SlideShare una empresa de Scribd logo
1 de 35
Lessons Learned in
 digital forensics
Abstract
Writing digital forensics(DF) tools is difficult because of the diversity of
Introduction
As the field of digital forensics (DF) continues to grow
Few of today’s forensic tool developers have formal t
Meaning of digital forensics software


ry dumps, network packet captures, program executable
The use of DF tools

                                 1-criminal investigations
                                 2-internal investigations.
                                         3-audits.

of which have different standards for chain-of-custody , admissibility , and scientific validit
Hackers hide data in several ways




 and steganography techniques but can be caught by artifacts , copy forge techniqu
 bad sectors or using alternate data stream (ADS) like C:notepade file.txt:hide (he
e files securely for good you need to use Gutmann algorithm for writing 35 times ra
Distinct Sector Hashes for Target file detection

Hashing files to check for file changes
Hashing sectors to discover changes in file segment
Hashing algorithm depends on probability so it won't hash the whole drive bec
Looking for distinct hashes and repeated file patterns using Government data,
Algorithm using urn statistic problem for finding sectors that need to be inspec
Finding distinct and repeated hashes in hard disk sectors
Using different data structures and testing the speed for the file system
Network forensics



           Network forensics challenges :
    Cloud computing challenges needed new tools
New frontiers in network intrusion starting from the firewall
          Emerging Network forensic areas:
                     Social networks
                        Data mining
                   Digital imaging and
                    data visualization
Applying network forensics in critical infrastructures



                          Botnets
      Wireless networks still lacking good forensic tools
Sink holes:accept,analyze and forensically store attack traffic
SCADA (Supervisory control and data acquisition) Challenges




Installs forensic tools at layers 0-2
Smart phone security challenges




Smart phone threat model showing malware spreading from the application layer to th
Lessons in digital forensics


The challenge of data diversity
1-processing incomplete or corrupt data.
2-Why data will not validate?
3-Windows inconsistencies.
4-Eliminate data that are consistent.


Data Scale challenges
1-The amount of data.
2-Applying big data solutions to DF.
ub-linear algorithms for reading secto


hms that operate by sampling data. Sampling is a powerful technique and can frequently fi
he absence of data: the only way to establish that there are no written sectors on a hard d
Temporal diversity:
   the never-ending upgrade cycle
Many computer users have learned that upgrades are
1-Upgrading forensics tools
2-Software Versions to be upgraded
3-Encase forensics tool
4-Intelligent forensics tools
Human capital demands and limitations
 1-It was found that users of DF software come overwhelming
 2-Examiners that have substantial knowledge in one area (e.g
 3-developers also with skills like opcodes, multi-threading,
 Organization of processes and operating system data structu
The CSI Effect



Hard to recover data in reality
Hard to recover data from Hard disk
Recovering data from hard drives typically involves decoding
Funding problems
The differences between Windows Explorer and EnCase Fore
Lessons learned managing a research corpus

This project started in 1998 and has expanded to incl
downloaded from US Government web servers, disk i
Corpus management --technical issues
 1-Imaging ATA drives
 Lesson: read the documentation for the computer that you are using.
 Lesson: make the most of the tools that you have and follow the technical innovation
         (Because you are dealing with hard disks with different technologies whether
2-Automation as the key to corpus management

Needed a process for capturing the hard disk make,model, serial numb
 Lesson: automation is key; any process that involves manual record ke
Lesson: useful data will outlive the system in which it is stored, so mak
3-Evidence file formats(customer container file)


Trying to use his own container files did not work well and he had to use standard co

Lesson: avoid developing new file formats has never been possible.
    Lesson: kill your darlings.
4-Crashes from bad drives
Causes of crash are many as it could be kernel memory overwritten or faulty drive or
 Lesson: many technical options remain unexplored.
5- Drive failures produce better data

Algorithm1: Developed an algorithm that reads from
Algorithm2: developed a disk imaging program called
Lessons learned



Lesson: Drives with some bad sectors invariably have more sensitive in

Lesson: do research, and only to maintain software that implements a p
6- Numbering and naming


Algorithm1: developed an algorithm that was generating files
Lesson: Names must be short enough to be usable but long e
When I started acquiring data outside the US I discovered that the country of origin w
a batch number allows different individuals in the same country to assign their own n

Lesson: although it is advantageous to have names that contain no semantic
content, it is significantly easier to work with names that have
some semantic meaning.
7- Path names

• Lesson: place access-control information as near to
the root of a path name as possible.
8- Anti-virus and indexing


