the pc as victim

83
The PC as Victim The PC as Victim

Upload: calum

Post on 12-Jan-2016

30 views

Category:

Documents


1 download

DESCRIPTION

The PC as Victim. Reviewing an Active System. Computers change state by: User interaction Process execution Data transfers Power cycles. What is Lost When you Power Down. Registers, cache contents Memory contents State of network connections State of running processes - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The PC as Victim

The PC as VictimThe PC as Victim

Page 2: The PC as Victim

Reviewing an Active SystemReviewing an Active System

Computers change state by:Computers change state by: User interactionUser interaction Process executionProcess execution Data transfersData transfers Power cyclesPower cycles

Page 3: The PC as Victim

What is Lost When you Power What is Lost When you Power DownDown

Registers, cache contentsMemory contentsState of network connectionsState of running processesContents of storage mediaContents of removable and

back up media

Page 4: The PC as Victim

Plan for Live SystemsPlan for Live Systems

Step Windows 2000/NT

UNIX

Establish a new shell

cmd.exe Bash

Record system date and time

Date, time W

Who is logged on Loggedon W

Record open sockets

Netstat Netstat

List processes that open sockets

Fport Lsof

List currently running processes

Pslist Ps

List systems recently connected

Nbtstat Netstat

Record system time Date, time W

Record steps taken doskey Script, vi, history

Page 5: The PC as Victim

BIOSBIOS

System uses during boot process to identify hard drives and storage devices that contain OS Check BIOS for

Drive geometry of evidence media Boot sequence of system

Boot from clean floppy with OS Review BIOS Geometry is different (# of cylinders is different) Failure to log configuration from BIOS means booting from imaged disk may fail if not aligned on correct

cylinder boundaries The boot process can be altered! What does this mean?

Page 6: The PC as Victim

Forensic Duplication ToolsForensic Duplication Tools

All data must be imagedTool should handle read

errorsNo changes to original

dataScientific testing

(validation)Check sum

Page 7: The PC as Victim

MethodologyMethodology

Safety net Process of safeguarding magnetic

media Insures evidence not destroyed Guarantees accuracy and integrity

of dataFor HD boot from floppy (A:\)

Virus free Back-up software Prevent writes Document condition of disk

Page 8: The PC as Victim

Creating a Boot DiskCreating a Boot Disk

Format a: /U /S IO.sys Msdos.sys Command.com Drvspace.bin (delete it)

Use diskedit to alter io.sys Tools to find all occurrences of C:\ 11 instances of a reference to C:\ Change to A:\ Use MD5

Page 9: The PC as Victim

Generating a Host ImageGenerating a Host Image

Attach to the suspect system a write-protected, verified system disk with:

Operating system, duplication software, & then reboot

Generate an image of the suspect system disk Mount it on a verified system Advantages of this approach include:

Not affecting the operational environment of the suspect system because you're examining an image of it on another system

Preserving the original evidence for subsequent legal proceedings

Page 10: The PC as Victim

Back up ImagesBack up Images

DAT is cheapestZips (removable HDs) format & verify CD ROM as second level backupSafeback only does a minimum of a

partition Physical drive is entire drive Logical drives partition on a physical drive

(0 or 1) Backing up logical drives misses partition

table

Page 11: The PC as Victim

DuplicationDuplication

Determine need for duplication 3 approaches

Image storage medium by removing it and attaching to forensic station

Image by attaching a hard drive to suspect computer Hard drive must be scrubbed Large enough to accommodate data

Image the storage medium by sending the disk image over a closed network Allows multiple images to be gathered at the same

time Perform checksums on original and image

Page 12: The PC as Victim

Create DuplicateCreate Duplicate

Prompts for location to create an audit file

4 modes of operation Backup Restore Verify Copy (backup and restore at

the same time)

Page 13: The PC as Victim

Hard DrivesHard Drives

IDE vs SCSI drives Terminology

Platters, cylinders, sectors, tracks

Partitioning Partition types (see p. 69 K&H)

Drive letters 3 absolutes: A: & B: are floppies C: is booted partition

Page 14: The PC as Victim

Hard DrivesHard Drives

MBR

MBR

Master Boot record has partition table that defines # of drives

Unused

Unused

C:\

D:\

Unused areas can be written to-- up to 31K of data

Page 15: The PC as Victim

Chain of CustodyChain of Custody

List of people that touched or had control of evidenceEvidence tag

Consent & signature Receipt & transfer Description

A list of office staff near evidenceState of the system when foundSerial numbersPeripherals attachedPrevent future access with seized

