SlideShare una empresa de Scribd logo
1 de 68
Why are there so many tools left at the end of the money?




Richard Austin MS, CISSP
Southern Polytechnic State University

ADVANCED DIGITAL FORENSICS
WITH OPEN SOURCE TOOLS
IT Elder Flatulence
Bio
                                       My First Computer

   Richard is a 30+ year veteran of the IT industry in positions ranging from
    software developer to security architect. Before beginning a career as an
    independent cybersecurity consultant and educator, he was focused on
    technology and processes for successfully protecting the 14PB storage area
    network infrastructure within the global IT organization of a Fortune 25
    company.
   MS degree with a concentration in information security from Kennesaw State
    University, a DHS/NSA recognized National Center of Academic Excellence in
    Information Assurance Education.
   Active member of SNIA's Security Technical Working Group.
   Active member of the Cloud Security Alliance’s Trusted Cloud Initiative.
   Senior Member of both the IEEE and ACM and also a member of the IEEE
    Computer Society, CTIN, ISC(2) and the Atlanta Chapter of Infragard .
   Book review columnist for IEEE Cipher, the newsletter of the IEEE Computer
    Society Technical Committee on Security and Privacy
   A published author frequently writing and presenting on storage networking
    security, ethics and digital forensics.


                         Advanced Digital Forensics with Open Source Tools
Forensics is Changing

Digital forensics was once solely concerned with
just collecting and analyzing disk images from a
cold, dead system but much useful information
         leaves few durable traces on disk




               Advanced Digital Forensics with Open Source Tools
Two New Areas

 Live memory collection and analysis
 Registry analysis




 Though commercial tools are available, Open
    Source tools provide much of the same
                 functionality

               Advanced Digital Forensics with Open Source Tools
Collecting Live Memory




          Advanced Digital Forensics with Open Source Tools
Why Live Memory?

 The bad people are very interested in forensic
  technology and follow quite closely what we do
   Contrary to popular opinion, this stuff ain’t secret
   They know that we image disks so they do things that
    don’t leave disk traces
     Memory-only malware
 A lot of information may not leave clearly
  discernable disk traces
   Open network connections
   Active encryption – data may only be in plaintext while
    the system is running

                 Advanced Digital Forensics with Open Source Tools
How do you do it?

 Just like any other forensic task
   You collect the data
   You extract information from it
 So what’s all the hub bub, bub?
   IAxx architectures don’t have a “DUMP” button
     Rely on software to dump main memory (the
      infamous BSOD and crashdump)
   Reading memory dumps is the province of O/S
    level debuggers
     Great tools but you have to be a Windows/*UX
      internals guru to understand and use them
                Advanced Digital Forensics with Open Source Tools
Remember!

 When working with a compromised system,
 remember you’re working with Satan’s
 computer
   You have no clue what the attacker may have
    done to it




                 Advanced Digital Forensics with Open Source Tools
Issues

 User mode access to the .PhysicalMemory
  object was removed in Vista/2003 and later
   This was a serious security issue – it’s gone; not
    coming back; get over it!
   Many older live memory acquisition tools no
    longer work
 For Vista/2003 and later, a utility must load a
  kernel mode driver to get access to physical
  memory
   Some vendors call this an “agent”

                 Advanced Digital Forensics with Open Source Tools
Issues

 Running a program to collect memory
  contents does change the state of memory
  (and maybe disk)
   Can’t be helped
   If physical memory is full, something may be
    swapped out when you run the program
   Documented, repeatable process is key
 You are only collecting physical memory
   Swapped out pages will not be in the image

                Advanced Digital Forensics with Open Source Tools
Data Triage




•Consider the order of volatility
    •Relevance of the type of information to the case under investigation


                       Advanced Digital Forensics with Open Source Tools
Lots of Options

 Memoryze from Mandiant
  http://www.mandiant.com/software/memory
  ze.htm
 The usual forensic vendors have their tools
 I’ll be demoing winxxdd (community edition)
  from http://www.moonsols.com/products/
   This free version does have limitations such as not
    running from a removable device or via a script.


                Advanced Digital Forensics with Open Source Tools
Win32dd




          Advanced Digital Forensics with Open Source Tools
Hash the Image




         Advanced Digital Forensics with Open Source Tools
Points to Remember

 You must be able to run a program as
  ADMINISTRATOR on the system
   For remote access:
     psexec
     Remote Desktop
     Etc
   This does change the state of the system
     Students are surprised to see win32dd in the list of
      running processes


                  Advanced Digital Forensics with Open Source Tools
Analyzing the Memory Image
OK, I got it but what do I do with it?




