Transcript Document

Computer Forensics
劉 立 民 老師
中原大學 應用數學系
Introduction
Sharon Guthrie Case




Sharon Guthrie, 54, drowned in the bathtub of her
Wolsey, South Dakota home May 14. An autopsy
revealed the contents of 10-20 capsules of
Temazepan in her body, a sleeping pill that was
prescribed for her husband.
Rev. Guthrie pleaded innocent. "A minister killing his
wife in the bathtub? Impossible!" asserted the
defense.
Judd Robbins, a computer forensics, found evidence
that Guthrie had searched the Internet for painless
and surefire killing methods.
Rev. Guthrie was sentenced to life imprisonment.
蠻牛千面人




民國94年5月,“蠻牛”與“保力達B”遭
人下毒,放置氰化物
造成一無辜民眾物飲死亡
警方由監視錄影中找到線索,順利逮捕
一名嫌犯
在嫌犯電腦中找出 “毒蠻牛” 的字樣與
圖案以及為寄出的恐嚇信件
Computer Crime

Computer misuse has two categories:

Computer is use to commit a crime

Child pornography

Threatening letters

Fraud

Theft of intellectual property
Computer Crime (con’t)

Computer misuse has two categories:

Computer itself is a target of a crime.


AKA incident response
Started from mid-80s, attack was carried out
over phone line through modems.

Internet

More sophisticated attacks
What is Computer Forensics

Computer forensics includes

Preservation,

Identification,

Extraction,

Documentation,

Interpretation of computer data.
What is Computer Forensics

These evidence can be useful in many
investigations:




Civil litigations such as divorce, harassment, and
discrimination cases
Corporations seeking to embezzlement, fraud, or
intellectual property theft issues
Individuals seeking evidence in age discrimination,
wrongful termination, or sexual harassment claims
Insurance company investigations where evidence
is required relating to insurance fraud, wrongful
death, workerman’s compensation, and other
cases.
Types of Incidents
Categories of incident defined by Federal Computer
Incident Response Center (FedCIRC)







Malicious code attacks
Unauthorized access
Unauthorized utilization of services
Disruption of service
Misuse
Espionage
Hoaxes
Malicious code attacks

Malicious code:






Viruses
Trojan horse programs
Worms
Scripts used by crackers/hackers
Difficult to detect
Self replicating property
Unauthorized access



Improperly logging into a user’s account
Unauthorized access to files and
directories
Plating an unauthorized sniffer program
or device
Unauthorized utilization of
services



Perpetrate an attack without access
someone’s account
Using the NFS to mount the file system
of a remove server machine
Interdomain access mechanisms in
Windows NT files and directories
Disruption of service

Disrupt services in a variety of ways:

Erasing critical programs

Mail spamming

Altering system functionality by installing
Trojan horse programs.
Misuse, Espionage, Hoaxes

Someone uses a computing system for other
than official purposes



A legitimate user uses a government computer to
store personal tax records.
Espionage is stealing information to subvert
the interests of a corporation
Hoaxes occur when false information about
incidents or vulnerabilities is spread
Catching the criminal

US FBI delineates the following aspects
of computer forensic science:

Data objects

Digital evidence

Physical items

Original digital evidence

Duplicate digital evidence
Catching the criminal (con’t)

Data objects


Digital evidence


Objects or information of potential probative value that are
associated with physical items.
Information of probative value that is stored or transmitted
in digital form.
Physical items

Items on which data objects or information may be stored
and/or through which data objects are transferred.
Catching the criminal (con’t)

Original digital evidence


Physical items and the data objects associated
with such items at the time of acquisition or
seizure
Duplicate digital evidence

An accurate digital reproduction of all data objects
contained on an original physical item.
FedCIRC incident activity
summary for 2000
Detecting intrusion

The common approach to detecting intrusions
is as follows:




Observe your systems for unexpected behavior or
anything suspicious.
Investigate anything you consider to be unusual
Initiate your intrusion response procedures when
you find you find something that isn’t explained by
authorized activity.
Look for unusual or unauthorized user accounts or
groups.
Monitoring your Windows system

Look for unusual or unauthorized user
accounts or groups.



