Computer vs. Digital Forensics Explained
Computer vs. Digital Forensics Explained
Investigation
! Introduction to Computer Forensics
! Digital investigation
! Conducting a Digital Crime Scene Investigation
Computer Security
! Legal aspects and considerations
EDA263, lecture 14 ! Data preservation, acquisition and analysis
Ulf Larson – Live incident response
– Data duplication
– Forensic analysis techniques
! Applicability of computer forensics
– or… ”The art and science of applying computer science to aid the legal
The Digital Investigation
process”
– or… ”The application of computer investigation and analysis techniques to
determine potential legal evidence”
1
The digital investigation The digital investigation
! However, not all investigations goes to court.. ! A digital investigation takes place when a
– Corporate investigations digiatal incident is reported and evidence
– Private investigations
needs to be found
! ..and therefore, all investigations are not
“computer forensics” ! Analogy to physical investigation:
– A physical investigation considers fibers,
– A better name for the investigation process is footprints, blood stains and fingerprints.
digital investigation, or digital crime scene
– A digital investigation considers text files, e-mail
investigation messages, log entries and alerts.
A digital event is any activity or transition ! A digital event can be the cause of a data
– Interrupts, command invocations, process termination,
network data transmission/reception object, or the effect of a data object
! A digital event changes the state of one or more – A process can create a file
digital objects
! A digital object is a discrete collection of digital data – A file can be created by a process
– A file, a hard disk sector, a network packet, a process
! The state of a digital objects is the collection of X X’ X X’
object characteristics
Y E Y E1 W E2 W’
– File name, file content, MAC times
– A running process’ PCB, memory content Z Z
Three cause objects, one effect object Event chain with two events
2
Digital evidence and incidents
! Preserve the crime scene to prevent it from changes that are Evidence Searching
3
Evidence search Evidence search
4
Guidelines for collecting digital
evidence Collection procedure
! There is no established check list for how to collect ! Verify that no changes have been introduced to the
evidence for use in a court of law crime scene during investigation
! However, there are guidelines: – Physical: Don’t move furniture, reposition bodies or wash up
– Are the theories and techniques employed during evidence stains. Isolate environment. Don’t walk around in the area!
collection tested; – Digital: Don’t move files, run programs or remove data.
– Do the techniques for evidence collection have a known Isolate computer. Don’t “walk” around in the file system!
error rate;
– Physical: Take photos, samples, wear gloves to not
– Are the techniques subject to standards governing their introduce new objects. Document your actions!
application;
– Do the theories and techniques enjoy widespread – Digital: Take snapshots of computer state, duplicate data,
acceptance. use write blockers. Document your actions!
-Forensic Duplications
5
Live incident response Live incident response
! Live incident response: ! Connect your prepared forensic workstation to the suspect
computer
– When suspect computer is still running
– Collect all relevant data to confirm whether an incident has
occurred
– Collect both volatile and non-volatile data
! Volatile data disappears when computer is powered off
– Example: Process memory content
! Non-volatile data can still be recovered after power off, but
might be easier to read if captured with proper system tools. Forensic workstation Suspect computer
– Example: Easier to read already formatted system logs than raw
binary data. ! Set up channel between the suspect and the workstation
! Run commands to produce data, transfer data over the channel
! Hash the data to protect its integrity
6
Non-volatile data Non-volatile data
! Non-volatile data: Persistent after power off ! System version and patch level
– Version and patch level implies what attacks the system is
– System version and patch level vulnerable against, i.e., the starting point for the investigation
! System event logs
– System event logs
– Security logs, application logs and system logs
– User accounts – Allows us to find relevant entries regarding security issues, or
events that either applications or system finds notable
– Web-server logs
! User accounts
– Suspicious files – Listing the account list, allows us to see if any new accounts have
been created by the attacker
Non-volatile data
! Web-server logs
– Type of application logs, but should be treated more carefully
since webservers are highly exposed assets
– If attacks are automated, we can find this out from the timestamps
of individual log items
– We can also find if the webserver executed commands on the host
Forensic Duplications
! Suspicious files
– Allows us to find more information regarding the attack
– Usually done unless a forensic duplication is done
7
Forensic duplications Forensic duplications
! Different approaches for different operating ! Files exist in two shapes, logical and deleted
systems and file systems – Metadata: full file names, sizes, MAC times MD5
– The investigator needs good knowledge of how – Used for file name searches, timeline analyses
the file system is organized and how the and reporting
operating system treats deleted data. – Common UNIX tools can do this for logical data.
– Usually, the type of file system is provided to the – Specialized tools can do it also for deleted data
tool. The tool then investigates the file system
accordingly
8
Removing known files String searching and file fragments
! Limit the number of files that need to be ! When searching for data, two situations may come
considered up:
! A data object, e.g., a file, is found
! Remove the files that are considered as
– Inspect the file directly with a suitable application
normal… – Look for keywords that can forward the search
– Compare the hash of every file in the file system ! A keyword or string, e.g., ‘b0mb’ is present
to the hashes of a known good set of hashes – Search the system for data objects containing the string
! Collections of hashes exist – Investigate the rest of the data object
! Remove matches
Application areas
! Email tracing
! Web browsing reconstruction
! Intrusion analysis
Application areas ! Cell phone and PDA forensics
! USB and Flash memory forensics
! Static and dynamic binary analysis
Conclusion
! Computer forensics is the application of technology and
science to establish facts in a court of law
! A digital investigation preserves the crime scene, searches for
evidence, and reconstructs events
! A digital investigator needs to know computers, the legal
system, and draw conclusions
! Different approaches to the investigation is required depending
on the situation, on one extreme, we have live response, on the
other we have forensic duplication
! Several techniques are available to reduce and to pinpoint the
important objects
! Forensics have many application areas, including PDA
forensics and intrusion analysis