                          Advanced Digital Forensics with Open Source Tools
Volatility

 https://www.volatilesystems.com/default/volatili
  ty
 Open Source, written in Python
   Python is a well-known scripting language
   Download Python from www.activestate.com
 The 1.3 version only supports XP SP2 and SP3
   Version 1.4 in in RC and supports Vista and Windows 7
    as well as incorporating many improvements
     http://code.google.com/p/volatility/
     Already installed on REMnux

                  Advanced Digital Forensics with Open Source Tools
Update

 Volatility 2.0 is now released!!!
   Includes a standalone Windows installer




                Advanced Digital Forensics with Open Source Tools
Using Volatility

 Very simple command-line interface:
   python volatility command –f image_file
     1.4 adds --profile=profile to identify the O/S
 Notable commands:
   ident – descriptive information about the dump file
   datetime – date/time information for the dump file
      (included in ident)
     pslist – list of processes
     files – list of files open for each process
     connections – open network connections
     sockets – open sockets
                    Advanced Digital Forensics with Open Source Tools
ident



 In 1.4, this command becomes imageinfo




                Advanced Digital Forensics with Open Source Tools
pslist




         Advanced Digital Forensics with Open Source Tools
Scan vs List

 Some commands have two versions – list and
  scan
 The difference is that list follows the normal way
  of doing things
   e.g., listing processes by following the EPROCESS list
 scan scans through memory looking for data
  structures (e.g., _EPROCESS)
   Psscan will find terminated and de-linked processes
    (one stealth technique used by rootkits)
   The scan version is much slower because it is scanning
    memory contents rather than walking a linked list
                 Advanced Digital Forensics with Open Source Tools
psscan




                                                             Terminated
                                                                 FTP
                                                              processes




         Advanced Digital Forensics with Open Source Tools
files




        Advanced Digital Forensics with Open Source Tools
connections



                                                             FTP




         Advanced Digital Forensics with Open Source Tools
Connections vs Connscan2




         Advanced Digital Forensics with Open Source Tools
sockets




          Advanced Digital Forensics with Open Source Tools
netscan

 For Vista and later, these are consolidated into
  netscan




     Sample output taken from the Volatility 1.4 wiki
     http://code.google.com/p/volatility/wiki/CommandReference#netscan




                             Advanced Digital Forensics with Open Source Tools
Protocol Numbers




         Advanced Digital Forensics with Open Source Tools
And the Registry

 Locating the Registry -- hivelist




               Advanced Digital Forensics with Open Source Tools
Listing Keys




         Advanced Digital Forensics with Open Source Tools
Examining Values




         Advanced Digital Forensics with Open Source Tools
Services – Where malware
hides




         Advanced Digital Forensics with Open Source Tools
What does it all mean?

 Working with memory
  contents does require a
  bit of knowledge about
  what it all means
 These are two good
  reference books on
  how Windows really
  works and what you’re
  looking at in a memory
  dump
                  Advanced Digital Forensics with Open Source Tools
BUT What About Vista, …?

 Volatility is nice but it only works on XP. So if you
  need to look at memory on Vista, Server 2003,
  etc, you’re back to using strings ….
   Of course not:
     1.4 is in RC and is installed in the REMnux CD (and virtual
      appliance)
     And other tools are a little more arcane but they work
        The Windows Debugging Tools can be used to analyze a
         Windd dump IFF it’s made in crashdump format (-d option)
        http://www.msuiche.net/con/BlackHat_Webcast_New_Fron
         tiers_in_Forensics.pdf

                   Advanced Digital Forensics with Open Source Tools
Active Processes




         Advanced Digital Forensics with Open Source Tools
Don’t get too comfortable …
Particularly Part
III on Anti-
Forensics




                    “In war the will is directed at an animate object that reacts.”
                                      Carl Von Clausewitz, On War




                       Advanced Digital Forensics with Open Source Tools
Registry Extraction and Analysis




          Advanced Digital Forensics with Open Source Tools
Windows Registry

 The Windows registry has been found to
  contain a treasure trove of information useful
  to the forensic analyst
   The good news is that disk imaging includes the
    registry
 New tools are simplifying the process of
  extracting this information in a useful format



                Advanced Digital Forensics with Open Source Tools
Nomenclature

            Value                                        Data
                                Type




Key

Subkey




           Advanced Digital Forensics with Open Source Tools
Registry File Locations
System             %WINDIR%system32configSystem
SAM                %WINDIR%system32configSam
Security           %WINDIR%system32configSecurity
Software           %WINDIR%system32configSoftware
NTUSER.DAT         Documents and SettingsUser


   Simply extract these files from the image
       Security on NTUSER.DAT may prevent copying so use the type command to
        make a copy:
        type NTUSER.DAT>somewhere else




                          Advanced Digital Forensics with Open Source Tools
Note

 I’m going to be showing some representative
  samples of the information available and the
  things they imply about events in the real
  world.
 If you get lost in the key-value wilderness,
  don’t despair – it’s all in the book.
   What book? Be patient.




