51
1 IT Investigative Tools Tools and Services for the Forensic Auditor

1 IT Investigative Tools Tools and Services for the Forensic Auditor

Embed Size (px)

Citation preview

Page 1: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

1

IT Investigative Tools

Tools and Services for the Forensic Auditor

Page 2: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

2

Digital Crime Scene Investigation Problems with Digital Investigation Timing essential – electronic evidence

volatile Auditor may violate rules of evidence NEVER work directly on the evidence Skills needed to recover deleted data or

encrypted data

Page 3: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

3

Digital Crime Scene Investigation Extract, process, interpret Work on the imaged data or “safe copy” Data extracted may be in binary form Process data to convert it to

understandable form Reverse-engineer to extract disk partition

information, file systems, directories, files, etc Software available for this purpose

Interpret the data – search for key words, phrases, etc.

Page 4: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

4

Digital Crime Scene Investigation Technology

Magnetic disks contain data after deletion Overwritten data may still be salvaged Memory still contains data after switch-off Swap files and temporary files store data Most OS’s perform extensive logging (so do

network routers)

Page 5: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

5

Disk Geometry

Track

Sector

Cylinder

(Clusters aregroups ofSectors)

Page 6: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

6

Slack Space

End of FileEnd of File Slack SpaceSlack Space

Last Cluster in a FileLast Cluster in a File

Page 7: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

7

Illustration of Forensic Tools

Forensic Software Tools are used for … Data imaging Data recovery Data integrity Data extraction Forensic Analysis Monitoring

Page 8: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

8

Data Imaging

EnCase

Reduces internal investigation costs Platform independent Automated analysis saves time Supports electronic records audit Creates logical evidence files — eliminating

need to capture entire hard drives

Page 9: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

9

Data Recovery

File Recovery with PC Inspector

Page 10: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

10

Data Eradication

Securely Erasing Files

Page 11: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

11

Data Integrity

MD5 Message Digest – a hashing algorithm used to

generate a checksum Available online as freeware Any changes to file will change the checksumUse: Generate MD5 of system or critical files

regularly Keep checksums in a secure place to

compare against later if integrity is questioned

Page 12: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

12

Data Integrity

MD5 Using HashCalc

Page 13: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

13

Data Integrity HandyBits EasyCrypto

Page 14: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

14

Data Integrity Private Disk

Page 15: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

15

Data Monitoring

Tracking Log Files

Page 16: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

16

Data Monitoring

PC System Log

Page 17: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

17

Security Software Log Entries

Page 18: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

18

Page 19: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

19

Free Log Tools

Page 20: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

20

Audit Command Language (ACL) ACL is the market leader in computer-

assisted audit technology and is an established forensics tool.

Clientele includes … 70 percent of the Fortune 500 companies over two-thirds of the Global 500 the Big Four public accounting firms

Page 21: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

21

Forensic Tools

Audit Command Language

ACL is a computer data extraction and analytical audit tool with audit capabilities …StatisticsDuplicates and GapsStratify and ClassifySamplingBenford Analysis

Page 22: 1 IT Investigative Tools Tools and Services for the Forensic Auditor
Page 23: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

23

Page 24: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

24

Page 25: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

25

Page 26: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

26

Page 27: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

27

Forensic Tools: ACL

Benford Analysis States that the leading digit in

some numerical series follows an exponential distribution

Applies to a wide variety of figures: financial results, electricity bills, street addresses, stock prices, population numbers, death rates, lengths of rivers

Leading Digit

Probability

1 30.1 % 2 17.6 % 3 12.5 % 4 9.7 % 5 7.9 % 6 6.7 % 7 5.8 % 8 5.1 % 9 4.6 %

Page 28: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

28

Page 29: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

29

Page 30: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

30

Page 31: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

31

Data Monitoring

Employee Internet ActivitySpector captures employee web activity

including keystrokes, email, and snapshots to answer questions like:

Which employees are spending the most time surfing web sites?

Which employees chat the most? Who is sending the most emails with

attachments? Who is arriving to work late and leaving early? What are my employees searching for on the

Internet?

Page 32: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

32

Data Monitoring : Spector

Recorded Email

Page 33: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

33

Data Monitoring : Spector

Recorded Web Surfing

Page 34: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

34

Data Monitoring : Spector

Recording Keystrokes

Page 35: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

35

Data Monitoring : Spector

Recorded Snapshots

Page 36: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

36

Page 37: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

37

Data Capture : Key Log Hardware

KeyKatcher Records chat, e-mail, internet &

more Is easier to use than parental

control software Identifies internet addresses Uses no system resources Works on all PC operating

systems Undetectable by software

www.lakeshoretechnology.com

Page 38: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

38

index.dat filesContain all of the Web sites that you have ever visited. Every URL, every Web page, all of the email that has been sent or received through Outlook or Outlook Express.On Windows 2000 and Windows XP  there are several "index.dat" files in these locations:

\Documents and Settings\<Username>\Cookies\index.dat

\Documents and Settings\<Username>\Local Settings\History\History.IE5\index.dat

\Documents and Settings\<Username>\Local Settings\History\History.IE5\MSHist012001123120020101\index.dat\Documents and Settings\<Username>\Local Settings\History\History.IE5\MSHist012002010720020114\index.dat

\Documents and Settings\<Username>\Local Internet Files\Content.IE5\index.dat

These files cannot be deleted without special software!

Page 39: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

39

Page 40: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

40

Background Checks

Page 41: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

41

Page 42: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

42

Page 43: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

43http://www.expressmetrix.com/solutions/

Page 44: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

44

Page 45: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

45

ipconfig /allipconfig /all

Page 46: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

46

ipconfig /displaydns

Page 47: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

47

netstat -a

Page 48: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

48

Page 49: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

49

Eraser

http://www.heidi.ie/eraser/

Private Disk

http://www.private-disk.net/

HashCalc

http://www.slavasoft.com/hashcalc/index.htm

PC Inspector

http://www.download.com/3000-2242-10066144.html

VeriSign

http://www.verisign.com

HandyBits Encryption

http://www.handybits.com/

EnCase

http://www.handybits.com/

Page 50: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

50

Spector

http://www.spectorsoft.com/

Stolen ID Search

https://www.stolenidsearch.com/

Abika Background Check

http://www.abika.com/

Guide to Log Management

http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf

ACFE Fraud Prevention Checkup

http://www.acfe.com/documents/Fraud_Prev_Checkup_IA.pdf

NetWitness

http://www.netwitness.com/

GASP Std V 7.0 Free Software

http://www.bsa.org/usa/antipiracy/Free-Software-Audit-Tools.cfm

Federal Guidelines for Searches

http://www.cybercrime.gov/searchmanual.htm

Page 51: 1 IT Investigative Tools Tools and Services for the Forensic Auditor

51

Florida Criminal Database

http://www.fdle.state.fl.us/CriminalHistory/

Federal Bureau of Prisons

http://www.bop.gov/