91.460.201 & 91.530.202 Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.

Slides:



Advertisements
Similar presentations
Computer Forensics.
Advertisements

Computer & Network Forensics Introduction Xinwen Fu.
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 3 Understanding the Boot Process and Command Line.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Guide to Computer Forensics and Investigations, Second Edition
Computer & Network Forensics
Guide to Computer Forensics and Investigations Fourth Edition
COS 413 DAY 2. Agenda Questions? Assignment 1 due next class Finish Discussion on Preparing for Computing Investigations Begin Discussion on Understanding.
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
Guide to Computer Forensics and Investigations Third Edition
11 INSTALLING WINDOWS XP Chapter 2. Chapter 2: Installing Windows XP2 INSTALLING WINDOWS XP  Prepare a computer for the installation of Microsoft Windows.
1 Web Server Administration Chapter 3 Installing the Server.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
COS/PSA 413 Day 2. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Begin.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Guide to Computer Forensics and Investigations, Second Edition
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics
Guide to Computer Forensics and Investigations, Second Edition
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Windows Tutorial 9 Maintaining Hardware and Software
Hands-on: Capturing an Image with AccessData FTK Imager
Chapter 7 Installing and Using Windows XP Professional.
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition
Configuring the MagicInfo Pro Display
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Windows XP Professional Windows XP Professional Overview Install and Upgrade Windows XP Pro Customize and Manage Windows XP Pro Troubleshoot Common Windows.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Mohd Taufik Abdullah Department of Computer Science
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Preserving Evidence ● Number one priority ● Must also find incriminating evidence ● Must search the contents of the hard drive ● Can not change the hard.
Chapter 13 Troubleshooting and Maintenance Fundamentals.
10/1/2015 Chapter 2 Installing Windows XP Professional.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Computer Forensics Principles and Practices
Chapter 2 Understanding Computer Investigations
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Guide to Computer Forensics and Investigations Fifth Edition Topic 1 Understanding The Digital Forensics Profession and Investigations All slides copyright.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Third Edition
CONFIGURING HARDWARE DEVICE & START UP PROCESS
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Presentation transcript:

& Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu

Dr. Xinwen Fu2 Outline  Prepare a case  Conduct an investigation  Complete a case  Critique a case

Dr. Xinwen Fu3 Course Outline Incident occurs: Point-in-Time or Ongoing pre-incident preparation pre-incident preparation Detection of Incidents Detection of Incidents Initial Response Initial Response Formulate Response Strategy Formulate Response Strategy Data Collection Data Collection Data Analysis Data Analysis Reporting Investigate the incident Resolution Recovery Implement Security Measures Resolution Recovery Implement Security Measures CSIRT: Computer Security Incident Response Team

Dr. Xinwen Fu4 Preparing a Computer Investigation  Role of a computer forensics professional Gather evidence to prove if a suspect committed a crime or violated a company policy Maintain valid evidence that can be offered in court or at a corporate inquiry  Follow an accepted scientific procedure to prepare a case

Dr. Xinwen Fu5 Things to Do while Preparing a Case 1. Assessing the case 2. Planning the investigation 3. Securing evidence

Dr. Xinwen Fu6 1. Assessing the Case  Systematically outline the case details: Nature of the case: public/private Type of evidence Location of evidence  Based on case details, you can determine the case requirements: Computer forensics tools Special OSs

Dr. Xinwen Fu7 2. Planning your Investigation - Steps 1.Acquire the evidence 2.Complete an evidence form and establish a chain of custody The route the evidence takes from the time you find it until the case is closed or goes to court Prison break the video tape case: Michael Scofield and Lincoln Burrows  Lincoln Burrows is lured to kill somebody  Lincoln pulled out of the gun in a garage, the victim is already dead  All is taped  The tape is manipulated: it seems that Lincoln fires

