Digital Forensics
Digital Forensics
University of Kashmir
Unit 4: Digital Forensics
M.Tech Sem: 3
Digital Forensics
The use of scientifically derived and proven methods toward the preservation, collection, validation,
identification, analysis, interpretation, documentation and presentation of digital evidence derived
from digital sources for the purpose of facilitating or furthering the reconstruction of events found
to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned
operations.
(Digital Forensic Research Workshop (DFRWS) 2001)
Investigations types might vary but
the principles and procedures remain the same more or less
the sources of evidence remain same
Digital Forensics depends upon the
Expertise of an examiner to interpret data
Information ret rieved by tools (hence, should be trust worthy)
Digital Forensics, hence, is the Science of forensics combined with the art of investigation
Applying scientific method and deductive reasoning to data is the science
Interpreting these data to reconstruct an event is an art
Goals of Forensic Analysis:
Find the facts
Via these facts reconstruct the truth of an event
Truth of an event is revealed by discovering and exposing the remnants (traces) of the
event left on the system
Remnants are known as artifacts or evidence (used in legal proceedings)
Even the simple tasks create artifacts
Even the act of cleaning the tasks leave additional artifacts
To survive in a court of law, Investigators must apply the two tests for evidence:
Authenticity:
Where does the evidence come from?
Reliability:
Is the evidence reliable and free of flaws?
Modes of At t ack:
Insider attacks:
These involve a breach of trust from employees within an organization.
External attacks:
These involve hackers hired by ei ther an insider or an external entity whose aim is to
destroy a competitor ’s reputation.
Rules of Comput er Forensics:
A good forensic investigator should always follow these rules:
Examine original evidence as little as possible. Instead, examine the duplicate evidence.
Follow the rules of evidence and do not tamper with the evidence.
Always prepare a chain of custody, and handle evidence with care.
Never exceed the knowledge base of the FI.
Make sure to document any changes in evidence.
Staying within these parameters makes a case valuable and defensible.
6 A ’s of Digital Forensics:
Assessment:
You must be able to distinguish between evidence and jun k dat a. For this, you should know
what the data is, where it is located, and how it is stored.
Acqui siti on:
The evidence you find must be preserved as close as possible to its original st at e. Any
changes made during this phase must be documented and justi fied.
Aut hentication:
At least two copies are taken of the evidential computer. One of these is sealed in the
presence of the computer owner and then placed in secure storage. This is the master copy
and it will only be opened for examination under inst ruction from the court in the event of a
challenge to the evidence presented after forensic analysis on the second copy.
Analy sis:
The stored evidence must be analyzed to extract the useful information and recreate the
chain of events.
Articulation:
The manner of presentation is important, and it must be understandable to court effectively.
It should remain technically correct and credible. A good presenter can help in this respect.
Archival:
After the case is closed seal the original evidence and keeps it in secure storage place
because it is a chance to reopen the case after some time or years, then it ’s requi red to
resubmit in court.
Skill s requ ired for Digit al Forensic App lication:
Programming or computer-related experience
Broad understanding of operating system and its applications
Strong analytical skills
Strong computer science fundamentals
System administrative skills
Knowledge of the latest intrusion tools
Knowledge of cryptography and steganography
Strong understanding of the rules of evidence and evidence handling
Ability to be an expert defender in court
--------------------------------------------------------------------------------------------------------------------------------------
Incident Respon se
Having the ability to properly respond to securi ty incidents in an orderly and efficient
manner allows organizations to both li mit the damage of a potential cyberattack, but also
recover from the associat ed damage that is caused.
Incident response is a capabili ty added to the existing policies and procedures of
organizations of all sizes.
Building of this capabili ty needs to address several key components as:
Working knowledge of the incident respon se process
(includes general incident flow and general actions taken at each stage)
Organizations having acc ess to personn el who form the nucleus of any incident
response capabili ty
(includes organizing the team, formalizing the plan and associated processes)
Having Incident Response framework in place, the plan needs to be continually evaluat ed,
test ed, and improved as new threats immerge.
Having Incident Response capabili ty will posi tion organizations to be prepared for the
un fortunat e reali t y that many organizations have already faced, an incident that
compromises their securi ty.