Guest account should be disable
Check all groups for invalid user
membership
Check log file for connections from
unusual locations or for any unusual
activity.
Computer management utility
Monitoring your Windows system

Search for invalid user right.




Guest account should be disable
Check all groups for invalid user membership
Check log file for connections from unusual
locations or for any unusual activity.
Check to see if unauthorized application are
running.
Edit Registry
Monitoring your Windows system

Look for invalid services

Monitor system startup folder



Inspect network configurations for unauthorized
entries
Check your system program files for alterations
Check for unusual ports listing for connections from
other hosts by using the netstat.
Common program startup
locations
HKEY_CURRENT_USER\Software\Microsoft\Win
dows\Current Version\Run
SuperScan 3.0 by Foundstone
Incident Response Team


All organizations need an incident
response team to develop a complete
incident response response capability
The team should have written
procedures for incident response

What conditions warrant calling on local
and/or federial law enforcement authorities.
The incident reporting process

Low-level incidents are least severe and
should be resolved within one working day.
Low-level incidents include





Loss of passwords
Suspected unauthorized sharing of accounts
Misuse of computer hardware
Unintentional computer actions
Unsuccessful scans or probes
The incident reporting process

Mid-level incidents are more serious and should be
handled within 2-4 hours. Mid-level incidents include







Property destruction related to a computer incident
Illegal download of copyrighted music/unauthorized software
Violation of special access
Unauthorized user of a system for processing of storing
personal data
An act resulting from unfriendly employee termination
Illegal building access
Personal theft
The incident reporting process

High-level incidents are the most serious and should
be handled immediately. They include









Property destruction related to a computer incident
Child pornography
Pornography
Personal theft (higher value than a mid-level incident)
Suspected computer break-in
Denial of service (DoS) attacks
Illegal software download
Malicious code
Any violation of the law
Internal reporting procedure

Every organization needs to develop one that
requires following:







Preservation of evidence
Assessment
Containment and recovery actions
Damage determination
Report documentation
Lessons learned
Identification of corrective actions required by the
organization’s security programs
Forensic Toolkit






Authenticity and Integrity
A tool to report any open TCP/UDP port and map
them to the owning process or application
A tool to capture and analyze logs to identify and
track who has gained access to a computer system
A utility to make a bit-stream back-up of a hard drive
A tool to examine files on a disk drive for
unauthorized activity
A program used to document the CMOS system Time
and Date on a computer seized as evidence
Forensic Toolkit (con’t)





A password-cracking utility
A text-search utility that can scan Windows systems and
locate targeted keywords and/or strings of text in
computer-related investigations and computer security
reviews
A forensic binary data search tool that is used to identify
targeted graphics file content and/or foreign language
words and phrases stored in the form of computer data
A tool to discover hidden files, such as NTFS Alternate
Data Streams
A data collection tool to capture file slack and unallocated
(erased file) data
Considerations of the
Law Enforcements
The Role of NIPC


NIPC (National Infrastructure Protection
Center) was established at 1998 located in
the headquarter of the FBI.
The NIPC’s functions:



The NIPC is the national focal point for gathering
information on threats to critical infrastructure,
Coordinating the federal government’s response to
an incident, mitigating attacks, investigating
threats.
The NIPC provides law enforcement and
intelligence information and reports to relevant
federal, state, and local agencies.
Taiwan

行政院下設立「國家資通安全會報」


國家資通安全會報設有「國家資通安全應變中
心」



分為七個工作小組:綜合業務,技術服務、標準規
範、稽核服務、網路犯罪、資訊蒐集、危機通報
下轄行政機關、國防體系、事業機構、學術機構、
民營機構六個分組
台灣電腦網路危機處理中心(TWCERT/CC)
政府憑證管理中心GCA的成立(1998年2月)
加拿大




於2001年2月,成立「關鍵基礎建設防護與緊急應變辦公室」
(Office of Critical Infrastructure & Emergency Preparedness ,
OCIPEP)
OCIPEP 由國防部長主持,來防護加拿大關鍵基礎建設免受失效
或被襲擾的風險
於OCIPEP成立「基礎建設防護協調中心」
加拿大政府定義的國家關鍵基礎建設,共有六大類:能源設施
(如電力、天然氣及石油傳輸系統),通信(如電信及廣播系
統),服務(如金融、食品、醫療),運輸(如陸上、水上、空
中及鐵路),安全(如核安、搜救、急難救助),政府(如重要
設施、資訊網路、及資產)。
英國

