ForensicsFinalProject

advertisement
10101010110010101010101010101
01010100101011010101010100101
01001010010101010101010101010
10101010101010101010101010101
Forensics Final Project
00100010101101010110101010101
ISYS 590R, Team B
00101010010011111001010000011
11101010101010010101010101010
10101000101011011000101011010
10111000101010101100001010010
11000011010100010001110101000
10101010101010101010101000101
01010101100010101010101010101
01010101010110000101010101011
11001001010101010101010010001
01010100100101101100001010101
01010101000101010011011001001
3/31/2008
Craig Marshall, Casey Jackman
Forensics Final Project
Contents
General Approach ......................................................................................................................................... 3
Investigative Strategy................................................................................................................................ 3
Procedures ................................................................................................................................................ 3
Forensics Tools Used ................................................................................................................................. 3
AccessData FTK ..................................................................................................................................... 3
Live View ............................................................................................................................................... 4
VM Ware Server .................................................................................................................................... 4
Google Maps/Street View ..................................................................................................................... 5
WhitePages.com ................................................................................................................................... 5
Password Recovery Tool Kit (PRTK) ...................................................................................................... 5
Cain and Able (Password Cracking) ....................................................................................................... 6
Motobit.com AIF Decoder..................................................................................................................... 6
Most Interesting Findings ............................................................................................................................. 6
Audit Report .............................................................................................................................................. 6
Phone Directory ........................................................................................................................................ 7
Email Information ..................................................................................................................................... 8
AIF Decode .............................................................................................................................................. 10
Excerpt from Monthly Technology Newsletter....................................................................................... 11
Timeline....................................................................................................................................................... 12
Timeline Event Table ............................................................................................................................... 13
Timeline Diagram .................................................................................................................................... 15
Difficulty in Investigative procedures ......................................................................................................... 16
Drive Profile ................................................................................................................................................ 16
User Profile ................................................................................................................................................. 18
Company Profile.......................................................................................................................................... 18
General Approach
Investigative Strategy
The investigation was initially divided into four categories of inquiry. First, general disk information was
explored to provide context for the investigation. Second, it was important to identify the user(s) of the
disk and gather as much information as possible from Operating System Accounts. Third, to establish
nature of the data written and read on the disk, all programs and applications installed on the drive
were located. Fourth, using information from the previous areas the actual document and files were
reviewed searching for relevant data. Finally, all relevant information from the four areas of inquiry was
compiled into a standard timeline of events.
Procedures
Due to the general nature of the search, we began the investigation using the DataAccess Forensic Tool
Kit looking for general disk information such as Operating System, drive size, timestamps and areas of
interest (PWL files, etc). After acquiring general information, individual files and directories were
searched for relevant data about the case. The drive was then copied and loaded into a virtual machine,
for further hands-on investigation. We the assistance of the virtual machine, applications were opened
to view recent documents, current and archived emails and messenger information. This data was
categorized in relevant and non relevant information to build a timeline and extract interesting findings.
Forensics Tools Used
Many Tools were used for various parts of the investigation. The following tools provided assistance in
extracting relevant information.
AccessData FTK
AccessData Forensics tool kit was our primary source of information for the investigation. This
application was used to create our case, organize important files into evidence, and through search
through document on the drive. FTK provides a powerful filter engine to allowing users to query key
words and file types. It was especially helpful in viewing document file in older formats.
Liveview
Liveview is an open source program designed to convert disk images into virtual machines that can be
opened using VMware server. It can operate without making any changes to the disk image itself.
VMWare Server
We used VMware server to run our virtual machine created in Liveview. This was especially helpful in
interpreting the OS configurations and data that needed specialized programs to open them.
The following are screen shots of the Windows 95 login and a live desktop view.
Google Maps/Street View
Upon discovering the work address the drive was originally located; Google Maps was used to identify
the location the work office. This tool provided an exact location of the Utah Community Credit Union
branch were the Computer was once in operation.
WhitePages.com
It was discovered that many users had credentials on the recovered drive. WhitePages.com was used to
attempt to find more information about said users including phone numbers, spouses and home
addresses.
Password Recovery Tool Kit (PRTK)
We used PRTK to try and crack the windows passwords of the users on the system. However we were
unsuccessful because of time constraints.
