Cyber Forensics Cyber Forensics: The Fascinating World of Digital Evidence
Cyber Forensics Cyber Forensics: The Fascinating World of Digital Evidence
Cyber Forensics
The Fascinating World of Digital
Evidence
1
5/8/2024
Communities
There at least 3 distinct communities
within Digital Forensics
Law Enforcement
Military
Business & Industry
Possibly a 4th – Academia
4
2
5/8/2024
Cyber Forensics
• Includes:
• Networks (Network Forensics)
• Small Scale Digital Devices
• Storage Media (Computer forensics)
• Code Analysis
3
5/8/2024
Cyber Forensics
The scientific examination and analysis of
digital evidence in such a way that the
information can be used as evidence in a
court of law.
4
5/8/2024
The 3 As
The basic methodology consists of the 3 As:
Acquire the evidence without altering or
damaging the original
Authenticate the image
Analyze the data without modifying it
Crime Scenes
10
5
5/8/2024
11
Forensic Principles
Digital/ Electronic evidence is extremely volatile!
Once the evidence is contaminated it cannot be de-
contaminated!
The courts acceptance is based on the best evidence
principle
• With computer data, printouts or other output readable by sight,
and bit stream copies adhere to this principle.
Chain of Custody is crucial
12
6
5/8/2024
Process/Phases
Identification
Collection
Bag & Tag
Preservation
Examination
Analysis
Presentation/Report
14
7
5/8/2024
Identification
The first step is identifying evidence and
potential containers of evidence
More difficult than it sounds
Small scale devices
Non-traditional storage media
Multiple possible crime scenes
15
8
5/8/2024
Challenges
• Limited resources: Small-scale devices often have limited
processing power, memory, and storage capacity, making
forensic acquisition and analysis more challenging.
• Proprietary systems: Many small-scale devices run on
proprietary operating systems or firmware, which may require
specialized tools and techniques for forensic analysis.
• Connectivity issues: Some devices may have intermittent or
limited connectivity, requiring forensic examiners to consider
offline analysis methods.
9
5/8/2024
Challenges
• Data dispersion: Non-traditional storage solutions often
distribute data across multiple servers or locations, making
forensic acquisition and analysis more complex.
• Data volatility: Cloud storage and virtual environments may
exhibit data volatility, with data being dynamically allocated and
de-allocated, posing challenges for evidence preservation.
• Legal and jurisdictional issues: Data stored in the cloud may
be subject to different legal jurisdictions, raising questions about
jurisdictional authority and legal admissibility.
Considerations
• Legal considerations: Forensic examiners must be aware of
legal and regulatory requirements governing the acquisition and
analysis of data stored in non-traditional media, such as privacy
laws and data protection regulations.
• Access controls: Investigators may encounter access controls
and encryption mechanisms when accessing data in cloud
storage or virtual environments, requiring appropriate
authorization and decryption capabilities.
• Data integrity: Techniques for verifying the integrity of data
stored in non-traditional media, such as cryptographic hashes and
digital signatures, should be employed to ensure the reliability of
forensic findings.
10
5/8/2024
11
5/8/2024
Challenges
• Complexity: Investigating multiple crime scenes introduces
complexity due to the interconnected nature of digital systems
and the potential spread of evidence across diverse locations.
• Coordination: Coordinating investigations across multiple
crime scenes requires effective communication and
collaboration among forensic teams, law enforcement agencies,
and other stakeholders.
• Data synchronization: Ensuring the synchronization of data
and timelines across multiple crime scenes is crucial for
reconstructing events and establishing causality in digital
investigations.
Considerations
• Prioritization: Investigators must prioritize crime scenes based
on the severity of the incident, the potential impact on critical
systems or data, and the availability of resources.
• Legal jurisdiction: Consideration of legal jurisdiction and
jurisdictional boundaries is essential when investigating multiple
crime scenes across different geographic locations or
jurisdictions.
• Evidence correlation: Correlating evidence collected from
multiple crime scenes, such as log files, timestamps, and network
traffic, is necessary to reconstruct the sequence of events and
identify potential suspects or motives.