於1999年12月,成立「國家基礎建設安全協調中心」(National
Infrastructure Security Co-ordination Centre,NISCC)

負責開發一些專案來防止國家關鍵基礎建設遭到電子攻擊
(electronic attack)。

重點放在:電信、金融、供水與下水道系統,能源、運輸、醫療
服務、中央政府、急難救助 的資訊科技系統(IT systems)

在NISCC之下設有


「統一事件報告與警告小組」(Unified Incident Reporting & Alert
Scheme,UNIRAS)以做為英國政府的電腦緊急應變小組
「電子攻擊應變小組」(Electronic Attack Response Group,EARG)
Related laws


Disclosure law - “Title 18, Part I, Chapter 121, Sec.
2702 of the Federal Criminal Code”
Computer crimes will be considered breaking federal
laws when it involves:





The theft or compromise of national defense, foreign
relations, atomic energy, or other restricted information
A computer owned by a U.S. government department or
agency
A bank or most other types of financial institutions
Interstate or foreign communications
People or computer in other states or countries
Related laws (con’t)



The “Computer Fraud and Abuse Act”
was signed by President Reagan at
1986
Computer Abuse Amendments Act of
1994
The USA Patriot Act of 2001
相關法律


著作權法
刑法220,315,318,359,360等條文


刑法第二百二十條在紙上或物品上之文字、符號、
圖畫、照像,依習慣或特約,足以為表示其用意之
證明者,關於本章及本章以外各罪,以文書論。錄
音、錄影或電磁紀錄,藉機器或電腦之處理所顯示
之聲音、影像或符號,足以為表示其用意之證明者,
亦同。
刑法第三百五十九條 無故取得、刪除或變更他人
電腦或其相關設備之電磁紀錄,致生損害於公眾或
他人者,處五年以下有期徒刑、拘役或科或併科二
十萬元以下罰金。
Forensic Preparation
Forensic Preparation



Network Operating Systems
Auditing and Logging
Logs cab help organizations by




Altering system administrators of any suspicious
activity
Determining the extent of any damage caused by
an intruder’s activity
Helping to quickly recover systems
Providing information or serving as evidence
required for legal proceedings
Enable auditing and logging
on Windows
Log files on Windows
Centralized logging



The location of the log data is
centralized
The integrity of log data remains
protected
This approach is easier to back up,
secure, and analyze.
Logging Tools

Kiwi Syslog Deamon by Kiwi Enterprise



Freeware for Windows plateform
www.kiwisyslog.com
GFI LANquard Security Event Log
Monitor by GFI Software


Is able to analyzing Windows NT/2000
event logs in real time.
www.fgi.com
Time Synchronization



Automating the synchronization of system
clocks save substantial time during an
incident response.
IP based networks, Network Time Protocol
(NTP) is the one most commonly used.
Tools on Windows:



Automachron by Guy Coding
NIST Internet Time Service (ITS)
World Time by PawPrint.net
Memory dump on Windows


The contents of the system memory
should be printed or copied while it still
resides in memory.
Windows 2000 and XP (not NT) include
a handy feature to generate a memory
dump file. However, it must first be
configured to do so.
Memory dump on UNIX

The sysdump command

Crash utility
Imaging hard drives



Hard-drive imaging provides a mirror image or a
snapshot of the data contained on the hard-drive.
The imaging process can be performed off-lined (OS
is turned off).
NIST’s disk-imaging spec. includes the following
guidelines:





The
The
The
The
:
tool shall not alter the original disk
tool shall be able to access both IDE and SCSI disks.
tool shall log input/output (I/O) errors.
tool’s documentation shall be correct.
Business continuity and
contingency planning

The NIST IT contingency planning guide







Develop the contingency-planning policy
statement
Conduct the business impact analysis (BIA)
Identify preventive controls
Develop recovery strategies
Develop an IT contingency plan
Plan testing, training, and exercises
Plan maintenance
Develop the contingencyplanning policy statement




