Analysis and Validation

Transcription

Analysis and Validation
1
! 
Determining What Data to Analyze
Examining and analyzing digital evidence depends on:
! 
! 
! 
! 
Nature of the case
Amount of data to process
Search warrants and court orders
Company policies
Analysis and Validation
! 
Scope creep
! 
COMP 2555: Principles of Computer Forensics
Investigation expands beyond the original description
L11: Analysis and Validation
Autumn 2014
http://www.cs.du.edu/2555
! 
Process the data methodically and logically
Basic steps for all computer forensics investigations
! 
! 
! 
! 
Starting at the root directory of the volume partition
! 
For all password-protected files that might be related to the
investigation
! 
! 
! 
List all folders and files on the image or drive
If possible, examine the contents of all data files in all folders
! 
! 
! 
Supported file systems: FAT12/16/32, NTFS, Ext2fs, and
Ext3fs
FTK can analyze data from several sources, including
image files from other vendors
FTK produces a case log file
Searching for keywords
! 
! 
Make your best effort to recover file contents
Identify the function of every executable (binary or .exe) file
that doesn’t match known hash values
Maintain control of all evidence and findings, and document
everything as you progress through your examination
Using AccessData Forensic Toolkit
! 
! 
! 
Indexed search
Live search
Supports options and advanced searching techniques, such as
stemming, phonics, synonyms and fuzzy search
Analyzes compressed files
You can generate reports
! 
Using bookmarks
L11: Analysis and Validation
! 
3
Approaching Computer Forensics Cases
L11: Analysis and Validation
2
! 
5
Validating with Hexadecimal Editors
Advanced hexadecimal editors offer many features not
available in computer forensics tools
! 
! 
Such as hashing specific files or sectors
! 
Validating with Forensics Programs
Commercial computer forensics programs have built-in
validation features
Using hash values to discriminate data
! 
Hex Workshop provides several hashing algorithms
! 
! 
Such as MD5 and SHA-1
! 
Hex Workshop also generates the hash value of selected
data sets in a file or sector
! 
Filters known program files from view, such as MSWord.exe, and
identifies known illegal files
KFF compares known file hash values to files on your
evidence drive or image files
Periodically, AccessData updates these known file hash values
and posts an updated KFF
L11: Analysis and Validation
! 
AccessData has a separate database, the Known File Filter
(KFF)
! 
File manipulation
! 
! 
! 
! 
! 
File Manipulation
Easiest method to hide data on a live file system
! 
Filenames and extensions
Hidden property
Segmentation
! 
! 
! 
Hidden partitions
Bad clusters
! 
Rootkits
! 
! 
! 
Many malwares run as svchost.exe, which is a very common
process name in Windows
Change the extension and place in a folder with similar
files
! 
Bit shifting
Steganography
Change the name or extension of the file in question
Change the name to a very common one
Encryption
! 
! 
! 
Disk manipulation
! 
! 
7
Data Hiding Techniques
L11: Analysis and Validation
6
L11: Analysis and Validation
! 
Name your file as MSODBC32.dll and place in WinNT/
System32
This folder is full of .dll files
Even the very experienced system administrators do not
know the names of all dll files
File signature analysis
! 
Identifying a file by looking inside it
L11: Analysis and Validation
4
Using the hidden property of files
! 
! 
! 
! 
! 
Almost every file system allows a file to be specified as
hidden
Windows: check box in file properties to specify as hidden
Unix: any file name starting with a dot is hidden
File Manipulation (contd.)
File segmentation
! 
! 
! 
Back in the old DOS days, a large file must be split to be able
to carry in floppy diskettes
Split a file into multiple segments of arbitrary size
Store each segment in a separate location
Not difficult to detect
! 
! 
Either change system settings to display all files
ls -a
! 
! 
In the disk drive
As an alternate data stream
In the registry
…
L11: Analysis and Validation
! 
! 
10
Delete references to a partition using a disk editor
! 
! 
Hiding Partitions (contd.)
Re-create links for accessing it
Use disk-partitioning utilities
! 
! 
! 
! 
! 
11
Hiding Partitions
GDisk
PartitionMagic
System Commander
LILO
Account for all disk space when analyzing a disk
L11: Analysis and Validation
! 
L11: Analysis and Validation
! 
9
File Manipulation (contd.)
L11: Analysis and Validation
8
12
! 
! 
! 
Common with FAT systems
Place sensitive information on free space
Use a disk editor to mark space as a bad cluster
To mark a good cluster as bad using Norton Disk Edit
! 
! 
! 
! 
! 
Type B in the FAT entry corresponding to that cluster
Old technique
Shift bit patterns to alter byte values of data
Make files look like binary executable code
Tool
! 
! 
Hex Workshop
WinHex
14
! 
Greek for “hidden writing”
Steganography tools were created to protect
copyrighted material
! 
! 
! 
What’s Common Between These?
By inserting digital watermarks into a file
Suspect can hide information on image or text
document files
! 
! 
15
Using Steganography to Hide Data
Most steganography programs can insert only small amounts
of data into a file
Very hard to spot without prior knowledge
Tools: S-Tools, DPEnvelope, jpgx, and tte
L11: Analysis and Validation
! 
L11: Analysis and Validation
In Linux, associate good blocks with the bad blocks
inode
L11: Analysis and Validation
! 
Bit-shifting
L11: Analysis and Validation
! 
13
Marking Bad Clusters
17
! 
A collection of tools and utilities that masks the presence of
malicious activity in a system
! 
! 
! 
Hook APIs
! 
Rootkits operating at the kernel level are very dangerous
L11: Analysis and Validation
! 
! 
! 
! 
! 
! 
! 
Different tools generate the lists using different techniques
Rootkit processes may show up on one
! 
Analyze installed services (both running and halted)
Analyze registry for errant services
Analyze system from a remote system
! 
! 
Prevention is better than cure!
Recovering Passwords
Dictionary attack
Brute-force attack
Password guessing based on suspect’s profile
Many systems do not directly store passwords, but their
hashes
! 
Knowing the hash can make recovery attempts faster
Tools
! 
Some hooked APIs can be bypassed this way
Use tools to monitor system files added/deleted
The core functionality of the operating system is questionable
Techniques
! 
Look for known rootkit files
Use different tools to obtain running process lists
! 
! 
! 
! 
L11: Analysis and Validation
! 
! 
Example: filter the output of common programs
19
Rootkits (contd.)
Detection involves obtaining multiple perspectives of
the problem and look for inconsistencies
! 
Example: listing processes will not show processes created by the
attacker
! 
! 
! 
An attacker may devote a whole lot of time in compromising a
system
Would want to keep the obtained privileges as long as possible
Replace system binaries to report that everything is normal
! 
18
Rootkits
L11: Analysis and Validation
Both Has This In There!!
! 
AccessData PRTK
Advanced Password Recovery Software Toolkit
John the Ripper
L11: Analysis and Validation
16
20
Remote acquisitions are handy when you need to image
the drive of a computer far away from your location
! 
Or when you don’t want a suspect to be aware of an ongoing
investigation
References
Ch 9: B. Nelson, A. Phillips and C. Steuart, Guide to
Computer Forensics and Investigations. ISBN:
978-1-435-49883-9
Remote acquisition software follow a client-server
model to exchange information
! 
! 
Server component runs on suspect machine providing a
portal into it
Client component talks to the server and pulls the
information to the target machine
L11: Analysis and Validation
! 
! 
L11: Analysis and Validation
! 
21
Performing Remote Acquisitions