Page 16: The PC as Victim

Avoiding Technical MishapsAvoiding Technical Mishaps

Altering time and date stampsTerminating rogue processesPatching the system before

investigationNot recording commands executed on

the systemUsing tools that require a GUIWriting over evidence by installing

software driversWriting over evidence by running

programs that store on hard drive

Page 17: The PC as Victim

CautionsCautions

Never allow suspect to touch the computer after decision to investigate Remove/restrict under subterfuge

Remove computer or HD to secure area

Beware of magnetic devices to eraseBe aware of burn boxes to destroy

diskettesConfiscate all storage media (check

keychain for Trek)

Page 18: The PC as Victim

Copying Your DataCopying Your Data

Bit stream image is the first step Whole data not just files Safeback (standard for law

enforcement) www.forensics-intl.com

Ghost www.symantec.com

Dd UNIX utility Diskcopy/V Snapback www.cdp.com Byte Back www.toolsthatwork.com

Page 19: The PC as Victim

ATTRIBATTRIB

To display the attribute settings of all files in the current directory:ATTRIB To display the attributes of a directory:ATTRIB directoryname To display the attributes of a file:ATTRIB filename To set or remove attributes of a file or directory:ATTRIB [ + | - R] [ + | - A] [ + | - S] [ + | - H] [directory|filename] [/S] + Sets an attribute. - Clears an attribute.

R, Read-only file A, Archive file S, System fileH, Hidden file/S, Processes files in all directories in the specified path

To display the attributes of a file named "news86": ATTRIB news86

To assign the Read-Only attribute to the file "report.txt", use: ATTRIB +R report.txt

To remove the System and Hidden attributes from "record.txt": ATTRIB -S -H record.txt

To hide the directory "c:\secret:" ATTRIB +H c:\secret

To hide the files (but not the directories) in the C:\ directory: ATTRIB +H c:*.*

Page 20: The PC as Victim

CHKDSKCHKDSKCHKDSK [path] [/F] [/V] path Specifies the drive and directory to check./F Fixes errors on the disk. /V Displays the full path and name of every file on the disk.

Page 21: The PC as Victim

DRIVPRMDRIVPRMThe DRIVPARM command can only be invoked through Config.sys. The DRIVPARM command modifies the parameters of an existing physical drive. It does not create a new logical drive. The settings specified in the DRIVPARM command override the driver definitions for any previous block device.

DRIVPARM=/D:number [/C] [/F:factor] [/H:heads] [/I] [/N] [/S:sectors] [/T:tracks]

/D:numberSpecifies the physical drive number. number can be range from 0 to 255. Drive number 0 corresponds with drive a:, Drive number 1 corresponds with drive b:, and so on.

How could this be used?

Page 22: The PC as Victim

FINDFINDFIND [/V] [/C] [/N] [/I] "string" "filename1" "filename2" "filename ..."

/V Displays all lines NOT containing the specified string./C Displays only a count of lines containing the string. If used with /V, FIND displays a count of the lines that do not contain the specified string./N Displays line numbers with the lines. If /C and /N are used together, /N is ignored./I Ignores the case of characters in string. By default FIND is case sensitive and searches for an exact character match.String The text string to be found. String must be in inverted commas.Filename The file(s) to be searched. If filename does not contain spaces, it does not need to be enclosed in inverted commas.

Page 23: The PC as Victim

FINDFINDTo display all lines from the file "pencil.ad" that contain the string "Pencil Sharpener": FIND "Pencil Sharpener" pencil.ad If the string contains quotation marks, these must be doubled:

FIND "This paper is ""for discussion only."" It is not a final report." report.doc To search the current directory for the string "PROMPT" in all .BAT files:

FOR %f in (*.bat) DO FIND "PROMPT" %f To search your hard disk to find and display the filenames on drive C that contain the string "CPU", you can use the pipe "|" to direct the results of a DIR command to FIND:

DIR c:\ /s /b | FIND "CPU"

Remember, the default output from DIR can be upper and/or lower case depending on how a file was saved. To catch all instances of "CPU", "cpu". etc. either use the /L switch with DIR (to force lower case output), or the /I switch with FIND (to ignore case in string).