               Advanced Digital Forensics with Open Source Tools
Mounting images

 You need to extract the registry files out of
  the disk image
   P2Explorer is a very useful tool provided free by
    Paraben
     http://www.paraben.com/p2-explorer.html
     It allows you to mount disk images on a Windows
      system (free edition only works on 32-bit versions)
   OSFMount from PassMark software is another
    option
     Works on both 32 and 64 bit Windows

                 Advanced Digital Forensics with Open Source Tools
Mounting An Image




         Advanced Digital Forensics with Open Source Tools
Mounting An Image




         Advanced Digital Forensics with Open Source Tools
Accessing Registry Files




         Advanced Digital Forensics with Open Source Tools
Advantages of Mounted Image

 Mounting the image basically gives you read-
  only access to the contents of the image as a
  drive letter
   Windows Explorer, anti-malware, etc, can be used
   No need to export everything in advance




               Advanced Digital Forensics with Open Source Tools
Other Options

 FTKImager is a free download from
  AccessData (developers of The Forensic
  Toolkit)
 It can be used to open a disk image and
  export the registry files




              Advanced Digital Forensics with Open Source Tools
Exporting Registry Files
Imager can open most of the
common image formats (dd,
EnCase, etc)




                         Advanced Digital Forensics with Open Source Tools
Exporting Registry Files
Once the image is
opened, students see a
familiar directory tree
and just have to
navigate to the registry
file locations


Files are exported by
right clicking the file
and selecting “Export”
from the menu




                           Advanced Digital Forensics with Open Source Tools
Analyzing the Registry




          Advanced Digital Forensics with Open Source Tools
Resource
        This is an excellent book that covers
         many of the registry analysis tasks in
           detail
            RegRipper is the tool used for analyzing
             the registry after it is collected
            http://www.regripper.net/RegRipper/ and
             also available on the tools CD that
             accompanies the book
            You can read my book review at
             http://www.ieee-
             security.org/Cipher/BookReviews
             (shameless self-promotion)


             Advanced Digital Forensics with Open Source Tools
The Case: Price Software

 Tom Warner is suspected of industrial espionage
   He was upset about being passed over for a VP
    position
   He is alleged to have set up a quid pro quo deal with a
    competitor
   He may have colluded with Leslie Stowle in other
    actions
 The forensic analyst has been given an image of
  Tom’s Windows workstation
 Let’s see what kinds of information can be found
                  Advanced Digital Forensics with Open Source Tools
Plugins

 RegRipper comes with a wide variety of
  plugins for examining registry information
   Plugins are basically Perl scripts




                 Advanced Digital Forensics with Open Source Tools
Running Plugins: winver

 You have the option to run the Perl scripts
  directly if you have Perl (and the right
  libraries) installed or you can use rip.exe
 rip –r registry file –p plugin




               Advanced Digital Forensics with Open Source Tools
USB Devices
Identifying use of a thumb drive




               Advanced Digital Forensics with Open Source Tools
Command Line
C:DATARegRipper>rip -r ..PSCRegistryntuser.dat -p mp2
Launching mp2 v.20080324
MountPoints2
SoftwareMicrosoftWindowsCurrentVersionExplorerMountPoints2
LastWrite Time Mon Jan   3 21:59:36 2005 (UTC)


 Drives:
   A   Wed Sep 29 21:00:05 2004 (UTC)
   D   Wed Sep 29 21:00:05 2004 (UTC)
   C   Wed Sep 29 21:00:05 2004 (UTC)
   E   Fri Oct 29 17:46:24 2004 (UTC)


 Volumes:
   {3622c883-1069-11d9-b601-806d6172696f}     Wed Sep 29 21:02:41 2004 (UTC)
   {707f5caa-29d2-11d9-99eb-000c291e65ae}     Fri Oct 29 18:09:55 2004 (UTC)
   {3622c880-1069-11d9-b601-806d6172696f}     Wed Sep 29 21:02:41 2004 (UTC)
   {3622c881-1069-11d9-b601-806d6172696f}     Wed Sep 29 21:03:24 2004 (UTC)