The contingency plan must be based on a clearly
defined policy.
The contingency planning policy statement should
define the agency’s overall contingency objectives
and establish the org. framework and responsibilities.
The senior management (CIO, Chief Information
Officer) must support a contingency program.
The contingency program should comply with federal
guidance contained in the NIST SP 800-34
Key policy elements







Roles and responsibilities
Scope and applied to the type(s) of
plateform(s) and organization functions
subject to contingency planning
Resource requirements
Training requirements
Exercise and testing schedules
Plan maintenance schedule
Frequency of backup and storage of backup
media
Conduct the Business Impact
Analysis (BIA)




The BIA is the key step in the contingencyplanning process.
It enables the coordinator to fully
characterize the system requirements,
processes, and interdependencies.
The purpose of the BIA is to correlate specific
system components with the critical services
that they provide.
The BIA characterize the consequences of a
disruption to the system components.
Identity preventive controls



Preventive methods are preferable to actions
that may be necessary to recover the system
after a disruption.
Preventive controls should be documented in
the contingency plan.
Some common measures are listed here:

Appropriated size uninterruptible power supplies
(UPS) to provide short-term backup power to all
system components (including environmental and
safety controls)
Identity preventive controls






Gasoline-or diesel-powered generators to provide
long-term failure power
Air-conditioning systems with adequate excess
capacity to permit failure of certain components
such as a compressors
Fire suppression systems
Fire and smoke detectors
Water sensors in the computer room ceiling and
floor.
Plastic tarps that may be unrolled over IT
equipment to protect it from water damage
Identity preventive controls





Heat-resistant and waterproof containers for
backup media and vital nonelectronic records
Emergency master system shutdown switch
Offsite storage of backup media, nonelectronic
records, and system documentation
Technical security controls, such as cryptographic
key management and least-privilege access
controls
Frequent, scheduled backups
Develop recovery strategies




Recovery strategies provide a means to restore IT
operations quickly and effectively following a service
disruptions.
Strategies should address disruption impacts and
allowable outage times identified in the BIA.
Several alternatives should be considered when
developing the strategy, including cost, allowable
outage time, security, and integration with larger,
organization-level contingency plans.
The strategy should include a combination of
methods that complement one another to provide
capability over the full spectrum of incidents.
Develop an IT contingency
plan



The plain contains detailed roles,
responsibilities, teams, and procedures
associated with restoring an IT system.
The plan should document technical
capabilities designed to support contingency
operations.
The plan should comprise five main
components: Supporting Information,
Notification/Activation, Recovery,
Reconstitution, and Plan Appendices.
Plan testing, training, and
exercises


Testing enables plan deficiencies to be
identified and addressed.
The following areas should be addressed in a
contingency test:





System recovery on an alternate platform from
backup media
Coordination among recovery teams
Internal and external connectivity
Restoration of normal operations
Notification procedures
Plan maintenance



The contingency plan should be reviewed and
updated regularly, as part of the
organization’s change management process.
The plan should be reviewed for accuracy and
completeness at least annually or whenever
significant changes occur to any element of
the plan.
Certain elements, such as contact lists, will
require more frequent reviews.
Windows Registry, Recycle
Bin, and Data Storage
The Windows Registry

The registry is used to store

Operating system configuration

Application configuration information

Hardware configuration information

User security information

Current user information
Registry structure

The Registry has a hierarchy structure similar
to the directory structure.

Each main branch is called a hive.

Located within those hives are keys.

Each key may contain other keys called
subkeys along with their value. It is the
values that contain the actual information
that is stored within the Registry.
Windows Registry

HKEY_CLASSES_ROOT contains




File-association types
Object Linking and Embedding (OLE)
information
Shortcut data
HKEY_CURRENT_USER points to the
section of HKEY_USERS appropriate for
the user currently logged into the PC.
Windows Registry

HKEY_LOCAL_MACHINE



contains info about computer hardware, software,
and other preferences for the local PC.
is used for all users who log onto this computer.
HKEY_USERS contains individual preferences
for each user of the computer.

Each user is represented by a security identifier
(SID) subkey.
Windows Registry

HKEY_CURRENT_CONFIG links to
HKEY_LOCAL_MACHINE\Config for
machine specific information.