Containment Analysis
Perf o r m i ng For en s i c An al ys i s
Rul es of ev i de nc e
Rule 402: Test for relevant evidence
Rule 502: Attorney-Client privilege and work product
Rule 702: Testimony by expert witnesses
Rule 902: Evidence that is sel f -authenticating
Rule 1002: Best evidence rule
Rule 1003: Admissibility of duplicates
Or de r of Vo l at ili t y
When collecting evidence, you should proceed from the volatile to the less volatile. Here is an
example order of volatility for a typical system.
registers, cache
routing table, ARP cache, process table, kernel statistics, memory
temporary file systems
disk
Remote logging and moni toring data that is relevant to the system in question
physical configuration, network topology
archival media
Co lle c t i on of Ev iden ce :
Handheld Devi ces: Pe riphe ral Devi ces:
PDA’S (Personal Digital Assistant) Equi pment that can be Attached or Connected
to a Compu te r
Digital Multimedia Devices Modems
Pagers Rout e rs
Digital Cameras P rin te rs
Global Positioning Satellite (GPS) Scanne rs
Receivers
Mobile and Smart Phones Docking S tati ons
Tab l e of Too l s :
Har d di s k dr i ve s :
Introduced in 1956 by IBM for general purpose mainframes & minicomputers.
Advancements over the years in terms of:
Capaci ty Shape Performance
Size Internal st ructure Interface
Modes of storing data
Parall el Ad van c ed Tec hno l ogy Attach m en t (PA TA ): [CONSULT PPT FOR IMAGES]
First types of hard disk drives used as internal computer storage interface
Interface: PATA
Referred to as: Int egrat ed Drive Elect ronics (IDE) & Enhanced Int egrat ed Drive Elect ronics
(EIDE)
First Introduced by: Western Digital Bank (1986)
Provide a common drive interface technology for connecting hard drives & other devices to
computers.
Data Transfer Rate: 133MB/s
Max devices connected to the Drive channel: 2 (most of the motherboards have a provision
of 2 channels, thus, internally 4 EIDE devices can be connected).
40 (all connectors black) or 80 (black, gray, blue connectors) wire ribbon cable transferring
multiple bits of data simul taneously in parallel.
Data Stored: by magnetism
Internal Structure: made of moving mechanical parts
External: No
Hot plugging: No
USB:
Universal Serial Bus
The USB "trident" Icon
Year Created: January 1996
Number of Devices:127 per host
Style: Serial
Hot plugging: Yes
External: Yes
Fir eW ir e:
FireWire is Apple Inc.'s brand name for the IEEE 1394 interface. It is also known as i.Link (Sony ’s
name). It is a personal computer (and digital audio/digital video serial bus interface standard,
offering high-speed communications and real-time data services. FireWire has replaced Parallel SCSI
in many applications, due to lower implementation costs and a simplified, more adaptable cabling
system.
The FireWire icon
Year Created:1990
Created By: Apple
Number of Devices:63
Style: Serial
Hot plugging: yes
External: yes
PCI Ex p r ess :
PCI Express, officially abbreviated as PCIe (and sometimes confused with PCI Extended, which is
officially abbreviated as PCI-X), is a computer expansion card interface format. It was designed as a
much faster interface to replace PCI, PCI-X, and AGP interfaces for computer expansion cards and
graphic cards. The PCI Express (PCIe) physical connection (slot) is completely different from those of
the older standard PCI slots or those for PCI Extended (PCI-X).
Pu r po s e of Wr i t e B lo ck er s :
To allow a seized hard drive (source) to be connected to a lab/exam computer for forensic
image acquisition and or analysis.
To prevent the lab/exam computer from writing data to a seized (source) hard drive.
Wr i t e B lo ck Requ i r em ent s :
• Forensic investigators need to be absolutely certain that the data they obtain as evidence
has not been altered in any way during the capture, analysis, and control.
• A writ e blocker is any tool that permits read-only access to data storage devices without
compromising the integri ty of the data.
• The main difference between the software and hardware write blockers is that software
write blockers are installed on a forensic computer workstation, whereas hardware write
blockers have write blocking software installed on a controller chip inside a portable physical
device.
• Where possible, set a hardware jumper to make the disk read only.
