SlideShare una empresa de Scribd logo
1 de 40
Digital Forensics
Practical Workshop
Who am I?
Tim Fletcher
@TimJDFletcher
http://blog.night-shade.org.uk
What are we going to cover?
Brief legal overview
Where can you find digital evidence
Collecting and preserving digital evidence
Examining digital evidence
Documenting the process
What am I not going to cover
Digital Forensics is a massive area and this
workshop only scratches the surface
Windows commercial tools
Network forensics
Report writing
So what, why do I care about this?
Understanding the landscape, what information
can be retrieved
Forensics Readiness, eg collecting FDE keys
Incident response
Ever been asked to “have a look at” what
someone has been doing?
Legal Overview
First I’m not a lawyer, but I have studied some
of the key acts involved.
Respect other people’s privacy
Have a plan if you find something unexpected
eg child pornography or terrorist material
ACPO Guidelines
Who are they - Association of Chief Police
Officers
Set guidelines on procedures for all police
forces in England and Wales
The guidelines are well thought out
Principle 1
No action taken by law enforcement agencies,
persons employed within those agencies or
their agents should change data which
may subsequently be relied upon in court.
In circumstances where a person finds it
necessary to access original data, that person
must be competent to do so and be able to give
evidence explaining the relevance and the
implications of their actions.
Principle 2
Principle 3
An audit trail or other record of all processes
applied to digital evidence should be created
and preserved. An independent third
party should be able to examine those
processes and achieve the same result.
Principle 4
The person in charge of the investigation has
overall responsibility for ensuring that the law
and these principles are adhered to.
Collecting Evidence
If you are examining digital evidence in a
workplace, consult HR and get permission in
writing.
If you are doing this professionally make sure
you have advice and support from a real
lawyer.
Chain of evidence
It is absolutely critical to be able to account for
what happened to an exhibit such as a
computer from the moment it was seized to the
moment it was examined by a forensic
examiner.
Fear the words “I’ve had a quick look…..”
Training
For learning and training purposes the key
point is that you should only examine kit you
own, and if in doubt seek advice from a real
lawyer.
Today you will get an iPhone and a Windows
system image to examine
Attribution
Digital evidence proves “a computer” did
something
Proving who was using the computer at the
time can be challenging.
Digital evidence can be considered “hearsay”
Where do you find digital evidence?
Desktops / Laptops
Embedded devices, eg home routers
Servers / Home NAS units
Cell phones
The Cloud
Public Internet / Social Media
Tools for collecting
Disk imaging - depends on your budget
Write blockers - hardware is expensive
Software can work
Collect to a blank disk - SSDs help here
otherwise 4 pass badblocks test
Key point - practice and test
How do you gather evidence?
Pull the power, ship it to the lab…...
When would this work?
When wouldn’t this work?
What about cloud storage?
What about Mobile devices?
What about full disk encryption?
Imaging normal computers
If the computer is active
Document the screen / gather artifacts
Assess if there is encryption
Do you need to image the RAM?
Secure the system and plan investigation
Imaging FDE computers
Who has the password?
Gather evidence without powering off?
Other evidence sources, logs or backups?
Exploit firewire or thunderbolt?
Cold boot attack - only get 1 go
Mobile devices
Passcodes / PINs
Backups?
Cloud storage?
Hardware flaws?
Remember - Faraday bags to stop remote wipe
NAS units and servers
Vast amounts of data
How do you find what matters?
Are you invading others privacy?
What is the business impact of seizure?
Where are they and who owns them?
Mostly just normal computers
Examining Digital Evidence
Understand the context
Consider what you are looking for
Build and understand a timeline
Digital Triage - what is the context?
Understand your adversary
Examine what matters
Reduce the evidence you have
Eliminate noise - eg NIST hash DB
What are you looking for?
Image files
Geolocation
Emails / Messages
Meta data
Content
Browser history
Timelines
What happened when?
Who or what caused it to happen?
What order did things happen in?
Correlation with other sources
System logs, Social Media
Can often point to new sources of evidence
Tool selection
There are 100s of tools that let you examine
systems, pick those you are comfortable with.
Autopsy - web front end to “the sleuthkit”
Standard unix tools find, strings and etc
Other tools - exiftool, sqlitebrowser
Windows tools - nirsoft and sysinternals
Volatility - Memory forensics
Mobile devices
Is the device jailbroken or joined to a MDM
Can you get the PIN?
Specialist software tools
iOS - Elcomsoft
Older Apple hardware - Limera1n
Android - ADB
Training - II
Virtualisation is very powerful for learning and
training
Resettable state - test your tool or technique
and then reset the VM
Dump RAM contents without complex tools
Documentation
Remember ACPO principle 3
Contemporaneous notes, paper or electronic
Video and photographic evidence is powerful
Log system sessions eg ssh
Your evidence bags
32GB memory stick containing
iPhone4 image - raw nand, key bag and
encrypted disk image
Windows XP disk image
1GB memory stick image
Remember - chain of evidence
Windows XP
Simple unencrypted computer
iOS exploitation demo
Using iphone-dataprotection
https://code.google.com/p/iphone-dataprotection/
iPhone 4 - note this doesn’t work on newer
models
Exploits the bootloader, uploads a ramdisk
Lets you bruteforce the PIN and extract the
NAND
What do you know?
Fluffy the dog has been dognapped!
The owner has been told to meet at a pub
The dognapper might have scouted the area
An iPhone and laptop have been seized
Can you find evidence that the owner of them
was involved?
What you are looking for
Photos
Emails
SMS messages
Documents
Internet History
Tools to use
sha1sum - check your images
Autopsy - apt-get install autopsy
Exiftool - apt-get install perl-exiftool
SQLitebrowser - apt-get install…..
Kali Linux - Bootable from the Memory Stick
Autopsy
Perl based web front end to The SleuthKit
Allows file browsing of disk images
Search for text strings
Build file timelines
Extract raw disk sectors
Interesting files on the memory stick
Memory Stick: MemoryStick.raw.gz
Windows: WindowsXP.raw.gz
iPhone: d0c3eaaaa2/d0c3eaaaa2-data.dd.gz
Checksums: sha1sums
Starting points
Most user files in iOS are under /var/mobile
iOS includes lots of SQLite databases
The memory stick might tell you where to look
Recycle Bin and Web history
How would I do this?
Copy disk images to high speed storage
Import into Autopsy
Timeline the disk images
Catch low hanging fruit first
Photos
Web history
Email