HKEY_DYN_DATA contains info. that
must be kept in RAM.
Types of values

String or REG_SZ

Binary or REG_BINARY



DWORD or REG_DWORD
Multistring value or REG_MULTI_SZ
Expandable string value or
REG_EXPAND_SZ
Viewing and Editing Registry
Registry backup and restore
The Windows Recycle Bin



The purpose of the Recycle Bin was to
provide users with the ability to reclaim
deleted files.
Before users “empty” the Recycle Bin, the
deleted files remains on disks.
Even the Recycle Bin is empty, but the
actually information remains on its original
place on the hard drive (until the OS
overwrites it).
The Windows Recycle Bin
Property
Recovery Utilities

PC Inspector File Recovery
Recovery Utilities

EasyRecovery Professional www.ontrack.com
UNIX/Linux ext2 File System



In ext2, the complete inode for a deleted file is
preserved,
Only the name is removed from the directory and
the time of the deletion in the inode is marked.
Using e2undel
Analyzing and Detecting
Malicious Code and Intruders
Analyzing Abnormal System
Processes

Monitors should look for the following
signs:




Unusual resource utilization or process
behavior
Missing processes
Added processes
Processes that have unusual user
identification associated with them
Causes of abnormal system
processes



Programs that log a user’s keystrokes or
monitor and steal passwords.
Malicious code (virus, Internet worms,
and Trojan horse applications)
Spyware (software that transmits
information back to a third party
without notifying the user)
Windows Event Viewer

Log files allows you to check for:

Unusual login entries

Failures of services

Abnormal processes
OS and Network Logs

When reviewing OS or network logs, look for
the following:




Process consuming excessive resources
Processes starting or running at unexpected times
Unusual processes not the result of normal
authorized activities
Previously inactive user accounts that suddenly
begin to spawn processes and consume computer
or network resources
OS and Network Logs





Processes that prematurely terminate
Unexpected or previously disabled processes,
which may indicate that a hacker or intruder has
installed his own version of a process or service
A workstation or terminal that starts exhibiting
abnormal input/output behavior
Multiple processes with similar names
(Explorer.exe vs. explorer.exe)
An unusually larger number of running processes
Windows Task Manager
The Select Columns box in
Windows Task Manager
Default processes in Windows
NT, 2000, and XP






Csress.exe: is the Client/Server Run-time Subsystem.
Explorer.rxr: is the GUI for the taskbar and desktop
environment.
Lsass.exe: handles security administration on the
local computer.
Mstask.exe: is the task scheduler service.
Services.exe: is the Windows Services Control
Manager, which is responsible for starting and
stopping system services.
Smss.exe: is the Session Manager Subsystem, which
is responsible for starting the user session.
Default processes in Windows
NT, 2000, and XP




Spoolsv.exe: is the Windows spooler service and is
responsible for the management of spooled print and
fax jobs.
Svchost.exe: is a generic process, which acts as a
host for other processes running from DLLs.
System: permits system kernel-mode threads to run
as the System process.
System Idle Process: is a single thread running on
each processor. Its sole task is accounting for
processor time when the system isn’t processing
other threads.
Gathering Process Information

UNIX/Linux
ps -ef

Windows
PsToolscoded
www.sysinternals.com
PsTools suite
Unusual or Hidden Files

Start ->

Control Panel ->

View menu ->

Options
Viewing Hidden Files under
Unix/Linux

The find command is able to display
files with unusual names such as “.. ”
(dot-dot-space) or ..^G (dot-dotcontrol-G)
find / -name “.. ” –print –xdev
find / -name “.*” –print -xdev

Keep track of SUID programs
find / -type f –perm -4000 –print | mail root
Rootkits and Backdoors



“It takes a thief to catch a thief.”
Windows rootkits are usually detected by any
reputable antivirus s/w.
Rootkit is one of the most widely used
hackers tools and it contains


a suite of hacker utilities (log clean-up scripts and
network packet sniffers) and
specialized replacements of core Unix/Linux
utilities such as netstat, ifconfig, ps, and ls.
Rootkits and Backdoors

