Uploaded by Timothy Muscat

ForensicsCoursework

advertisement
Host-Based Forensics Assignment
Timothy Muscat
MSc. Advanced Security and Digital Forensics
Edinburgh Napier University
November 28, 2018
1
Executive Summary and Timeline
With regards to the two suspects Stephen Knox and Filipe Young (henceforth referred to as simply Knox
and Young respectively), a cursory investigation of the data on their shared machine has allowed the
formation of a solid hypothesis both with regards to the guilt of Knox and Young as well as that of the
alleged co-conspirators Christopher Guzman and Lewis Campbell (henceforth simply Guzman and
Campbell ).
No evidence has been found to support Knox’s claim that Young was the one behind the thefts. Indeed
this investigation was not able to find any evidence to suggest Young had any part in or even knowledge
of the automobile theft and resale racket of which Guzman, Campbell and Knox were initially arrested
for forming part of.
With regards to Knox, ample evidence to suggest he played an active role in the scheme has been found
on the subject machine. Although the thefts occurred in March of 2017, the suspect’s browsing history
suggests the thefts had been planned at least as far back as January of the same year, suggesting
Guzman and Campbell first made contact with Knox around this time. Communication appears to have
taken place principally through Skype and Email. No encryption was used throughout. Guzman and
Knox appear to have communicated using an idiosyncratic code language. A key to decoding this coded
language as well as a list of prospective car models to steal were found in an spreadsheet on the suspect’s
computer entitled The List.ods.
The suspect’s code language, was a simple and informal idiom whereby Knox would refer to different
makes, models and years of manufacture of cars he planned to obtain for Guzman using women’s names
and the places and times they planned to take them on dates, with the days of said dates denoting at
what stage the plan was at; whether the car had been spotted, in the process of being stolen or stolen
and delivered to one of two drop-off points. Additionally, several photographs of luxury vehicles parked
in various places around Edinburgh were found on the suspect’s drive, having secret messages coded into
them by Campbell (presumably, as the preliminary investigation concluded that he was responsible for
locating potential targets and communicating them to the person who was to commit the theft) detailing
the GPS coordinates of the vehicles and often certain information regarding the movements and habits of
their owners and the times it is likely to be parked.
1
Conclusion And Limitations
Overall, the evidence found appears to form a coherent picture of the role of Knox within Guzman and
Campbell’s theft ring as well as their modus operandi. It is clear fom the evidence gathered that Knox
played an active and integral role in the operation and was far more than a mere accomplice. On the
other hand, no evidence was found to justify the continued detention of Young.
Regarding the limitations of this investigation, our analysis was limited to the main drive of the PC and
one could not account for data that may have been stored on removable media used on the PC or
web-based communications that store no local data. While the spreadsheet found in Knox’s possession
spoke of two drop-off points for the stolen vehicles, this investigation was unable to determine where
these drop-off points may have been from the data on hand. This was however, beyond the remit of this
investigation.
Overleaf is a reconstruction of events gleaned from the suspect machine in chronological order.
Event Time
30/01/2017
13:07
Event Type
Browsing
History
30/01/2017
13:07
Browsing
History
08/02/2017
19:20
Browsing
History
22/02/2017
11:49
Skype
Logs
28/02/2017
09:18
Skype
Logs
05/03/2017
05:26
Skype
Logs
09/03/2017
20:49
Browsing
History
21:22-21:24
1
Details
Knox watches a YouTube video entitled
“how to Hot wire a car”
Knox looks for coordinates of
NCP Car Park Castle Terrace, Edinburgh.
Innocuous in and of itself, but suspicious in
the given context.
Knox researched “phone fob car jamming”;
A technology used to jam signals from car
keys to lock a car, leaving the car open and
vulnerable to theft, as well as car alarm signal
jamming.
He subsequently searches for such a device on
Amazon.
Guzman adds Knox as a contact on Skype.
Around this time he also begins researching theft laws.
Guzman first contacts Knox over Skype;
Sends a text message reading:
“Keep yourself available later this week, I’ll let you know asap,
but we might have something”
Guzman contacts Knox over Skype,
tells him he has a ”shopping list” for him.
Also advises him to download the program “QuickStego”.
Knox searches “what is quick stego” and subsequently downloads
Quickstego, a free, basic image steganography 1 software
that the group were using to hide their communications.
Knox makes a number of car related searches:
“cars in Edinburgh”, “ used cars in Edinburgh”,
“Edinburgh Expensive Cars”
“Luxury cars in Edinburgh”
Image steganography is the hiding of hidden text within image files.
2
13/03/2017
13:03
Communication
20:51
13/03/2017
20:55-58
13/03/2017
21:06
14/03/2017
14:39
15/03/2017
14:33
Email
Browsing
History
Skype
Communication
Skype
Communication
00:56
Browsing
History
17/03/2017
16:12
Skype
Communication
18/03/2017
00:24
19/03/2017
20:18
20/03/2017
02:01
Browsing
History
Skype
Communication
Browsing
History
Skype
Communication
21/03/2017
04:14
Browsing
History
18:03
Skype
Communication
Knox sends a Skype message to Guzman reading:
”Thanks for joining Faith and I for coffee at 5pm yesterday,
had a great time.