 Remote Drives:
   ##2kadvserver#Users#twarner    Wed Sep 29 21:03:22 2004 (UTC)
   ##psc-ws-03#c$   Fri Oct   1 05:58:52 2004 (UTC)
   ##2kadvserver#Management    Fri Oct   1 05:54:14 2004 (UTC)
   ##2kadvserver#Software     Fri Oct   1 05:54:50 2004 (UTC)
   ##2kadvserver#Software Development     Fri Oct   1 05:54:37 2004 (UTC)



                                         Advanced Digital Forensics with Open Source Tools
Running Plugins: recentdocs




         Advanced Digital Forensics with Open Source Tools
The GUI

                                  A GUI (rr.exe) is
                                   available
                                  It provides access to
                                   plugin files that collect
                                   commonly used
                                   plugins into a single file
                                   and run them as a
                                   group



          Advanced Digital Forensics with Open Source Tools
Plugin Files

 Some sets of plugins are so commonly used
  together they are listed in a plugin file
     rip –r registryfile -f plugingfile
   The plugin file is just a list of plugings to be run




                  Advanced Digital Forensics with Open Source Tools
Network Config




 Excerpt from the SYSTEM plugin report
 Pretend you didn’t notice “Guidance Software”

                 Advanced Digital Forensics with Open Source Tools
The Software Hive


 The disk image had large blocks of binary 0’s –
  wonder how that happened?




                 Advanced Digital Forensics with Open Source Tools
Sources of Images
Garfinkel’s Forensic Corpora




                        Advanced Digital Forensics with Open Source Tools
Scenarios

 Simson Garfinkel of the NPS is working under
  a NSF grant to produce scenarios and
  associated forensic images for use in teaching
  digital forensics
 Two scenarios are currently available at
  http://domex.nps.edu/corp/scenarios




               Advanced Digital Forensics with Open Source Tools
M57

2009-M57 "Patents" scenario

  This scenario involves a small company called M57
   which was engaged in prior art searches for
   patents. The fictional company is contacted by
   the local police in November 2009 after a person
   purchases a computer from Craigslist and
   discovers "kitty porn" on the computer. The
   police trace the computer back to the M57
   company.
Includes an instructor’s packet!!!

               Advanced Digital Forensics with Open Source Tools
Nitroba

Nitroba University Harassment Scenario

 This scenario involves a harassment case at
  the fictional Nitroba University.




              Advanced Digital Forensics with Open Source Tools
Summary

 Digital forensic practice must evolve to keep
  pace
   Live memory analysis for volatile information lost
    when a system is shutdown or restarted
 The Windows registry is a rich mine of
  information




                Advanced Digital Forensics with Open Source Tools
Questions?




 EMAIL raustin2@spsu.edu if you’d like a PDF of
  the slides
                 Advanced Digital Forensics with Open Source Tools

Más contenido relacionado

La actualidad más candente

Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityChris Sistrunk
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
CompTIA Network+ Training Courses
CompTIA Network+ Training CoursesCompTIA Network+ Training Courses
CompTIA Network+ Training CoursesKRISHCB1
 
Business Dashboards using Bonobo ETL, Grafana and Apache Airflow
Business Dashboards using Bonobo ETL, Grafana and Apache AirflowBusiness Dashboards using Bonobo ETL, Grafana and Apache Airflow
Business Dashboards using Bonobo ETL, Grafana and Apache AirflowRomain Dorgueil
 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commandstmavroidis
 
Fortinet
FortinetFortinet
FortinetABEP123
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 
DNS & DNSSEC
DNS & DNSSECDNS & DNSSEC
DNS & DNSSECAPNIC
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hackingbegmohsin
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information SecuritySplunk
 
Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1Abdul Basit
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsOllie Whitehouse
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 
Splunk for Real time alerting and monitoring. www.gtri.com
Splunk for Real time alerting and monitoring. www.gtri.comSplunk for Real time alerting and monitoring. www.gtri.com
Splunk for Real time alerting and monitoring. www.gtri.comZivaro Inc
 

La actualidad más candente (20)

Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
Forensics Analysis and Validation
Forensics Analysis and Validation  Forensics Analysis and Validation
Forensics Analysis and Validation
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
CompTIA Network+ Training Courses
CompTIA Network+ Training CoursesCompTIA Network+ Training Courses
CompTIA Network+ Training Courses
 
Business Dashboards using Bonobo ETL, Grafana and Apache Airflow
Business Dashboards using Bonobo ETL, Grafana and Apache AirflowBusiness Dashboards using Bonobo ETL, Grafana and Apache Airflow
Business Dashboards using Bonobo ETL, Grafana and Apache Airflow
 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commands
 