Page 24: The PC as Victim

LASTdriveLASTdriveUsed to designate the maximum number of drives (real and virtual) recognized by the operating system.

The LASTDRIVE command can only be invoked from Config.sys.LASTDRIVE=x LASTDRIVEHIGH=x xA single letter (A to Z) representing the last valid drive that MS-DOS is to recognize. (Default is Z)Note: a trailing colon should not be included.

Page 25: The PC as Victim

PathPathThe PATH command is used to view or modify the Path environmental variable and is synonymous with "SET PATH=".

To set a path: PATH path1 [;path2...]] or

PATH=path1 [;path2...]] To add directories to an existing Path environmental variable:

PATH %path%; path3 [;path4...]]To clear all path settings: PATH ; To display the current path settings: PATH

1.To add the directory c:\downloads to the regular path, enter PATH %path%;c:\downloads

2.To add a directory name that contains a space, enclose the name in inverted commas: PATH %path%;c:\"program files"\dos

or PATH %path%;"c:\program files\

dos"

Page 26: The PC as Victim

Del or eraseDel or erase

To delete a file: DEL [path] filename [/P] To delete all files in a directory (with confirmation): DEL path or

DEL path \*.* To delete all files in a directory (without confirmation): DEL path \?*.*

DEL path \** (in Dos7.0 - confirmation is required in Dos7.1)

Filename The file to delete./P Forces confirmation before deleting each file.

Page 27: The PC as Victim

ModeModeThe MODE series of commands is used to control the

computers links with its peripherals. 1. Display lines and columns 2. Display configuration 3. Printer configuration 4. Serial port configuration 5. Device status 6. Redirect printing from parallel to serial port 7. Set typematic rate 8. Set code page (character set) for international use

MODE CON[:] [COLS=c] [LINES=n] C The number of characters per line. c can be 40 or

80 (Default: 80).N The number of lines displayed on the screen. n

can be 25, 43, or 50 (Default: 25).MODE CON Lines=50

MODE [device] [/STATUS] Device The name of the device. Default: all

installed devices.

Page 28: The PC as Victim

DeltreeDeltree

Delete directory and subdirectories

To delete a directory and all the subdirectories and files contained therein:

DELTREE [/Y] directory To delete all the files and subdirectories but leave the directory itself:

DELTREE [/Y] directory\*.* To delete a file:

DELTREE [/Y] filename

directory The directory to be deleted./Y Suppresses prompts for confirmation before deleting

Page 29: The PC as Victim

DeltreeDeltreeTo delete the TEMP directory on drive C, including all files and subdirectories of the TEMP directory: DELTREE c:\temp

To delete all the files and subdirectories in the "temp" directory leaving an empty "temp" directory for future use, and avoiding the prompt for confirmation:

DELTREE /Y c:\temp\*.*

To delete the read-only file text.doc in the c:\data directory (without resetting the attributes): DELTREE /Y c:\data\text.doc

Page 30: The PC as Victim

FormatFormatFORMAT drive: [/Switches] /V[:label] Specifies a volume label.

/S Copies system files to the formatted disk (to make a boot disk).

/B Allocates space on the formatted disk for system files.

/C Tests clusters that are currently marked "bad.“ By default, if a disk contains clusters that have been marked

as "bad", FORMAT does not retest the clusters; it simply leaves them marked "bad"./AUTOTEST Formatting proceeds without further user input or warning messages. All sectors previously marked bad on the hard drive are retested (i.e. equivalent to including the /C switch)².

Page 31: The PC as Victim

MoreMore

The MORE command reads standard input from a pipe or redirected file and displays one screen of information at a time.

MORE filename MORE < filename command | MORE [path][filename] Command a command whose output is to be

displayed.filename file(s) to display one screen at a time

MORE clients.new MORE < clients.new TYPE clients.new | MORE

Page 32: The PC as Victim

PromptPromptTo change the command prompt: PROMPT [text] text Any series of alphanumeric characters including the following special codes:  $P  Current drive and path $E  Escape code (ASCII code 27) $N  Current drive   $G  > $V  Windows version number $L  < $D  Current date  $B  | $T  Current time $Q  = $_  Carriage return and linefeed $$  $ $H  Backspace (erases previous character) To reset the prompt to its default ($N$G): PROMPT $N$G

Page 33: The PC as Victim

ShellShellSpecifies the command interpreter you want MS-DOS to use. The SHELL command can only be invoked from Config.sys.

