48
Guide to Network Security 1 st Edition Chapter Twelve Digital Forensics

9780840024220 ppt ch12

Embed Size (px)

Citation preview

Guide to Network Security 1st Edition

Chapter TwelveDigital Forensics

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Objectives

• Explain how U.S. law enforcement and the U.S. legal system affect digital forensics

• Describe the roles and responsibilities of digital forensic team members

• List the steps involved in collecting digital evidence• Discuss the process used to analyze evidence• Explain how encryption can thwart digital forensic

analysis

2

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Introduction

• Computer forensics– Use of technical investigation and analysis

techniques to collect, preserve, and analyze electronic evidence

• Digital forensics– Applies to all modern electronic devices

3

© 2013 Course Technology/Cengage Learning. All Rights Reserved 4

Legal Matters

• Prosecution– Most important outcome of digital forensics process

• Various aspects of U.S. legal system influence digital forensics process

• Important to understand how to interact with law enforcement personnel

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Search and Seizure

• Private sector requirements to search an employee’s computer– Employee was made aware of organizational policy

establishing possibility of search– Search has legitimate business reason– Search has specific focus and is constrained to that

focus– Organization has clear ownership to container in

which the material was discovered– Search is authorized by the responsible manager

5

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Interacting with Law Enforcement

• Must notify authorities when incident violates civil or criminal law– Appropriate agency depends on type of crime– Example: FBI handles computer crimes categorized

as felonies• State, county, and city law enforcement agencies

– Better equipped for processing evidence than business organizations

– Prepared to handle warrants and subpoenas

6

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Interacting with Law Enforcement (cont’d.)

• Disadvantages of involving law enforcement– Loss of control of the chain of events– Long delays in resolution due to heavy caseloads or

resource shortages– Organizational assets can be removed, stored, and

preserved as evidence• Involving law enforcement unnecessary if

organization simply wants to reprimand or dismiss an employee

7

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Adversarial Legal System

• U.S. legal system is adversarial in nature– Parties attempt to prove own views are correct– Everything is open to challenge by opposing counsel

• Methods used in collecting evidence will be challenged– Ensures all parties “follow the rules”

8

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Digital Forensics Team

• Team of experts responsible for translating a real-world problem into questions to be answered by digital forensic analysis

• First response team– Assesses location, identifies sources of relevant

digital evidence, and collects and preserves evidence

• Analysis and presentation team– Analyzes the collected information to identify

material facts relevant to the investigation

9

© 2013 Course Technology/Cengage Learning. All Rights Reserved

First Response Team

• Size and makeup of team varies based on organization size

• Roles and duties– Incident manager

• Identifies sources of relevant information and produces photographic documentation

– Scribe or recorder• Produces written record of team’s activities and

maintains control of field evidence log and locker– Imager

• Collects copies or images of digital evidence

10

© 2013 Course Technology/Cengage Learning. All Rights Reserved

First Response Team (cont’d.)

• Incident manager prioritizes collected evidence– Guiding principles: value, volatility, and effort

required• Incident manager photographs equipment to be

removed– Imager sets up equipment and begins imaging items– Image hash information is documented in the record– Image is logged into the field evidence locker

• Team returns items to the scene after imaging

11

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Analysis Team

• Analysis performed by specially trained digital forensics personnel

• Tasks– Recover deleted files– Reassemble file fragments– Interpret operating system artifacts

• Larger organizations may divide functions– Forensic examiner– Forensic analyst– Subject matter expert (if required)

12

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Analysis Team (cont’d.)

• Presentation– Creating forensic reports– Present investigation’s findings

• Documentation should be easily understood by the audience (judge and jury)– Communicate highly technical matters without

sacrificing critical details– Analogies often used

13

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Dedicated Team or Outsource?

• Factors affecting decision to employ in-house investigatory team or outsource– Size and nature of the organization– Available resources– Cost

• Tools, hardware, staffing, and training– Response time

• Outside consultant needs time to get up to speed– Data sensitivity

• Outside consultant may have access to highly sensitive information

14

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Forensic Field Kit

• Prepacked field kit– Also known as a jump bag– Contains portable equipment and tools needed for

an investigation• Equipment in the kit should never be borrowed

– Always ready to respond• See Figure 12-1 for example of a forensic field kit

15

© 2013 Course Technology/Cengage Learning. All Rights Reserved 16

Figure 12-1 Example of a forensic field kit© Cengage Learning 2013

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Forensic Field Kit (cont’d.)

