Forensic Computer Analysis ISMT350 Overview Why do we care? Forensic Science Overview Process and Tools Evidence on Networks Advanced Analysis Errors & Uncertainty Why do we Care? Determine what happened Determine extent of damage Inform other universities of problems Prevention & preparation for future Mitigate risk & liability If necessary, apprehend & prosecute = Forensic Science Overview Improper Evidence Handling Why we need to avoid… Open to unfair dismissal claims Vulnerable to false accusations Privacy violation leads to counter suit Information leakage leads to larger problem Unresolved incidents create problems Researcher accused of hacking Larger problem goes unrecognized Develop poor evidence handling skills Forensic Science Overview Science applied to the discovery of truth Locard’s exchange principle whenever two objects come in contact with each other, they transfer material from one to the other. The Locard exchange produces the trace evidence of interest from fingerprints to mud Authorization Locate / identify evidence Collection, documentation & preservation everything that you will need in two years Crime reconstruction (forensic analysis) when, where, how, what, who, why reproducible & free from bias/distortion Report / present Continuity of Offense (COO) Seek sources, conduits, and targets Connect the dots Corroborating evidence Multiple independent sources Kiosk NT DC Router Proxy Hotmail NetFlow Access logs Authentication logs Victim’s mail server/PC Pornography: Transmission Pivotal Case Study The theory behind child pornography laws in the U S traditionally has been that such material is illegal not because of the content of the material itself, but because of the harm the production and distribution of such material causes children who are used to create the child pornography. U S versus Hilton, invalidated part of the Child Pornography Prevention Act of 1996, 18 USC Section 2252A. Hilton claimed to have been collecting child pornography for research purposes: Met with an FBI agent and U S Customs officials on a number of occasions since 1995 to discuss curbing child pornography on the Internet. Quoted in articles warning parents of the dangers of allowing their children to surf the 'Net unsupervised. Police uncovered evidence that “made us question his motivation." A case of police prosecuting people trying to help cure the Child Pornography problem? Pornography: Transmission How to investigate a “US v. Hilton” Modem logs Dial-up server logs Confirms connection and account used MAC times and Registry (LastWrite) Shows PC was connected to Internet File modification, creation, and access times FTP logs On PC: file name, time, remote directory On server: file name, size, time, account, IP Relational Reconstruction Improve understanding of events Locate additional sources of evidence Example: Accounting server break-in Log File Correlation Sort each source independently, then combine Correlate MAC times and LastWrite times of Registry keys with Eventlogs, PC modem & ISP logs 05-15-2000 16:32:53.93 - Initializing modem. 05-15-2000 16:32:53.93 - Send: AT 05-15-2000 16:32:53.93 - Recv: AT 05-15-2000 16:32:54.05 - Recv: OK 05-15-2000 16:32:54.05 - Interpreted response: Ok 05-15-2000 16:32:54.05 - Send: AT&FE0V1&C1&D2 S0=0 W1 05-15-2000 16:32:54.07 - Recv: AT&FE0V1&C1&D2 S0=0 W1 05-15-2000 16:32:54.19 - Recv: OK 05-15-2000 16:32:54.19 - Interpreted response: Ok 05-15-2000 16:32:54.20 - Send: ATS7=60S40=0L1M1\N7%C1&K3B0N1X3 05-15-2000 16:32:54.22 - Recv: OK 05-15-2000 16:32:54.22 - Interpreted response: Ok 05-15-2000 16:32:54.26 - Dialing. 