CERT-EU-SWP 12 004 v1 3
CERT-EU-SWP 12 004 v1 3
1 Target Audience
This document is aimed at general IT staff that may be in the position of being required to take action in
response to an IT security incident, and who does not have specific training in the area of computer forensics.
This document only provides high-level guidelines. It does not supersede any specific applicable policies or
procedures, which should be followed if they exist.
Furthermore, this document does not describe the only possible way of performing data acquisition. Different
approaches are possible and may be valid. This document should rather be seen as a best practice guideline in
case of the absence of more specific local policies and procedures related to this topic.
In case of doubts or any additional questions about this document, do not hesitate to seek further advice
and assistance from your respective authorities or CERT-EU team.
2 Introduction
IT security incidents sometimes are of such nature that the organisation affected by the incident wants to pursue
prosecution. However, often the facts are not necessarily immediately communicated to the police for a variety
of reasons, including the fact that their scope and nature is not clear from the beginning. For prosecution to be
successful, the chain of custody needs to be preserved in a legally accepted manner, which requires the evidence
to be preserved immediately after the detection of the incident.
It should be noted that communication to law enforcement authorities must be made as soon as possible after
discovery of the facts given the volatility of traces and actions that could be taken (Internet identification, etc.).
The decision to contact law enforcement authorities lies solely with the organization that is impacted by the
incident. CERT-EU may assist, but it will never contact the law enforcement on behalf of the organization.
3 Purpose
The purpose of these guidelines is to help IT services to preserve evidence in an IT security incident in such a
way that the investigation by IT security experts or law enforcement authorities can be carried out in an optimal
manner. This procedure described herein focuses primarily on a case when an end-user workstation is impacted
(e.g., a desktop or a laptop). It does not try to describe other specific cases of (e.g., different type of servers,
smart phones, and others devices).
4 Context
4.1 Authority
Before any data acquisition may be done, it must be clearly established who has the authority to perform it. The
persons performing the data acquisition must be clearly identified and have the rights (given the situation and
based on local policies and procedures) to acquire the data. This right should be clearly documented as part of
the procedure.
1
NIST (SP 800-86) on "Integrating Forensic Techniques into Incident Response" provides more detailed technical background.
CERT-EU Security Whitepaper Version 1.3 – 26 October 2012
4.3 Handling
To avoid damage and loss of potentially crucial data, manipulation of the system should be done according to the
following four general principles2:
1. No action taken should change data held on a computer or storage media that may subsequently be
relied upon in court.
2. In circumstances where a person finds it necessary to access original data held on a computer or on
storage media, that person must be competent to do so and be able to give evidence explaining the
relevance and the implications of their actions.
3. An audit trail or other record of all processes applied to computer-based electronic evidence should be
created and preserved. An independent third party should be able to examine those processes and
achieve the same result.
4. The person in charge of the investigation has overall responsibility for ensuring that the law and these
principles are adhered to.
As a rule of thumb, and specifically for cases where prosecution in court is being considered, the original
evidence has to be seized as a copy or it will not generally be accepted as valid forensic evidence in court. This
applies mainly to computers, peripherals, cabling, and storage devices that must be seized, inventoried and
packed following sound a forensic methodology to preserve the chain of custody.
5 Documentation
2
Good Practice Guide for Computer-Based Electronic Evidence, v4.0, Association of Chief Police Officers (APCQ), UK.
6 IT Interventions
• Logs of all intermediate systems involved (e.g., network switches, firewalls, proxy, IDS, Active
Directory, LDAP, etc.) for a time window surrounding the incident (if possible, keep all earlier logs as
well). Do not filter logs, and if possible keep them in the original format.
• If possible, try to obtain a packet capture of the packets sent/received from the impacted machine before
it is unplugged from the network.
Procedure:
• The application needs to be run with administrator privileges.
• Insert USB stick into the computer that you want to image.
• Right-click on the dumpit.exe application and choose to "run as administrator".
• Confirm (Y) that you want to proceed. The memory image will be stored directly on the USB stick.
• When the operation finishes, you may safely remove the USB and cleanly shutdown the computer.
Procedure:
• Make sure the computer that is to be investigated is shut down. Pull the plug if necessary.
• Connect the external hard drive to the computer.
• Insert CAINE CD, start the computer and ensure that it boots from the CD (some configuration changes
in BIOS may be necessary). If necessary it is also possible to use Live CAINE USB.
• CAINE does not mount any hard drives to prevent unwanted changes on them. Hence, when CAINE
has started, mount the external hard drive in read-write mode:
o Choose MENU -> Forensic Tools -> Safe Mount
o Find your external drive on the drop-down list (Use button: Device Information), (e.g.
/dev/sdc1) Make sure that Make Writable option is selected and click OK.
o Click Mount.
• Use GUYMAGER to create the image of the disk:
o Choose MENU -> Forensic Tools -> Guymager
o From the list of devices in the main window choose the one that is to be acquired – e.g. sda.
Select it for acquiring by right clicking on it and choosing Acquire image.
o Choose the file format (recommended: Expert Witness Format, leave the recommended split
size of 2047 MiB)
o Optionally fill-in additional notes (case, evidence, examiner, description, etc.)
o Choose the destination of the image by choosing Image directory and Image filename
o Click OK to start the acquisition.
o Once finished (it may take several hours), shutdown the computer (MENU -> Shut Down ->
Shutdown) and remove the CD.
o Disconnect the external hard drive when the computer has shut down.
Pre-requisites:
• Write Blocker and cables;
• The hard-disk to acquire (removed from the original machine), we will refer to it as Subject Drive;
• A dedicated PC, we will refer to it as Forensic PC;
• A data acquisition software, e.g. Guymager (Linux) or FTK Imager (Windows);
NOTE: For a Forensic PC you can use CAINE as explained above, or you can use any other
Linux distribution that supports GUYMAGER (e.g., Ubuntu). However, if the Forensic PC is
Windows based, we suggest using FTK Imager from Access Data. You can download the FTK
Imager (not Lite!) tool and the user guide here: http://accessdata.com/support/product-
downloads. The procedure to use with Guymager has been explained above – this procedure
explains the use of FTK Imager.