Lesson: Configure anti-virus scanners and other indexing tools to ignore directo

9- Distribution and updates
Lesson: solutions developed by other disciplines for distributing large files rarely wor
Corpus management–policy issues

1- Privacy issues
 Lesson: just because something is legal, you may wish to think twice before you do it.
2- Illegal content financial, passwords, and copyright
Lesson: never sell access to DF data, even if you have personal ownership.
Lesson: understand Copyright Law before copying other people’s data.
Lesson: make sure your intent is scientific research, not fraud, so that any collection of access
3- Illegal content pornography
 Lesson: do not give minors access to real DF data; do not intentionally extract pornography fro
4- Institutional Review Boards
Lesson: While IRBs exist to protect human subjects, many
have expanded their role to protect institutions and experimenters.
Unfortunately this expanded role occasionally decreases the protection afforded human subje
the IRB watching over you, it’s important to watch your back.
Lessons learned developing DF tools


1- Platform and language
2- Parallelism and high performance computing
3- All-in-one tools vs. single-use tools
4- Evidence container file formats
1- Platform and language




1- The easiest way to write multi-platform tools is to write command-li
2-Although C has historically been the DF developer’s language of choic
3-Java has a reputation for being slow especially for high computationa
4-While it is easy to write programs in Python, experience to date has s
2-Parallelism and high performance computing



ications bottlenecks and a lot of times host computer processor is better th
3- All-in-one tools vs. single-use tools




My experience argues that it
is better to have a single tool than many:
 If there are many tools, most investigators will want to have them all. Splitting functi
 Much of what a DF tools does ---data ingest, decoding and enumerating data structu
 There is a finite cost to packaging, distributing, and promoting a tool. When a tool ha
4- Evidence container file formats



should be allowed to process inputs in any format and transparently handle disk images in


 2-With network packets the situation is better, with pcap being the universal format.
Famous digital forensics tools


  Encase
             FTK

                               PTK
                             Forensics


      Nuix

                                 Microsoft
                   Intilla        Cofee
Conclusion


1-Digital Forensics is an exciting area in which to work, but it is exceedingly difficult b

2-These problems are likely to get worse over time, and our only way to survive the c

3-in building and maintaining this corpus he encountered many problems that are in

Más contenido relacionado

Similar a Digital forensics lessons

Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source ForensicsCTIN
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics reportyash sawarkar
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)softwaresatish
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docxsmile790243
 
Digital Forensics: The next 10 years
Digital Forensics: The next 10 yearsDigital Forensics: The next 10 years
Digital Forensics: The next 10 yearsAl Imran, CISA
 
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfHow to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfuzair
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the ArchiveGarethKnight
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Developmentamiable_indian
 
INTERFACE by apidays 2023 - Nuclear Rust, John Darrington, Idaho National Lab...
INTERFACE by apidays 2023 - Nuclear Rust, John Darrington, Idaho National Lab...INTERFACE by apidays 2023 - Nuclear Rust, John Darrington, Idaho National Lab...
INTERFACE by apidays 2023 - Nuclear Rust, John Darrington, Idaho National Lab...apidays
 
Considerations for using personal information management (pim) software for d...
Considerations for using personal information management (pim) software for d...Considerations for using personal information management (pim) software for d...
Considerations for using personal information management (pim) software for d...Merlien Institute
 
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docxASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docxedmondpburgess27164
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newKatherineJack1
 

Similar a Digital forensics lessons (20)

Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics report
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
 
Digital Forensics: The next 10 years
Digital Forensics: The next 10 yearsDigital Forensics: The next 10 years
Digital Forensics: The next 10 years
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfHow to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the Archive
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
1435488539 221998
1435488539 2219981435488539 221998
1435488539 221998
 
INTERFACE by apidays 2023 - Nuclear Rust, John Darrington, Idaho National Lab...
INTERFACE by apidays 2023 - Nuclear Rust, John Darrington, Idaho National Lab...INTERFACE by apidays 2023 - Nuclear Rust, John Darrington, Idaho National Lab...
INTERFACE by apidays 2023 - Nuclear Rust, John Darrington, Idaho National Lab...
 
Considerations for using personal information management (pim) software for d...
Considerations for using personal information management (pim) software for d...Considerations for using personal information management (pim) software for d...
Considerations for using personal information management (pim) software for d...
 