I’m thinking of going to the gym tomorrow if you want to join.”
Decoded this means:
“The Ford Focus taken from the Airport Long Stay has been delivered.”
Knox receives email on address fortknox2017@outlook.com:
“Pick up Carla from the supermarket at 6:25, take her out for dinner”
Decoded this means: There is a Citroen C2 at the Fountain Car Park.
Knox receives and downloads 5 images of different cars with hidden
messages within them as email attachments showing their GPS coords.
Knox searches Google Maps for GPS coordinates encoded in one of the
images, appears to be a white SUV outside of a clinic.
Knox sends a Skype message to Guzman reading:
“I met Vanda today after she finished work at the cafe,
thanks for suggesting that restaurant to take her to dinner at.”
Decoded this means: Volkswagen Golf Available at Fountain Car Park
Knox sends a Skype Message to Guzman reading:
“My sister Carla came over for dinner tonight when she was finished
at the gym,
hope you’re having a good day too!”
Decoded: Citroen DS3 Available at the Fountain Park Car Park
Knox begins making Google Searches about Tesla and Mercedes E-Class,
pictures of which were found on the subject’s PC with GPS coordinates.
Knox sends a Skype Message to Guzman reading:
“Remember Mary from the cafe? We went for a jog at 5pm.
It was pretty nice weather you should join us next time.”
Decoded: Mini Clubman available at Omnicenter car park
Knox makes several searches for Used car buyers.
Suggests he may have been thinking to cut Guzman and Campbell out
and sell the stolen vehicles himself.
Knox sends a Skype Message to Guzman reading:
“I think I’m going to have trouble meeting Mary from University at 6pm,
I’ll fill you in later. But I met Nigela at Lunch today at University.”
2011 Mini Cooper, Nissan 370z at Fountain Park Car Park.
Knox inputs GPS coordinates embedded in another one of the images,
a red Nissan minivan, into Google Maps.
Knox sends a Skype Message to Guzman reading:
“Ariana and I are going for lunch tomorrow,
usual place if you want to meet us.”
Decoded: Retrieving Audi from Fountain Park Car Park.
Knox inputs GPS coordinates embedded in another one of the images,
a matte black Audi, into Google Maps.
Knox sends a Skype Message to Guzman reading:
“I’m going to enjoy taking Tina out for a drink tomorrow,
she might be a challenge compared to the rest of the girls though”
Decoded: Retrieving Tesla from Airport Long Stay.
3
22/03/2017
02:01
Browsing
History
Knox inputs GPS coordinates embedded in another one of the images,
a Tesla, into Google Maps.
Embedded in this image are links to a list of charge points in Edinburgh
and an article on Tesla security precautions.
Knox makes several Google searches on how to
bypass Tesla security features.
02:15
Skype
Communication
03/04/2017
12:30
Skype
Communication
2
Knox sends a Skype Message to Guzman reading:
“Just got back from having a drink with Tina, she’s really fun!”.
Indicating the Tesla has been successfully stolen.
Campbell contacts Young on Skype requesting that he log into Knox’s
account and activate TeamViewer, ostensibly so that he may retrieve
some information that Knox has stored.
Young claims that he had not seen Knox in several days here,
most likely as Knox was already in police custody by this point.
Young consents to Campbell’s request and logs into Knox’s account,
apparently knowing the password.
He continues the conversation with Campbell on Knox’s Skype account.
He gives Campbell Knox’s TeamViewer ID and his password.
Procedure/Discussion
Procedure
• The image of the suspect’s drive was received in Expert Witness Format (EWF) and ingested into
Autopsy (v4.9 Running on Ubuntu Linux )
• The integrity of the image was first checked using the embedded md5 checksum.
• The image appeared to belong to a PC running Windows 10 Education Edition, having two user
accounts, Filipe Young and “John”. “Filipe Young” fairly obviously belonged to Young, however
“John” was in fact the name of the user account used by Knox.
• A cursory look through files on the system revealed the following files of interest:
– A number of photographs of cars appearing to have been taken in and around Edinburgh.
– A map of Tesla charge points in Edinburgh.
– A spreadsheet file The List.ods mapping makes and models of cars to female names crossed
with different locations crossed with different times of day. From later findings, this appears to
be the key to deciphering a code language.
• A keyword search using String Extraction [1] was made for the names of the two suspects, Guzman
and Campbell using Autopsy, the search revealed Skype chat logs in which the two made contact
with Knox.
• Skype chat logs are found mainly in a database file entitled main.db, with each user having one [4].
