







Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
An in-depth exploration of forensic analysis and validation in the field of computer security. It covers topics such as the definition and importance of forensic analysis, the role of validation in ensuring data integrity, and techniques for determining what data to collect and analyze. The document also delves into the use of access data forensic toolkit for analyzing data, data-hiding techniques, and the importance of network forensics. It concludes with a discussion on securing networks and performing live acquisitions.
Typology: Study notes
1 / 13
This page cannot be seen from the preview
Don't miss anything!
Forensic analysis:
Forensic analysis definition can be described as a detailed process of detecting, investigating, and documenting the reason, course, and consequences of a security incident or violation against state and organization laws.
Forensic analysis is often used for providing evidence in court hearings, especially in criminal investigations. It involves the use of a wide range of technologies and investigative methods and procedures. Forensic specialists gather different types of information by working with electronic devices.
Validation is the confirmation by examination and the provision of objective evidence that a tool, technique or procedure functions correctly and as intended. One of the most critical aspects of computer forensics is validating digital evidence because ensuring the integrity of data you collect is essential for presenting evidence in court.
Examining and analyzing digital evidence depend on the nature of the investigation and the amount of data to process. Criminal investigations are limited to finding data defined in the search warrant, and civil investigations are often limited by court orders for discovery.
Corporate investigators might be searching for company policy violations that require examining only specific items, such as e-mail. Therefore, investigations often involve locating and recovering a few specific items, which simplifies and speeds processing.
Scope creep: In which an investigation expands beyond the original description because of unexpected evidence you find, prompting the lawyer to ask you to examine other areas to recover more evidence. Scope creep increases the time and resources needed to extract, analyze, and present evidence.
One reason scope creep has become more common is that criminal investigations increasingly require more detailed examination of evidence just before trial to help prosecutors fend off attacks from defense attorneys. Because defense lawyers typically have the right of full discovery of digital evidence used against their clients, it’s possible for new evidence to come to light while complying with the defense request for full discovery.
Examining and analyzing digital evidence depends on:
Nature of the case Amount of data to process Search warrants and court orders Company policies
Scope creep
Investigation expands beyond the original description
Using Access Data Forensic Toolkit to Analyze Data
FTK can perform forensics analysis on the following file systems: Microsoft FAT12, FAT16, and FAT Microsoft NTFS (for Windows NT, 2000, XP, and Vista) Linux Ext2fs and Ext3fs
FTK can analyze data from several sources, including image files from other vendors. It can also read entire evidence drives or subsets of data, allowing you to consolidate large volumes of data from many sources when conducting a computer forensics analysis. With FTK, you can store everything from image files to recovered server folders on one investigation drive.
FTK also produces a case log file, where you can maintain a detailed record of all activities during your examination, such as keyword searches and data extractions. This log is also handy for reporting errors to Access Data. At times, however, you might not want the log feature turned on.
FTK has two options for searching for keywords. One option is an indexed search, which catalogs all words on the evidence drive so that FTK can find them quickly. This option returns search results quickly, although it does have some shortcomings. For example, you can’t search for hexadecimal string values, and depending on how data is stored on the evidence drive, indexing might not catalog every word. If you do use this feature, keep in mind that indexing an image file can take several hours, so it’s best to run this process overnight.
The other option is a live search, which can locate items such as text hidden in unallocated space that might not turn up in an indexed search. You can also search for alphanumeric and hexadecimal values on the evidence drive and search for specific items, such as phone numbers, credit card numbers, and Social Security numbers. You can right-click a search hit to add it to your bookmarks, which includes the result in your final report.
Validating with Hexadecimal Editors:
Advanced hexadecimal editors offer many features not available in computer forensics tools, such as hashing specific files or sectors. Learning how to use these tools is important, especially when you need to find a particular file, for example, a known contraband image.
With the hash value in hand, you can use a computer forensics tool to search for a suspicious file that might have had its name changed to look like an innocuous file. (Recall that two files with exactly the same content have the same hash value, even if they have different names.) Getting a hash value with a full-featured hexadecimal editor is much faster and easier than with a computer forensics tool.
Data hiding involves changing or manipulating a file to conceal information. Data-hiding techniques include hiding entire partitions, changing file extensions, setting file attributes to hidden, bit-shifting, using encryption, and setting up password protection.
Hiding Partitions
One way to hide partitions is to create a partition and then use a disk editor, such as Norton Disk Edit, to delete any reference to it manually. To access the deleted partition, users can edit the partition table to re-create the links, and then the hidden partition reappears when the computer is restarted. Another way to hide partitions is with a disk-partitioning utility, such as G Disk, Partition Magic, System Commander, or Linux Grand Unified Boot loader (GRUB), which provides a startup menu where you can select an OS. The system then ignores other bootable partitions.
To circumvent these techniques, be sure to account for all disk space when you’re examining an evidence drive. Analyze any disk areas containing space you can’t account for so that you can determine whether they contain additional evidence.
For example, in the following code, Disk Manager recognizes the extended partition (labeled EXT DOS) as being 5381.1 MB (listed as Mbytes). The LOG DOS labels for partitions E through F indicate that they’re logical partitions that make up the extended partition. However, if you add the sizes of drives E and F, the result is only 5271.3 MB, which is your first clue to examine the disk more closely. The remaining 109.8 MB could be a previously deleted partition or a hidden partition. For this example, the following code shows the letter ―H‖ to indicate a hidden partition. Disk Partitions Cylinders Heads Sectors Mbytes Sectors 2 5111661663 5495.