05-15-2000 16:32:54.26 - Send: ATDT########## Time Pattern Analysis Mon Tues Wed Thurs Fri Sat Sun 8am 9am 10am x 11am x 12pm 1pm 2pm 3pm 4pm 5pm x 6pm 7pm x = event x x x x Histograms Histogram of events over time High number of events at key times Histogram of time periods may show unusual gaps MAC times System log entries EnCase Timeline (patterns) Search Methodology Identify the crime scene Area 1: Local Nodes Area 2: Wireless devices Mobile equipment 802.11b Area 3: Wireless networks PDA’s Laptops Core systems (BSC, MSC, SMS) Area 4: Remote networks Routers, switches, cables Remote nodes Authorization Example Floppy found in desk drawer Collected by IT staff No authorization Process not documented Not clear who found disk Disk not labeled Not clear if search was legal Not clear which disk among several disks Hot potato – drop it! High risk of counter suit Chain of Custody Who collected & handled the evidence Fewer people handling the evidence => Fewer people testify Standard forms & procedures => Consistency Collection & Preservation Acquire evidence Documentation EABD versus removing hard drive save evidence on sterilized media calculate MD5 checksum of evidence digitally sign evidence (MD5, time & person) acquisition & verification process who, where, how, when, and sometimes why Lock original in safe alternately use a custodian Message Digests 128-bit “fingerprint” Two messages with same digest 16 hexadecimal values Computationally infeasible Search disk for file with same MD5 md5sum netstat.exe => 447282012156d360a862b30c7dd2cf3d What to Collect? The original disk An exact copy of the original disk Log files from the disk (e.g. UNIX wtmp) Interpreted logs (output of last) Relevant portions of interpreted logs Information lost in summarization Output of last username May miss some relevant entries Written notes describing command output The approach depends on the circumstances Remote Collection Document collection process (log to file) May alert the suspect Stepping in evidence Forgotten evidence Planning and procedures Jurisdiction Same as at console May be only means - foreign countries May cause an international incident Evidence only available remotely (SNMP) To shutdown or not to shutdown Network state Processes in memory (MB/GB) Kernel memory Swap space Lose cached data not yet written to disk Lose data protected by EFS/PGP disk Corrupt existing data Limitations of Live Exam? Hasty Stepping in evidence alternate data streams Can’t see deleted data automation minimizes changes not 100% (overwrite user.dmp) Might miss something prone to error automation helps avoid errors anyone have a floppy diskette? Can’t trust operating system Challenge Concealment Deleted binary Log deletion or wiping wzap clears wtmp entries Altering file attributes Hidden files/Alternate Data Streams Copy in /proc/pid/file icat /dev/hda inode > recovered hfind.exe (Foundstone) Device files in Recycle Bin Rootkits/Loadable Kernel Modules (Knark) Encryption The Coroner’s Toolkit grave-robber output coroner.log proc with MD5 of output command_out with MD5 of output body - mactime database removed_but_running conf_vault trust MD5_all MD5_all.md5 Case Example W2K Domain Controller Hacked Unusual port Messy examination Cleanup fails! Initial Assessment Routine Network Vulnerability Scan Physical Assessment Located in locked closet Initial Examination BO2K on port 1177 of W2K DC All security patches applied NT Security Event logging enabled fport: c:\winnt\system32\wlogin.exe System cannot be shutdown Central to operation of network Network Assessment Accessible from the Internet No dial-up access Many services enabled file sharing Internet Information Server FTP (anonymous FTP disabled) IIS fully patched Assess and Preserve Toolkit of known good executables Check for keystroke grabber / sniffer No fakegina or klogger Yes sniffer (system32\packet.sys) MAC times to locate other files Save output to external/remote disk Note md5 values of output Installed IRC bot in C:\WINNT\Java No obvious access of sensitive information Could have obtained passwords via lsass Could have access to other machines Logs No unusual logons in Security Event Logs IIS logs from before security patch installation Shows compromise via Web server AntiVirus messages in Application Event Logs 1/19/2002,1:09:11 AM,1,0,5,Norton AntiVirus,N/A, CONTROL, Virus Found!Virus name: BO2K.Trojan Variant in File: C:\WINNT\Java\w.exe by: Scheduled scan. Action: Clean failed : Quarantine succeeded : Virus Found!Virus name: BO2K.Trojan Variant in File: C:\WINNT\system32\wlogin.exe by: Scheduled scan. Action: Clean failed : Quarantine failed : 1/19/2002,1:09:11 AM,4,0,2,Norton AntiVirus,N/A, CONTROL, Scan Complete: Viruses:2 Infected:2 Scanned:62093 Files/Folders/Drives Omitted:89 Leads IP addresses from Web server logs IRC bot files eggdrop bot