Fortinet
FortinetFortinet
Fortinet
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
DNS & DNSSEC
DNS & DNSSECDNS & DNSSEC
DNS & DNSSEC
 
Network Audit
Network AuditNetwork Audit
Network Audit
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hacking
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Snort
SnortSnort
Snort
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Splunk for Real time alerting and monitoring. www.gtri.com
Splunk for Real time alerting and monitoring. www.gtri.comSplunk for Real time alerting and monitoring. www.gtri.com
Splunk for Real time alerting and monitoring. www.gtri.com
 

Destacado

[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...OWASP Turkiye
 
2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - publicSandro Suffert
 
July132000
July132000July132000
July132000CTIN
 
Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Shuvo Sarker
 
G Infomgnt
G InfomgntG Infomgnt
G InfomgntCTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Sleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGSleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGEduardo Chavarro
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7RIAH ENCARNACION
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics00heights
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Mark Matienzo
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registrysomutripathi
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionSeccuris Inc.
 
Raidprep
RaidprepRaidprep
RaidprepCTIN
 

Destacado (20)

[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public
 
July132000
July132000July132000
July132000
 
Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7-cheat-sheet
Windows 7-cheat-sheetWindows 7-cheat-sheet
Windows 7-cheat-sheet
 
Sleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGSleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKING
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 
Raidprep
RaidprepRaidprep
Raidprep
 

Similar a Open Source Forensics

Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons Amr Nasr
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfHow to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfuzair
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshortVincent Ohprecio
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics reportyash sawarkar
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory ForensicsIIJ
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docxsmile790243
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Vipin George
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012Rian Yulian
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesSandeep Kumar Seeram
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkitsamiable_indian
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for EveryoneNikhil Mittal
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 

Similar a Open Source Forensics (20)

Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfHow to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshort
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics report
 
Deft v7
Deft v7Deft v7
Deft v7
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory Forensics
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
DR FAT
DR FATDR FAT
DR FAT
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on Examples
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkits
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 

Más de CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsCTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Nra
NraNra
NraCTIN
 
Live Forensics
Live ForensicsLive Forensics
Live ForensicsCTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Edrm
EdrmEdrm
EdrmCTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassCTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrimeCTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search WarrantsCTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector ConcernsCTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking OverviewCTIN
 
M Compevid
M CompevidM Compevid
M CompevidCTIN
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The DayCTIN
 

Más de CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 
M Compevid
M CompevidM Compevid
M Compevid
 
L Scope
L ScopeL Scope
L Scope
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
 

Último

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Último (20)

