Preserving and recovering digital evidence

7,585 views

Published on

Click Here

http://www.eacademy4u.com/

Online Educational Website For You

Published in: Education, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
7,585
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Preserving and recovering digital evidence

  1. 1. Preserving And Recovering Digital Evidence
  2. 2. Introduction• Digital Evidence – encompasses any and all digital data that can establish that a crime has been committed or can provide a link between a crime and its victim or a crime and its perpetrator.• This presentation will explore collection, preservation and identification of digital evidence.
  3. 3. Overview• Introduction to Intrusion Detection Systems• The rules and guidelines surrounding the gathering and use of digital evidence.• Digital evidence on the target machine.• Digital evidence on the network.
  4. 4. Intrusion Detection• A brief overview Intrusion detection systems collect information from a variety of system and network sources, then analyze the information for signs of intrusion and misuse.
  5. 5. Intrusion Detection:• Intrusion Detection – 2 Types• Host-Based• Network-Based
  6. 6. Intrusion Detection – Host-Based • Host-based intrusion detection systems .The system is used to analyze data that originates on computers (hosts). • Examines events like what files are accessed and what applications were executed. - Logs are used to gather this data • Resides on every system and usually reports to a central command console. • Uses signatures or predefined patterns that have been defined as suspicious by the security officer.
  7. 7. Intrusion Detection – Host-Based - cont• Used primarily for detecting insider attacks. - For example an employee who abuses their privileges, or students changing their grades.• Audit policy - Defines which end-user actions will result in an event record being written to an event log. For example accesses of mission-critical files.
  8. 8. Intrusion Detection – Network-BasedNetwork-Based• The system is used to analyze network packets.• Used to detect access attempts and denial of service attempts originating outside the network.• Consists of sensors deployed throughout a network.• Sensors then report to a central command console
  9. 9. Intrusion Detection – Network- Based• Uses packet content signatures - Based on the contents of packets. - Patterns are detected in the headers and flow of traffic.• Encryption prevents detection of any patterns.
  10. 10. Digital Evidence vs. Physical Evidence• It can be duplicated exactly and a copy can be examined as if it were the original. - Examining a copy will avoid the risk of damaging the original.• With the right tools it is very easy to determine if digital evidence has been modified or tampered with by comparing it with the original.
  11. 11. Digital Evidence vs. Physical Evidence• It is relatively difficult to destroy.• Even if it is “deleted,” digital evidence can be recovered.• When criminals attempt to destroy digital evidence, copies can remain in places they were not aware of.
  12. 12. Collecting and Preserving Digital Evidence• The focus of digital evidence is on the contents of the computer as opposed to hardware.• Two kinds of copies: - Copy everything. - Just copy the information needed.• When there is plenty of time and uncertainty about what is being sought, but a computer is suspected to contain key evidence, it makes sense to copy the entire contents.
  13. 13. Collecting and Preserving Digital Evidence• When collecting the entire contents of a• computer, the general concept is the same• in most situations:
  14. 14. Collecting and Preserving Digital Evidence• All related evidence should be taken out of RAM.• The computer should be shut down.• Document the hardware configuration of the system.• Document the time and date of the CMOS.• The computer should be booted using another operating system that bypasses the existing one and does not change data on the hard drive(s).• A copy of the digital evidence from the hard• drive(s) should be made.
  15. 15. Collecting and Preserving Digital Evidence• When collecting the entire contents of a computer, a bit stream copy of the digital evidence is usually desirable.• In short, a bit stream copy copies what is in slack space and unallocated space, whereas a regular copy does not.
  16. 16. Agenda for Duplication and Preservation of Evidence • Make bit stream back-ups of hard disks and floppy disks cont. Tools to accomplish this: • Encase • DD • Byte back • Safeback Note the tool used • When making the bit stream image, note and • document how the image was created. Also note the date, time, and the examiner.
  17. 17. Empirical Law• Empirical Law of Digital Collection and Preservation:• If you only make one copy of digital evidence, that evidence will be damaged or completely lost.