Cain and Able (Password Cracking)
Cain and able is a password cracking program by Oxid. It is what we used to try and crack the windows
user passwords.
Motobit.com AIF Decoder
An AIF file is an encrypted file used to store exported outlook express configurations and passwords.
Motobit offers an online decoder written in asp. It is quick and easy to use.
Most Interesting Findings
Audit Report
A sample from the Audit Report emailed to Carol Goldsberry
PROCESSOR
OFFICER
ACCT #
NAME
AUGUST 2000 AUDIT REPORT
BLC
BLC
1112929.:
JACOB
GUARANTY AGREEMENT NOT
WITNESSED
NO RENT OR MORTGAGE INDICATED
KRP
KRP
1099277.:
CURTIS
3 BOXES ON NOTE NOT CHECKED
CGL
NMR
1070718.:
ROBINSON
ITEMIZATION OF THE AMOUNT
FINANCED
NOT COMPLETE
CGL
DED
1068374.:
CHRISTIAN
GUARANTY AGREEMENT NOT
WITNESSED
INCOME NOT VERIFIED ON CRI
NO RENT OR MORTGAGE INDICATED
CGL
NMR
476375.:
HANSEN
3 BOXES ON NOTE NOT CHECKED
NOTE NOT WITNESSED
APK
APK
1108478.:
PITTS
ITEMIZATION OF THE AMOUNT
FINANCED
NOT COMPLETE
GUARANTY AGREEMENT NOT
WITNESSED
INCOME NOT VERIFIED ON CRI
APK
APK
1091768.:
OSAKI
NOTE NOT WITNESSED
BRB
SHH
1117526.:
CARLISLE
NOTE NOT WITNESSED
GUARANTY AGREEMENT NOT
WITNESSED
BRB
MSB
344201.:
CHRISTOPHERSN
3 BOXES ON NOTE NOT CHECKED
NO RENT OR MORTGAGE INDICATED
LWB
SHH
1115882.:
MILLER
NOTE NOT WITNESSED
KEM
SHH
1114668.:
SEAMONS
NOTE NOT WITNESSED
Phone Directory
A sample of Phone Directory discovered from UCCU intranet.
Email Information
With the drive loaded into a virtual machine, user account information was easily viewed in the Outlook
Express. This provided detailed information about SMTP server information and POP3 server
information. Outlook Express files were also copied and loaded onto a windows XP Outlook Express
client for eased viewing.
AIF Decode
This table represent Carol Goldsberry’s Outlook Express account configuration. This data includes ports
and servers used to send and receive mail.
Excerpt from Monthly Technology Newsletter
The following email was discovered in Carol Goldsberry’s Outlook Express inbox. The letter is notice of a
New Authorization System. Sensitive Data is shared regarding authentication credentials for DataSafe.
Subject: New Authorization System
On Monday, October 2, the credit union will begin using a new authorization system within DataSafe.
What will this mean to you? When accessing DataSafe (aka USERS or SmartTerm) you will be prompted
for your Teller Number and Password. Once logged into DataSafe, you will only be prompted for a
password when an override is needed for a transaction.
Why are we making the change? Actually, we used this "New" authorization system several years ago
for a short time. First, it provides better security and control. Second, it is a requirement for the new
Lending Navigator program that we will begin using on October 2.
If you haven't already taken the opportunity to test the new system, we urge you to do so before
October 2. You can access it by enter BYUALT at the USERNAME prompt when logging into DataSafe.
Enter TEMP0 (TEMP "zero") as the password. Your Teller number remains the same and your password
is your last name. This is a test directory, so feel free to enter as many transactions as you would like to
ensure that it will work for you when we go live. Report any problems to James Hill (ext. 462).
Timeline
A timeline was created by gathering data about the drive coupled with automatic timestamps and/or
self documented dates. The timeline is constructed with information from 6/27/1996 (the first write
data discovered on the drive) to 2/10/2003 (when the computer was shut down for the last time).
Significant events found from application installations, users’ data, company data, and general drive
information were selected to build the timeline.
Timeline Event Table
The following table contains dates coupled with relevant events discovered on the disk.