SHELL=filename [path] [parameters] filename The full filename and path of the command

interpreter to be usedpath The path to the command interpreter parameters Any command-line parameters or switches that can be used with the specified command interpreter

If Command.com is in the root directory and is to be loaded with its default values, the following line is optional:

SHELL=c:\command.com c:\ /P

Page 34: The PC as Victim

SwitchesSwitches

SWITCHES= /F /K /N /E[:n] Invoked from config.sys

/F Skips the two-second delay after displaying the "Starting MS- DOS . . ." message during startup./K Forces an enhanced keyboard to behave like a conventional keyboard. If Ansi.sys is installed, its K switch should also be used./N Disables the F5 and F8 keys used to bypass commands in Config.sys and Autoexec.bat. It does not disable the Ctrl-F5 and Ctrl-F8 keys which bypass loading Drvspace.bin; to disable these keys, see DRVSPACE.

Page 35: The PC as Victim

VolVolDisplays a disk's volume label and serial number. Can be used with LABEL to identify a drive

VOL [drive:]

VOL E:

Page 36: The PC as Victim

CopyCopyThe prime use of COPY is to copy one or more files to another location but it can also be used to combine (concatenate) files and to type directly to a file, printer, or other device

COPY source [destination] [/V] [/Y | /-Y] source The file(s) to be copied. Although this must be a single

parameter, it may include multiple files specified using wildcards (* or ?). It may also be a valid device (e.g.,

CON)Destination The directory and/or filename for the new file(s). If destination... is not specified source is copied to the current directory with the same name and creation date as the original. file /A Forces COPY to treat the file as an ASCII test filefile /B Forces COPY to treat the file as a binary file /V Verifies that new files can be read (does not compare with the original - see VERIFY)./Y No warning prompt before overwriting a file (default when COPY is used in a batch file)./-Y Displays a warning and requires confirmation before

overwriting a file (default when COPY is used from the command line).

Page 37: The PC as Victim

TypeTypeThe TYPE command is used to display the contents of an ASCII

text file on screen. TYPE filename

1. To display the contents of HOLIDAY.MAR: TYPE holiday.mar

2. If the file is too long to fit on a single screen: TYPE holiday.mar | MORE

3. To pipe the contents of GO.TXT to a DEL command requiring confirmation before deleting all files in a directory. TYPE go.text | DEL *.* If the first two characters of GO.TXT contain a "Y" or "y" followed by an [Enter], the files will be deleted. Anything else and the operation will be skipped.

Page 38: The PC as Victim

FdiskFdiskFDISK is a menu driven utility used to configure and/or display information about the partitions on a hard disk.

Before a hard disk can be recognized by DOS (or any other compatible operating system), a Master Boot Record (MBR) must be established. The MBR defines areas of the disk to be a(n):

•Primary Partition and/or •Extended Partition

CAUTION: Using FDISK to modify or delete partitions on a hard drive renders all the data associated with that partition unavailable – I.e., deleted!

FDISK [/X] To display a summary of the partition structure on all hard drives: FDISK [/STATUS] To create partitions without going through the

standard FDISK menus: FDISK [/X] drive [/PRI:size] [/EXT:size] [/LOG:size] [/PRMT | /Q] FDISK /MBR To rewrite the Master Boot Record of the primary drive without altering the partition table information: FDISK /CMBR drive To rewrite the Master Boot Record of any drive (drive) without altering the partition table information:

Page 39: The PC as Victim

Pipes & RedirectionPipes & RedirectionA number of Dos commands send output to the screen and/or require

input from the user. Redirection is a mechanism whereby the output of a command can be fed either to some other device (a printer or file) or to another program or command.

