0% found this document useful (0 votes)
32 views30 pages

QUICK Cloud Storage Forensic Analysis Presentation

Uploaded by

rajatkumar88478
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views30 pages

QUICK Cloud Storage Forensic Analysis Presentation

Uploaded by

rajatkumar88478
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

Cloud

Storage
Forensic
Analysis
0 1
Darren Quick
[email protected]
01 1
Supervisor: Dr Kim-Kwang Raymond Choo
Outline
 1 - Introduction
 2 - Literature Review
 3 - Research Method
 4 – Digital Forensic Analysis Cycle
 5 - Dropbox
 6 - Skydrive
 7 - Google Drive
 8 - Preservation
 9 - Summary
Introduction
 Cloud computing
 Cloud storage
 Gartner Report (Kleynhans 2012)
 Personal cloud will replace PC’s as the main

storage by 2014
 Dropbox, Microsoft SkyDrive, and

Google Drive
 PC; client software or browser
 Portable devices; browser or apps
Introduction
 Criminals and victims data of interest
 Virtualised, geographically disbursed and

transient
 Technical and legal issues for investigators;

◦ Identification of data; i.e. service provider


◦ Username,
◦ Data in the account
◦ Difficult to prove ownership
◦ Data may be moved or erased before it can be
preserved
Research Objectives
 Objective 1: To examine current research published in
literature relating to cloud storage and identified cloud
storage analysis methodologies.
 Objective 2: To develop a digital forensic analysis framework
that will assist practitioners, examiners, and researchers
follow a standard process when undertaking forensic analysis
of cloud storage services.
 Objective 3: To conduct research using popular cloud storage
services; Dropbox, Microsoft SkyDrive, and Google Drive, and
determine whether there are any data remnants which assist
digital forensic analysis and investigations.
 Objective 4: To examine the forensic implications of
accessing and downloading cloud stored data from popular
cloud storage services; Dropbox, Microsoft SkyDrive, and
Google Drive.
Literature Review
 NIST (2011) definition of cloud computing
 IaaS – Infrastructure as a Service – user

control
 PaaS – Platform as a Service – OS provided
 SaaS – Software as a Service – User has

limited control
 Criminal use
 Security of cloud services is well addressed
 Mobile devices
Literature Review
 Digital forensic analysis process
 Common procedures for investigation
 McClain (2011) Dropbox analysis
 Chung et al. (2012) Dropbox, Google Docs,
Amazon S3 and Evernote
 Zhu (2011) examines Skype, Viber, Mail,
Dropbox
 Reese (2010) examines Amazon EBS
 Clark (2011) examines Exif metadata in
pictures
Research Method
 Objectives not answered in literature
 Need to conduct primary research

 Q1 What data remnants result from the use


of cloud storage to identify its use?

 H0 - There are no data remnants from cloud


storage use

 H1 – There are remnants from cloud storage use


Research Question 1
a) What data remains on a Windows 7 computer hard drive after
cloud storage client software is installed and used to upload and
store data with each hosting provider.
b) What data remains on a Windows 7 computer hard drive after
cloud storage services are accessed via a web browser with each
hosting provider?
c) What data is observed in network traffic when client software or
browser access is undertaken?
d) What data remains in memory when client software or browser
access is undertaken?
e) What data remains on an Apple iPhone 3G after cloud storage
services are accessed via a web browser with each hosting
provider?
f) What data remains on an Apple iPhone 3G after cloud storage
services are accessed via an installed application from each
hosting provider?
Research Question 2
 Q2 What forensically sound methods are
available to preserve data stored in a cloud
storage account?
◦ H0 the process of downloading files from cloud storage
does not alter the internal data or the associated file
metadata.
◦ H1 the process of downloading files from cloud storage
alters the internal file data and the associated file metadata.
◦ H2 the process of downloading files from cloud storage
does not alter the internal data, but does alter the file
metadata.
◦ H3 the process of downloading files from cloud storage
alters the internal data, but not the
associated file metadata.
Research Question 2a
 Q2a) What data can be acquired and preserved from
a cloud storage account using existing forensic
tools, methodologies, and procedures when
applied to cloud storage investigations?
Research Method
 Research experiment Windows

