automated production of predetermined digital evidence

34
Automated Production of Predetermined Digital Evidence Submitted by Vipin Kumar 1104331054 EC 3 rd year

Upload: animesh-lochan

Post on 14-Jun-2015

98 views

Category:

Engineering


6 download

DESCRIPTION

Have a look.. Handsome application...

TRANSCRIPT

Page 1: Automated production of predetermined digital evidence

Automated Production of Predetermined Digital

Evidence

Submitted byVipin Kumar1104331054

EC 3rd year

Page 2: Automated production of predetermined digital evidence

Prof J.P SAINI

Under the able guidance and support of

Page 3: Automated production of predetermined digital evidence

INTRODUCTION 2.4 Billion Internet user worldwide.

2/3 of online adults have been victim of cybercrime.

Estimated global loss of $110 billion annually.

Page 4: Automated production of predetermined digital evidence

TERMINOLOGY Digital evidence

Any probative information stored or transmitted

digitally. Ubiquitous, Immaterial, local, remote.

DIGITAL ALIBI Excuse supplied by a person suspected

FALSE DIGITAL ALIBI Tampering digital information

Page 5: Automated production of predetermined digital evidence

CASE STUDY Rodney Bradford -19 years old charged with

armed robbery case. Alberto Stasi -Suspect in the murder.

In both cases DNA traces and digital evidence on the PCs prove them innocent.

Page 6: Automated production of predetermined digital evidence

CREATION OF PREDETERMINED DIGITAL EVIDENCE

Alibi Maker (AM) - an individual interested in constructing a false digital alibi

Target System (TS) - Personal computer of AM

Page 7: Automated production of predetermined digital evidence

AIMTo produce remote digital evidence, or even a mix of local and remote evidence.

Different strategies to accomplish this-Involvement of another PersonRemotization and Automation.

Page 8: Automated production of predetermined digital evidence

REMOTIZATION Remote control of the TS from a different

machine. Two methods:

Using KVM device Software control from another PC

Page 9: Automated production of predetermined digital evidence

SOFTWARE CONTROL

Control software to pilot the TS from another computer Avoid installation Portable application such as TeamViewer Portable Success depends on the ability of obfuscating the server process

Page 10: Automated production of predetermined digital evidence

KVM METHOD KVM switch over IP (IP-KVM) creates remote connection to the KVM ports of the TS.

WHAT IT DOES? Digitizes and compresses the video signal of the TS for transmission to a remote controller Do not require any software to be installed.

Page 11: Automated production of predetermined digital evidence

PROBLEMS

Controller machine, MAC or IP addresses of the KVM, may be recorded by other components of the network, such as DHCP. The necessity of human intervention. Unwanted creation of logs and caches.

Page 12: Automated production of predetermined digital evidence

AUTOMATION Automation : To have false alibi at required time without human interference. It’s a type of program Can simulate any common user activity,

Web navigation authentication posting of messages sending of emails videogames

Page 13: Automated production of predetermined digital evidence

THE AUTOMATION METHODOLOGY

DIGITAL EVIDENCE OF AN AUTOMATION

May access resources on the TS Modification of system state TYPES Wanted Evidence Unwanted evidence

Page 14: Automated production of predetermined digital evidence

UNWANTED EVIDENCE TYPE

Filesystem Traces Execution Traces Virtual Memory Traces LOGIN Traces

Page 15: Automated production of predetermined digital evidence

UNWANTED EVIDENCE HANDLING

Require awareness on OS modules Other approaches

a-priori avoidance a-posteriori removal and obfuscation

Page 16: Automated production of predetermined digital evidence

A-PRIORI AVOIDANCE Disabling any logging mechanisms

Virtual Memory Prefetch Volume Shadow Copy

(Can be suspicious)

Executing the automation from an external device

Page 17: Automated production of predetermined digital evidence

A-POSTERIORI REMOVAL

Removal by secure deletion procedure Manual deletion

using Deft suite to avoid suspicion Automatic deletion

Difficult as executable files are read only Interpreted programming languages can do the job

Page 18: Automated production of predetermined digital evidence

OBFUSCATION

Using common file names

Storing the suspicious files in system folders.

Page 19: Automated production of predetermined digital evidence

DEVELOPMENT OF AN AUTOMATION

(1) Preparation of the development environment(2) Implementation of the automation(3) Testing of the(4) Automation procedure(5) Exportation of the automation(6) Destruction of the development environment

Page 20: Automated production of predetermined digital evidence

PREPARATION AND DESTRUCTION OF THE ENVIRONMENT

Should be totally isolated and similar from the TS

Techniques to create a proper development environment:

Virtual machine Live OS Physically isolated system

Page 21: Automated production of predetermined digital evidence

IMPLEMENTATION OF THE AUTOMATION

Depends on the choice of the automation techniques Some techniques are:

Using frameworks such as AutoIt By writing hundreds code lines in a whatever scripting language

Synchronization of all the automated operations

Page 22: Automated production of predetermined digital evidence

TESTING OF THE AUTOMATION PROCEDURE

Verify that the automation acts correctly Identify all the unwanted artifacts left by the automation Specific tools

Process monitoring tools Digital forensic tools

Page 23: Automated production of predetermined digital evidence

EXPORTING THE AUTOMATION

Network Transfer

External Memory Transfer

Page 24: Automated production of predetermined digital evidence

V. AUTOMATION TOOLS

Framework that allows the implementation of a program

Any programming languages supporting GUI events

Page 25: Automated production of predetermined digital evidence

VBScript

VBScript is a scripting language

Simulate user interaction such as mouse movements, clicks and keystrokes.

Does not require any third-party resources

Provides advance simulation features than AutoIt

Page 26: Automated production of predetermined digital evidence

UNWANTED EVIDENCE IN WINDOWS 7

Prefetch Registry Hibernation Restore Points

Page 27: Automated production of predetermined digital evidence

EXECUTION Load script onto SD card containing other multimedia files. Access SD card through File Explorer The script HexToDec.vb is launched with a simple double-click. Hardcode starting time

Page 28: Automated production of predetermined digital evidence

CASE STUDY: WINDOWS 7 An advanced automation for Windows 7 Alibi Timeline.

Time Activity

T0 Execution of a Web browser

T1 Access to Facebook

T2 Posting of a message on Facebook

T3 System shutdown

Page 29: Automated production of predetermined digital evidence

Execution of a Web Browser

Crucial steps to avoid failures :

Internet connection must be functioning and stable Disable the automatic saving of login information Add websites to “ Trusted sites”.

Page 30: Automated production of predetermined digital evidence

USE OF BROWSER AND FB

Page 31: Automated production of predetermined digital evidence

ANALYSIS

Verification of coherence of DE with the alibi timeline

Discover any unwanted evidence left by the automation

Page 32: Automated production of predetermined digital evidence

CONCLUSION

Given methodology could be exploited by a party Automation is a program able to simulate a series of human activities Problem of avoiding unwanted traces is also addressedCase study on a target system running Windows 7 is presented

Page 33: Automated production of predetermined digital evidence

REFERENCE

IEEE ACCESS Received April 17, 2013, accepted April 24, 2013, published May 10, 2013.

AUTHORS ANIELLO CASTIGLIONE (Member, IEEE), GIUSEPPE CATTANEO, GIANCARLO DE MAIO, AND ALFREDO DE SANTIS (Member, IEEE)

Department of Computer Science, University of Salerno, Via Ponte don Melillo, Fisciano I-84084, Italy

Page 34: Automated production of predetermined digital evidence

THANK YOU