andreas kaltsounis sherry johnson computer forensics, crime & investigators october 6, 2010 2010...

58
Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Upload: oliver-caldwell

Post on 24-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Andreas KaltsounisSherry Johnson

Computer Forensics, Crime & InvestigatorsOctober 6, 2010

2010 Organization of Bar Investigators Conference

Page 2: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Trends in Computer Usage & Crime

• Computer Usage

Email, Text-Messaging

PDAs and Smartphones

Social Networking

• Computer Crime

Botnets

Computer Intrusions & Corporate Espionage

Page 3: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

What we Can Do

• Define HOW propriety data was stolen, and HOW MUCH of it was stolen

• Detect the alteration of documents, images, or other files

• Track internet usage and web activity

• Create a timeline of user activity on a system

• Recover emails and other files that have been “deleted”

• Document unauthorized access to systems or servers (intrusions)

• Identify the use of anti-forensics (cleaning utilities)

Page 4: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

What we Can’t Do

• Recover information if it has been truly deleted (that is, overwritten)

• Tell you with certainty WHO was using a computer

• Conduct an examination without access to the drive, or on a physically damaged drive

Page 5: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Digital ForensicsWhat types of investigations can Digital Forensics support?

• Thumb (Jump) Drives

• CD/DVD Forensics

• Camera Forensics

• Copier Hard Drives

• Cell Phone Forensics

Call Detail Records

Text Messages

GPS & Tower Location Data

Page 6: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

• Forensic Examinations

What is Digital (Computer) Forensics

Need to Substantiate:

• What was being done on the computer / device

• When it was being done

• Who (user account) was doing it

Forensic Evidence – Where to Start

Page 7: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

What type of information can you get from Digital Forensic analysis?• Could be as little as 4 words carved from a deleted file

• Or a part of a picture carved from unallocated space

Page 8: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Forensics 101 – Don’t Take Actions That will Change the Evidence

• What not to do Allow anyone to “look around”, open, close, move, or copy Hitting a key could trigger an undesired change Not always best to pull the plug and turn the system off

• What to do Have a forensic expert with you or someone you can call Document all actions taken If system is on have it checked for encryption Make decisions as to the best way to take the image

[There are several forensically acceptable ways to take an image of a live

system, but the actions need to be well documented.]

Page 9: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to:• Who • What• When• How• (Why)• (Where)

Page 10: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhoWho has been using this system?

SAM Registry File

Last Logon Time may not be useful if the system has been left on for days

Page 11: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: Who Which user was the last one to use the

system?

• Compare Time/Date of all user NTUSER.DAT

files• Compare last used NTUSER file to SYSTEM file

Last Access Time/Date

Page 12: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhoWhat can be used to establish connection to

suspect?

• Non-Digital Forensics: Phone records Door cards Video monitors Witnesses

• Check Log Files Applications used by suspect Chat file logs

Page 13: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: Who Chat Logs

Page 14: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: Who Is there a QUICK way check across suspect related

files?• Filter on User SID• Review All Files• Sort by Last Access

Page 15: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhoHow to DEBUNK the Malware / Virus

defense?“I didn’t do it…Malware, Viruses or hackers did it”

• Establish multiple indicators of Who was on the computer and When

• Prove Malware / Virus is not on the system• Prove Malware / Virus found is designed to do…..and

would not have created this body of evidence of wrong doing

Page 16: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatUsing the Suspect personal config file (NTUSER.DAT)

• gmail Password & Time / Date Last Used (Written)

Page 17: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatUsing the Suspect personal config file (NTUSER.DAT)

• Google User ID & Password• Time / Date Used

Page 18: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatUsing the Suspect personal config file (NTUSER.DAT)

• Documents Most Recently Used & Time / Date(Open and/or Saved)

Page 19: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatUsing the Suspect personal config file (NTUSER.DAT)

• Recent Documents Used & Time / Date:

Page 20: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatUsing the Suspect personal config file (NTUSER.DAT)

• Internet Form Data & Time / Date Captures any information typed into a web form

Page 21: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatUsing the Suspect personal config file (NTUSER.DAT)

• Internet Form Data & Time / Date:

Page 22: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatUsing the Suspect personal config file (NTUSER.DAT)

• E-Bay User ID and Password & Time / Date:

Page 23: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatUsing the Suspect personal config file (NTUSER.DAT)

• Shell Folders Lists default locations for the information relevant to this user

Page 24: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatUsing the Suspect personal config file (NTUSER.DAT)

• Typed URLs Created by user showing an intended action (typed or pasted ) Will be “deleted” when the user clears their Internet Explorer

History The lower the number, the more recent the URL was accessed

Page 25: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatWhere / When has the suspect gone on the web?(local Settings\ personal config folder)

• User Internet History (History IE5) Websites visited Index.DAT (Master history Index File Clear History will drop and create a new file but

the old file is still there until over written

The user actually clicked on these links or went there!!