• All commands that change drive content are blocked
• Why not just say all READ commands are allowed?
• The tool shall not prevent obtaining any information from or about any drive.
--------------------------------------------------------------------------------------------------------------------------------------
Disk Forensics
Im agi n g:
Imaging the subject media by making a bit -for-bit cop y of all sectors on the media is a well-
established process that is commonly performed on the hard drive level, hence often
referred to as hard drive imaging, bit st ream imaging or forensic imaging.
Generate a digit al fingerprint of the acqui red media known as a hash.
A hash generation process involves examining all of the 0’s and 1’s that exist across the
sectors examined. Altering a single 0 to a 1 will cause the resulting hash value to be different.
Both the original and copy of the evidence are analyzed to generate a source and target
hash. Assuming they both match, we can be confident of the authenticity of the copied hard
drive or other media.
Mas t e r B oo t Rec o r d:
Special type of boot sector at the very beginning of parti tioned computer mass storage
devices like fixed disks or removable drives.
The MBR holds the information on how the logic al part itions, containing file systems, are
organized on that medium.
Boot signature validates the MBR i.e., invalid magic number indicates a corrupt or missing MBR,
hence, critical to booting or using the disk.
Sl ack Spac e:
Slack space is a form of internal fragmentation, i.e. wasted space, on a hard disk.
When a file is writ ten to disk it ’s stored at the “beginning” of the cluster.
A cluster is defined as a collection of logically contiguous sectors and the smallest amount of
disk space that can be allocated to hold a file.
Rarely will there be an even match between the space available in a cluster and the number
of bytes in the file.
Lef t over bytes in the cluster are unused, hence the name slack space.
The examination of slack space is an important aspect of computer forensics.
Technically, a file’s slack space is the differ ence bet ween it s logic al and ph ysical size.
Logical size of a file is determined by the file’s actual size and is measured in bytes.
The physical size of a file is determined by the nu mber of sec tors that are allocated to the
file.
Sectors are clustered in groups of four by default which means that each cluster has 2,048
bytes.
Fil e sy s t em Tab l es :
File System table is an array of entries that describe each file system implementation details.
Recovery of deleted data is possible by consul ting the file system tables, meta data or timestamps to
recreate the timeline of events is done by file system tables.
Fil e Syst ems:
FAT (File Allocation Table)
NTFS (New Technology File System)
HFS (Hierarchical File System)
ext4
…
Inod e in ext4
Un all oc at e d sp aces :
Unallocated space, sometimes called “free space”, is logical space on a hard drive that the
operating system e.g., Windows, can write to.
To put it another way it is the opposi te of “allocated ” space, which is where the operating
system has already writ ten files to.
On a standard, working computer, files can only be writ ten to the unallocated space.
On a new drive the unallocated space is normally zeros, as files are writ ten to the hard drive
the zeros are over writ ten with the file data.
Dele ting a file:
FAT / MFT tells the computer where the file begins and ends.
Deleting a file deletes pointer to the file
FAT/MFT space occupied by the file is marked as available.
The actual data that was contained in the file is not deleted.
The space is marked unallocated.
Hence, can be recovered till not over-written using specialized tools.
Aut oruns:
A feature of the Windows operating system that causes predetermined system actions
when certain media is inserted.
Common media types that trigger AutoRun actions include CDs, DVDs in tradi tional or Blu-
Ray format and USB storage devices, such as flash drives or external hard drives.
Withou t prope r unde rstandi ng of the unde rlaying technology, it ’s just like you ’ re searching for a
need l e in t h e hays tac k!
--------------------------------------------------------------------------------------------------------------------------------------
Memory Forensics
Forensic analysis of volatile data in computer ’s memory du mp.
For investigation of advanced computer attacks that are steal thy enough to avoid leaving
data in on computer ’s hard drive (memory resident ).
RAM is, hence, acqui red and analysed by capt uring or du mping or sampli ng it to a non-
volatile storage in a way that does not corrupt the image.
The importance of RAM in forensics lies in the fact that every transaction occurs with RAM
being part of it.