There are four redirection functions: > Redirect output>> Append< Redirect input| Pipe

1. To print out a sorted directory listing of all files in the Windows directory: DIR c:\windows /o/a > PRN

2. To create a file containing the directory listing of the same directory: DIR c:\windows /o/a > c:\data\directories\windows.txt

3. DIR c:\windows\system /o/a >> c:\data\directories\windows.txt

Page 40: The PC as Victim

Batch filesBatch files

             COPY CON COPYFILE.BAT   {ENTER} or EDIT    COPYFILE.BAT    {ENTER}

                FORMAT A:      {ENTER}     

           COPY *.*       {ENTER}                DIR A:  {ENTER}

CTRL+Z or Save, Exit from the menu

To run the file Type:

COPYFILE {ENTER}

Page 41: The PC as Victim

CopyCopyCOPY source1 + source2 + ... destination [/V] [/Y | /-Y]

1. To combine "mar89.rpt", "apr89.rpt" and "may.rpt" into one file named "report.rpt" in the current directory:

COPY mar89.rpt + apr89.rpt + may89.rpt report.rpt

2. To combine all files in the current directory on the current drive that have the extension ".rpt" into one file named "combined.rpt":

COPY *.rpt combined.rpt 3. To combine a series of files that have ".txt" extensions with their

corresponding ".ref" files to make new files with the same file names but with ".doc" extensions (ie "file1.txt" is combined with "file1.ref" to form "file1.doc", and so on).

COPY *.txt + *.ref *.doc 4. To combine first all files with the ".txt" extension, then all files with

the ".ref" extension into one file named "combin.doc": COPY *.txt + *.ref combin.doc

Page 42: The PC as Victim

fcfcCompares two files or sets of files and displays the differences between them.

FC [/Switches] file1 file2 FC c:\test1.txt c:\test2.txt

/B Performs a binary comparison. This is the default mode for comparing files when file1 has an extension of .EXE, .COM, .SYS, .OBJ, .LIB, or .BIN./L Compares files as ASCII. This is the default mode for comparing files when file1 does not have an extension of .EXE, .COM, .SYS, .OBJ, .LIB, or .BIN./LBn Sets the number of lines for the internal line buffer. If the files being compared have more than this number of consecutive differing lines, FC cancels the comparison. Default value of n: 100/N Displays the line numbers on an ASCII comparison./C Disregards the case of letters/T Does not expand tabs to spaces. By default, tabs are treated as spaces with 1 tab = 8 spaces./W Compresses tabs and multiple spaces to a single space for the

comparison.

Page 43: The PC as Victim

MemMemThe MEM command is used to display a table showing how memory (RAM) is currently allocated

MEM [/Switches] None Displays the status of the computer's used and free memory/C Lists the programs that are currently loaded into memory and shows how much conventional and upper memory each program is using. /D Lists the programs and internal drivers that are currently loaded into memory./F Lists the free areas of conventional and upper memory./M progname   Shows how the program (progname) is currently using memory./P Pauses after each screenful of information./H Brief help (same as /?).

Page 44: The PC as Victim

Mem/C/PMem/C/P

Page 45: The PC as Victim

XcopyXcopyCopies files and directory trees. XCOPY source [destination] [/Switches]

source The file(s) to be copied. Although this must be a single parameter, it may include multiple files specified using wildcards (* or ?).

destination The location and/or name(s) of new files. Scope: By default, XCOPY will confine its

operation to files in the source directory. /E Copies the complete subdirectory structure of source and

all files therein./S Copies the complete subdirectory structure of source and

all files therein but does not copy empty subdirectories.

/T W Copies the subdirectory structure of source but does not copy any files and does not copy empty subdirectories. To include empty subdirectories, use with the /E switch.

1. XCOPY will not copy a folder's attributes (eg. 'hidden'). These have to be set as required using Windows Explorer or ATTRIB.

Page 46: The PC as Victim

XcopyXcopy

1. To copy all files and subdirectories from the data directory to the disk in drive a: xcopy c:\data a: /s or xcopy c:\data\*.* a: /s

2. To copy all files and subdirectories from the data directory created/modified since 1st Jan.1997 to the disk in drive a: should be:xcopy c:\data a: /s /d:1/1/97

Page 47: The PC as Victim

DiskcopyDiskcopyDISKCOPY is used to duplicate floppy disks. Any data on the destination disk is overwritten.

DISKCOPY drive1: [drive2:] [/1] [/V] [/M] drive1 Drive containing disk to be copied from (and to, if the computer has only one floppy drive) .drive2 Drive containing disk to be copied to (if different from drive1)./V Verifies that the information is copied correctly./M Force multi-pass copy using memory only.