Rootkit is used to accomplish the following
functions:






Prevent logging of activity
Establish backdoors for reentry
Hide or remove evidence of initial entry
Hide specific contents of files
Hide files and directories
Gather intelligence (ex: usernames and passwords)
Detecting Rootkits on
Unix/Linux

Manual inspection


The strings command. It can produce readable
data such as the names of files where intruder
passwords are kept.
Rootkit detection programs


Chkrootkit
www.chkrootkit.org
Pedestal Software
www.pedestalsoftware.com
Functions of a Backdoor

Main functions of a backdoor



Getting back into the system with the least
amount of visibility.
Getting back into a machine even if the
administrator tries to secure it
Permitting the hacker to regain entry into
the system in the least amount of time.
Detecting Backdoors


Most reputable antivirus products are able
to detect backdoor Trojans
Freeware tools are available

Fport.exe

Superscan (right)

Nmap.

Listdlls.exe
Removing Rootkits and
Trojans

The steps for removing a Trojan:



Identify the Trojan horse file on your
system hard disk.
Find out how it is being initiated (ex: via
Registry, Startup Folder, and so on) and
take action(s) necessary to prevent it from
being restarted after a reboot.
Reboot your machine and delete the Trojan
horse.
Removing Rootkits and
Trojans

The steps involved in recovering from a
rootkit are:



Isolate the affected machine. (Disconnect it
from the network and/or Internet.)
Determine the severity of the compromise.
(Are other networked computers also
infected?)
Begin the cleanup by reinstalling the OS
and applications from a trusted backup..
Detecting and Defending
Against Network Sniffers



Nearly every rootkit includes utilities for
sniffing network traffic.
Network adapters running in promiscuous
mode receive not only the data directed to
the machine hosting the software, but also all
other data traffic on the physically connected
local network.
The ifconfig command allows the privileged
administrator to determine whether any
interfaces are in promiscuous mode.
Removing Rootkits and
Trojans

Unix/Linux


User ifconfig –a and look for the string
PROMISC
Windows

PromiscDetect
www.ntsecurity.nu/toolbox/promiscdetect/
Retrieving and Analyzing Clues
Performing Keyword Searches

Purposes of keyword searches




To locate occurrences of words or strings of text in
data stored in files or slack and unallocated file
space.
Internal audits to identify violations of corporate
policy
To find evidence in corporate, civil, and criminal
investigations, which involve computer related
evidence.
To find embedded text in formatted wordprocessing documents or fragments of such
documents.
Industrial Strength KeywordSearching Programs

AccessData Forensic Toolkit ($995)

Encase Forensic Pro Suite by Guidance
Software, Inc. ($895)

Maresware Suite by Mares and
Company, LLC ($375)
Freeware Keyword Search
Tools



BinText by Foundstone, Inc.
www.foundstone.com
Disk Investigator by Kevin Soloway
www.theabsolute/sware/
SectorSpyXP by Nick McCamy
home.carolina.rr.com/lexunfreeware
SectorSpyXP 2.1
Examining the Windows Swap File



The Windows swap file is space on a hard
disk reserved for the OS to do paging.
The swap file is important when conducting a
forensics investigation since a large volume of
data can exist within the swap file.
Windows swap files can be dynamic or
permanent.
Locating and Viewing the
Windows Swap File



Enable viewing the hidden files
Search the swap file (ex: pagefile.sys)
Tools for viewing swap files




Norton Commander
Norton DiskEdit
EnCase www.guidancesoftware.com
Filter_1 www.forensics-intl.com
Tutorial on PC Inspector File
Recovery

Download
http://www.pcinspector.de

Install

Delete files

Recover deleted files
Tutorial on PsTools

Download
http://www.sysinternals.com

Install

Delete files

Recover deleted files
References





Incident Response-Computer Forensics Toolkit,
by Douglas Schweitzer
Hacking Exposed Web Applications, by Joel
Scambrey and Mike Shema
Computer Forensics, by
「護好國家關鍵基礎建設,才能安心去拼經濟」
- 國政基金會科經組顧問 陳友武
電腦鑑識科學的現在與未來 - 台灣電腦網路危
機處理暨協調中心(TWCERT/CC)