files contained information about servers, nicknames, channels, and channel passwords that could be used to gather additional information Remediation Change passwords and examine other hosts HKLM\System\CurrentControlSent\Services Machine fails to reboot Extended downtime MAC times incomplete C:\WINNT\System32\wlogin.exe C:\subdir Wlogin is zeroed out Accidental by examiner Intentional by Norton/intruder? No binary to analyze Lessons Learned Intrusion prior to patching Lastwrite time of wlogin Registry key Do not assume that system was secure Missed opportunity Attempt to recover piecemeal Don’t make matters worse than intruder Make a plan and make a backup plan Forensic Analysis Overview Locate, recover, and interpret evidence Low level analysis vs interpreted data Timeline – when Relational reconstruction – where Functional reconstruction – how Synthesis – what, why crime reconstruction risk assessment motive and intent Data may not be trustworthy seek corroborating data on network Analysis Process Access evidentiary images & backups File inventory with hash values, etc. Recover deleted data (files, folders, etc.) Recover slack and unallocated space Exclude known/unnecessary files Remove duplicates Process/decrypt/decompress files swap and hibernation files Index text data File Systems General creation process Allocation table and folder entries created Time stamps set Track written Slack space Perhaps artefacts generated MS Word file menu Registry entries Windows: FAT12, FAT16, FAT32, NTFS Unix: UFS, ext2, ext3 Macintosh: HFS Plus FAT NTFS MFT records overwritten quickly Index entries are overwritten quickly Reference handbook How quickly are blocks reused Timestamp in MFT Record in table only modified when name is changed Sourceforge for more information http://sourceforge.net/projects/linux-ntfs/ Unix MacOS (HFS Plus) Catalog file Time formats Balance tree File threads GMT v local No access time http://developer.apple.com/technotes/tn/tn1150.html Linux – A Forensic Platform # dd if=/dev/fd0 | md5sum 2880+0 records in 2880+0 records out 5f4ed28dce5232fb36c22435df5ac867 # dd if=/dev/fd0 of=floppy.image bs=512 # md5sum floppy.image 5f4ed28dce5232fb36c22435df5ac867 floppy.image # mount -t vfat -o ro,noexec,loop floppy.image /mnt # find /mnt -type f -exec sha1sum {} \; 86082e288fea4a0f5c5ed3c7c40b3e7947afec11 /mnt/Marks.xls 81e62f9f73633e85b91e7064655b0ed190228108 /mnt/Computer.xml 0950fb83dd03714d0c15622fa4c5efe719869e48 /mnt/Law.doc # grep -aibf searchlist floppy.image 75441:you and your entire business ransom. 75500:I want you to deposit $50,000 in the account 75767:Don't try anything, and dont contact the cops. The Coroner’s Toolkit ils -A /dev/hda1 (free inodes) ils –o /dev/hda1 (removed open files) icat /dev/hda1 inode pcat pid mactime -R -d / 12/13/2001-12/14/2001 mactime -d /export/home 10/30/2001 grave-robber -d . -E / Perl is a requirement Log File Correlation Use the time range from wtmp logs # last user pts/3 66-65-113-65.nyc Sat Oct 20 19:45 - 01:08 (05:23) # mactime -b body -l "Sat Oct 20 19:45 - 01:08 (05:23)" Oct 21 01 01:32:30 75428 .a. -r-xr-xr-x root bin /usr/bin/ftp Computer Forensics Software AccessData Forensic Toolkit® (FTK™) The most popular of email forensic software tools View over 270 different file formats with Stellent's Outside In Viewer Technology. Generate audit logs and case reports. Compatible with the Password Recovery ToolkitTM and Distributed Network Attack®. Full text indexing powered by dtSearch® yields instant text search results. Advance searches for JPEG images and Internet text. Locate binary patterns using Live Search. Automatically recover deleted files and partitions. Target key files quickly by creating custom file filters. Supported File & Acquisition Formats File formats include: NTFS, NTFS compressed, FAT 12/16/32, and Linux ext2 & ext3. Image formats include: Encase, SMART, Snapback, Safeback (up to but not including v.3), and Linux DD. Email & Zip File Analysis Supports: Outlook, Outlook Express, AOL, Netscape, Yahoo, Earthlink, Eudora, Hotmail, and MSN email. View, search, print, and export email messages and attachments. Recover deleted and partially deleted email. Automatically extract data from PKZIP, WinZip, WinRAR, GZIP, and