27
Blackhat Las Vegas 2003 Case 1

Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

1

Page 2: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

2

BlackHat 2003 Case Tutorial

Digital Information, User Tokens,Privacy and Forensics Investigations:

Windows XP Platform

Larry Leibrock, Ph.D.eForensics LLC

Page 3: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

3

MY SLIDES & YOUR SLIDES AREDIFFERENT

Page 4: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

4

I am an Information Technologist focusing on DigitalEvidence.

I am on the teaching faculty of the University of TexasLaw School and Business School, however,

I am not a Practicing Attorney

Page 5: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

5

Caveats and Rights of Use

• My skills, background - forensicsprofession and at trial experience

• This tutorial is not – legal advice orlegal opinion

• Who do I speak for? – me – nouniversity or governmental affiliations –in the context of this tutorial

• No warranty for fitness – express orimplied

Page 6: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

6

Caveats and Rights of Use

• No grant of license for software ortechnology that may be developed thatsupports this material

• Risk of use – are expressly yours – notmine

• Your attendance in this tutorial, from hereon, marks your agreement to theseaforementioned caveats, conditions andlimitations

Page 7: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

7

Notes for Materials

• All materials – slides and case materials anddiscussion sets are athttp://www.eforensics.com

• I will not use/discuss each slide in this set.There are numerous slides in this set.

• The slides support a notional case – We willuse the case as a discussion-leadershipvehicle to explore the intersection of

Digital Information, User Tokens, Privacyand International Forensics

Investigations

Page 8: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

8

A Protocol – for this TutorialPlease Ask Questions – whenever you need to.

• I reserve the obligation to ask you questions

• Let’s collectively feed our brains.

Page 9: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

9

My Bias

• Digital Forensics is an emerging profession.• The notion of a profession

– Body of Knowledge - Competency– Tests

• Science, Theory and Peer Review arenecessary but not sufficient to supporting thedigital forensics profession – we need acommunity of practice among forensicsprofessionals that is also tested withquestions of human rights, privacy and ethics.

Page 10: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

10

Forensics

• What does this term imply?

Page 11: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

11

Ubiquity of Digital Devices ineveryday life

• Characteristics– IT technology everywhere and embedded in everything– Global connectivity and always on– Physical world joining virtual

• cyberspace acts can affect real-world processes and viceversa

– Web pages and portals for everything• documents, people, things, places, events, processes• pages give access to files, sensors, actuators, controls

• Enablers– Business performance: more bang for buck in less space– Mobility – Knowledge work– Criminal– Non-Criminal– Proscribed Activity

Page 12: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

12

Questions

• Review certain tokens (taggants)inherent in digital forensics

• What is a token?

• What is a taggant?

• Can we derive some terms?

Page 13: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

13

Digital

• Data• Fragment• Token• Information• Findings• Evidence• Knowledge• Judgment

Page 14: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

14

Some Forensics Theory

• Science and Law Intersection?

Page 15: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

15

An exemplar - Windows XP as aforensics platform

• Some details– Organization

– Present Variant & Builds

– Installations

– Supported Computers

– Physical Media

– Partitions

– File Types

– File Hashing of known good and known suspect

Page 16: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

16

The Windows Client

• Its’ Role

• The Platform

• The Build

• File System

• Registry

• The Forensics Corpus

Page 17: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

17

Forensics Instruments

Page 18: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

18

Privacy and Our Government

Page 19: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

19

Responses

• Privacy Needs

• Shredders

• Anti-Forensics

• Encryption

• Special Methods

Page 20: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

20

The Emerging Tensions

Page 21: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

21

che_xmas-beta.zip

yourdemand.txt

Page 22: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

22

The Generalized Framework

1. Protect seized evidence2. Recover deleted files3. Discover (enumerate) files contained in seized materials

(notable text, binary, hidden & encrypted)4. Discover swap, temp/tmp, file slack meta-data and artifacts5. Explore all unallocated space6. Conduct searches for key terms, special data – imagery7. Note any observed versus expected files, folders binaries, www

data, emails and file conditions8. Prepare a written report – archive data, findings9. Provide expert consultation and testimony, as necessary

Page 23: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

23

Some prevailing frameworks forforensics investigations

• US Laws• Federal Guidelines

– DOJ – FBI– DOD– NIST

• International Organization on Computer Evidence IOCE Guidelineshttp://www.ioce.org

• Some national and EU Privacy Issues – European Commission on HumanRights – UK RIPA

• Patriot Act October 26,2001• Data Retention Policies in the Enron Context• US Sorbane-Oxley – US Corrupt Activities and RICO Statutes

• The prevailing model– Seizure, forensics (bit copy), examination, report, deposition, testimony, archiving– Data extracted from both logical and physical media (active and recovered) files, data

artifacts, swap space and file – device slack– Focus is on finding data contained in files

Page 24: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

24

Notes

________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 25: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

25

Your Questions

Page 26: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

26

My Appreciation

• Thank you for your time and interest

• My Coordinates– [email protected]

– http://www.eforensics.com– Austin, Texas (512) 656-7161– GMT Time (-5)

Page 27: Blackhat Las Vegas 2003 Case · Blackhat Las Vegas 2003 Case 22 The Generalized Framework 1. Protect seized evidence 2. Recover deleted files 3. Discover (enumerate) files contained

Blackhat Las Vegas2003 Case

27