Dr. Xinwen Fu8 Single- Evidence Form

Dr. Xinwen Fu9 2. Planning your Investigation (Cont.) 3.Secure evidence in an approved secure container 4.Transport evidence to a computer forensics lab 5.Prepare a forensics workstation 6.Obtain the evidence from the secure container 7.Make a forensic copy of the evidence 8.Return the evidence to the secure container 9.Process the copied evidence with computer forensics tools

Dr. Xinwen Fu10 3. Securing your Evidence  Use evidence bags to secure and catalog the evidence  Use computer safe products Antistatic bags/pads  Use well-padded containers  Use evidence tape to seal all openings Floppy disk or CD drives Power supply electrical cord  Write your initials on tape to prove that evidence has not been tampered  Consider computer-specific temperature and humidity ranges

Dr. Xinwen Fu11 Objectives  Prepare a case  Conduct an investigation Overview Preserving data on floppy disks Preserving data on hard disks Collecting data remotely FTK for disk imaging and analysis  Complete a case  Critique a case

Dr. Xinwen Fu12 Setting Up Specific Workstation for Collecting Evidence  Why is DOS needed sometimes for acquiring data? Windows may contaminate files during maintenance  Set up Windows 98 workstation to boot into MS-DOS (P. 44) Display a Startup menu Modify Msdos.sys file using any text editor  Install a computer forensics tool DriveSpy and Image

Dr. Xinwen Fu13 Conducting an Investigation  Begin by copying the evidence using a variety of methods Recall that no single method retrieves all data The more methods you use, the better

Dr. Xinwen Fu14 Gathering the Evidence  Take all necessary measures to avoid damaging the evidence Place the evidence in a secure container  Complete the evidence custody form  Transport the evidence to the computer forensics lab  Create forensics copies (if possible)  Secure evidence by locking the container

Dr. Xinwen Fu15 Understanding Data-Recovery Workstations and Software  Investigations are conducted on a computer forensics lab (or data- recovery lab) Computer forensics and data-recovery are related but different  Computer forensics workstation Specially configured personal computer  To avoid altering the evidence, use: Write-blockers devices Forensics boot floppy disk FRED-M System

Dr. Xinwen Fu16 Objectives  Prepare a case  Conduct an investigation Overview Preserving data on floppy disks Preserving data on hard disks Collecting data remotely FTK for disk imaging and analysis  Complete a case  Critique a case

Dr. Xinwen Fu17 Understanding Bit-stream Copies  Bit-by-bit copy of the original storage medium  Exact copy of the original disk  Different from a simple backup copy Backup software only copy known files Backup software cannot copy deleted files or messages, or recover file fragments

Dr. Xinwen Fu18 Understanding Bit-stream Copies (Cont.)  A bit-stream image file contains the bit- stream copy of all data on a disk or partition  Preferable to copy the image file to a target disk that matches the original disk’s manufacturer, size, and model

Dr. Xinwen Fu19 Understanding Bit-stream Copies (Cont.) 2-4

Dr. Xinwen Fu20 Objectives  Prepare a case  Conduct an investigation Overview Preserving data on floppy disks Preserving data on hard disks Collecting data remotely FTK for disk imaging and analysis  Complete a case  Critique a case

Dr. Xinwen Fu21 Creating a Forensic Boot Floppy Disk  Goal is not to alter the original data on a disk A computer access files during startup. So what?  Preferred way to preserve the original data is to never examine it Make forensic copies Create a special boot floppy disk that prevents OS from altering the data when the computer starts up Windows 9x can also alter other files, especially if DriveSpace is implemented on a file allocation table (FAT) 16 disk

Dr. Xinwen Fu22 Assembling the Tools for a Forensic Boot Floppy Disk  Tools: Disk editor such as Norton Disk Edit or Hex Workshop Floppy disk MS-DOS OS Computer that can boot to a true MS-DOS level Forensics acquisition tool Write-block tool