12
5/8/2024
Strategies
• Parallel investigations: Conducting parallel investigations allows
forensic teams to focus on individual crime scenes while
maintaining communication and sharing relevant findings in real-
time.
• Centralized command: Establishing a centralized command
center or digital forensics lab can facilitate coordination, resource
allocation, and information sharing among investigative teams.
• Cross-disciplinary collaboration: Collaboration with experts in
related fields, such as network security, data analytics, and legal
counsel, can provide valuable insights and expertise for complex
multi-scene investigations.
Identification
26
13
5/8/2024
Devices Identification
27
Collection
Care must be taken to minimize contamination
Collect or seize the system(s)
Create forensic image
Live or Static?
Do you own the system?
What does your policy say?
28
14
5/8/2024
29
Collection: Documentation
30
15
5/8/2024
Collection: Documentation
• Take detailed photos and notes of the computer / monitor
• If the computer is “on”, take photos of what is displayed on the monitor – DO
NOT ALTER THE SCENE
31
Collection: Documentation
Make sure to take photos and notes of all connections
to the computer/other devices
32
16
5/8/2024
Collection: Imaging
• Rule of Thumb: make 2 copies and don’t work from the
original (as much as possible)
• A file copy does not recover all data areas of the device for
examination
• Working from a duplicate image
• Preserves the original evidence
• Prevents unintentional alteration of original evidence during
examination
• Allows recreation of the duplicate image if necessary
33
Collection: Imaging
•Digital evidence can be duplicated with no degradation
from copy to copy
• This is not the case with most other forms of evidence
34
17
5/8/2024
35
18
5/8/2024
Collection: Imaging
Write blockers
Software
Hardware
37
Write blockers
• Write blockers are hardware or software
devices used in digital forensics to prevent
data alteration on storage devices during the
process of evidence acquisition.
• They ensure that the original data on the
storage device remains unchanged, preserving
its integrity for forensic analysis.
19
5/8/2024
Functionality
• Write blockers intercept write commands from
the forensic examiner's computer to the
storage device, allowing read operations while
blocking write operations.
• They act as a transparent intermediary
between the storage device and the forensic
tool, ensuring that no data is written to the
device during the forensic process.
Purpose
• Prevents contamination: By blocking write access to
the storage device, write blockers prevent accidental or
intentional alteration of data, preserving the integrity of
the original evidence.
• Admissibility in court: The use of write blockers
ensures that the forensic examiner can demonstrate the
integrity of the evidence, increasing its admissibility in
legal proceedings.
• Protects against malware: Write blockers help mitigate
the risk of malware infection or tampering with the
storage device during forensic analysis.
20
5/8/2024
Considerations
• Compatibility: Write blockers must be compatible with a
wide range of storage devices, including hard drives, solid-
state drives (SSDs), USB drives, and memory cards.
• Validation: Forensic examiners should validate the
effectiveness of write blockers through testing and
verification to ensure they function as intended and do not
introduce any unintended artifacts.
• Chain of custody: Write blockers play a crucial role in
maintaining the chain of custody by ensuring that the
original evidence remains intact and unaltered throughout
the forensic process.
21
5/8/2024
Collection: Imaging
Forensic Copies (Bitstream)
Bit for Bit copying captures all the data on the copied media including
hidden and residual data (e.g., slack space, swap, residue, unused
space, deleted files etc.)
Often the “smoking gun” is found in the residual data.
Imaging from a disk (drive) to a file is becoming the norm
Multiple cases stored on same media
No risk of data leakage from underlying media
Remember avoid working for original
Use a write blocker even when examining a copy!
43
Smoking Gun
• Definite: A smoking gun provides clear and undeniable
evidence that supports the investigator's hypothesis or
conclusion without ambiguity.
• Decisive: It has a significant impact on the investigation,
often leading to breakthroughs, confessions, or
convictions.
• Contextual: The significance of a smoking gun may
depend on the context of the investigation and the
relevance of the evidence to the case.
22
5/8/2024
23
5/8/2024
24
5/8/2024
Examination
Higher level look at the file system representation of the
data on the media
Verify integrity of image
• MD5, SHA1 etc.