undertaken using Virtual


client
software

PC’s to create various Internet


Memory
VMEM

circumstances of Dropbox Explorer

accessing cloud storage Mozilla Hard drive

services. Control
installation
Microsoft
SkyDrive
Firefox VMDK

 VM’s forensically Google

preserved and analysed


Chrome Network
PCAP
Google

for data remnants Drive


Apple
Safari

XRY

Apple
iPhone
Experiment Process
 Prepare Virtual PC’s with Windows 7
 Base (control) clean installation
 Install Browser (Internet Explorer, Mozilla

Firefox, Google Chrome, Apple Safari)


 Install Client Software and upload test files
 Use browser to access account and view files
 Use browser to access and download files
 Use Eraser to erase files
 Use CCleaner to remove browsing history
 Use DBAN to erase virtual hard drive
Digital Forensic Analysis Cycle
 Commence (Scope)
 Prepare and Respond
 Identify and Collect
 Preserve (Forensic Copy)
 Analyse
 Present
 Feedback
 Complete
Dropbox
 Using the Framework to guide the process
 Analysis of the VM images
 In the Control VM’s; ‘Dropbox’ references
 Client Software 1.2.52; encrypted, sample files
 System Tray link to ‘launch Dropbox website’
 Browser remnants
 OS remnants; Prefetch information, Link Files, $MFT,
Registry, Thumbcache, Event logs
 Network traffic; IP’s, URL client/web
 RAM; password in cleartext
 Eraser/CCleaner; left remnants
 DBAN; all erased
Dropbox
 iPhone 3G iOS 4.2.1 (using the framework)
◦ Base (control); nil located
◦ Browser; filenames in History.plist + URL
◦ Dropbox App; username in keychain.plist

 Case study (used to illustrate findings)


◦ ‘Botnet’ hypothetical example describing finding
information on PC and iPhone re Dropbox
use
Dropbox
 Conclusion;
◦ dbx files are now encrypted, earlier versions;
 Filecache.db and config.db
◦ Password in cleartext in memory
◦ Process of booting a forensic image in a virtual PC
will synchronise and provide access to the account
without requiring a username or password

 Current Police investigation; located illicit


data being stored in a Dropbox account
(real world application of the research)
Microsoft SkyDrive
 Using the Framework to guide the process
 Analysis of the VM images
 In the Control VM’s; ‘skydrive’ references
 Client Software; SyncDiagnostics.log,
OwnerID.dat
 OS remnants; Prefetch information, Link Files,
$MFT, Registry, Thumbcache, Event logs
 Network traffic; IP’s, filenames
 RAM; password in cleartext
 Eraser/CCleaner; left remnants
 DBAN; all erased
Microsoft SkyDrive
 iPhone 3G iOS 4.2.1 (using the framework)
◦ Base (control); nil located
◦ Browser; OwnerID in URL, filenames in History.plist
◦ SkyDrive App; username in keychain.plist

 Case study (used to illustrate findings)


◦ ‘IP Theft’ hypothetical example describing finding
information on PC and iPhone re SkyDrive
use
Microsoft SkyDrive
 Conclusion;
◦ SyncDiagnostics.log and OwnerID.dat files
◦ Password in cleartext in memory
◦ Process of booting a forensic image in a virtual
PC may synchronise the files in an account.
Access to the account requires a password.
Google Drive
 Using the Framework to guide the process
 Analysis of the VM images
 In the Control VM’s; ‘drive google’ references
 Client Software; Sync_config.db and snapshot.db
 Password in cleartext stored on Hard Drive
 System Tray link to ‘visit Google Drive on the web’
 OS remnants; Prefetch information, Link Files,
$MFT, Registry, Thumbcache, Event logs
 Network traffic; IP’s, username
 Eraser/CCleaner; left remnants
 DBAN; all erased
Google Drive
 iPhone 3G iOS 4.2.1 (using the framework)
◦ Base (control); nil located
◦ Browser; username in cookies, filenames in
History.plist
◦ Google Drive App; unable to install, need iOS 5