180 184
180 184180 184
180 184
 
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docxASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 

Más de Amr Nasr

Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methodsAmr Nasr
 
6 big google buys of 2012
6 big google buys of 20126 big google buys of 2012
6 big google buys of 2012Amr Nasr
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarkingAmr Nasr
 
Scaling compression2
Scaling compression2Scaling compression2
Scaling compression2Amr Nasr
 
Compression one example
Compression one exampleCompression one example
Compression one exampleAmr Nasr
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarkingAmr Nasr
 
Whitebalance
WhitebalanceWhitebalance
WhitebalanceAmr Nasr
 
Wavelet watermark level3
Wavelet watermark level3Wavelet watermark level3
Wavelet watermark level3Amr Nasr
 
Wavelet watermark level2
Wavelet watermark level2Wavelet watermark level2
Wavelet watermark level2Amr Nasr
 
Two dimensional true wavelet compression
Two dimensional true wavelet compressionTwo dimensional true wavelet compression
Two dimensional true wavelet compressionAmr Nasr
 
Image dct shifting
Image dct shiftingImage dct shifting
Image dct shiftingAmr Nasr
 
Tcp snoop protocols
Tcp snoop protocols  Tcp snoop protocols
Tcp snoop protocols Amr Nasr
 

Más de Amr Nasr (16)

Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methods
 
6 big google buys of 2012
6 big google buys of 20126 big google buys of 2012
6 big google buys of 2012
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Scaling compression2
Scaling compression2Scaling compression2
Scaling compression2
 
Compression one example
Compression one exampleCompression one example
Compression one example
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Whitebalance
WhitebalanceWhitebalance
Whitebalance
 
Wavelet
WaveletWavelet
Wavelet
 
Wavelet watermark level3
Wavelet watermark level3Wavelet watermark level3
Wavelet watermark level3
 
Wavelet watermark level2
Wavelet watermark level2Wavelet watermark level2
Wavelet watermark level2
 
Two dimensional true wavelet compression
Two dimensional true wavelet compressionTwo dimensional true wavelet compression
Two dimensional true wavelet compression
 
