CS526: Information Security Chris Clifton December 4, 2003 Forensics.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

OPEN SOURCE TOOLS Dr. Abraham Professor UTPA. Open Source Freely redistributable Provides access to source code End user may modify source code.
Operating-System Structures
COEN 252 Computer Forensics
Tan COMPUTER FORENSICS.
Evidence Collection & Admissibility Computer Forensics BACS 371.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Chapter 10: File-System Interface
File System Analysis.
File System Interface CSCI 444/544 Operating Systems Fall 2008.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
File Management Systems
X-Ways Trace Prepared By: Leen F. Arikat Supervisor: Dr. Lo’ai Tawalbeh.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Handling Security Incidents
COMPUTER FORENSICS Aug. 11, 2000 for Cambridge, Massachusetts.
Chapter 12 File Management Systems
Jai, 2004 Incident Response & Computer Forensics Chapter 6 Live Data Collection from Unix Systems Information Networking Security and Assurance Lab National.
Chapter 14: Computer and Network Forensics
Data Acquisition Chao-Hsien Chu, Ph.D.
CONTENTS:-  What is Event Log Service ?  Types of event logs and their purpose.  How and when the Event Log is useful?  What is Event Viewer?  Briefing.
Sleuthkit/Autopsy Kevin Krause.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Legal and Ethical Issues Lecture 12
Computer Systems Week 10: File Organisation Alma Whitfield.
Introduction to Knoppix-STD: Forensic Analysis of a Compromised Linux Harddrive Dana M. Epp Computer Security Software Architect Scorpion Software Corp.
A Guide to Unix Using Linux Fourth Edition
COEN 252 Computer Forensics
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
1 Forensics: The use of science and technology to investigate and establish facts in criminal or civil courts of law. Computer Forensics: Commonly defined.
NATIONAL PARTNERSHIP FOR ADVANCED COMPUTATIONAL INFRASTRUCTURE SAN DIEGO SUPERCOMPUTER CENTER Coroner’s Toolkit: An Introduction Victor Hazlewood
Chapter 2: Operating-System Structures. 2.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 2: Operating-System Structures Operating.
Introduction to Digital Forensics Florian Buchholz.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing.
Tool Names: 1. VISION 2. PASCO 3. GALLETA. Tool 1 VISION.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Chapter Eight Exploring the UNIX Utilities. 2 Lesson A Using the UNIX Utilities.
File Systems CSCI What is a file? A file is information that is stored on disks or other external media.
File System Interface. File Concept Access Methods Directory Structure File-System Mounting File Sharing (skip)‏ File Protection.
Operating Systems (CS 340 D) Dr. Abeer Mahmoud Princess Nora University Faculty of Computer & Information Systems Computer science Department.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
Chapter Five Advanced File Processing Guide To UNIX Using Linux Fourth Edition Chapter 5 Unix (34 slides)1 CTEC 110.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Guide To UNIX Using Linux Third Edition Chapter 8: Exploring the UNIX/Linux Utilities.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Guide To UNIX Using Linux Third Edition Chapter 8: Exploring the UNIX/Linux Utilities.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 Nov 1, 2005 Computer Forensics (Lab 2 Related)
OS, , Part I Operating - System Structures Department of Computer Engineering, PSUWannarat Suntiamorntut.
COEN 250 Computer Forensics Windows Life Analysis.
Lecture 18 Windows – NT File System (NTFS)
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
SOCSAMS e-learning Dept. of Computer Applications, MES College Marampally FILE SYSTEM.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
2.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition System Programs (p73) System programs provide a convenient environment.
Role Of Network IDS in Network Perimeter Defense.
Chapter Eight Exploring the UNIX Utilities. 2 Lesson A Using the UNIX Utilities.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
SVBIT SUBJECT:- Operating System TOPICS:- File Management
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
CSE Operating System Principles File Systems.
PDF Recovery Tool Fix Portable Document File Format.
1D0-570 CIW CIW v5 Security Professional
File System Interface CSSE 332 Operating Systems
Chapter 2: System Structures
Modern PC operating systems
Presentation transcript:

CS526: Information Security Chris Clifton December 4, 2003 Forensics

CS526, Fall What is Computer Forensics? Understand what happened –Recovery –Prevention of future incidents –Sanctions / Law enforcement Often similar problems to Audit But what if audit trail inadequate? –Audit information incomplete/insufficient –Audit trail damaged –We don’t own the computer