In Memory Data:
Current running processes, running treads and terminated processes
Open TCP/ UDP ports / raw sockets / active connections
Memory mapped files
Executables, shared objects (modules and drivers), text files
Caches
Web addresses, typed commands, passwords, clipboards, Securi ty Account Manager
(SAM dat abase) , edited files
Passwords/ keys / other information
Malware presence including rootki ts
Live regist ry hives
Hidden data and many more
In fact, anything that processor works upon.
Kernel Debugger Data Block
Unloaded drivers
Process Struct (_Eprocess)
Process Environment Block (_PEB)
PEB loader data
SAM: Securi ty Account Manager is a database that stores users ’ passwords used to authenticate
local or remote users.
Live regist ry hives: A hive is a logical group of keys, sub-keys, and values in the regist ry that has a set
of supporting files containing backups of its data. Each time a user logs in a new hive is created with
a separate file for that user profile.
Persist ence of Dat a in memory:
Factors that determine the persistence of data in RAM:
System Activity
Main Memory Size
Data Type
Operating System
The Process of Memory Forensics:
Capture the memory (memory dump)
Analyse the memory
Reconstruction of memory state
Reconstruction of the entire scenario with disk image and memory image in conjunction
Various formats:
Raw dump ( linear format ) (.img / .dd)
Windows crash dump format (.bin)
BSoD (writ ten after a system is frozen)
Hiberfil.sys format
Commercial tools format
Winen .E01 kind of format
.vmem (Vmware)
.Bin (hyper V)
Fastdump pro (hpak)
Windows Memory Forensics:
It includes:
Windows objects and pool allocations Registry in memory
Processes, handles and tokens Kernel forensics and Rootkits
Process memory internals Windows GUI subsystem
Hunting malware in Process Memory Disk Artifacts in memory
Event logs Event reconstruction
Networking artifacts / hidden Timelining
connections / Internet history
--------------------------------------------------------------------------------------------------------------------------------------
In ternet Forensics/ Network Forensics
Int er n et For en s i cs :
Internet forensics shifts that focus from an individual machine to the Internet at large & the
challenge is immense to extract Internet – related evidence. The Internet forensics mainly covers:
• Web Forensics
• Network Forensics
• Email Forensics
Web br o w ser s :
• Software application that allows a user to locate, access, and display web pages.
• The purpose of a web browser is to fetch information resources from Internet and display
them on a user ’s device.
• The content on web is created using HTML and XML (Extensible Markup Language).
• Browsers translate web pages and websites delivered using Hypert ext Transfer Prot ocol
(HTTP) into human-readable content.
• Browsers possess the ability to display other protocols and prefixes, such as HTTPS, FTP,
email handling (mail to:), or files (file:)
• The web pages are identified by distinct URL, the browsers make use of this URL to locate
the content on Internet.
• A variety of web browsers are available with different features, and are designed to run on
different operating systems.
• Major browsers have lightweight versions available for mobile devices called micr o-browser
(st ripped-down browser).
• As a cli ent / server mod el, the browser is the client run on a computer that contacts the
Web server and requests information.
• Contemporary web browsers are fully-functional suites that can interpret and display HTML
web pages, applications, JavaScript, AJAX and other content hosted on web servers.
• External plug-ins requi red to support the active content is also supported e.g., in-page video,
audio or game content, hence, extend the capabili ty of a browser.
• Browser can be used to perform tasks of video-conferencing, designing web pages, and add
anti-phishing filters or other securi ty features to browser itsel f.
Web f or en s i cs :
Web forensics relates to cyber-crime on the Internet.
Web forensic analysis brings out some details like when and in what sequence did
somebody access a Web page.
The victims of Web attacks are clients and Web servers.
The medium of attack on the Internet are Web Browser , Dat abase Servers and App lication
Servers.
Port number 80 is the standard port for Websi tes.
It listens to requests from a Web Client.
The po tent ial at t acks ent er int o the syst em through this po rt .
Web forensics is carried out on both cli ent side and server side.
While the server-side forensic evidence helps an investigator progress towards a con clusion ,
the client-side evidence provides potentially very st ron g and det ailed evidence.
Both are sometimes insufficient, hence, intermediate logging locations like application
server logs play crucial role in proving someone ’s guilt.
.dat is usually a generic data file that stores information speci fic to the application it refers to. They
sometimes might be found with other configuration files e.g., dlls
Cli ent - s id e f or en s i cs :
On the client side, forensic analysis is done to find out if a user has been involved or has been a
victim of the crime.