• Example forensic field kit contents– Dedicated laptops with multiple operating systems– Call list with subject matter experts– Mobile phones with extra batteries and chargers– Hard drives, blank CDs, DVDs, and thumb drives– Imaging software or hardware– Forensic software and tools to perform data

collection and analysis– Ethernet tap to sniff network traffic

17

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Forensic Field Kit (cont’d.)

• Example forensic field kit contents (cont’d.)– Cables to provide access to other devices– Extension cords and power strips– Evidence bags, seals, permanent markers for storing

and labeling evidence– Digital camera with photographic markers and scales– Incident forms, notebooks, and pens– Computer toolkit with spare screws, anti-static mats

and straps, mirrors, lights, and other equipment

18

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Digital Forensics Methodology

• Digital investigation begins with allegation of wrongdoing

• Authorization is sought to begin investigation– Public sector: search warrant– Private sector: affidavit, or other form specified by

organization’s policy

19

© 2013 Course Technology/Cengage Learning. All Rights Reserved 20

Figure 12-2 Flow of a digital investigation© Cengage Learning 2013

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Assessing the Scene

• Assess the scene and document its state:– Before evidence collection begins

• Assessment process– Interviewing key contacts– Documenting the scene as it is

• Typical tools used– Photography– Field notes

21

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Assessing the Scene (cont’d.)

• Photographic evidence– Plays a major role in documenting evidence

• Digital camera best practices– Sterilize the media card by formatting to destroy

existing content– Set the camera’s clock to ensure accurate recorded

dates/times– Take the first exposure of a “begin digital

photography” marker to make media self-documenting

22

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Assessing the Scene (cont’d.)

• Digital camera best practices (cont’d.)– Make an “end of photography” exposure– Remove card from the camera, place it in a static

bag, and seal in an evidence envelope– Do not make hashes of digital photographs until the

first time the evidence envelope is opened• Field notes

– Purpose: help investigators remember key aspects of the scene

– See Figures 12-3 through 12-6 for example forms

23

© 2013 Course Technology/Cengage Learning. All Rights Reserved 24

Figure 12-3 Scene sketch form© Cengage Learning 2013

Figure 12-4 Field activity log form© Cengage Learning 2013

© 2013 Course Technology/Cengage Learning. All Rights Reserved 25

Figure 12-5 Field evidence log form© Cengage Learning 2013

Figure 12-6 Photography log form© Cengage Learning 2013

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence

• Organization’s IR policy spells out procedures for initiating investigative process– Obtain authorization to conduct an investigation– Private organization can be sued if investigation

proves groundless• Collect digital evidence

– Identify sources of evidentiary material– Authenticate the evidentiary material– Collect the evidentiary material– Maintain a documented chain of custody

26

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence (cont’d.)

• Identifying sources– Can be complex in the digital world

• Data collection may involve:– Hundreds of gigabytes of information– A wide variety of devices

• Volatile information– Contents of a computer’s memory– Currently challenging to capture without sacrificing

information on disk

27

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence (cont’d.)

• Authenticating evidentiary material– Must be able to demonstrate data is a true and

accurate copy of the original• Authentication method: cryptographic hash

– Data is fed through the hash function– Fixed size output results– Infeasible that another input could produce the same

output value as a given input– Hash value is recorded with the digital evidence– Two commonly used hashes: MD-5 and SHA-1

28

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence (cont’d.)

• Collecting evidence– Live acquisition

• Collecting evidence from a currently running system– Dead acquisition

• Powering down the system to copy data from the hard drives

• Important to make no changes to the evidence– Labels and seals are crucial

• Media used to collect digital evidence must be forensically sterile– Contains no residue from previous use

29

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence (cont’d.)