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Open Source Forensics

  • 1. Why are there so many tools left at the end of the money? Richard Austin MS, CISSP Southern Polytechnic State University ADVANCED DIGITAL FORENSICS WITH OPEN SOURCE TOOLS
  • 2. IT Elder Flatulence Bio My First Computer  Richard is a 30+ year veteran of the IT industry in positions ranging from software developer to security architect. Before beginning a career as an independent cybersecurity consultant and educator, he was focused on technology and processes for successfully protecting the 14PB storage area network infrastructure within the global IT organization of a Fortune 25 company.  MS degree with a concentration in information security from Kennesaw State University, a DHS/NSA recognized National Center of Academic Excellence in Information Assurance Education.  Active member of SNIA's Security Technical Working Group.  Active member of the Cloud Security Alliance’s Trusted Cloud Initiative.  Senior Member of both the IEEE and ACM and also a member of the IEEE Computer Society, CTIN, ISC(2) and the Atlanta Chapter of Infragard .  Book review columnist for IEEE Cipher, the newsletter of the IEEE Computer Society Technical Committee on Security and Privacy  A published author frequently writing and presenting on storage networking security, ethics and digital forensics. Advanced Digital Forensics with Open Source Tools
  • 3. Forensics is Changing Digital forensics was once solely concerned with just collecting and analyzing disk images from a cold, dead system but much useful information leaves few durable traces on disk Advanced Digital Forensics with Open Source Tools
  • 4. Two New Areas  Live memory collection and analysis  Registry analysis Though commercial tools are available, Open Source tools provide much of the same functionality Advanced Digital Forensics with Open Source Tools
  • 5. Collecting Live Memory Advanced Digital Forensics with Open Source Tools
  • 6. Why Live Memory?  The bad people are very interested in forensic technology and follow quite closely what we do  Contrary to popular opinion, this stuff ain’t secret  They know that we image disks so they do things that don’t leave disk traces  Memory-only malware  A lot of information may not leave clearly discernable disk traces  Open network connections  Active encryption – data may only be in plaintext while the system is running Advanced Digital Forensics with Open Source Tools
  • 7. How do you do it?  Just like any other forensic task  You collect the data  You extract information from it  So what’s all the hub bub, bub?  IAxx architectures don’t have a “DUMP” button  Rely on software to dump main memory (the infamous BSOD and crashdump)  Reading memory dumps is the province of O/S level debuggers  Great tools but you have to be a Windows/*UX internals guru to understand and use them Advanced Digital Forensics with Open Source Tools
  • 8. Remember!  When working with a compromised system, remember you’re working with Satan’s computer  You have no clue what the attacker may have done to it Advanced Digital Forensics with Open Source Tools
  • 9. Issues  User mode access to the .PhysicalMemory object was removed in Vista/2003 and later  This was a serious security issue – it’s gone; not coming back; get over it!  Many older live memory acquisition tools no longer work  For Vista/2003 and later, a utility must load a kernel mode driver to get access to physical memory  Some vendors call this an “agent” Advanced Digital Forensics with Open Source Tools
  • 10. Issues  Running a program to collect memory contents does change the state of memory (and maybe disk)  Can’t be helped  If physical memory is full, something may be swapped out when you run the program  Documented, repeatable process is key  You are only collecting physical memory  Swapped out pages will not be in the image Advanced Digital Forensics with Open Source Tools
  • 11. Data Triage •Consider the order of volatility •Relevance of the type of information to the case under investigation Advanced Digital Forensics with Open Source Tools
  • 12. Lots of Options  Memoryze from Mandiant http://www.mandiant.com/software/memory ze.htm  The usual forensic vendors have their tools  I’ll be demoing winxxdd (community edition) from http://www.moonsols.com/products/  This free version does have limitations such as not running from a removable device or via a script. Advanced Digital Forensics with Open Source Tools
  • 13. Win32dd Advanced Digital Forensics with Open Source Tools
  • 14. Hash the Image Advanced Digital Forensics with Open Source Tools
  • 15. Points to Remember  You must be able to run a program as ADMINISTRATOR on the system  For remote access:  psexec  Remote Desktop  Etc  This does change the state of the system  Students are surprised to see win32dd in the list of running processes Advanced Digital Forensics with Open Source Tools
  • 16. Analyzing the Memory Image OK, I got it but what do I do with it? Advanced Digital Forensics with Open Source Tools
  • 17. Volatility  https://www.volatilesystems.com/default/volatili ty  Open Source, written in Python  Python is a well-known scripting language  Download Python from www.activestate.com  The 1.3 version only supports XP SP2 and SP3  Version 1.4 in in RC and supports Vista and Windows 7 as well as incorporating many improvements  http://code.google.com/p/volatility/  Already installed on REMnux Advanced Digital Forensics with Open Source Tools
