35
Computer Forensics Peter Caggiano

Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Embed Size (px)

Citation preview

Page 1: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Computer Forensics

Peter Caggiano

Page 2: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Outline

My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How to enter the field Questions?

Page 3: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Background

Stockton College BS Computer Science Minor in Mathematics

The George Washington University MS Computer Science Concentrations:

Information Assurance Computer Forensics

Page 4: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Work Experience

PG Lewis & Associates Corporate Forensics and Data Recovery

Department of State Computer Investigations and Forensics

Nuclear Regulatory Commission Office of the Inspector General

Page 5: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Computer Forensics

Computer forensics is the discipline of acquiring, preserving, identifying and examining digital media

The application of computer science and mathematics to the reliable and unbiased collection, analysis, interpretation and presentation of digital evidence.

Page 6: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

What Is Computer Forensics?

Is often more of an art, than a science. Follows clear, well-defined

methodologies. Uses the same basic techniques as

other forensics areas.

Page 7: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

What Forensics Can Do

High tech investigations Incident response Email recovery and analysis Document and file discovery Data collecting

While still preserving MAC times Other volatile data

Page 8: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

What Forensics Can Do Uncover and document evidence and

leads Corroborate other evidence Assist in showing patterns of events Connect computers and people Reveal an end-to-end path of events

leading to a compromise attempt, successful or not

Extract data that may be hidden, deleted or otherwise not directly available

Page 9: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

What Forensics Can’t Do

Create evidence Tie the suspect to the incident

Only system or profile Prove innocence or guilt Be instantaneous

Page 10: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Goals

Details of investigation will depend on the circumstances and goals, but the steps are always the same.

Goals: Support Law Enforcement To determine the root case of an event to

prevent re-occurrence Re-construct the series of events surrounding the

incident Assist in more types of investigations than just

digital

Page 11: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Evidence

All forms of digital media Hard drives CD’s Floppy disks USB drives Flash memory Tape drives Cameras Etc.

Page 12: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Evidence Categories Beyond Hard Drives Logs

Managing devices Hosts/systems Servers

Interviews Involved personnel Business and

technical managers Device

configuration files

Network maps Event observation

timelines Notes

Meetings Passwords

Response team notes and observations

Page 13: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Types of Forensics

Traditional vs.

Incident Response

Page 14: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Basic Methodology

Identification Preparation Approach strategy Preservation Collection Examination Analysis Presentation Returning evidence

Page 15: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Traditional Forensics

Referred to as ‘Dead’ Forensics Analysis done in a ‘Post Mortem’ state

After the system has lost power Two basic rules

Harm Nothing Preserve Everything

Page 16: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Harm Nothing

Writeblocker (Hardware, Firmware, Software) Preserves the integrity of the original

evidence Work of a ‘Forensic Image’ of original

evidence, never original evidence Don’t handle original evidence longer

than it needs to be

Page 17: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Forensic Image

An exact, bit by bit copy of a piece of media without altering the original data.

Includes slack space, unallocated, and hidden partitions.

Preserves MAC times An exact “snapshot” of the hard drive

at that given time

Page 18: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Writeblockers

Hardware Only true hardware writeblocker is the

Floppy tab Firmware

Intermediate device between the evidence and the system

Intercepts the write signal from the system and prevents any alteration of data

Software Secure Linux environment Connecting file systems as ‘Read Only’ to

the system HFS partition connected to a Windows system

Page 19: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Preserve Everything

Contact system administrators Data can be on remote servers

Image entire disks not just volumes Physical vs. Logical layer

Image all peripheral media

Page 20: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Common tools

MacForensicsLab FTK EnCase iLook Pro Discover Many specialized tools

Page 21: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Incident Response

Also known as Live Forensics Growing field because of the

expanding roll of networks Vital to preserve volatile data Unlike Traditional Forensics, original

evidence must be altered To retrieve needed data, must use the

system in question

Page 22: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

What Incident Response Can Do

Show a path that the intruder took over the network

Reveal intermediate intrusions Preserve data that would be lost

during Tradition Forensic Investigations

Create leads to expand investigation

Page 23: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

What Incident Response Can’t Do Solve the case alone

Traditional Forensics is still needed Tie the suspect to the attack

Only system Create data that is not present

Page 24: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Collecting the evidence

Information gathering Volatile memory and configurations

Enumerating Files or ambient data

Compromised system Attack system

Log entries in intermediate devices

Page 25: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

What to look for

Footprinting Files or ambient data on attack computer

and log entries in intermediate devices

Probing for weaknesses Files or ambient data on attack computer Log entries

Intermediate devices Compromised system

Page 26: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Tools

Mostly open source tools Helix

Live Linux environment and response suite

Backtrack Network mapping and penetration (if

needed) Custom batch and script files

Page 27: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Big Picture

Use all the data collected to tie all the events together in support of the overall investigation.

Page 28: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Future Problems

Large data sets Steganography Cell phones PDA’s Encryption

Page 29: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

How to enter the field

Law Enforcement Mostly point and click Don’t always understand the technical

side Technical

Don’t understand the entire scope of the investigation

Understands the ‘behind the scene’ actions of the tools

Page 30: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Forensic Analyst Requires Knowledge of

Computer Hardware and Software Operating Systems File Systems Special “Forensics” Hardware and

Software Networks General technical support

Page 31: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Preparation from Stockton

Technical support Programming Computer security basics Analytical approach Networks Sound fundamentals

Page 32: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Preparation from GW

SFS Scholarship Hands on forensic practical In-depth computer security Network security practices Hacking

Page 33: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

SFS Scholarship www.sfs.opm.gov

Roughly 15 schools nationwide Pay for up to 2 years of school Pay you to go to school

NSA Center of Excellence Concentrate in all areas of computer security Not all centers are scholarship schools

In return: 1 to 1 Years of education to government

employment

Page 34: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Questions?

Page 35: Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How

Contact Information

Peter Caggiano908.581.3630

[email protected]