Guide To Computer Forensics and Investigations Fifth Edition
Guide To Computer Forensics and Investigations Fifth Edition
and Investigations
Fifth Edition
Module 1
Understanding The Digital Forensics
Profession and Investigations
An Overview of Digital Forensics
• Digital forensics
– The application of computer science and
investigative procedures for a legal purpose
• involving the analysis of digital evidence after proper
search authority, chain of custody, validation with
mathematics, use of validated tools, repeatability,
reporting, and possible expert presentation.
– In October 2012, an ISO standard for digital
forensics was ratified - ISO 27037 Information
technology - Security techniques
2
An Overview of Digital Forensics
3
An Overview of Digital Forensics
4
Digital Forensics and Other Related
Disciplines
6
Digital Forensics and Other Related
Disciplines
• Vulnerability/threat assessment and risk
management
– Tests and verifies the integrity of stand-along workstations
and network servers
• Network intrusion detection and incident response
– Detects intruder attacks by using automated tools and
monitoring network firewall logs
• Digital investigations
– Manages investigations and conducts forensics analysis of
systems suspected of containing evidence
7
A Brief History of Digital Forensics
8
Understanding Case Law
9
Developing Digital Forensics
Resources
10
Preparing for Digital Investigations
• Digital
investigations
fall into two
categories:
– Public-sector
investigations
– Private-sector
investigations
11
Preparing for Digital Investigations
13
Following Legal Processes
15
Understanding Private-Sector
Investigations
16
Understanding Private-Sector
Investigations
17
Understanding Private-Sector
Investigations
19
Understanding Private-Sector
Investigations
20
Understanding Private-Sector
Investigations
21
Maintaining Professional Conduct
24
An Overview of a Company Policy
Violation
25
Taking a Systematic Approach
26
Taking a Systematic Approach
27
Assessing the Case
28
Planning Your Investigation
29
Planning Your Investigation
30
Planning Your Investigation
31
Planning Your Investigation
32
Planning Your Investigation
33
Securing Your Evidence
35
Procedures for Private-Sector High-
Tech Investigations
36
Employee Termination Cases
37
Internet Abuse Investigations
38
Internet Abuse Investigations
• Recommended steps
– Use standard forensic analysis techniques and
procedures
– Use appropriate tools to extract all Web page URL
information
– Contact the network firewall administrator and
request a proxy server log
– Compare the data recovered from forensic analysis
to the proxy server log
– Continue analyzing the computer’s disk drive data
39
E-mail Abuse Investigations
40
E-mail Abuse Investigations
• Recommended steps
– Use the standard forensic analysis techniques
– Obtain an electronic copy of the suspect’s and
victim’s e-mail folder or data
– For Web-based e-mail investigations, use tools such
as FTK’s Internet Keyword Search option to extract
all related e-mail address information
– Examine header data of all messages of interest to
the investigation
41
Attorney-Client Privilege Investigations
42
Attorney-Client Privilege Investigations
44
Attorney-Client Privilege Investigations
45
Industrial Espionage Investigations
46
Industrial Espionage Investigations
• Guidelines when initiating an investigation
– Determine whether this investigation involves a
possible industrial espionage incident
– Consult with corporate attorneys and upper
management
– Determine what information is needed to
substantiate the allegation
– Generate a list of keywords for disk forensics and
sniffer monitoring
– List and collect resources for the investigation
47
Industrial Espionage Investigations
• Guidelines (cont’d)
– Determine goal and scope of the investigation
– Initiate investigation after approval from management
• Planning considerations
– Examine all e-mail of suspected employees
– Search Internet newsgroups or message boards
– Initiate physical surveillance
– Examine facility physical access logs for sensitive
areas
48
Industrial Espionage Investigations
49
Industrial Espionage Investigations
• Steps (cont’d)
– Place surveillance systems at key locations
– Discreetly gather any additional evidence
– Collect all log data from networks and e-mail servers
– Report regularly to management and corporate
attorneys
– Review the investigation’s scope with management
and corporate attorneys
50
Understanding Data Recovery
Workstations and Software
• Investigations are conducted on a computer
forensics lab (or data-recovery lab)
– In data recovery, the customer or your company just
wants the data back
• Computer forensics workstation
– A specially configured PC
– Loaded with additional bays and forensics software
• To avoid altering the evidence use:
– Write-blockers devices
• Enable you to boot to Windows without writing data to
the evidence drive
51
Setting Up Your Workstation for Digital
Forensics
• Basic requirements
– A workstation running Windows XP or later
– A write-blocker device
– Digital forensics acquisition tool
– Digital forensics analysis tool
– Target drive to receive the source or suspect disk
data
– Spare PATA or SATA ports
– USB ports
52
Setting Up your Workstation for Digital
Forensics
53
Conducting an Investigation
• Gather resources identified in investigation plan
• Items needed
– Original storage media
– Evidence custody form
– Evidence container for the storage media
– Bit-stream imaging tool
– Forensic workstation to copy and examine your
evidence
– Securable evidence locker, cabinet, or safe
54
Understanding Bit-Stream Copies
• Bit-stream copy
– Bit-by-bit copy of the original storage medium
– Exact copy of the original disk
– Different from a simple backup copy
• Backup software only copy known files
• Backup software cannot copy deleted files, e-mail
messages or recover file fragments
• Bit-stream image
– File containing the bit-stream copy of all data on a disk
or partition
– Also known as “image” or “image file”
55
Understanding Bit-stream Copies
56
Acquiring an Image of Evidence Media
• First rule of computer forensics
– Preserve the original evidence
• Conduct your analysis only on a copy of the data
• Several vendors provide MS-DOS, Linux, and
Windows acquisition tools
– Windows tools require a write-blocking device when
acquiring data from FAT or NTFS file systems
57
Using ProDiscover Basic to Acquire a
USB Drive
58
Using ProDiscover Basic to Acquire a
USB Drive
59
Using ProDiscover Basic to Acquire a
USB Drive
• Steps (cont’d)
– Click the >> button next to the Destination text box
– Type your name in the Technician Name text box
– ProDiscover Basic then acquires an image of the
USB thumb drive
– Click OK in the completion message box
60
Using ProDiscover Basic to Acquire a
USB Drive
61
Analyzing Your Digital Evidence
62
Analyzing Your Digital Evidence
63
Analyzing Your Digital Evidence
64
Analyzing Your Digital Evidence
65
Analyzing Your Digital Evidence
66
Analyzing Your Digital Evidence
67
Analyzing Your Digital Evidence
68
Analyzing Your Digital Evidence
69
Completing the Case
• You need to produce a final report
– State what you did and what you found
• Include ProDiscover report to document your work
• Repeatable findings
– Repeat the steps and produce the same result
• If required, use a report template
• Report should show conclusive evidence
– Suspect did or did not commit a crime or violate a
company policy
70
Completing the Case
• Keep a written journal of everything you do
– Your notes can be used in court
• Answer the six Ws:
– Who, what, when, where, why, and how
• You must also explain computer and network
processes
71
Critiquing the Case
72
Critiquing the Case
73
Summary
74
Summary
• Always use a systematic approach to your
investigations
• Always plan a case taking into account the nature of
the case, case requirements, and gathering evidence
techniques
• Both criminal cases and corporate-policy violations
can go to court
• Plan for contingencies for any problems you might
encounter
• Keep track of the chain of custody of your evidence
75
Summary
• Internet abuse investigations require examining
server log data
• For attorney-client privilege cases, all written
communication should remain confidential
• A bit-stream copy is a bit-by-bit duplicate of the
original disk
• Always maintain a journal to keep notes on exactly
what you did
• You should always critique your own work
76