Windows creates a partition gap between partitions automatically; however, you might find a gap hat’s larger than it should be. For example, in Windows 2000/XP, the partition gap is only 63 sectors, so 109.8 MB is too large to be a standard partition gap. In Windows Vista, the gap is approximately 128 sectors.
Marking Bad Clusters
Another data-hiding technique, more common in FAT file systems, is placing sensitive or incriminating data in free or slack space on disk partition clusters. This technique involves using disk editor, such as Norton Disk Edit, to mark good clusters as bad clusters. The OS then considers these clusters unusable. The only way they can be accessed from the OS is by hanging them to good clusters with a disk editor.
Bit-Shifting
Some home computer users developed the skill of programming in the computer manufacturer’s assembly language and learned how to create a low-level encryption program that changes the order of binary data, making the altered data unreadable when accessed with a text editor or word processor.
These programs rearrange bits for each byte in a file. To secure a file containing sensitive or incriminating information, these users run an assembler program (also called a macro) on the file to scramble the bits. To access the file, they run another program that restores the scrambled bits to their original order. Some of these pro- grams are still used today and can make it difficult for investigators to analyze data on a suspect drive.
Start Notepad, and in a text document, type TEST FILE. Test file is to see how shifting bits will alter the data in a file.
Save the file as Bit_shift.txt in your work folder, and exit Notepad.
Remote acquisitions are handy when you need to image the drive of a computer far away from your location or when you don’t want a suspect to be aware of an ongoing investigation. This method can save time and money, too. Many tools are available for remote acquisitions; in the following sections, you use Runtime Software to learn how remote acquisitions are made.
Remote Acquisitions with Runtime Software
Runtime Software (www.runtime.org) offers the following shareware programs for remote acquisitions: DiskExplorer for FAT DiskExplorer for NTFS HDHOST The above are designed to be file system specific, so there are DiskExplorer versions for both FAT and NTFS that you can use to create raw format image files or segmented image files for archiving purposes.
HDHOST is a remote access program for communication between two computers. The connection is established by using the DiskExplorer program (FAT or NTFS) corresponding to the suspect (remote) computer’s file system. The following sections show how to make a live remote acquisition of another computer over a network. To use these tools, it’s best to have computers connected on the same local hub or router with minimal network traffic.
Fig: FTK displaying encrypted files
Network forensics is the process of collecting and analyzing raw network data and tracking network traffic systematically to ascertain how an attack was carried out or how an event occurred on a network.
Because network attacks are on the rise, there’s more focus on this field and an increasing demand for skilled technicians. Labor forecasts predict a shortfall of 50,000 network forensics specialists in law enforcement, legal firms, corporations, and universities.
Network forensics can also help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program, for example. A lot of time and resources can be wasted determining that a bug in a custom program or an untested open-source program caused the “attack”.
Being able to spot variations in network traffic can help you to track interruptions or attacks, so knowing your network’s typical traffic patterns is important.
Network forensics examiners must establish standard procedures for how to acquire data after an attack or intrusion incident. Typically, network administrators want to find compromised.
Typically, network administrators want to find affected machines, get them offline, and restore them as quickly as possible to minimize downtime.
Securing a Network:
Network forensics is used to determine how a security breach occurred; however, steps must be taken to harden/secure networks before a security breach happens, particularly with recent increases in network attacks, viruses, and other security incidents.
The National Security Agency (NSA) developed an approach, called the defense-in-depth (DiD) strategy. DiD have three modes of protection:
People Technology Operations
Step 5: The next step varies, depending on the incident you’re investigating. Such as creating an image of the drive over the network, or shutting the system down and making a static acquisition later.
Step 6: Be sure to get a forensic hash value of all files you recover during the live acquisition to make sure they aren’t altered later.
Several bootable forensic CD s are available, such as Helix
Performing a Live Acquisition in Windows
Live acquisitions are becoming more necessary, and several tools are available for capturing RAM. ManTech Memory DD (www.mantech.com/msma/MDD.asp) can access up to 4 GB RAM in standard did format. Another freeware tool, Win32dd (http://win32dd.msuiche.net), runs from the command line to perform a memory dump in Windows. In addition, commercial tools, such as Guidance Software Winen.exe, can be used.
Another popular tool is Backtrack (www.remote-exploit.org/backtrack.html), which com- bines tools from the White Hat Hackers CD and The Auditor CD (see Figure 11-3). More than 300 tools are available, including password crackers, network sniffers, and freeware forensics tools.
Backtrack has become popular with penetration testers and is used at the annual Collegiate Cyber Defense Competitions.
Network forensics is a long, tedious process, and unfortunately, the trail can go cold quickly. A standard procedure often used in network forensics is as follows:
Always use a standard installation image for systems on a network. This image isn’t a bit- stream image but an image containing all the standard applications used. You should also have the MD5 and SHA-1 hash values of all application and OS files.
When an intrusion incident happens, make sure the vulnerability has been fixed to prevent other attacks from taking advantage of the opening.
Far too many tools are available to list here, but you should take some time to explore the site and see what’s available. One in particular that’s worth investigating is PsTools, a suite created by Sysinternals that includes the following tools:
PsExec —Runs processes remotely PsGetSid —Displays the security identifier (SID) of a computer or user PsKill —Kills processes by name or process ID PsList —Lists detailed information about processes PsLoggedOn —Displays who’s logged on locally PsPasswd —Allows you to change account passwords PsService —Enables you to view and control services PsShutdown —Shuts down and optionally restarts a computer PsSuspend —Allows you to suspend processes