 Case study (used to illustrate findings)


◦ ‘Steroid importation’ hypothetical example
describing finding information on PC and
iPhone re Google Drive use
Google Drive
 Conclusion;
◦ sync_config.db and snapshot.db files files
◦ Password in cleartext in RAM and on Hard Drive
◦ System Tray link to ‘visit Google Drive on the
web’
◦ Process of booting a forensic image in a virtual
PC will give full access to an account without
requiring a username or password
Forensic Preservation
 No documented process to collect data once
identified
 Some jurisdictions have legal power to

secure data accessible at the time of serving


a warrant, such as 3LA Crimes Act 1914
 Tested in VM with Dropbox, Microsoft

SkyDrive, and Google Drive


 Access via Browser and Client Software
 No change to files (Hash values same after

downloading when compared with original)


Forensic Preservation
 Times and Dates change;
Last Accessed File Created Last Written Entry Modified
Dropbox browser Last Written (UTC) Last Written (UTC) unZIP time unZIP time
client download time download time same download time
Google browser 1/01/1980 1/01/1980 unZIP time unZIP time
Drive client last written download time same download time
SkyDrive browser upload date/time upload date/time unZIP time unZIP time
client download time download time same download time
Results
 Q1 = H1
There are remnants from cloud storage use
which enable the identification of the service,
a username, or file details.

 Q2 = H2
The process of downloading files from cloud
storage does not alter the internal data, but
does alter the file metadata.
Contributions
 Identified software files for each service, e.g.
◦ SyncDiagnostics.log – SkyDrive
◦ Snapshot.db – Google Drive
◦ Filecache.db – Dropbox
 Identified OS remnants;
◦ Prefetch
◦ Link files
◦ Registry
 Identified Browser History remnants
 No change to access and download files
 Difference in timestamps for downloaded files
 Process to boot PC in a VM
Future research
 Other cloud storage services;
◦ Amazon S3, iCloud, and UbuntuOne
 Physical iPhone extract compared to logical
extract
 Android, Windows Mobile devices
 Apple iOS 5 devices
 Further test the framework
Publications
(in submission / under review)
 Quick, D & Choo, K-K R 2012. ‘Dropbox Analysis: Data
Remnants on User Machines’. Submitted to Digital
Investigation
 Quick, D & Choo, K-K R 2012. ‘Digital Droplets: Microsoft
SkyDrive forensic data remnants’. Submitted to Future
Generation Computer Systems
 Quick, D & Choo, K-K R 2012. ‘Forensic Collection of Cloud
Storage Data from a Law Enforcement Perspective’. Submitted
to Computers & Security
 Quick, D & Choo, K-K R 2012. ‘Google Drive: Forensic
Analysis of data remnants’. Submitted to Journal of Network
and Computer Applications
References
 Chung, H, Park, J, Lee, S & Kang, C (2012), Digital Forensic Investigation of
Cloud Storage Services, Digital Investigation
 Clark, P (2011), 'Digital Forensics Tool Testing–Image Metadata in the Cloud',
Department of Computer Science and Media Technology, Gjøvik University
College.
 Kleynhans, S (2012), The New Pc Era- the Personal Cloud, Gartner Inc,
 McClain, F (2011), Dropbox Forensics, updated 31 May 2011, Forensic Focus
 McKemmish, R (1999), 'What Is Forensic Computing?', Trends and Issues in
Crime and Criminal Justice, Australian Institute of Criminology, vol. 118, pp.
1-6.
 NIST (2011), Challenging Security Requirements for Us Government Cloud
Computing Adoption (Draft), U.S. Department of Commerce.
 Ratcliffe, J (2003), 'Intelligence-Led Policing', Trends and Issues in Crime and
Criminal Justice vol. 248, pp. 1-6
 Reese, G (2010), Cloud Forensics Using Ebs Boot Volumes, Oreilly.com
 Zhu, M (2011), 'Mobile Cloud Computing: Implications to Smartphone
Forensic Procedures and Methodologies', AUT University.

You might also like