• Live acquisition– Investigator uses a trusted set of CD-based tools– Stand-alone tools can also be used– Live response tools modify the state of the system

• Renders hard drive information inadmissible in a legal proceeding

• Windows Forensic Toolchest (WFT)– Driver script that identifies and lists running

processes, active network connections, and other activity

– Saves output on external media

30

© 2013 Course Technology/Cengage Learning. All Rights Reserved 31

Figure 12-10 Integrity checks from WFT© Cengage Learning 2013

© 2013 Course Technology/Cengage Learning. All Rights Reserved 32

Figure 12-11 Hash generation of evidence from WFT© Cengage Learning 2013

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence (cont’d.)

• Examples of situations that require live acquisition– Running server– Logs

• State is changing on a continual basis– PDAs and cellular phones

• Could continue to receive calls or be accessed wirelessly

• To prevent: block wireless access using a Faraday Cage

33

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence (cont’d.)

• Dead acquisition often used with:– Computer disks– Thumb drives– Memory cards– MP3 players

• Investigator seeks to obtain a forensic image of disk or device– Includes active files and directories and deleted files

and file fragments

34

© 2013 Course Technology/Cengage Learning. All Rights Reserved 35

Figure 12-14 Small portion of a file system© Cengage Learning 2013

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence (cont’d.)

• Bit-stream (sector-by-sector) copying– Used when making a forensic image of a device– Copies all sectors on the suspect drive

• Tools used– Specialized hardware tools

• Generally faster than software tools– Software running on a computer

36

© 2013 Course Technology/Cengage Learning. All Rights Reserved 37

Figure 12-15 Intelligent Computer Solutions’ ImageMaSSter© Cengage Learning 2013

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence (cont’d.)

• Write blockers– Blocks any write requests the laptop might generate– Allows read requests– Ensures information on the suspect media is not

changed accidentally• The imaging process

– Document origin and description of disk media– Ensure forensically sterile media for imaging– Connect suspect media to the imaging setup

38

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence (cont’d.)

• The imaging process (cont’d.)– Calculate and record baseline cryptographic hash of

suspect media– Perform a bit-stream image of the suspect media– Calculate and record hash of the target– Compare the hashes to verify they match– Package the target media for transport

39

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence (cont’d.)

• Maintaining a chain of custody– Purpose: protecting evidence from accidental or

purposeful modification– Legal record of where the evidence was at each

point in its lifetime– Document each and every access to evidence

• Field investigator usually maintains personal custody of sealed item until logged into evidence storage room

40

© 2013 Course Technology/Cengage Learning. All Rights Reserved 41

Figure 12-19 Sample chain of custody log© Cengage Learning 2013

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Acquiring the Evidence (cont’d.)

• Proper storage– Controlled temperature and humidity– Freedom from strong electrical and magnetic fields– Protection from file and other physical hazards

42

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Analyzing Evidence

• First step in analysis: obtain evidence from the storage area– Make a copy for analysis– Return original to storage

• Major tools in forensic analysis– EnCase Forensic from Guidance Software– Forensic Toolkit from AccessData

43

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Searching for Evidence

• Identifying relevant information– Important task

• FTK preprocessing– Constructs index of terms found on the image– Results available under the Search tab

• FTK also allows searching on user-specified terms• EnCase offers flexible search interface

– Includes predefined filters for common items

44

© 2013 Course Technology/Cengage Learning. All Rights Reserved 45

Figure 12-20 FTK’s processing step© Cengage Learning 2013

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Reporting the Findings

• Findings must be reported in a written presentation– And often in legal testimony

• Report audiences– Upper management– Forensic expert retained by the opposition– Attorneys, judges, and juries– Other professionals

• Prepare a single report– Summarizes detailed records contained in the case

file, analyst’s notebooks, and other documentation

46

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Encryption Concerns

• Retrieving information can pose a threat to privacy and confidentiality of information assets

• Encrypted information can present challenges to forensic investigators– Common encryption method destroys key when user

powers down or logs off• Data unreadable without the key

• Encrypted information may exist in unencrypted form in temporary work files or the paging file

47

© 2013 Course Technology/Cengage Learning. All Rights Reserved

Summary

• Computer forensics uses investigation and analysis techniques to identify, collect, preserve, and analyze electronic evidence

• First response team secures and collects the devices or media– Analysis and reporting done later by specially trained

forensic analysts• When incident violates law, organization is required

to inform law enforcement• Forensic tools can be used to obtain deleted

information48