Recover deleted files & folders
Determine keyword list
• What are you searching for
Determine time lines
• What is the time zone setting of the suspect system
• What time frame is of importance
• Graphical representation is very useful 50
25
5/8/2024
Examination
Examine directory tree Search for relevant
• What looks out of place evidence types
51
Issues
lack of certification for tools
Lack of standards
lack of certification for professionals
lack of understanding by Judiciary
lack of curriculum accreditation
Rapid changes in technology!
Immature Scientific Discipline
52
26
5/8/2024
27
5/8/2024
Network forensics
Network forensics
28
5/8/2024
Network forensics
Network forensics
29
5/8/2024
Network forensics
Network forensics
• Investigating cyber-attacks:
• Network forensics can be used to investigate cyber-attacks,
including phishing attacks, DDoS attacks, and ransomware
attacks.
• By analyzing network traffic, investigators can identify the
source of the attack, the methods used by the attacker, and the
extent of the damage caused.
30
5/8/2024
• Tap wired network traffic: To capture network traffic using a tap, you
would typically use a network sniffer such as Wireshark.
• To capture traffic, you would select the interface that is connected to the
tap and then start the capture.
• To capture wired network traffic, you can use a packet capture tool such
as tcpdump or Wireshark. Here is an example command to capture
wired traffic using tcpdump.
• But first we need to find out the ethernet interface name, which you can
get by running ifconfig. In our case it is eth0.
• Command: Sudo tcpdump -i eth0 –w capture.pcap
• -i is a switch for the interface where you can provide either ethernet or
wireless. - w is a switch for writing the packet capture to a file, which, in
our case it capture.pcap.
31
5/8/2024
• Firewall logs: To view firewall logs natively, you would typically access
the device’s management interface and navigate to the log settings.
From there, you can typically view the logs in real-time or export them to
a file.
• To view firewall logs, you can use the firewall’s management interface or
command line interface.
• Here is an example command to view firewall logs on a Palo Alto
Networks firewall.
• For example, on a Cisco ASA firewall, you could use the following
commands to view the logs:
• Command: show log traffic
32
5/8/2024
• To view proxy server logs natively, you would typically access the device’s management interface and
navigate to the log settings.
• From there, you can typically view the logs in real-time or export them to a file.
• For example, on a Squid proxy server, you could use the following command to view the access log:
• The logs list the client IP address, the username (if authentication is enabled), the date and time of the
request, the HTTP method and URL, the response status code, the size of the response in bytes, and
any additional information such as the reason for a denied request.
• IDS/IPS logs: To view IDS/IPS logs natively, you would typically access the device’s
management interface and navigate to the log settings.
• From there, you can typically view the logs in real-time or export them to a file.
• For example, on a Snort IDS, you could use the following command to view the alert
log:
• In the above example, the log entry contains the following information:
• Timestamp: 05/05-2023:16:45:28.789983
33
5/8/2024
• Priority: 1
• Protocol: TCP
• This log entry indicates that Snort has detected a known malicious stratum
authentication line associated with a CoinMiner Trojan on a host with IP address
192.168.1.100, attempting to communicate with an external IP address 12.34.56.78
on port 3333.
Memory forensics
34
5/8/2024
• Go to the terminal of the host environment and make sure you have
Vboxmanager installed.
• Command: vboxmanage debugvm "Target_Ubuntu_Machine" dumpvmcore
-- filename=/home/kidrah/Documents/Victim\ shared/Ubuntu/ubuntu.dmp
• The above command will acquire the memory of the Target_Ubuntu_Machine
and output it as ubuntu. dmp at the specified location.
Network forensics
35
5/8/2024
Careers
One of the fastest
growing job
markets!
71
Paths to Careers in CF
Certifications
Associate Degree
Bachelor Degree
Post Grad Certificate
Masters
Doctorate
72
36
5/8/2024
Job Functions
CF Technician
CF Investigator
CF Analyst/Examiner (lab)
CF Lab Director
CF Scientist
73
37