Image fft
Image fftImage fft
Image fft
 
Image dct shifting
Image dct shiftingImage dct shifting
Image dct shifting
 
Tcp snoop protocols
Tcp snoop protocols  Tcp snoop protocols
Tcp snoop protocols
 
Crypt
CryptCrypt
Crypt
 

Último

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Digital forensics lessons

  • 1. Lessons Learned in digital forensics
  • 2. Abstract Writing digital forensics(DF) tools is difficult because of the diversity of
  • 3. Introduction As the field of digital forensics (DF) continues to grow Few of today’s forensic tool developers have formal t
  • 4. Meaning of digital forensics software ry dumps, network packet captures, program executable
  • 5. The use of DF tools 1-criminal investigations 2-internal investigations. 3-audits. of which have different standards for chain-of-custody , admissibility , and scientific validit
  • 6. Hackers hide data in several ways and steganography techniques but can be caught by artifacts , copy forge techniqu bad sectors or using alternate data stream (ADS) like C:notepade file.txt:hide (he e files securely for good you need to use Gutmann algorithm for writing 35 times ra
  • 7. Distinct Sector Hashes for Target file detection Hashing files to check for file changes Hashing sectors to discover changes in file segment Hashing algorithm depends on probability so it won't hash the whole drive bec Looking for distinct hashes and repeated file patterns using Government data, Algorithm using urn statistic problem for finding sectors that need to be inspec
  • 8. Finding distinct and repeated hashes in hard disk sectors
  • 9. Using different data structures and testing the speed for the file system
  • 10. Network forensics Network forensics challenges : Cloud computing challenges needed new tools New frontiers in network intrusion starting from the firewall Emerging Network forensic areas: Social networks Data mining Digital imaging and data visualization
  • 11. Applying network forensics in critical infrastructures Botnets Wireless networks still lacking good forensic tools Sink holes:accept,analyze and forensically store attack traffic
  • 12. SCADA (Supervisory control and data acquisition) Challenges Installs forensic tools at layers 0-2
  • 13. Smart phone security challenges Smart phone threat model showing malware spreading from the application layer to th
  • 14. Lessons in digital forensics The challenge of data diversity 1-processing incomplete or corrupt data. 2-Why data will not validate? 3-Windows inconsistencies. 4-Eliminate data that are consistent. Data Scale challenges 1-The amount of data. 2-Applying big data solutions to DF.
  • 15. ub-linear algorithms for reading secto hms that operate by sampling data. Sampling is a powerful technique and can frequently fi he absence of data: the only way to establish that there are no written sectors on a hard d
  • 16. Temporal diversity: the never-ending upgrade cycle Many computer users have learned that upgrades are 1-Upgrading forensics tools 2-Software Versions to be upgraded 3-Encase forensics tool 4-Intelligent forensics tools
  • 17. Human capital demands and limitations 1-It was found that users of DF software come overwhelming 2-Examiners that have substantial knowledge in one area (e.g 3-developers also with skills like opcodes, multi-threading, Organization of processes and operating system data structu
  • 18. The CSI Effect Hard to recover data in reality Hard to recover data from Hard disk Recovering data from hard drives typically involves decoding Funding problems The differences between Windows Explorer and EnCase Fore
  • 19. Lessons learned managing a research corpus This project started in 1998 and has expanded to incl downloaded from US Government web servers, disk i
  • 20. Corpus management --technical issues 1-Imaging ATA drives Lesson: read the documentation for the computer that you are using. Lesson: make the most of the tools that you have and follow the technical innovation (Because you are dealing with hard disks with different technologies whether
  • 21. 2-Automation as the key to corpus management Needed a process for capturing the hard disk make,model, serial numb Lesson: automation is key; any process that involves manual record ke Lesson: useful data will outlive the system in which it is stored, so mak
  • 22. 3-Evidence file formats(customer container file) Trying to use his own container files did not work well and he had to use standard co Lesson: avoid developing new file formats has never been possible. Lesson: kill your darlings. 4-Crashes from bad drives Causes of crash are many as it could be kernel memory overwritten or faulty drive or Lesson: many technical options remain unexplored.
  • 23. 5- Drive failures produce better data Algorithm1: Developed an algorithm that reads from Algorithm2: developed a disk imaging program called
  • 24. Lessons learned Lesson: Drives with some bad sectors invariably have more sensitive in Lesson: do research, and only to maintain software that implements a p
  • 25. 6- Numbering and naming Algorithm1: developed an algorithm that was generating files Lesson: Names must be short enough to be usable but long e When I started acquiring data outside the US I discovered that the country of origin w a batch number allows different individuals in the same country to assign their own n Lesson: although it is advantageous to have names that contain no semantic content, it is significantly easier to work with names that have some semantic meaning.
  • 26. 7- Path names • Lesson: place access-control information as near to the root of a path name as possible.
  • 27. 8- Anti-virus and indexing Lesson: Configure anti-virus scanners and other indexing tools to ignore directo 9- Distribution and updates Lesson: solutions developed by other disciplines for distributing large files rarely wor
  • 28. Corpus management–policy issues 1- Privacy issues Lesson: just because something is legal, you may wish to think twice before you do it. 2- Illegal content financial, passwords, and copyright Lesson: never sell access to DF data, even if you have personal ownership. Lesson: understand Copyright Law before copying other people’s data. Lesson: make sure your intent is scientific research, not fraud, so that any collection of access 3- Illegal content pornography Lesson: do not give minors access to real DF data; do not intentionally extract pornography fro 4- Institutional Review Boards Lesson: While IRBs exist to protect human subjects, many have expanded their role to protect institutions and experimenters. Unfortunately this expanded role occasionally decreases the protection afforded human subje the IRB watching over you, it’s important to watch your back.
  • 29. Lessons learned developing DF tools 1- Platform and language 2- Parallelism and high performance computing 3- All-in-one tools vs. single-use tools 4- Evidence container file formats
  • 30. 1- Platform and language 1- The easiest way to write multi-platform tools is to write command-li 2-Although C has historically been the DF developer’s language of choic 3-Java has a reputation for being slow especially for high computationa 4-While it is easy to write programs in Python, experience to date has s
  • 31. 2-Parallelism and high performance computing ications bottlenecks and a lot of times host computer processor is better th
  • 32. 3- All-in-one tools vs. single-use tools My experience argues that it is better to have a single tool than many: If there are many tools, most investigators will want to have them all. Splitting functi Much of what a DF tools does ---data ingest, decoding and enumerating data structu There is a finite cost to packaging, distributing, and promoting a tool. When a tool ha
  • 33. 4- Evidence container file formats should be allowed to process inputs in any format and transparently handle disk images in 2-With network packets the situation is better, with pcap being the universal format.
  • 34. Famous digital forensics tools Encase FTK PTK Forensics Nuix Microsoft Intilla Cofee
  • 35. Conclusion 1-Digital Forensics is an exciting area in which to work, but it is exceedingly difficult b 2-These problems are likely to get worse over time, and our only way to survive the c 3-in building and maintaining this corpus he encountered many problems that are in