Potential evidence can be found in:
Browser history
Registry entries
Temporary files
Index.dat
Cookies
Favori tes
HTML pages in unallocated space
Emails sent and received by the user
Cache
Ind ex.dat is a database file used by browser to improve performance. Repository of info. e.g., URLs,
search queries, recently opened files
Cookies: small pieces of info stored on your computer e.g., session id, user id, set tings for future use
of a page to hide something
Ser ver -s i d e f or en s i cs :
On the server side, forensic analysis can be done by examining
Access Logs
Error Logs
FTP log files
Network traf fic
The int ermediat e sit e logs such as
Antivirus Server Logs
Web filter logs
Spam filter logs
Firewall logs also help in tracking an incident
Google Chrome stores data in SQLit e format and can be examined using SQLi te database viewer.
The database file that contains the Google chrome browsing history is stored at default folder
Hist ory.
The tables include:
downloads Keyword_search_terms
presentation segment_usage
urls visits
TCP/ IP Po rt s & Pr o t oc ol s :
Th e en vir on m ent
When going for network forensics, it is implied that network transmissions are temporal.
It may not be possible to personally collect the data that be analysed in a timely or cost-
effective manner. This might necessitate inst ructing or consul ting others in the process. We
can hope for an IDS/NSM solution.
Hence, it is necessary to be able to define and explain the steps to others clearly.
Hex du mp: viewing data in hexadecimal form of data done for debugging or reverse engineering.
Chip off : advanced forensics where we remove the chip/flash memory physically and then acqui ring
the raw data using specialized equipment. It helps to get the complete physical image.
Micro-read: This process involves interpreting and viewing data on memory chips. Physical gates on
the chips are analyzed with high-powered elect ron microscope converting gate level into 1’s and 0’s
to discover the resulting ASCII code. It is expensive and time-consuming, needs hardware and file-
system knowledge.
Authentication Key
Location Area Identity (LAI) used for location updating of mobile subscribers
SMS messages
Contacts
Remnant s of files in SIM cards:
Straight forward and hierarchical data storage st ructure.
Master File (MF)--- references to all other files on the same SIM card, root of the file
system
Dedicated File (DF)
Elementary File (EF)
Dedicated Files are subordinate directories under the MF, their contents and functions being
defined by the GSM11.11 standards.
The EFs under DF (DCS1800) and DF (GSM) contain network related information and the EFs
under DF (Telecom) contain the service-related information.
3. Devic e is OFF:
Attempt physical acquisition while turned OFF
Turn it ON and follow the steps when device is (ON & unlocked, or ON & locked)
Rem em ber… Only GSM and Nex t el Phon es have SI M s. Not in CDMA (Ver i zon , Spr int)
A PIN Lo cked SI M is Not Acc ess i bl e Wi t hou t PIN – Requ i r es PUK Fr om Carr i er
iPhon e For en s i c An al ys i s :
iOS is a proprietary encrypted operating system and the constant patches and upgrades
mean that forensic tools st ruggle to keep pace.
The most common way of acqui ring data from an iOS device is through iTunes backup.
iTunes performs an automated backup during the sync process which will provide the most
important information to the forensic investigator.
--------------------------------------------------------------------------------------------------------------------------------
Multimedia Forensics
Def i n i t i on:
Multimedia is the integration of text, image, graphics, audio, video to enhance the delivery or
presentation of digital information and hence, its impact on the user.
Multimedia presentation can be non-linear (interactive) or linear (passive).
The presentation of multimedia requi res the support of appropriate hardware and software
tools, e.g., Keyboard, Optical Character Recognition (OCR), printer, moni tor, sound card,
microphone, scanner, video camera, graphics card, screen capture software, audio/video
editors, graphic tablet, etc.
However, compared to tradi tional unimedia (text), multimedia use huge amounts of storage
space plus high speed storage media.
Internet is one of the main sources of communicating multimedia globally.
Hypermedia – consists of hypertext combined with still or moving images and sound i.e.,
hypertext + hypergraphics.
Multimedia information in presented in a variety of standard file formats.