Date
Event
6/27/1996
Creation date of First file on disk: various OLE streams
7/7/1997
Windows Install: Conclusion based on the creation dates of core OS
files
12/24/1997 Strange cartoon of naked woman is created on drive
10/14/1998 Novell installed
1/6/1999
Softstuff screen saver installed
5/17/1999
Pervasive SQL installed
12/14/1999 JAMESH account created- James Hill (Systems Admin)
12/14/1999 Nada Car guide installed
12/20/1999 SHARONC account created. Sharon Child (Title Clerk)
3/21/2000
CAROLG account created. Carol Goldsberry (Construction Loans)
4/12/2000
MICHELLE account created
4/25/2000
DAVEP account created- Dave Purdon (Network Admin)
8/4/2000
UCCU starts new email System
8/4/2000
Carol begins using Outlook Express
9/14/2000
Year 2000 audit report is received in an email
10/2/2000
UCCU begins new Authorization System
10/18/2000 Jim and Alise Wise Christmas letter/email received
10/23/2000 Account created. Karen Peterson (Construction Loans)
12/8/2000
UCCU has their Christmas party at Aspen Grove
12/18/2000 Date of last sent email
12/21/2000 Brian L. Goldsberry Christmas letter/email received
1/12/2001
Date of last email received
1/31/2001
Date of last email in Outbox
3/19/2001
Carol Golderberry accesses CNN.com
2/20/2001
Carol Golderberry accesses insideUCC.com
3/21/2001
Carol Golderberry logs in for last time
3/21/2001
Email is last accessed
2/10/2003
ADMIN account created
2/10/2003
Computer shutdown for last time
Timeline Diagram
Difficulty in Investigative procedures
Because much of the data from Utah Community Credit Union is stored on network drives, we were
unable to access some documents.
Can’t find f:\apps\wincar\userdata\nadauser.mdb invalid path or network server down
Also, due to time constraints, we were unable to crack passwords for some Windows 95 User accounts.
This was not detrimental to our investigation because we were able to discover an administrator
account username and password.
Drive Profile
The following profile was created with information on the drive image.
OPERATION SYSTEM: Windows 95
ADMIN USERNAME : admin
ADMIN PASSWORD : admin
DRIVE SIZE: 1.5GB
FIRST KNOWN OPERATION D ATE : 6/27/1996
LAST KNOWN OPERATION DATE : 2/10/2003
SIGNIFICANT APPLICATION INSTALLATIONS: Pervasive SQL, Nada Car Guide, Novell Client, Outlook Express
USED USER ACCOUNTS : UCCU, JDW, DENZILD, JOSEPHW, JOEW, CAROLG, CONNIEH, ETC
[Password Lists]
UCCU=C:\WINDOWS\UCCU.PWL
JDW=C:\WINDOWS\JDW.PWL
DENZILD=C:\WINDOWS\DENZILD.PWL
JOSEPHW=C:\WINDOWS\JOSEPHW.PWL
JOEW=C:\WINDOWS\JOEW.PWL
CAROLG=C:\WINDOWS\CAROLG.PWL
CONNIEH=C:\WINDOWS\CONNIEH.PWL
LAROSEH=C:\WINDOWS\LAROSEH.PWL
SAUNDRAG=C:\WINDOWS\SAUNDRAG.PWL
JAMESH=C:\WINDOWS\JAMESH.PWL
SHARONC=C:\WINDOWS\SHARONC.PWL
MICHELLEM=C:\WINDOWS\MICHELLE.PWL
DAVEP=C:\WINDOWS\DAVEP.PWL
KARENP=C:\WINDOWS\KARENP.PWL
User Profile
The following profile was created with data from Windows Accounts, sent and received emails, user
documents and drive information.
FULL NAME: Carol Goldsberry
POSITION: Construction Loan Specialist
USERNAME : carolg
EMAIL PASSWORD: carolg
EMAIL ADDRESS : carolg@uccu.com
WORK PHONE NUMBER: (801) 223 7625
Company Profile
The following profile was created with data from Windows Accounts, sent and received emails, user
documents and drive information.
COMPANY NAME: Utah Community Credit Union
COMPANY BRANCH : River Woods
BRANCH PHONE NUMBER: (801) 223 7656
COMPANY DESCRIPTION: Credit Union providing financial services and information
BRANCH ADDRESS : 188 W. River Park Drive Provo, UT 84603
Download