Dr. Xinwen Fu23 Assembling the Tools for a Forensic Boot Floppy Disk (Cont.)  Steps: Make the floppy disk bootable Update OS files to remove any reference to the hard disk (using Hex Workshop or Norton Disk Edit) - in order to prevent the access of c:\Hex Workshop  Modify the command.com file on the floppy disk  Modify the Io.sys file on the floppy disk to disable Drivespace Add computer forensic tools Test your floppy disk Create several backup copies

Dr. Xinwen Fu24 Objectives  Prepare a case  Conduct an investigation Overview Preserving data on floppy disks Preserving data on hard disks Collecting data remotely FTK for disk imaging and analysis  Complete a case  Critique a case

Dr. Xinwen Fu25 Retrieving Evidence Data Using a Remote Network Connection  Bit-stream image copies can also be retrieved from a workstation’s network connection  Software: SnapBack EnCase R-Tools  Can be a time-consuming process even with a 1000-Mb connection  It takes less using a NIC-to-NIC connection

Dr. Xinwen Fu26 Objectives  Prepare a case  Conduct an investigation Overview Preserving data on floppy disks Preserving data on hard disks Collecting data remotely FTK for disk imaging and analysis  Complete a case  Critique a case

Dr. Xinwen Fu27 Copying the Evidence Disk  Recall a forensic copy is an exact duplicate of the original data  Create a forensic copy using: MS-DOS Specialized tool such as Digital Intelligence’s Imager  First, create a bit-stream image  Then, copy the image to a target disk

Dr. Xinwen Fu28 Creating a Bit-stream Image with FTK Imager  Functions Create the image of a physical drive Extract the image from a bit-stream image file Analyze the image  Forensic Software Downloads, linklink Forensic Toolkit ® (FTK™) version FTK Imager version or FTK Imager Lite version 1 Known File Filter Library File version (not necessary)

Dr. Xinwen Fu29 Creating a Bit-stream Image with FTK Imager (Cont.)  Start Forensic Toolkit (FTK) Imager by double- clicking the icon on your desktop  Click File, Image Drive from the menu; insert floppy disk labeled “Domain Name working copy #2”  In the dialog box that opens, click the A: drive to select a local drive, then click OK  A wizard walks you through the steps Accept all the defaults Specify the destination folder If necessary, create a folder called Forensics Files Name the file Bootimage.1

Dr. Xinwen Fu30 FTK Imager: Create Image

Dr. Xinwen Fu31 FTK Imager: Read Image

Dr. Xinwen Fu32 Analyzing Your Digital Evidence by Forensic Toolkit ® (FTK™)  Your job is to recover data from: Deleted files File fragments Complete files  Deleted files linger on the disk until new data is saved on the same physical location  Tools: Digital Intelligence’s DriveSpy AccessData’s FTK

Dr. Xinwen Fu33 Analyzing Your Digital Evidence (Cont.)

Dr. Xinwen Fu34

Dr. Xinwen Fu35 Objectives  Prepare a case  Conduct an investigation  Complete a case  Critique a case

Dr. Xinwen Fu36 Completing the Case  You need to produce a final report State what you did and what you found  You can even include logs from the forensic tools you used  If required, use a report template  The report should show conclusive evidence that the suspect did or did not commit a crime or violate a company policy

Dr. Xinwen Fu37 Objectives  Prepare a case  Conduct an investigation  Complete a case  Critique a case

Dr. Xinwen Fu38 Critiquing the Case  Ask yourself the following questions: How could you improve your participation in the case? Did you expect the results you found? Did the case develop in ways you did not expect? Was the documentation as thorough as it could have been?

Dr. Xinwen Fu39 Critiquing the Case (Cont.)  Questions continued: What feedback has been received from the requesting source? Did you discover any new problems? What are they? Did you use new techniques during the case or during research?

Backup Dr. Xinwen Fu40

Dr. Xinwen Fu41 In-Class Exercise 1. Form the group 2. Check the checksums (MD5 and SHA1) of the downloaded gpg4win exe by using WinPT within gpg4wingpg4win exe 3. Play with FTK and search around the image