tan ([email protected])[email protected] computer forensics

21
Tan ([email protected]) COMPUTER FORENSICS

Upload: jasper-casey

Post on 17-Dec-2015

253 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Tan ([email protected])

COMPUTER FORENSICS

Page 2: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

FORENSICS IS A FOUR STEP PROCESS

Acquisition Identification Evaluation Presentation

RCMP Technical Security Branch - Computer Forensics: An Approach to Evidence in Cyberspace (RCMP GRC Publications) http://www.rcmp-grc.gc.ca/tsb/pubs/bulletins/bull41_3.htm , by Special Agent Mark M. Pollitt, Federal Bureau of Investigation, Baltimore, Maryland (4/96)

Page 3: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

GROUND ZERO – WHAT YOU CAN DO do not start looking through files establish an evidence custodian - start a journal with the date

and time, keep detailed notes Designate equipment as “off-limits” to normal activity (if

possible) – especially back-ups (with dump or other backup utilities), locally or remotely scheduled house-keeping, and configuration changes.

collate mail, DNS and other network service logs to support host data

capture exhaustive external TCP and UDP port scans of the host (unless tcp-wrapped)

contact security department or CERT,management,police or FBI, affected sites*

packaging/labeling and shipping short-term storage

Page 4: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Incident Response – What the Pros Do

Identify designate or become the evidence custodian Review any journal of what has been done to the system

already and how the intrusion was detected Start or maintain existing journal Install a sniffer Backdoors If possible without rebooting, make two byte by byte copies of

the physical disk Capture network info Capture process listings and open files Capture configuration information to disk and notes Receipt and signing of data

Page 5: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Data Collection with dd, TCT & cryptcat

Script started on Fri Sep 29 16:39:41 2000

# grave-robber –v –F –i –l –M –m –O –P –S –s –t –V /

# tar –c $TCT_HOME/data/`hostname` |cryptcat –k f0renzikz juarez 33

^C punt!

# df -k

Filesystem kbytes used avail capacity Mounted on

/proc 0 0 0 0% /proc

/dev/dsk/c0t0d0s0 240302 37942 178330 18% /

/dev/dsk/c0t0d0s6 2209114 324049 1840883 15% /usr

fd 0 0 0 0% /dev/fd

/dev/dsk/c0t0d0s1 480620 2983 429575 1% /var

/dev/dsk/c0t0d0s7 961257 94 903488 1% /export/home

swap 196312 832 195480 1% /tmp

# ./dd if=/dev/dsk/c0t0d0s0 bs=1024 |cryptcat -k f0renzikz juarez 37737

farm9crypt_init: f0renzikz

256095+0 records in

256095+0 records out

^C punt!

# exit

script done on Fri Sep 29 16:57:51 2000

Script started on Fri Sep 29 16:35:37 2000

juarez% cryptcat –k f0renzikz –l –p 33 >jezabelle_gr.tar

^C punt!

Bus error (core dumped)

juarez% df -k .

Filesystem kbytes used avail capacity Mounted on

/dev/dsk/c0t8d0s7 9344221 5836607 3414172 64% /export/home

juarez% cryptcat -k f0renzikz -l -p 37737 >jezabelle.c0t0d0s0

^C punt!

Bus error (core dumped)

juarez% exit

script done on Fri Sep 29 16:54:53 2000

Sending Side Receiving Side

Page 6: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Acquisition – Takin’ it Off-Line SLR – take pictures Considerations before pulling the plug Unplug the system from the network If possible freeze the system such that the current

memory, swap files, and even CPU registers are saved or documented

Unplug the system (power) Packaging/labeling Shipping

Page 7: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

FBI List of Computer Forensic Laboratory Services

Content (what type of data) Comparison (against known

data) Transaction (sequence) Extraction (of data) Deleted Data Files (recovery) Format Conversion Keyword Searching Password (decryption) Limited Source Code

(analysis or compare) Storage Media (many types)

Page 8: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Summarization of acquisition (1)

Page 9: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Summarization of acquisition (2)

Page 10: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Summarization of acquisition (3)

Page 11: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Summarization of acquisition (4)

Page 12: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Extraction with Lazarus

Script started on Sat Sep 30 16:23:03 2000

[root@plaything forensics]# ../tct-1.03/bin/lazarus -B -h -H ../www -D ../blocks -w ../www -t ./valencia.hda1

[root@plaything www]# cd ../www

[root@plaything www]# netscape ./valencia.hda1.html

Page 13: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Summarization of extraction (1)

Page 14: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Summarization of extraction (2)

Page 15: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Summarization of extraction (3)

Page 16: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Correlating Log Files

Where to look What do log entries mean? How to narrow your search How reliable is the data?

Page 17: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Shipping and Storage

UPS/FEDEX Requirements Laboratory Requirements Latent Materials Tamper Evident Packaging Restricted Access and Low Traffic, Camera

Monitored Storage. Sign In/Out for Chain of Custody

Page 18: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Thinking Strategic

Preparing with procedures and checklists Having an evidence locker OS Accounting turned on Log IP Numbers - DO NOT RESOLVE! Clocks synchronized to GPS on GMT Evidence Server Use of encrypted file systems Tools and materials

Page 19: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Pocket Security Toolkit

Page 20: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

ADDITIONAL RESOURCES RCMP Article on the Forensic Process.

http://www.rcmp-grc.gc.ca/tsb/pubs/bulletins/bull41_3.htm Lance Spitzner’s Page: Forensic Analysis, Building Honeypots

http://www.enteract.com/~lspitz/pubs.html Fish.com Security’s Forensic Page: The Coroner’s Toolkit (Unix), Computer Forensic

Class Handouts. http://www.fish.com/forensics/ The Forensic Toolkit (NT). http://www.ntobjectives.com/forensic.htm Cryptcat. http://www.farm9.com/Free_Tools/Cryptcat Long Play Video Recorders. http://www.pimall.com/nais/vrec.html FBI Handbook of Forensic Services.

http://www.fbi.gov/programs/lab/handbook/intro.htm Solaris Fingerprint Database for cryptographic comparison of system binaries. http://

sunsolve.sun.com/pub-cgi/fileFingerprints.pl Inspecting Your Solaris System and Network Logs for Evidence of Intrusion.

http://www.cert.org/security-improvement/implementations/i003.01.html ONCTek List of possible Trojan/Backdoor Activity

http://www.onctek.com/trojanports.html Sixteen Tips for Testifying in Court from the “PI Mall”

http://www.pimall.com/nais/n.testify.html

Page 21: Tan (tan@atstake.com)tan@atstake.com COMPUTER FORENSICS

Thank you …

… very much.