Mul t i m ed i a ( For m at s ):
Sour c e Iden t i f i cat i on : Determining the device used to create the speci fic content.
These include:
Digit al Camera: device for the reproduction of natural scenes
Features identifying digital cameras include: JPEG compression, Color Fil ter Array (CFA),
sensor imperfections, Sensor Pat tern Noise (SPN)
SPN is usually caused by influences during the sensor production cycle: individual
pixels show a different sensitivity to light because of inhomogeneity of silicon wafers.
The major problems of this approach are the con t aminat ion of SPN, denial of the
acqu isit ion of a clean fingerprint of the camera because of its absence.
Photo Response Non-uni formity Noise (PRNU) – finger print for an individual camera.
Colou r decoup led PRNU (CD-PRNU): PRNU + CFA. The CFA is predefined by the
manufacturer.
Cont en t Cl ass if ic at i on :
The cheaper storage media has resulted in tremendous amounts of data to be
investigated by forensics team and there are always challenges of false posi tives and
false negatives in an investigation that can mislead an investigator.
Available multimedia content can be classified on the basis of available Formats
In video media, key frames and mot ion analysis is performed to classify content.
Content is analysed for any probabili ty of pornography.
Cont en t For g er y:
Detection of content forgery in visual, auditive and video data:
Visual dat a: looks for modi fication of digital images & includes:
Copy-move forgery (cloning) it has duplicated image sections
Partial deletion of speci fic objects
Manipulation of geomet ry, luminance, color-space, etc.
Fil tering of unwanted parts of an image
Aud itive dat a: to check for forgeries visual, physical, elect rical, and acoustical tests
need to be carried out. It includes the analysis of:
Recording device, veri fication of integri ty of recording medium, usage of
analytical tools to identify irregularities
Video dat a: involves analysis of video tampering by looking for:
Duplicated frames, duplication of regions across frames
--------------------------------------------------------------------------------------------------------------------------------------
Top ics
Int rusion Det ect ion Hashing Issues
At t ack Trace Back Ant i-forensics
Packet Inspect ion Tools
Log Analysis
• IDS is a system that moni tors network traf fic for suspicious activity and issues alerts in real-
time when such activity is discovered.
• The basic activities include anomaly detection & reporting (passive), while some IDS can even
take actions against malicious activity or traf fic that includes blocking traf fic from a suspicious
IP address (reactive).
• IDS analyzes whole packets = header + payload
• The system detects unauthorized users attempting to enter into a computer system by
comparing user behavior to a user profile, detects events that indicate an unauthorized
entry into the computer system, notifies a control function about the unauthorized users
and events that indicate unauthorized entry into the computer system and has a control
function that automatically takes action in response to the event.
• The user profiles are dynamically constructed for each computer user when the
computer user first attempts to log into the computer system and upon subsequent
logins, the user's profile is dynamically updated.
• By comparing user behavior to the dynamically built user profile, false alarms are
reduced.
• The system also includes a log auditing function, a port scan detector and a session
moni tor function.
• IDS can be prone to false alarms (false posi tives), IDS’ need to be properly configured to
differentiate between normal traf fic and malicious traf fic.
An Int rusion Prevent ion Syst em (IPS) also moni tors network packets for potentially damaging
network traf fic. But where an intrusion detection system responds to potentially malicious traf fic by
logging the traf fic and issuing warning notifications, intrusion prevention systems respond to such
traf fic by rejecting the potentially malicious packets. IPS can be configured to block/stop potential
threats without involvement of system administrator. If not tuned properly, IPSes can deny
legi timate traf fic as well, hence, care should be taken in this regard.
• IDS types:
• Network int rusion det ect ion syst em (NIDS): deployed at a st rat egic po int (s) within the
network, to moni tor inbound and outbound traf fic.
• Host int rusion det ect ion syst ems (HIDS): run on all computers or devices in the network
with direct access to both the internet and the enterprise internal network. Hence, can
detect anomalous traf fic generated from inside the organization or from a host that is
infected as well not done by NIDS.
• Signat ure-based int rusion det ect ion syst ems: moni tors all the packets traversing the
network and compares them against a database of signatures or attributes of known
malicious threats, much like antivirus software.