TAR compressed files. Known File Filter™ (KFF™) Identify and flag standard operating system and program files. Identify and flag known child pornography and other potential evidence files Includes hash datasets from NIST and Hashkeeper Registry Viewer™ Access and decrypt protected storage data View independent registry files Report generation Integrates with AccessData's forensic Tools Email Forensics How FTK is used … Email is one of the most common ways people communicate Studies have shown that more email is generated every day than phone conversations and paper documents combined Forensic Analysis of email clients and servers has been in the spotlight of civil and criminal cases worldwide and no examination of Document Discovery is complete without requesting, searching and organizing email Email Forensics Identification and Extraction The first step in an email examination is to identify the sources of email and how the email servers and clients are used in an organization More than just a way of sending messages email clients and servers have expanded into full databases, document repositories, contact managers, time mangers, colanders and many other applications E.g., Microsoft Exchange customized to be used as a complete Customer Relationship Manager (CRM) Lotus Notes and Domino Server are used beyond an email system Many users store their personal calendars, contacts and even synchronize their email clients with their Personal Digital Assistants (PDA) Organizations use database enabled email and messaging servers to manage cases, track clients and share data Computer forensics should start their collection of evidence with email Email Forensics Deleted Email Many user believe that once they delete email from their client that the mail is unrecoverable Nothing could be farther from the truth, many times emails can forensically extracted even after deletion Many users also do not grasp the concept that email has a sender AND a recipient or multiple recipients Emails may reside on servers unbeknown to the user, or on backup tapes that were created during the normal course of business Of course they may also be extracted from the hard disk of the client or the server. Forensic programs are able to recover deleted email, calendars and more from users email clients and email servers. Email Forensics Web Mail or Web Based Email It is completely possible to forensically recover email that was created or received by web based email systems and from free web based email services such as Hotmail, Gmail (Google Mail) and Yahoo Mail These types of mail systems use a browser to interface with the email server, the browser inherently caches information to the disk drive in the system used to retrieve or generate the email thereby effectively saving a copy to the disk Forensic examiners can extract the HTML based Email from disk drive of the system used to create or retrieve the email messages Many Web Based or Web mail services, including Yahoo and Hotmail have shared calendaring services, personal calendars and contact managers as email. Anytime these services are accessed they may be cached to the disk as well. Email Forensics Correlating Email Messages New evidence is essentially created by Correlating emails by date, subject, recipient or sender These yield a map of inferences, events and entities And open up opportunities for more complex pattern analysis Forensic software is especially important in providing these correlations EnCase Forensic (Guidance Software) EnCase Forensic is the most popular software for computer forensic investigation A single tool, capable of conducting large-scale and complex investigations from beginning to end: Acquires data in a forensically sound manner using software with an unparalleled record in courts worldwide. Investigate and analyze multiple platforms — Windows, Linux, AIX, OS X, Solaris and more — using a single tool. Automates complex and routine tasks with prebuilt EnScript® modules, such as Initialized Case and Event Log analysis. Find information despite efforts to hide, cloak or delete. Easily manage large volumes of computer evidence, viewing all relevant files, including "deleted" files, file slack and unallocated