Page 26: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatWeb – Internet History (History IE5)

Page 27: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatWeb – Internet History Temporary Internet Files

Page 28: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatWas a File Printed?*.EMF files

Page 29: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatWhat files did suspect (try to) deleted – Recycle Bin?(separate folder for each user)Info2 file

Page 30: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatFiles – *.LNK (Shortcut Pointers to files, drives and devices)Local Drive

Page 31: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatFiles – *.LNK (Shortcut Pointers to files, drives and devices)Local to External Drive

Page 32: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatFiles – *.LNK (Shortcut Pointers to files, drives and devices)External Drive

Page 33: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatFiles – *.LNK (Shortcut Pointers to files, drives and devices)Network Drive

Page 34: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

[Cameras may not always be found under USBSTORE; also look in USB.]Multifunctional devices will have a line for each function; fax, copier, printer,

scanner]

Tying Evidence to: WhatWhat Other Devices Have Been Connected?IDE/USB/USBStore

Page 35: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Meta Data File Information (varies by type of file):

[Word documents can maintain past revisions and up to 10 of the last authors to edit the file.]

Meta data around files (article) The New Metadata Rules

What a busy attorney won’t take the time to tell you, and how it affects the legal IT departmentby Dona Payne, Payne Consulting, Group

http://www.payneconsulting.com/pub_books/articles/pdf/ILTAPayneMetadata.pdf

Tying Evidence to: WhatWhen was the file created and Who created it?Has the file been changed and When / Who has changed it?Meta Data

Creator (Author) Name Last Author Date Created Date Last Printed Date Last Modified Tracked Changes by Author [Track Changes needs to have been turned on in WORD]

Last Name to Modify Hidden Objects Hidden Text # of Revisions Total Editing Time Smart Tag Captured Information

Page 36: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatAre there Similar Files or Other Versions of the file?Meta Data based on MD5 Hash

Page 37: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatWhat applications were use recently?Prefetch - use to locate Malware

Page 38: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhatWhat applications were use recently?Prefetch - use to locate cleaners (CCleaner ), defrag, backup (Carbonite- remote backup

site/service) software

[Listing the related / dependent files and processes for Carbonite backup]

Page 39: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: What / WhoAre there Emails and Attachments related to scope and suspect?

Page 40: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

• Changes tracked in the Security.EVT registry log file• Use an Event Viewer • FSPRO Labs Eventlogxp.Com

• Manually (re)setting the system time creates an Event ID # 520

• Meaning of Event IDs for different OS WWW.EventID.Net

• Networked computers synchronize local clocks with a time server on the Internet or an intranet.

Tying Evidence to: WhenHas the System Time/Date Has Been Changed?

Page 41: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: WhenTime & Date Change in Event Viewer

Page 42: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Tying Evidence to: When / What / Who

When did the Suspect and Events coincide? - TimelinesUsing the Suspect personal config file (NTUSER.DAT)

• UserAssist shows what windows they had open

• RecentDocs (also used under What)

• MRU lists OpenSaveMRU MapNetworkDriveMRU Explorer\RunMRU Explorer\StreamMRU

Page 43: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

How can a suspect change critical File Times?Create / Access / Modify

Laptops & Desktops

• Copy from one folder to another

Updates the Creation date to the current date

No change to Modify date

• Move from one folder to another

No change to Modify or Create dates

USB Storage Devices

• Copy or Move from one folder to another is the same as for laptops / desktops

• Copy file from USB to laptop/desktop Updates Creation date No change to Modify date

• Move file from USB to laptop/desktop

No change to Modify or Create dates

Page 44: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Anti (Counter)-Forensics

• Recently recognized as a legitimate field of study

• “Attempts to negatively affect the existence, amount and/or quality of evidence from a crime scene, or make the analysis and examination of evidence difficult or impossible to conduct.”