Page 48: The PC as Victim

DOS Commands & DOS Commands & UtilitiesUtilities

www.evilpigeon.net/tutorials/commands/http://www.butterwick0.freeserve.co.uk/

tutor/menu.htmlhttp://www.maem.umr.edu/~batch/

batchtoc.htmhttp://home7.inet.tele.dk/batfiles/http://www.simtel.net/pub/msdos/http://www.ntfs.com/products.htmhttp://www.opus.co.tt/dave/index.htm

Page 49: The PC as Victim

Searching for EvidenceSearching for Evidence

Know what you are looking forCreate list of termsUse text search tools to find dataCheck hacker sites for names of

programsAnti-virus web sites for

information on recent infections and registry entries

Page 50: The PC as Victim

Evidence on the Hard DriveEvidence on the Hard Drive

Hard disk drives Files Erased files File slack Hidden partitions Encrypted files Compressed data (zip) Windows swap file Windows temp files Application temp files Encrypted files Hidden files/folders

Page 51: The PC as Victim

Read and write in blocks of data (clusters) Files not stored in 1 piece or contiguous

Fixed blocks have even number of sectorsLow level format creates the sectors (at

factory)Clusters at high level format done by OSFloppies can have low and high level

formats at same timeBad sectors are marked

Knowing How Data is Knowing How Data is WrittenWritten

Page 52: The PC as Victim

Tracking FilesTracking Files

2 areas of vulnerability Signal strength of bits provide

ghosts--Border areas on tracks may still contain previous signal

Guard region on tracks—variances in read-write head leave scraps of data

Overwriting with 0s and 1s not a guarantee—original signal may be stronger and leave data in guard regions

Page 53: The PC as Victim

Tools used to Eliminate DataTools used to Eliminate Data

Delete and erase individual (or groups of) files Check recycle bin Recovery with Unerase or Undelete (DOS)

Disk scrubbers Fdisk and Format (DOS)

Format only writes a new empty root-it does not erase data clusters

Fdisk simply rearranges partition space 3-Pass std www.dss.mil/isec/nispom.htm DoD

5220-22M Tools include: Evidence eliminator,File

Monster, East-tec eraser, WipeInfo

Page 54: The PC as Victim

Shredding DataShredding Data

Simple deletes of files/folders Recycle bin deletes Shredding tools

Shred2 Email shredding

Email is persistent Simple delete Archived Backups

Page 55: The PC as Victim

File SlackFile Slack

Storage space between end of file and the end of the last cluster assigned to a specific space.

Space filled with random data from memory when the file is closed

512 bytes

File_A File Slack

File_B Parts of File_A + File slack

File A deleted

Page 56: The PC as Victim

Swap filesSwap files

Memory fills upSends to swap file

Dynamic (disappears on shut down) Static (stays and goes to unallocated

space on HD)

Page 57: The PC as Victim

Unallocated Unallocated (Erased File Space)(Erased File Space)

Storage space on HD available to be overwritten by the OS when new files are created File name remains Data remains File slack remains

Contents may be fragments of deleted files Deletes Out of space errors HD reformats

Page 58: The PC as Victim

Swap FileSwap File

Windows relies on a swap file

Swaps disk space for RAMActs as scratch pad (write

behind)Any work can pass through

Page 59: The PC as Victim

Shadow (ghost) DataShadow (ghost) Data

Data written in binary 0 and 1 in concentric rings (tracks)

Horizontal head alignment and vertical head placement is different each time data is written and rewritten to the same track.

Limits effectiveness of disk scrubberswww.metanet.org/mnt/lib/

homebrew_stm.html --not completely reliable yet

Use multiple over writes on all disks Security.tao.ca/secure_del.shtml

Page 60: The PC as Victim

Examining slack, unallocated and Examining slack, unallocated and swapswap

File System Layer

Location of Evidence DOS/Windows

Location of Evidence Linux

Application storage

File Files

Information Classification

Directories/folder

Directories

Storage space allocation

FAT Inode & data bitmaps

Blocking format Clusters Blocks

Data Classification

Partitions Partitions

Physical Absolute sectors or C/H/S

Absolute sectors

Page 61: The PC as Victim

Make 2 bitstream copies of original Label copies and work only 1 Remove original from work area Benchmark drive file with MD5 List files