space. Transfer evidence files directly to law enforcement or legal representatives as necessary. Review options allow non-investigators, such as attorneys, to review evidence with ease. Reporting options enable quick report preparation. EnCase Functions The EnCase Forensic GUI. EnCase Forensic "Conditions" permit users to create complex, multifaceted filters, using EnScript® programming language. EnCase Forensic The block size and error granularity settings interface EnCase Forensic Logical Evidence Files "Single Files" allows an examiner to drag and drop particular files of interest into EnCase for analysis "Logical Evidence Files" can be created and locked from "Single Files," as well as from specific files of interest from an EnCase preview of subject media. TASK Case Screen TASK Host Screen TASK Host Manager Screen TASK Analysis Screen FTK E-mail Extraction SMART Main Screen SMART Case View PDA Seizure Password Recovery Toolkit PRTK: Combinations & permutations Import FTK keyword list Missed obvious combinations DNA 40-bit Encryption Windows 2000 EFS (export) MS Word / Excel Evidence on Networks Associating Online Activity with Logs Server logs E-mail server logs Web server logs Internet activity -> data Internet activity Logs Active PPP Dial-up TACACS/RADIUS Terminal Server Router/Firewall Syslog/Netflow show conns Host logon wtmp/NT Eventlog utmp/nbtstat -c Web server access/error netstat -an E-mail server messages/syslog spool FTP server xferlog netstat -an IRC server/bot logs netstat -an Wireless device logs device query Case Example Harassment Complaint Complaint Unauthorized e-mail access Suspect pool Process accounting Bash history Harassment (janesmith) Make sure logs are consistent mailserver# grep 'Login user=janesmith' syslog* syslog:Sep 24 17:11:40 mailserver ipop3d[6466]: [ID 234311 mail.info] Login user=janesmith host=johnsmith.nasa.gov [192.168.135.156] What to look for next? Harassment (continued) wtmp logs indicate that her e-mail account was accessed from server4.nasa.gov on Dec 9 at 13:14 emailserver# last janesmith janesmith pts/114 server4.nasa.gov Sun Dec 9 13:14 - 13:19 (00:05) MAC times show that the .pinerc file was created on Dec 9 suggesting that this was the first time Pine was used to access e-mail in this account. Harassment (continued) wtmp logs on server4.nasa.gov show that seven people were logged in on Dec 9 at 13:14 Note: clock on server4.nasa.gov was 4 minutes fast server4% last walterp pts/14 roosevelt.nasa.g Sun Dec 9 13:10 - 13:17 (00:07) johnsmith pts/2 pc01.admin.nasa. Sun Dec 9 13:09 - 13:29 (00:10) stephens pts/13 lincoln.nasa.com Sun Dec 9 13:01 - 16:16 (03:15) hansmol pts/3 homepc.isp.com Fri Dec 7 14:14 - 10:53 (6+20:38) ianjones pts/7 nasavpn-22.nasa. Fri Dec 7 08:39 - 01:23 (5+16:44) Harassment (continued) RADIUS logs show suspect disconnected prior to offense 192.168.1.219,NASA\ianjones,12/07/2002,08:43:07,IAS,NTSE RVER,5,7029,6,2,7,1,8,192.168.16.22,25,311 1 192.168.1.45 10/08/2001 19:38:34 22348,40,1,44,E0D03B6B,66,64.252.248.134,45,1,41,0,61, 5,4108,192.168.1.219,4116,0,4128,NASA VPN,4136,4,4142,0 192.168.1.219,NASA\ianjones,12/07/2002,09:27:12,IAS,NTSE RVER,5,7029,6,2,7,1,8,192.168.16.22,25,311 1 192.168.1.45 10/08/2001 19:38:34 22348,40,2,42,36793575,43,6837793,44,E0D03B6B,46,356 19,47,417258,48,59388,49,1,66,64.252.248.134,45,1,41,0,6 1,5,4108,192.168.1.219,4116,0,4128,NASA VPN,4136,4,4142,0 Harassment (continued) However, server4.nasa.gov kept process accounting logs and an examination of these logs show only one SSH connection at the time in question. This indicates that another account (johnsmith) was used to connect to the complainants e-mail account. server4% lastcomm | grep ssh ssh S timsteel ?? ssh S johnsmith ?? ssh S richevans ?? 