CS526, Fall What is the Challenge? Audit information incomplete/erased –Reconstruct deleted information “Acceptable” state of system unknown –Need to identify violation in spite of this Goal not obvious –Transformations may have been applied to data Strong burden of proof –Not enough to know what happened –Must be able to prove it (non-repudiation)

CS526, Fall FBI List of Computer Forensic Services Content (what type of data) Comparison (against known data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code (analysis or compare) Storage Media (many types)

CS526, Fall TCT – Tool Overview mactimes - report on times of files ils - list inode info (usually removed files) icat - copies files by inode number unrm - copies unallocated data blocks lazarus - create structure from unstructured data file - determine file type pcat - copy process memory grave-robber - captures forensic data

CS526, Fall mactime mactime is shorthand reference to the three time attributes - mtime, atime, and ctime –atime - time of last access –mtime - time of last modification –ctime - time of last status change of inode –dtime - time of deletion (Linux only) Examples # mactime -d /var/adm -y 1/1/1970 # mactime –R -d /var/log -y 1/1/1970 # mactime –R –d / -y 7/1/2001

CS526, Fall mactime Examples # mactime -d /var/adm -y 1/1/1970 # mactime –R -d /var/log -y 1/1/1970 # mactime –R –d / -y 7/1/2001

CS526, Fall ils ils lists inode information of removed files. Can be used to identify deleted files for possible attempt to undelete with icat. Specify a device file which contains a file system. Example ils /dev/hdb1

CS526, Fall icat icat copies files by inode number from a device which contains a file system. Can be used to recover a deleted file (when intact) Example icat /dev/hdb1 17

CS526, Fall unrm unrm – copies unallocated data blocks Used to copy unallocated blocks to an output file in order to be processed by lazarus. Example # unrm /dev/hdb1 > /tmp/unrm.of.hdb1

CS526, Fall lazarus lazarus – attempts to make sense out of raw data blocks Use to process the output from unrm. Saves blocks into files that lazarus thinks are associated in blocks directory Output controlled by lazarus.cf file Example # lazarus /tmp/unrm.of.hdb1 # lazarus –h /tmp/unrm.of.hdb1

CS526, Fall Grouping Example exploit.c todo.txt /* exploit.c */ /* Allows user to perform attack */ int main(int argc, char *argv []) { evil_hack(); } exploit.c: C source code Things to Do: - Give presentation - Go to class - Do laundry - Write todo list todo.txt: English text File View

CS526, Fall Grouping Example /* exploit.c */ /* Allows user to perform attack */ int main(int argc, char *argv []) { evil_hack(); } exploit.c: C source code Things to Do: - Give presentation - Go to class - Do laundry - Write todo list todo.txt: English text Block View

CS526, Fall lazarus Typical output looks something like atttttccccccpppptttttattcccppptttt otherwise output is in html files (-h option) See lazarus man page for translation of characters

CS526, Fall file File – determine file type Similar to UNIX System V file command, but may generate better indication of file type

CS526, Fall pcat Pcat – copies process memory using ptrace or /proc file system. This is used to try to understand what a program is (doing), especially when the executable file has been deleted. (See Strangers in the Night article) Modern UNIX systems have a /proc filesystem that makes process information available in a convenient manner, including the executable file, current directory, and process memory.

CS526, Fall pcat Process attributes available in /proc executable/proc/pid/exe memory/proc/pid/mem memory map/proc/pid/maps

CS526, Fall grave-robber grave-robber captures system forensic data Runs many of TCT tools under the covers Three types of options –general options where output goes, verbosity, etc –micro options finer control over what data is collected –macro options puts micro data collection into logical groups

CS526, Fall Law Enforcement Challenges Many findings will not be evaluated to be worthy of presentation as evidence. Many findings will need to withstand rigorous examination by another expert witness. The evaluator of evidence may be expected to defend their methods of handling the evidence being presented. The Chain of Custody may be challenged.

CS526, Fall IDENTIFICATION – Technical Analysis Physical Context Logical Context Presentation/Use Context Opinion to support relevance of findings Handling and labeling of objects submitted for forensic analysis is key. Following a documented procedure is key.

CS526, Fall Broader Picture: What to Do do not start looking through files start a journal with the date and time, keep detailed notes unplug the system from the network if possible do not back the system up with dump or other backup utilities if possible without rebooting, make two byte by byte copies of the physical disk capture network info capture process listings and open files capture configuration information to disk and notes collate mail, DNS and other network service logs to support host data capture exhaustive external TCP and UDP port scans of the host contact security department or CERT/management/police or FBI if possible freeze the system such that the current memory, swap files, and even CPU registers are saved or documented short-term storage packaging/labeling shipping