• Ano maly-based int rusion det ect ion syst ems: moni tors network traf fic and compare it
against an established baseline, to determine what is considered normal for the network
with respect to bandwidth, protocols, ports and other devices. This type of IDS alerts
administrators to potentially malicious activity.
IDS is typically located between a company ’s firewall and the rest of its network.
IDS capab ili t i es :
• Moni toring the operation of routers, firewalls, key management servers and files
• providing administrators, a way to tune, organize and understand relevant operating
system audit trails and other logs that are often otherwise difficul t to track or parse
• providing a user-f riendly interface
• including an extensive attack signature database against which information from the system
can be matched
• recognizing and reporting when the IDS detects that data files have been altered
• generating an alarm and notifying that securi ty has been breached
• reacting to intruders by blocking them or blocking the server
--------------------------------------------------------------------------------------------------------------------------------------
• Has h: “A unique numerical identifier that can be assigned to a file, a group of files, or a
portion of a file, based on a standard mathematical algori thm applied to the characteristics
of the data set. The most commonly used algori thms, known as MD5 and SHA, will generate
numerical values so distinctive that the chance that any two data sets will have the same
hash value, no matter how similar they appear, is less than one in one billion. ‘Hashing ’ is
used to guarantee the authenticity of an original data set and can be used as a digital
equivalent of the Bates stamp used in paper document production. ”
Has h colli s i on s :
• If two separate inputs produce the same hash output, it is called a colli sion , hence, won’t be
able to prove the integri ty of evidence in the court of law.
• The odds of collisions are very low especially for the functions with large output sizes.
• Hash collision means hash code is not unique and more the duplicates worse the
performance.
• Hash collisions can even be exploited.
• MD5 & even SHA1 have been shown to not be completely collision resistant, however
st ronger functions such as SHA-256 seem to be safe for the foreseeable future.
--------------------------------------------------------------------------------------------------------------------------------------
An t i -f o r ens i cs :
• Attempts to negatively affect the existence, amount, and/or quality of evidence from crime
scene, or make the examination of evidence difficult or impo ssible to conduct.
Ryan Harris (2006)
Anti-forensics techniques can be categorized into:
• Low tech anti-forensics techniques
• High tech anti-forensics techniques
Lo w t ec h an t i -f or en s i cs t ec hn i qu es :
Requi re basic knowledge of computing and elect ronics (are destructive)
• Physical data destruction
• Hard drive Scrubbing
• Artefact wiping
• Steganography
• Cryptography
High tech ant i-for ensics techn iques:
Requi res excellent conversance of computing/programming and elect ronics (not destructive, rather
more focused on hiding data, breaking digital forensics tools and process and causing prolongation
of the whole investigation)
• Data Saturation • Scrambled MACE Times
• Hiding Data • Rest ricted Filenames
• Hiding data in Slack and Unallocated • Ci rcular References
Space
• Nonstandard RAID Configurations • Broken Log Files
• File Signature Masking • Portable Systems and Programs
• Dat a acqu isit ion : EnCase, FTK, SafeBack, MFL, dd, Macquisition, IxImager, …
• Sof t ware writ e block: HDL, PDBLOCK & ACES
• Hardware writ e block: MyKey, Tableau, WiebeTech, DiskJocky, DriveLock, & FastBlock
• Mobil e Devic e (cell phon e) acqu isit ion : Paraben, Bi tPim, MOBILedit, Neutrino, GSM XRY, …
• Drive wipe: Boot & Nuke, Voom, Drive eRazer
Embedded Syst em
Dedicated systems designed to do one job and to do it well.
Vary in size as well as in complexity and function.
Can have low complexity, like a single micro-controller chip used to open and close a gate
or very high complexity, like multiple complex embedded systems gathered to automate an
aircraf t
Are hugely widespread in the form of:
Consumer elect ronics
Industrial control
Military devices
Networking systems
Telecommunications
Medical indust ry
Power plants
Used to control an enormous variety of si tuations on a regular basis.
They are designed with a little concern for securi ty.
Embedded systems are probably the fastest growing source of forensic digital investigations
Thus, these systems can provide vast amounts and different kinds of information and data
that can be used for many purposes, such as crime investigations and forensic examination.
Dedicated hardware knowledge is requi red.