  18. 18. Computer Image Verification• At least two copies are taken of the evidential computer.• One of these is sealed in the presence of the computer owner and then placed in secure storage.• This is the master copy and it will only be opened for examination under instruction from the Court in the event of a challenge to the evidence presented after forensic analysis on the second copy.
  19. 19. The important to locate and recover all graphics files on a drive and determine which ones are pertinent to your case.. • Because these files aren’t always stored in standard graphics file formats, we should examine all files our computer forensics tools find, even if they aren’t identified as graphics files. • A graphic file contains a header with instructions for displaying the image. • Each type of graphics file has its own header that helps to identify the file format. • Because the header is complex and difficult to remember, we can compare a known good file header with that of a suspect file.
  20. 20. Collecting and Preserving Digital Evidence• Collecting evidence out of RAM on a Unix machine is not a simple task.• The ‘ps’ command is used to list programs that a machine is running but one must specify that one wants to see all the processes.• “ps –aux”
  21. 21. Collecting and Preserving Digital Evidence• Some types of Unix allow one to save and view the contents of RAM that is associated with a particular program using the “gcore” program.• There are also programs that provide a list of files and sockets that a particular program is running – “lsof”• Investigators can use the “dd” command to make a bit stream backup
  22. 22. Collecting and Preserving Digital Evidence• Whenever digital evidence is copied onto a floppy disk, compact disk, tape or any other form of storage media, an indelible felt-tipped pen should be used to label it with the following information:
  23. 23. Collecting and Preserving Digital Evidence• Current date and time and the date/time on the computer (any discrepancy should be noted).• The initials of the person who made the copy.• The name of the operating system.• The program(s) and/or command(s) used to copy the files. - Retain copies of software used.• The information believed to be contained in the files.
  24. 24. Collecting and Preserving Digital Evidence• Since the evidence has been collected, it is important to ensure the integrity of the evidence.
  25. 25. How To Handle Digital EvidenceSteps to guide the responder in handling theDigital evidence at an electronic crime scene.3. Recognize, identify, seize, and secure all digital evidence at the scene.4. Document the entire scene and the specific location of the evidence found.5. Collect, label, and preserve the digital evidence.6. Package and transport digital evidence in a secure manner.
  26. 26. The Primary Steps to Conduct a Forensic Investigation. Step 1: Isolate the System and Data• Collect information by interviewing all system administrators and anyone else who might have come into contact with the system.
  27. 27. The Primary Steps to Conduct a Forensic Investigation.Step 2: Collect Non-TechnicalInformation• The purpose of this step is to ensure that the required minimum information is recorded in paper note form, such as developing a timeline of events. The premise here is to start a log book using a fresh pad of paper to gather information from the system administration staff and any other persons involved.
  28. 28. The Primary Steps to Conduct a Forensic Investigation.Step 3: Preserve Evidence andCreate Copies for Analysis• Memory and /proc.• Create a duplicate of the system.• Validate copies.
  29. 29. The Primary Steps to Conduct a Forensic Investigation.Step 4: Prepare for an Analysis• At this point, the information collected in the preceding steps is ready for inspection.• The following steps can also be performed by a third party or at another physical location.
  30. 30. The Primary Steps to Conduct a Forensic Investigation.Step 5: Perform the Analysis• The purpose of the analysis step is to determine whether a compromise has occurred, what exactly was damaged, and to obtain any evidence indicating who the culprit(s) might be, as well as the methods they used to attack the system.• Tools are needed to complete the analysis phase.
  31. 31. The Primary Steps to Conduct a Forensic Investigation.Step 6: Perform Recovery• The recovery efforts that ensue after the forensic analysis is a standard process that should be defined in your organization
  32. 32. The Primary Steps to Conduct a Forensic Investigation.How to acquire data from removable media?
  33. 33. How to acquire data from removable media? 1.Document the scene Use static-proof container and label container with a.Type of media b.Where media was found c.Type of reader required for the media 2.Transport directly to lab 3.Do not leave any media in a hot vehicle or environment 4.Store media in a secure and organized area 5.Once at the lab, make a working copy of the drive a.Make sure the media is write-protected b.Make a hash of the original drive and the duplicate c.Make a copy of the duplicate to work from d.Store the original media in a secure location

×