  • 18. Update  Volatility 2.0 is now released!!!  Includes a standalone Windows installer Advanced Digital Forensics with Open Source Tools
  • 19. Using Volatility  Very simple command-line interface:  python volatility command –f image_file  1.4 adds --profile=profile to identify the O/S  Notable commands:  ident – descriptive information about the dump file  datetime – date/time information for the dump file (included in ident)  pslist – list of processes  files – list of files open for each process  connections – open network connections  sockets – open sockets Advanced Digital Forensics with Open Source Tools
  • 20. ident  In 1.4, this command becomes imageinfo Advanced Digital Forensics with Open Source Tools
  • 21. pslist Advanced Digital Forensics with Open Source Tools
  • 22. Scan vs List  Some commands have two versions – list and scan  The difference is that list follows the normal way of doing things  e.g., listing processes by following the EPROCESS list  scan scans through memory looking for data structures (e.g., _EPROCESS)  Psscan will find terminated and de-linked processes (one stealth technique used by rootkits)  The scan version is much slower because it is scanning memory contents rather than walking a linked list Advanced Digital Forensics with Open Source Tools
  • 23. psscan Terminated FTP processes Advanced Digital Forensics with Open Source Tools
  • 24. files Advanced Digital Forensics with Open Source Tools
  • 25. connections FTP Advanced Digital Forensics with Open Source Tools
  • 26. Connections vs Connscan2 Advanced Digital Forensics with Open Source Tools
  • 27. sockets Advanced Digital Forensics with Open Source Tools
  • 28. netscan  For Vista and later, these are consolidated into netscan Sample output taken from the Volatility 1.4 wiki http://code.google.com/p/volatility/wiki/CommandReference#netscan Advanced Digital Forensics with Open Source Tools
  • 29. Protocol Numbers Advanced Digital Forensics with Open Source Tools
  • 30. And the Registry  Locating the Registry -- hivelist Advanced Digital Forensics with Open Source Tools
  • 31. Listing Keys Advanced Digital Forensics with Open Source Tools
  • 32. Examining Values Advanced Digital Forensics with Open Source Tools
  • 33. Services – Where malware hides Advanced Digital Forensics with Open Source Tools
  • 34. What does it all mean?  Working with memory contents does require a bit of knowledge about what it all means  These are two good reference books on how Windows really works and what you’re looking at in a memory dump Advanced Digital Forensics with Open Source Tools
  • 35. BUT What About Vista, …?  Volatility is nice but it only works on XP. So if you need to look at memory on Vista, Server 2003, etc, you’re back to using strings ….  Of course not:  1.4 is in RC and is installed in the REMnux CD (and virtual appliance)  And other tools are a little more arcane but they work  The Windows Debugging Tools can be used to analyze a Windd dump IFF it’s made in crashdump format (-d option)  http://www.msuiche.net/con/BlackHat_Webcast_New_Fron tiers_in_Forensics.pdf Advanced Digital Forensics with Open Source Tools
  • 36. Active Processes Advanced Digital Forensics with Open Source Tools
  • 37. Don’t get too comfortable … Particularly Part III on Anti- Forensics “In war the will is directed at an animate object that reacts.” Carl Von Clausewitz, On War Advanced Digital Forensics with Open Source Tools
  • 38. Registry Extraction and Analysis Advanced Digital Forensics with Open Source Tools
  • 39. Windows Registry  The Windows registry has been found to contain a treasure trove of information useful to the forensic analyst  The good news is that disk imaging includes the registry  New tools are simplifying the process of extracting this information in a useful format Advanced Digital Forensics with Open Source Tools
  • 40. Nomenclature Value Data Type Key Subkey Advanced Digital Forensics with Open Source Tools
  • 41. Registry File Locations System %WINDIR%system32configSystem SAM %WINDIR%system32configSam Security %WINDIR%system32configSecurity Software %WINDIR%system32configSoftware NTUSER.DAT Documents and SettingsUser  Simply extract these files from the image  Security on NTUSER.DAT may prevent copying so use the type command to make a copy: type NTUSER.DAT>somewhere else Advanced Digital Forensics with Open Source Tools
  • 42. Note  I’m going to be showing some representative samples of the information available and the things they imply about events in the real world.  If you get lost in the key-value wilderness, don’t despair – it’s all in the book.  What book? Be patient. Advanced Digital Forensics with Open Source Tools
  • 43. Mounting images  You need to extract the registry files out of the disk image  P2Explorer is a very useful tool provided free by Paraben  http://www.paraben.com/p2-explorer.html  It allows you to mount disk images on a Windows system (free edition only works on 32-bit versions)  OSFMount from PassMark software is another option  Works on both 32 and 64 bit Windows Advanced Digital Forensics with Open Source Tools
  • 44. Mounting An Image Advanced Digital Forensics with Open Source Tools
  • 45. Mounting An Image Advanced Digital Forensics with Open Source Tools
  • 46. Accessing Registry Files Advanced Digital Forensics with Open Source Tools
  • 47. Advantages of Mounted Image  Mounting the image basically gives you read- only access to the contents of the image as a drive letter  Windows Explorer, anti-malware, etc, can be used  No need to export everything in advance Advanced Digital Forensics with Open Source Tools