Determine compressed or encrypted Check dates

Build a list of words to search for using TXTSEARCH (NTI) or Encase

Unlinked clusters must be re-linked Deleted files recovered

Organizing for a SearchOrganizing for a Search

Page 62: The PC as Victim

Knowing How Data is WrittenKnowing How Data is Written

Data stored in fixed length blocks as clusters

Size of clusters varies by type & storage capacity of media

FAT tracks clusters allocated to a fileFAT uses cluster numbers to find data FAT 12, 16, 32 each have different

number of clustersSectors are units of storage of 512

bytes (4096 bits)

Page 63: The PC as Victim

Looking at the FATLooking at the FAT

Using Norton Unerase Wizard to find the lost filenames In place replacement will wipe out

forensic data!Use Diskedit/w to find deleted files

Block allocation table is a chain for OS to follow when reconstructing a file

Blocks can have 3 values: pointer to next, EOF if the last one (FF F8) or bad (FF F7)

Page 64: The PC as Victim

Deleting a file causes FAT to have a sigma character (E5) in first byte, sets file size to 0 and marks all blocks as available

Reconstruction uses file size and clusters to re-create

Add your initials to name to identify later

Looking at the FATLooking at the FAT

Page 65: The PC as Victim

Places Where Data Can LivePlaces Where Data Can Live

Timed Backup

Temp

TempPrint

Swap

Slack Slack

Original

Document

Page 66: The PC as Victim

Forensic Data LocationsForensic Data Locations

Slack Space left over at the end of data and last

cluster/block Does every file have slack space? Amount of slack ~half the block size—the

larger the block, the more slack Cannot access slack—OS won’t allow a read

past EOF

Swap WORD documents contain random data (use hex editor or

Notepad)

Unallocated Blocks not currently in use Files deleted have freed-up space until overwritten

Page 67: The PC as Victim

Step by StepStep by Step

Install hard drive on forensic boxInstall as secondary controller Forensic box set to boot from

primary or floppyMake a bit stream image of driveAuthenticate hard drive Document date and time

Page 68: The PC as Victim

File recoveryFile recovery

Non-invasive read to determine deletes

Restore deleted files File Recovery tools

Norton Unerase Wizard

Page 69: The PC as Victim

MD5--ChecksumsMD5--Checksums

Page 70: The PC as Victim

Comparing FilesComparing Files

DOS prompt Syntax : CRCMD5 /h drive

Returns unique check sums for files on specified drive

Page 71: The PC as Victim

ShredShred

Page 72: The PC as Victim

Virtual ShreddingVirtual Shredding

Page 73: The PC as Victim

Active Records Active Records managementmanagement

Page 74: The PC as Victim

Document controlDocument control

Active Rights Management technology

• Documents

• Web

• Email

Based on policies for key distribution

Federal law (2000) allowed electronic documents the same legal standing as paper: Are they equal if senderAre they equal if sender

can shred them remotely?can shred them remotely?

If sender has 30 day limit and recipient has a 7 year If sender has 30 day limit and recipient has a 7 year legal obligation?legal obligation?

Page 75: The PC as Victim

Any Vulnerabilities?Any Vulnerabilities?

Page 76: The PC as Victim

DemonstrationDemonstration

GetFree

Page 77: The PC as Victim

Examining MS OfficeExamining MS Office

Tracking Changes set Properties Open in Notepad to find

evidence

Page 78: The PC as Victim

Linking to SuspectLinking to Suspect

MAC address Ipconfig/all or winipfg

Hidden file folders (notepad) Details about

environment stored in memory

Page 79: The PC as Victim

Windows systemWindows system

Sysedit View autoexec.bat. Config.sys, Windows

passwords Regedit

Auto complete functions in IE (web sites) Network information Run history Software installed (if hidden)

Password files Find *.pwl PWLTool www.webdon.com

Page 80: The PC as Victim

Locating saved Locating saved InformationInformation

Page 81: The PC as Victim

DemonstrationDemonstration

Hiding Files & Directories

Page 82: The PC as Victim

Forensic ToolkitsForensic Toolkits Forensic toolkit www.foundstone.com

NT specific, command line NTI www.forensics-intl.com

Any OS, command line Coroner’s Toolkit www.fish.com

UNIX-specific, live system ForensiX www.all.net

Linux, GUI Encase www.encase.com

Popular with police, GUI

Page 83: The PC as Victim

Hardware UnitsHardware Units

ICS –www.ics-iq.com Forensic Computers

www.forensic-computers.com