Forensics Analysis of Hacking Cases
Forensics Analysis of Hacking Cases
Forensics Analysis of
Hacking Cases
§ Is for
– Need to know
Doctor A Security
– Should/should
not
§ Is NOT for
– How to do
– Legal advice
§ Investigator
arrived the
crime scene and
Doctor A Security
§ used his
notebook and
created a new
partition in the
existing USB
Hard disk…
§ Used a
Forensic tools
installed
Doctor A Security
yesterday in
his notebook
using
colleague’s CD
§ Unplugged
the power
Doctor A Security
supply of the
target
computer
§ Copied the
files of the
target
Doctor A Security
computer to
the
Investigation
newly created
partition
§ Investigator
returned to
office, his
Doctor A Security
colleague
borrowed his
notebook for
another case,
and returned 2
days later.
§ Intruder: 2 Hours
§ the time spent to
clean up after them:
Doctor A Security
80 Hours
– not inlcude
v Intrusion Detection
(human element)
v Forensic acquisition of
disk images
v Restoration of
compromised system
v Hardening of
compromised system
v Network scanning for
other vulnerable
systems
v Communications with
stakeholders
§ Incident Respond
Procedure… .
– .. Snapshot of the
victim machine… (?)
Doctor A Security
§ Decide
– Recovery
v Virus
v Failed Harddisk…
– Forensic (if evidence
if important)
v Substantial
financial loss
v Computer crime
– Intrusion
– Theft of
proprietary
information…
1. Too many
variables
– Operating systems
Doctor A Security
– Software
application
– Cryptography
– Hardware platform
– Law
– International
boundaries
– Publicity
§ How Logging is
Done
§ What is Logged
Doctor A Security
§ Forensic
Acquisition
§ Evidence
Handling
§ “needle in the
haystack”
Doctor A Security
§ REFUTE because of
mishandling??
§ Chain of evidence
Doctor A Security
– 1 x Conduction the
investigation
– 1 x Document
§ What
– Time
– Date
– Steps were taken
– Name involved
– Whose authority’s
for step.
§ Snapshort
– Photograph the scene
– Note the scene
Doctor A Security
v Personal items
– Photograph the actual
evidence
v E.g. What’s on the
screen
– Open the case
carefully
– Photograph the
internal
– Document the
internals (e.g. Serial#,
cable config – IDE,
SCSI… )
§ Legal
authority?
Doctor A Security
§ Guard
against
electrostatic
discharge
hard drive
– Turn off virus
scanning software
– Record the time/date
of the CMOS
v Time zone
v Accurate
§ Make a second copy
§ Seal the original
evidence
– Electrostatic safe
– Catalog it
– Initial by everyone
touched.
§ to preserve the
entire digital crime
scene with minimal
Doctor A Security
or no modification
of data.
§ Order Of Volatility
(OOV) which implies
that collecting some
data impacts other
data.
– CDROM based tool kit
§ Backup
– MAC?
Doctor A Security
– Deleted files?
§ Live system?
§ Open source tools
§ Cryptographic
hashes
§ Shutdown vs
Poweroff
§ Copy of the copy
§ Chain of Custody
– track who had
access
Doctor A Security
§ Physical
Transport
Doctor A Security
– FBI
§ Storage
– Paper char at
460F
– Data start
disappearing
at 120F
§ disk image(s)
should be
Doctor A Security
mounted read-
only
§ Where do we
start?
Doctor A Security
§ Think like an
Intruder
§ And Let’s
start …
General
§ http://www.cybercrime.gov/
§ http://www.e-evidence.info/
Doctor A Security
§ http://www.forensix.org/
Tools
§ http://www.sleuthkit.org/
§ http://fire.dmzs.com/