  • 48. Other Options  FTKImager is a free download from AccessData (developers of The Forensic Toolkit)  It can be used to open a disk image and export the registry files Advanced Digital Forensics with Open Source Tools
  • 49. Exporting Registry Files Imager can open most of the common image formats (dd, EnCase, etc) Advanced Digital Forensics with Open Source Tools
  • 50. Exporting Registry Files Once the image is opened, students see a familiar directory tree and just have to navigate to the registry file locations Files are exported by right clicking the file and selecting “Export” from the menu Advanced Digital Forensics with Open Source Tools
  • 51. Analyzing the Registry Advanced Digital Forensics with Open Source Tools
  • 52. Resource  This is an excellent book that covers many of the registry analysis tasks in detail  RegRipper is the tool used for analyzing the registry after it is collected  http://www.regripper.net/RegRipper/ and also available on the tools CD that accompanies the book  You can read my book review at http://www.ieee- security.org/Cipher/BookReviews (shameless self-promotion) Advanced Digital Forensics with Open Source Tools
  • 53. The Case: Price Software  Tom Warner is suspected of industrial espionage  He was upset about being passed over for a VP position  He is alleged to have set up a quid pro quo deal with a competitor  He may have colluded with Leslie Stowle in other actions  The forensic analyst has been given an image of Tom’s Windows workstation  Let’s see what kinds of information can be found Advanced Digital Forensics with Open Source Tools
  • 54. Plugins  RegRipper comes with a wide variety of plugins for examining registry information  Plugins are basically Perl scripts Advanced Digital Forensics with Open Source Tools
  • 55. Running Plugins: winver  You have the option to run the Perl scripts directly if you have Perl (and the right libraries) installed or you can use rip.exe  rip –r registry file –p plugin Advanced Digital Forensics with Open Source Tools
  • 56. USB Devices Identifying use of a thumb drive Advanced Digital Forensics with Open Source Tools
  • 57. Command Line C:DATARegRipper>rip -r ..PSCRegistryntuser.dat -p mp2 Launching mp2 v.20080324 MountPoints2 SoftwareMicrosoftWindowsCurrentVersionExplorerMountPoints2 LastWrite Time Mon Jan 3 21:59:36 2005 (UTC) Drives: A Wed Sep 29 21:00:05 2004 (UTC) D Wed Sep 29 21:00:05 2004 (UTC) C Wed Sep 29 21:00:05 2004 (UTC) E Fri Oct 29 17:46:24 2004 (UTC) Volumes: {3622c883-1069-11d9-b601-806d6172696f} Wed Sep 29 21:02:41 2004 (UTC) {707f5caa-29d2-11d9-99eb-000c291e65ae} Fri Oct 29 18:09:55 2004 (UTC) {3622c880-1069-11d9-b601-806d6172696f} Wed Sep 29 21:02:41 2004 (UTC) {3622c881-1069-11d9-b601-806d6172696f} Wed Sep 29 21:03:24 2004 (UTC) Remote Drives: ##2kadvserver#Users#twarner Wed Sep 29 21:03:22 2004 (UTC) ##psc-ws-03#c$ Fri Oct 1 05:58:52 2004 (UTC) ##2kadvserver#Management Fri Oct 1 05:54:14 2004 (UTC) ##2kadvserver#Software Fri Oct 1 05:54:50 2004 (UTC) ##2kadvserver#Software Development Fri Oct 1 05:54:37 2004 (UTC) Advanced Digital Forensics with Open Source Tools
  • 58. Running Plugins: recentdocs Advanced Digital Forensics with Open Source Tools
  • 59. The GUI  A GUI (rr.exe) is available  It provides access to plugin files that collect commonly used plugins into a single file and run them as a group Advanced Digital Forensics with Open Source Tools
  • 60. Plugin Files  Some sets of plugins are so commonly used together they are listed in a plugin file rip –r registryfile -f plugingfile  The plugin file is just a list of plugings to be run Advanced Digital Forensics with Open Source Tools
  • 61. Network Config  Excerpt from the SYSTEM plugin report  Pretend you didn’t notice “Guidance Software” Advanced Digital Forensics with Open Source Tools
  • 62. The Software Hive  The disk image had large blocks of binary 0’s – wonder how that happened? Advanced Digital Forensics with Open Source Tools
  • 63. Sources of Images Garfinkel’s Forensic Corpora Advanced Digital Forensics with Open Source Tools
  • 64. Scenarios  Simson Garfinkel of the NPS is working under a NSF grant to produce scenarios and associated forensic images for use in teaching digital forensics  Two scenarios are currently available at http://domex.nps.edu/corp/scenarios Advanced Digital Forensics with Open Source Tools
  • 65. M57 2009-M57 "Patents" scenario This scenario involves a small company called M57 which was engaged in prior art searches for patents. The fictional company is contacted by the local police in November 2009 after a person purchases a computer from Craigslist and discovers "kitty porn" on the computer. The police trace the computer back to the M57 company. Includes an instructor’s packet!!! Advanced Digital Forensics with Open Source Tools
  • 66. Nitroba Nitroba University Harassment Scenario This scenario involves a harassment case at the fictional Nitroba University. Advanced Digital Forensics with Open Source Tools
  • 67. Summary  Digital forensic practice must evolve to keep pace  Live memory analysis for volatile information lost when a system is shutdown or restarted  The Windows registry is a rich mine of information Advanced Digital Forensics with Open Source Tools
  • 68. Questions?  EMAIL raustin2@spsu.edu if you’d like a PDF of the slides Advanced Digital Forensics with Open Source Tools