0.11 secs Sun Dec 9 10:24 0.02 secs Sun Dec 9 13:10 0.03 secs Sun Dec 9 12:10 Harassment (continued) Confirmed using bash history server4# grep janesmith /home/johnsmith/.bash_history ssh -l janesmith mailserver.ispX.com Network Traffic Historical data Performance monitoring NetFlow & Argus IDS (may include full packet capture) Traffic capture Temporal considerations Preservation Reconstruction and analysis Tools Dsniff, NetWitness, Sandstorm, Nixsun, SilentRunner Many for Unix (e.g., ngrep, review) Performance Monitoring Shows patterns on a device Spikes in traffic Loss of connectivity to a segment Multi Router Traffic Grapher (MRTG) www.mrtg.org Netflow and Snort Overview NetFlow flows represent unidirectional collection of similar packets NetFlow logs contain basic flow information (src, dst, times, size) Snort based on libpcap detects known attacks highly configurable Using Snort and NetFlow Host logs may be overwritten Intrusion Detection System shows partial picture [**] FTP-site-exec [**] 02/23-04:51:38.012306 192.168.164.88:2721 -> 192.168.168.2:21 TCP TTL:46 TOS:0x0 ID:20194 IpLen:20 DgmLen:468 DF ***AP*** Seq: 0x11A6920B Ack: 0xD567116C Win: 0x3EBC TCP Options (3) => NOP NOP TS: 98258650 1405239787 NetFlow logs show more complete picture Start DstP End P Fl Pkts Sif SrcIPaddress Octets 0223.04:51:38.841 0223.04:51:48.685 2 192.168.168.2 21 6 2 3 144 SrcP DIf DstIPaddress 192.168.164.88 2721 13 Netflow Losses Sequence numbers show gaps % flow-header < ft-v05.2002-04-15.183000-0400 # mode: normal # capture hostname: flow # exporter IP address: 130.132.1.100 # capture start: Mon Apr 15 18:30:00 2002 # capture end: Mon Apr 15 18:45:00 2002 # capture period: 900 seconds # compress: on # byte order: big # stream version: 3 # export version: 5 # lost flows: 179520 # corrupt packets: 0 # sequencer resets: 1 # capture flows: 206760 Traffic Monitoring/Capture tcpdump (68 bytes default capture) Ethereal Authorization Wiretap ECPA Live Capture Protecting systems Stored communications & records Maintenance and protect users USA Patriot Act libpcap losses High speed links overload sniffers Protocol type 11 (honeynet) Applies to all libpcap based sniffers snort, tcpdump, NetWitness # tcpdump -X host 192.168.12.5 tcpdump: listening on xl0 .....[data displayed on screen]… ^C 29451 packets received by filter 4227 packets dropped by kernel Switches Isolates traffic CatOS Switched Port Analyzer (SPAN) Spanning/Mirroring ports Sniffing is more difficult Only copies valid Ethernet packets Not all error information duplicated Low priority of span may increase losses http://www.cisco.com/warp/public/473/41.html Hardware taps Copy signals without removing layers May split Tx and Rx (reassembly required) NIC Losses Applies to all NICs (firewalls, switches, etc.) % netstat -nid Kernel Interface table Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg eth0 1500 0 19877416 0 0 128 7327647 0 0 0 BRU % /sbin/ifconfig eth0 Link encap:Ethernet HWaddr 00:B0:D0:F3:CB:B5 inet addr:128.36.232.10 Bcast:128.36.232.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:19877480 errors:0 dropped:0 overruns:128 frame:0 TX packets:7327676 errors:0 dropped:0 overruns:0 carrier:1 collisions:442837 txqueuelen:100 Interrupt:23 Base address:0xec80 Case Example Intellectual Property Theft (rootkit) Intellectual Property IDS logs show intrusion [**] FTP-site-exec [**] 09/14-12:27: 208.181.151.231 -> 130.132.x.y 09/14-12:28: 24.11.120.215 -> 130.132.x.y 09/14-12:33: 64.28.102.2 -> 130.132.x.y Concern: system contains sensitive data IP Theft (assess damage) Initial examination of compromised host showed no signs of compromise no wtmp entries from site exec exploit no syslog entries no odd processes using ps or files using ls System clock was 5 hours fast (Δt = 5hrs) Oddities on system suggested compromise difference between ps & lsof; /tmp/.tmp/ IP Theft (analysis) Used EnCase to analyze evidence Recovered deleted syslogs (noting Δt) Sep 14 17:07:22 host ftpd[617]: FTP session closed Sep 15 00:21:54 host ftpd[622]: ANONYMOUS FTP LOGIN FROM 231.efinityonline.com [208.181.151.231], • 1À1Û1É°FÍ 1À1ÛC‰ÙA°?