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & TomorrowDigital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Similar a Digital Forensics Workshop

Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPDDavide Gabrini
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdffeetshoemart
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureOllie Whitehouse
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...pable2
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxgitagrimston
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsShanaAneevan
 
Computer forensics basics
Computer forensics basicsComputer forensics basics
Computer forensics basicsJarle Thorsen
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Webrazzi
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsMariano Amartino
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsDario Caliendo
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Filesamiable_indian
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsDaksh Verma
 

Similar a Digital Forensics Workshop (20)

N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdf
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
 
Computer forensics basics
Computer forensics basicsComputer forensics basics
Computer forensics basics
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Digital Forensics Workshop

  • 2. Who am I? Tim Fletcher @TimJDFletcher http://blog.night-shade.org.uk
  • 3. What are we going to cover? Brief legal overview Where can you find digital evidence Collecting and preserving digital evidence Examining digital evidence Documenting the process
  • 4. What am I not going to cover Digital Forensics is a massive area and this workshop only scratches the surface Windows commercial tools Network forensics Report writing
  • 5. So what, why do I care about this? Understanding the landscape, what information can be retrieved Forensics Readiness, eg collecting FDE keys Incident response Ever been asked to “have a look at” what someone has been doing?
  • 6. Legal Overview First I’m not a lawyer, but I have studied some of the key acts involved. Respect other people’s privacy Have a plan if you find something unexpected eg child pornography or terrorist material
  • 7. ACPO Guidelines Who are they - Association of Chief Police Officers Set guidelines on procedures for all police forces in England and Wales The guidelines are well thought out
  • 8. Principle 1 No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data which may subsequently be relied upon in court.
  • 9. In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions. Principle 2
  • 10. Principle 3 An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.
  • 11. Principle 4 The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to.
  • 12. Collecting Evidence If you are examining digital evidence in a workplace, consult HR and get permission in writing. If you are doing this professionally make sure you have advice and support from a real lawyer.
  • 13. Chain of evidence It is absolutely critical to be able to account for what happened to an exhibit such as a computer from the moment it was seized to the moment it was examined by a forensic examiner. Fear the words “I’ve had a quick look…..”
  • 14. Training For learning and training purposes the key point is that you should only examine kit you own, and if in doubt seek advice from a real lawyer. Today you will get an iPhone and a Windows system image to examine
  • 15. Attribution Digital evidence proves “a computer” did something Proving who was using the computer at the time can be challenging. Digital evidence can be considered “hearsay”
  • 16. Where do you find digital evidence? Desktops / Laptops Embedded devices, eg home routers Servers / Home NAS units Cell phones The Cloud Public Internet / Social Media
  • 17. Tools for collecting Disk imaging - depends on your budget Write blockers - hardware is expensive Software can work Collect to a blank disk - SSDs help here otherwise 4 pass badblocks test Key point - practice and test
