like JPEG contain the photographers information such as location
where the picture was taken. Use tools such as Exifer, IrfanView and the
Image::MetaData::JPEG perl module to view, retrieve and modify metadata
embedded in jpeg image file.
7. File signature Analysis collecting information from the first 20 bytes of a file
helps to determine type and function of the file. Use prodiscover tools for file
signature analysis.
Cont..
Cont..
Cont..
Metadata
Cont..
Event Logs:
Event logs record a variety of day-to-day events that
occur on the windows system.
The Registry key maintains the event log
configuration:HKEY_LOCAL_MACHINE\SYSTEM\currentcotrol
set\services\Eventlog
Vista uses a XML format for storing events
Use wevtutil command to retrieve information
about the windows Event Log.
C:\>wevtutil el to display a list of available
Events logs on the system
C:\>wevtutil gl log name to list configuration
about a specific event log. Example: c:\>wevtutil gl
system or C:\>wevtutil el
Cont..
IIS Logs:
The IIS web server logs are maintained in the %winDir
%\system32\Log file directory.
The log files are ASCII text format which implies that they
are easily opened and searchable.
Access the console by choosing:
Start Run type either iis.msc or inetmgr
Start control panel Administrative Tools Internet
Services Manager
Search the logs that are created daily and stored in the
format exyymmdd.log, where:
Yymmdd stands for year, month and day
Ex refers to the extended format.
Each file name of the log is prefixed with the following
letters:
C = client actions
S = server to server actions
Sc = server to client actions
Cont..
Cont..
Parsing windows Firewall Logs
The firewall logs are present in the %systemRoot
%\pfirwall.log
The path and name setting of firewall log are
stored in the objects.data file.
Using the Microsoft Log parser
Use log parser tool to extract log files, xml files
and csv files
The command used for the log parser is :
Logparser.exe o:DATAGRID select * from
system
Module 9
Cont..
1. RAW Format
Fast data transfers
Can ignore minor data read error on source drive
Might not collect bad sectors on the source drive
2. Proprietary Format
Ability to split an image into smaller segmented
files.
Save space on the target drive
File size limitation
3. Advanced Forensics Format(AFF)
No size restriction for disk-to-image
Open source for multiple computing platforms and
OSes
Module 10
Recovering deleted Files and Deleted partitions
What happens when a file is Deleted in windows?
When a file is deleted, the OS system marks the files name
in MFT with a special character that indicates that the file
has been deleted.
The first letter of a file name is replaced by a hex byte code
E5h
What happens when a partition is deleted?
All data on that deleted partition or logical drive is lost.
Deleting a partition on a dynamic disk can delete all the
dynamic volumes on the disk, thus leaving the disk in a
corrupt state.
N.B: Deleted file and partition can be recovered by using
software
Module 11
Forensics Investigation Using AccessData FTK
Module 12
Forensic investigation using Encase
Encase Forensic features:
Preserve data in an evidence file format
Recover files and partitions detect deleted files
by parsing event logs, file signature
Acquire data from disk or RAM, images, email,
internet artifacts, web history and cache,
compressed files, backup files, encrypted files,
RAID, workstations, server and more
Module 13
Steganography:
A technique of hiding secret message within an ordinary
message and extracting it at the destination.
Utilizing a graphic image as a cover is the most popular method
of concealing data in files.
Legal use of steganography is law enforcements agencies us
steganography to:
Watermark intermediation martial after authorization and
under pubic prosecutor control with predefined marks.
Trace trade materials
Build an international data bank to collect data on the
trading controlled by investigative bodies.
Provide network nodes where trade material is monitored.
Unethical use of Steganography
Viruses, criminal communications, fraud, hacking,
electronic payments, harassment, intellectual property
Cont..
steganography is applicable to the following areas:
Broadcast monitoring (Gibson, pattern
recognition)
Cover communication
Ownership assertion
Fingerprinting (Traitor tracking)
Authentication(original vs. forgery)
Access control system for Digital content
Distribution
Steganographic file system
Media bridging
Copy prevention or control (DVD)
Metadata Hiding (Tracking Information)
Cont..
Classifications of stegagnography
1. Technical Steganography
1. Invisible Ink
Method with the longest tradition
2. Microdots
Method to hide up to one page in a dot
3. Computer-based methods
Uses redundant information in texts, pictures, sounds,
video, etc.
2. Linguistic Steganography :- written language to hide the message
in the carrier in some non-obvious ways. Have to parts:
1. Semagrams
1. Visual semagrams use innocent-looking or everyday
physical objects to convey a message, such as doodles or
the positioning of items on a desk or website.
2. Text Semagrams hide a message by modifying the
appearance of the carrier text such as subtle changes in the
font size or type, adding extra spaces, or different
flourishes in letters or handwritten text
Cont..
2. Open codes :- designed pattern on the document that is
unclear to the average reader
1. Jargon code a group of people can understand but is
meaningless to others
2. Covered ciphers hidden openly in the carrier medium
so that anyone who knows the secret of how it was
concealed can recover it.
1. Null ciphers is an ancient form of encryption where
the plaintext is mixed with a large amount of noncipher material
2. Grille Ciphers a grille is created by cutting holes in
a piece of paper and when the receiver places the grille
over the text, the intended message can be retrieved.
Cont..
Module 14
Application password cracker
Module 15
Log capturing and event correlation
1.Computer security logs
2.Loges and legal Issues
3.Event correlation
4.Log capturing and Analysis Tools
5.Log management
6.Time synchronization
7.Centralized logging and syslogs
Module 16
1.Network forensics
2.Network attacks
3.Log Injection Attacks
4.Investigating and analyzing logs
5.Investigating network traffic
6.Traffic capturing and analysis tools
Cont..
Network Forensics
Identifying criminal activity and the people
behind it.
Can defined as the sniffing, recording,
acquisition and analysis.
It allows investigators to inspect network traffic
and logs identify and locate the attack system.
Can tells:
Source of security incidents and network
attacks.
Path of the attack.
Intrusion techniques used by attackers.
Cont..
Module 17
Investigating wireless attacks
Cont..
Wi-Fi Discovery tools:
inSSIDer
GPS Maping tools: WIGLE, Skyhook,
Module 18
Investigating web attacks
Cont..
dotDefender
IBM AppScan
ServerDefender VP
2. Web Log Viewer
Deep log analyzer
WebLog Expert
AlterWind Log Analyzer
Webalizer
eWebLog Analyzer
Apache Logs Viewer (ALV)
Awstats
3. Web attack Investigation Tools:
Paros Proxy
Scrawlr
Cont..
Tools for Locating IP Address
Whois Lookup
SmartWhois
ActiveWhois
LanWhoIs
CountryWhois
CallerIP
Real Hide IP
IP Address Manager
Pandora FMS
Module 19
Tracking Emails and Investigating Email Crimes
Module 20
Mobile Forensic
Cont..
Cont..
Module 21
Investigative Reports
Computer Forensic Report:
Module 22
Becoming an Expert Witness
THE END