Í ëk^1À1É ^^AˆF^D f¹ÿ^A°'Í€ 1À• ^^A°=Í 1À1Û ^^H‰C^B1ÉþÉ1À ^^H°^LÍ þÉuó1ÀˆF^I ^^H °=Í€ þ^N°0þȈF^D1ÀˆF^G‰v^H‰F^L‰ó• N^H• V^L°^KÍ€ 1À1Û°^AÍ€ è• ÿÿÿ0bin0sh1..11 Sep 14 17:22:54 host inetd[448]: pid 622: exit status 1 Linux in EnCase IP Theft (reconstruction) Confirmed source of initial intrusion Determined that target was high risk Determined motive and intent not aware of sensitive information on host used host for DoS, scanning, and IRC Determined that a sniffer had been used Located other compromised systems notified system owners on outside networks Advanced Analysis Timestamp Oddities Moved file in Windows Corrupt timestamps Last write time before creation time Windows folder and .lnk MacOS Some logs are in order of the end of the event Process accounting CISCO NetFlow Artefacts of File Transfer File transferred to external media MS Word Metadata Program’s file menu (registry key LastWrite) Shortcut (.lnk) files MS Word, Powerpoint, Excel, etc. WinZip, WinAmp Explorer (e.g., RecentDocs, RunMRU) Internet Explorer (history, cache, TypedURLs) Recent\Desktop (time ordered CAM) Recycler May be in unallocated space/swap/hibernation Recent Lnk to External Disk Network Artefacts Downloaded files Interactive connections Unix directory listing on Windows PC Web, e-mail, Usenet, IRC, etc. IIS Transactions Telnet Lastmachine (registry) Secure CRT .ini Secure Shell pagefile.sys Mapped network drives NetHood (profile, MFT, registry, unallocated) Internet Accounts HKEY_USERS Key Name: SID\Software\Microsoft\Internet Account Manager\Accounts\00000004 Class Name: <NO CLASS> Last Write Time: 7/5/2002 - 4:33 AM Downloaded Files Tape Archive (.tar) Mapped Network Drive Explorer (\\name\drive) StreamMRU, RunMRU, RecentDocs Scattered User.dmp, swap, unallocated space Grep expression: \\\\[A-Z]+\\[A-Z]+ Unix Mounted Drives df, mount, samba /etc/fstab: /dev/hda1 / ext2 defaults 11 /dev/hda7 /tmp ext2 defaults 12 /dev/hda5 /usr ext2 defaults 12 /dev/hda6 /var ext2 defaults 12 /dev/hda8 swap swap defaults 00 /dev/fd0 /mnt/floppy ext2 user,noauto 00 /dev/hdc /mnt/cdrom iso9660 user,noauto,ro 00 none /dev/pts devpts gid=5,mode=620 0 0 none /proc proc defaults 00 remote-server:/home/accts /home/accts nfs bg,hard,intr,rsize=8192,wsize=8192 remote-server:/var/spool/mail /var/spool/mail nfs bg,hard,intr,noac,rsize=8192,wsize=8192 Remote Logs and Printing *.* /etc/syslog.conf @remote-server /etc/printcap: lp0|lp:\ :sd=/var/spool/lpd/lp0:\ :mx#0:\ :sh:\ :rm=remote-server:\ :rp=lp0:\ :if=/var/spool/lpd/lp0/filter: Network Artefacts (Telnet) Telnet registry File Transfer Protocol On PC: file name, time, remote directory On server: file name, size, time, account, IP xferlog: Nov 12 19:53:23 1998 15 216.58.30.131 780800 /home/user/image.jpg a _ o r user WS_FTP: 98.11.12 19:53 A C:\download\image.jpg <-- FTP Server /home/user image.jpg Linux ncftp (.ncftp/trace; .ncftp/history) SESSION STARTED at: Sun Oct 21 01:05:44 2001 Program Version: NcFTP 3.0.0/220 February 19 1999, 05:20 PM <cut for brevity> 01:05:44 Connecting to 129.132.7.170... 01:05:52 > get openssl-0.9.6.tar.gz SESSION ENDED at: Sun Oct 21 01:06:50 2001 Network Artefacts (Unix ls) Grep search [d\-][rwx\-][rwx\-][rwx\-][rwx\-][rwx\-][rwx\-][rwx\][rwx\-][rwx\-] (space) More Unix/Mac Artefacts SSH authorized_keys (incoming) known_hosts (outgoing) .xauth/refcount/xfs/hostname Unix xterm buffers show sessions Transactions of various servers Windows remnants on Unix Directory files e.g., C:\winnt\system32\*.exe Case Example Intellectual Property Theft (Insider) Initial Complaint Employee stole information prior to leaving Unknown documents from workstation clients.mdb Client contact database Stored on W2K workstation projectX Terminated on Sept 16, 2002 Secret project details Stored on Unix file server What do you look for? W2K Workstation Security (card swipe) records Suspect entered building at 08:45am Logon/Logoff record C:\>ntlast /ad 16/9/2002 /v Record Number: 18298 ComputerName: WKSTN11 EventID: 528 - Successful Logon Logon: Tue Sep 16 08:50:58am 2002 Logoff: Tue Sep 16 09:10:00am 2002 Details ClientName: user11 ClientID: (0x0,0xDCF9) ClientMachine: WKSTN11 ClientDomain: CORPX LogonType: Interactive How to collect this information as evidence? W2K Workstation Transfer of clients.mdb HKEY_USERS Created at 08:59:14 Last modified at 08:58:49 Suspect’s e-mail outbox \Windows\CurrentVersion\Explorer\RecentDocs Suspect’s environment temp\clients.xls Accessed 09/16/2002 08:58:30 EST Shows clients.xls sent to Hotmail What information would you seek on network? W2K Workstation Other file accessed at same time Registry OpenSaveMRU entry Recent .lnk written and accessed private.doc Recent A: .lnk written and accessed What would you expect to find on associated floppy diskette? Unix File Server SSH Client Access Accessed: \user11\Application Data\Microsoft\Internet Explorer\Quick Launch\Shortcut to SshClient.lnk Files in \user11\Application Data\SSH\ \user11\Application Data\SSH\ HostKeys\key_22_srv1 How to collect evidence? % last user11 user11 pts/77 wkstn11.corpx.com Sep 16 09:05 - 09:06 (00:01) % ls –altu -rwxr-xr-x 1 admin staff 8529583 Sep 16 09:05 projectX ProjectX file found in c:\temp on wkstn11 What timestamps changed in transfer? W2K Workstation Deleted projectX file found in c:\temp Explorer\RecentDocs\NetHood Created: 09:05am Accessed: 09:07am Modified: 09/12/2002 10:07:07am \\competitorpc\upload LastWrite 09/13/2002 11:04AM Explain time discrepancy Errors & Uncertainty Nothing can be known if nothing has happened; and yet, while still awaiting the discovery of the criminal, while yet only on the way to the locality of the crime, one comes unconsciously to formulate a theory doubtless not quite void of foundation but having only a superficial connection with the reality; you heave already heard a similar story, perhaps you have formerly seen an analogous case… Gross, H., Criminal Investigation: (Sweet & Maxwell, Ltd. 1924) Errors and Uncertainty Offender/victim covering behavior Preconceived theories Accepting others’ assumptions Technological limitations Mistakes and misinterpretation Evidence dynamics Handbook - Chapter 1 Uncertainty and loss Casey, E: “Error, Uncertainty and Loss in Digital Evidence”, International Journal of Digital Evidence, Volume 1, Issue 2, 2002 (www.ijde.org) Evidence Eliminator Evidence Eliminator v5.053 started work: 3/4/01 9:26:04 PM OS Detected: Win95 [Win95 4.0.1111.1024] Eliminating Folder: C:\WINDOWS\applog\ No folder found: C:\WINDOWS\applog\ Eliminating IE Typed URL History... Data Found: String data: [url1-C:\My Documents\] Eliminating IE Typed AutoComplete data... Eliminating IE Download Folder record... Eliminating IE Error Logs... Eliminating File: C:\WINDOWS\IE4 Error Log.txt No file found: C:\WINDOWS\IE4 Error Log.txt Eliminating Folder: C:\WINDOWS\Local Settings\Temporary Internet Files\ Eliminating folder tree: C:\WINDOWS\Local Settings\Temporary Internet Files\ including root folder... Lily Pad Examples SubSeven with IRC File sharing Denial of service Unix intrusion Bypass firewall Attack from within Remote Storage Compromised host Shell/Web account Online services www.freedrive.com www.filesanywhere.com Mounted network shares Sniffers that log to remote shares Home directory on remote server Intruder Concealment Deleted binary Log deletion or wiping wzap clears wtmp entries Altering file attributes Hidden files/Alternate Data Streams Copy in /proc/pid/file icat /dev/hda inode > recovered hfind.exe Device files in Recycle Bin Rootkits/Loadable Kernel Modules (Knark) Encryption Altering File Attributes Attrib Alter MAC times touch in Unix ls -altc Microsoft SetFileTime() API Hide from search tools dir /t[:a] afind.exe (FoundStone) Alternate Data Streams c:\temp> lads LADS - Freeware version 3.01 (C) Copyright 1998-2002 Frank Heyne Software (http://www.heysoft.de) Scanning directory C:\temp\ size ---------17 17 17 ADS in file --------------------------------C:\temp\myfile.txt:hidden C:\temp\myfile.txt:onetwothree C:\temp\myfile.txt:test 51 bytes found in 3 alternate data streams Maresware: copy_ads C:\>d:\marsware\copy_ads -p c:\ -d d:\evidence\ads Program started Wed Sep 25 13:58:09 2002 GMT, 09:58 EST (-5*) FILES: DIRECTORY C:\hidden\makeads:hidden2.txt 32 09/25/2002 09:43w EST C:\hidden\makeads:hidden2.txt ==> d:\evidence\ads\makeads\makeads[hidden2.txt] C:\hidden\makeads\regularfile.txt 25 09/25/2002 09:19:19w EST C:\research\makeads\regularfile.txt ==> d:\evidence\ads\makeads\regularfile.txt C:\research\makeads\regularfile.txt:hidden1.txt 17 09/25/2002 09:19:19w EST C:\research\makeads\regularfile.txt:hidden1.txt ==> d:\evidence\ads\makeads\regularfile.txt[hidden1.txt] Processed 16 directories, 118 files, totaling 7,703,785 bytes: Found 1 directories with 1 alternate data streams. Found 1 files with 1 alternate data streams. Total 2 data streams byte count = 49 bytes Rootkits Creates backdoors Replace system components to hide: files processes promiscuous mode network connections Often includes tools Sniffers Log wiping utilities Patches