  • 18. How do you gather evidence? Pull the power, ship it to the lab…... When would this work? When wouldn’t this work? What about cloud storage? What about Mobile devices? What about full disk encryption?
  • 19. Imaging normal computers If the computer is active Document the screen / gather artifacts Assess if there is encryption Do you need to image the RAM? Secure the system and plan investigation
  • 20. Imaging FDE computers Who has the password? Gather evidence without powering off? Other evidence sources, logs or backups? Exploit firewire or thunderbolt? Cold boot attack - only get 1 go
  • 21. Mobile devices Passcodes / PINs Backups? Cloud storage? Hardware flaws? Remember - Faraday bags to stop remote wipe
  • 22. NAS units and servers Vast amounts of data How do you find what matters? Are you invading others privacy? What is the business impact of seizure? Where are they and who owns them? Mostly just normal computers
  • 23. Examining Digital Evidence Understand the context Consider what you are looking for Build and understand a timeline
  • 24. Digital Triage - what is the context? Understand your adversary Examine what matters Reduce the evidence you have Eliminate noise - eg NIST hash DB
  • 25. What are you looking for? Image files Geolocation Emails / Messages Meta data Content Browser history
  • 26. Timelines What happened when? Who or what caused it to happen? What order did things happen in? Correlation with other sources System logs, Social Media Can often point to new sources of evidence
  • 27. Tool selection There are 100s of tools that let you examine systems, pick those you are comfortable with. Autopsy - web front end to “the sleuthkit” Standard unix tools find, strings and etc Other tools - exiftool, sqlitebrowser Windows tools - nirsoft and sysinternals Volatility - Memory forensics
  • 28. Mobile devices Is the device jailbroken or joined to a MDM Can you get the PIN? Specialist software tools iOS - Elcomsoft Older Apple hardware - Limera1n Android - ADB
  • 29. Training - II Virtualisation is very powerful for learning and training Resettable state - test your tool or technique and then reset the VM Dump RAM contents without complex tools
  • 30. Documentation Remember ACPO principle 3 Contemporaneous notes, paper or electronic Video and photographic evidence is powerful Log system sessions eg ssh
  • 31. Your evidence bags 32GB memory stick containing iPhone4 image - raw nand, key bag and encrypted disk image Windows XP disk image 1GB memory stick image Remember - chain of evidence
  • 33. iOS exploitation demo Using iphone-dataprotection https://code.google.com/p/iphone-dataprotection/ iPhone 4 - note this doesn’t work on newer models Exploits the bootloader, uploads a ramdisk Lets you bruteforce the PIN and extract the NAND
  • 34. What do you know? Fluffy the dog has been dognapped! The owner has been told to meet at a pub The dognapper might have scouted the area An iPhone and laptop have been seized Can you find evidence that the owner of them was involved?
  • 35. What you are looking for Photos Emails SMS messages Documents Internet History
  • 36. Tools to use sha1sum - check your images Autopsy - apt-get install autopsy Exiftool - apt-get install perl-exiftool SQLitebrowser - apt-get install….. Kali Linux - Bootable from the Memory Stick
  • 37. Autopsy Perl based web front end to The SleuthKit Allows file browsing of disk images Search for text strings Build file timelines Extract raw disk sectors
  • 38. Interesting files on the memory stick Memory Stick: MemoryStick.raw.gz Windows: WindowsXP.raw.gz iPhone: d0c3eaaaa2/d0c3eaaaa2-data.dd.gz Checksums: sha1sums
  • 39. Starting points Most user files in iOS are under /var/mobile iOS includes lots of SQLite databases The memory stick might tell you where to look Recycle Bin and Web history
  • 40. How would I do this? Copy disk images to high speed storage Import into Autopsy Timeline the disk images Catch low hanging fruit first Photos Web history Email