(Dr. Marc Rogers of Purdue University)

• “Anti-forensics is more than technology. It is an approach to criminal hacking that can be summed up like this: Make it hard for them to find you and impossible for them to prove they found you.”

(Scott Berinato in his article, The Rise of Anti-Forensics)

Page 45: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Anti (Counter)-ForensicsFrom Wikipedia

• Anti-forensics methods are often broken down into several sub- categories to make classification of the various tools and techniques simpler.

One of the more widely accepted subcategory breakdowns was developed by Dr. Marcus Rogers.

He has proposed the following sub-categories: data hiding, artifact wiping, trail obfuscation and attacks against the CF (computer forensics) processes and tools.

Page 46: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Anti (Counter)-Forensics

Windows Based

Windows Defrag Format and reinstall the OS Copying / Moving large amounts of data around repeatedly

Page 47: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Anti (Counter)-ForensicsOS (Re)Installation

Page 48: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Anti (Counter)-ForensicsRegistry Cleaners

PCTools Registry Doctor XP Medic (XPMedic.com) Registry Patrol (registrypatrol.com)

Page 49: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Anti (Counter)-Forensics

Software Examples

Metasploit – Anti-Forensic ToolkitAnti-Forensic Investigation Arsenal (MAFIA)

TransmogrifyTrail-obfuscation program

In most file types the header of the file contains identifying information. A (.jpg) would have header information that identifies it as a (.jpg), a (.doc) would have information that identifies it as (.doc) and so on. Transmogrify allows the user to change the header information of a file, so a (.jpg) header could be changed to a (.doc) header. In a forensic examination searching for images (.jpg) on a machine, it would simply see a (.doc) file and skip over it.

SlackerA program used to hide files within the file slack space on a Windows computer

Darik’s Boot and Nuke – disk wiping software

Page 50: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Anti (Counter)-Forensics

Software Examples

TimestompGoal is to allow for the deletion or modification of time stamp related information on files. There are (4) four date time and date stamps files display useful to Forensic Examiners in reconstructing when data was last modified, accessed, created, or entered into the NTFS Master File Table.

Note: Although this program is designed to frustrate forensic analysis, it should be noted that its use can be easily detected. Because the program can delete

all time stamp information, the lack of time stamp values would lead an examiner to the conclusion that something is amiss on the system. The Windows operating system records at least some timestamp information. The total absence of such is a dead giveaway that a user has tried to hide something. On the flipside, if

the values are simply changed to believable values, then there is little chance the change(s) will be noticed at a casual glance.

Page 51: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Anti (Counter)-ForensicsWiping Tools

Eraser (free & ready to install) CCleaner (free) Window Washer ($29.95)

Erases browser history, cookies & cacheProtects passwords and personal informationPermanently deletes unwanted filesFrees up space on HDRemoves cookies and unnecessary filessets automatic cleanings

Evidence Eliminator ($29.95)Erase all tracks of internet activityInternet & windows tracks erasing

Page 52: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Anti (Counter)-ForensicsWiping Tools (example) – CCleaner

Page 53: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Anti (Counter)-ForensicsWiping Tools (example) – CCleaner

Page 54: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Useful Tools

Read-Only Hard Drive Viewing Live image Peraben P2 explorer Smart Mount Mount Image Pro

Used For: Running Software Used on Suspect’s System Running Anti-Virus / Anti-Malware Software Against Suspect’s

System Safe Way to Walk Through Suspect’s System As They Used it

without having to restore their system

Page 55: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Gaining Access To:

• Emails

• ISP Data

• Cloud Computing

• Electronically Stored Information (ESI)

Page 56: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

I Need Electronic EvidenceSo How Do I Get It?

• Forensic Expert Trained and Certified Identify the Goal and the Scope of the

Examination

• Search Warrants & Subpoenas

Page 57: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Questions???

Page 58: Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference

Contact Information

Andreas KaltsounisDepartment of Defense Inspector GeneralDefense Criminal Investigative ServiceSeattle Resident Agency(206) 553-0699 [email protected]

Sherry JohnsonFraud & Digital Forensic Investigation, LLCDigital Forensic ExaminerCertified Fraud Examiner(206) 551-6227