Saved in Microsoft’s proprietarySQLite format. The files were loaded into a reader revealing the
4
following exchange between Guzman and Knox, the true meaning of which was explained in the
table above. 2
Figure 1: Skype Conversation Between Guzman and Knox
• Additionally, an exchange between Campbell and Young was also found in which the former
requests the latter log into Knox’s account, where he continues the exchange. 2
Figure 2: Lewis Campbell Contacts Filipe Young and requests he log into his account
5
Figure 3: Microsoft Outlook Planner Entries on Knox’s PC
Pick up Mandy from the Cafe at 8pm, go for a cycle!
Pick up Mary from University at 6pm for Dinner
Pick up Faith from the Gym at 5pm, she fancies a coffee
Pick up Carla from the Gym at 10:30, take her for a nice walk
Pick up Carla from the Supermarket at 6:25, take her out for Dinner
2013 Mercedes E-Class
At Omni-Center Car Park
2011 Mini Cooper
at Fountain Park Car Park
2010 Ford Focus
at Airport Long stay
2015 Citroen DS3
at Omni Center Car Park
2011 Citroen C2
at Fountain Park Car Park
• From String Extraction, a Microsoft Outlook planner containing the following entries was found.
These appear to contain coded messages. A translation derived using the previously found
spreadsheet has been included alongside the original messages in the referenced table: 3
• The suspect’s browsing history was investigated using the log2timeline tool in Autopsy. The relevant
findings were included in the above timeline.
• Owing to previous findings, namely Guzman sending Knox a download link to QuickStego[3] and Knox
making a number of searches for download links for the software, the suspicion that the previously found
images may contain hidden messages was established.
• Using the QuickStego tool, the hidden messages inside each image was retrieved and laid out in the table
below next to the names of the picture in question.
• Loading the pictures into an EXIF reader revealed no metadata present, indicating that it may have been
stripped out.
The Eighth.bmp
found here
55.97882970000001,-3.228954499999986
watchout you don’t get the tires slashed
The Fifth.bmp
Up the hill, right then left from the third
again this might be too close to the others and will raise alarm if stolen
potentially follow it, it’s not there during school hours midweek
6
The Fourth.bmp
55.92723965483411,-3.2346609234809875
at the gym
this guy is actually healthy but also if you could, give me his shoes when you steal it
they are amazing. he takes them off and put thems in his car before going to the gym
oh and his ipad too
Mon, Wed, Fri 6am - 8am
Thursday 7-8pm (playing 5 a side)
The Second.bmp
55.92723965483411,-3.2346609234809875
He goes to the gym when his lazy ass can
usaully once a week on a monday morning
7am - 9am
i would say tail him as you can also get another car here
don’t want to raise alarms
The Seventh.bmp
Across from the boxing gym in T2
Only there 2pm until 11pm
Ashley Tisdale.bmp
55.96316389999999,-3.191300599999977
7
MC Hammer.bmp
55.93871253413824,-3.2250478863716125
Michael Cera.bmp
55.93871253413824,-3.2250478863716125
Muhammad Ali.bmp
55.9524108,-3.2034777000000076
Nina Nesbitt.bmp
55.9731683,-3.1726105999999845
8
Tupac Shakur.bmp
55.9310172,-3.2148125000000003
Charge points incase you need it
http://www.greenerscotland.org/greener-travel/greener-driving/charge-point-map
Tesla security precautions - you may want to look at this
http://www.techtimes.com/articles/14537/20140901/everyone-loves-tesla-motor-s-except-thieves-he
• Deleted files recovered using the Photorec [2] file carving utility within Autopsy were analyzed. Nothing of
interest to the investigation was found.
• The above findings were organised into the above timeline.
Discussion
The findings suggest the high-level of organisation of the suspects as well as the extent and ambition of
their plans. They also show the naivety of Knox and his ineptitude when it comes to operational security
in the use of computers to facilitate the commission of crime.
Notwithstanding this naivety, it would appear that Knox was involved in the planning and potential
execution of no less than 11 automobile thefts, with speculative plans for many more.
As already stated, no evidence has been found to suggest Young was in any way involved. All evidence
found was in plaintext and required no decryption. The only serious attempt at obfuscating
communication (the “code language” notwithstanding) was the use of steganography to hide messages
within the photographs of cars. The tool used was a free consumer-level tool from the QuickCrypto [3]
suite of tools and the hidden messages were not encrypted. The hiding of the messages within images
already suspicious in the given context also shows the ineptitude of the subjects. Ultimately, the methods
of communication used by the suspects all left an extensive footprint allowing the easy recovery of
communication, nor was any attempt made to delete records of communication. Overall, it is felt that
sufficient evidence has been found to build a strong criminal case against the subjects.
References
[1] Anthony Dowling. Digital forensics: A demonstration of the effectiveness of the sleuth kit and autopsy
forensic browser, pg. 83. Master’s thesis, University of Otago, Dunedin, New Zealand, 2006.
[2] Klaus Knopper. Rescuing lost files with testdisk and photorec. Linux Magazine, 2015.
[3] Ana Marculescu. Quickstego. Softpedia, 2013.
[4] Jamie McQuaid. Skype forensics: Analyzing call and chat data from computers and mobile. Magnet
Forensics, 2014.
9
Download