• Aucun résultat trouvé

Forensics Analysis of Hacking Cases

N/A
N/A
Protected

Academic year: 2022

Partager "Forensics Analysis of Hacking Cases"

Copied!
26
0
0

Texte intégral

(1)

Doctor A Security

Forensics Analysis of Hacking Cases

Norman PAN cisa, pdcf

Doctor A Security Systems (HK) Ltd.

2003-09-22

npan@drasecurity.com

(Professional correspondence only)

(2)

Doctor A Security

Today

§ Is for

– Need to know – Should/should

not

§ Is NOT for

– How to do

– Legal advice

(3)

Doctor A Security

Case for discussion .. 1

§ Investigator arrived the

crime scene and

§ used his

notebook and

created a new

partition in the

existing USB

Hard disk…

(4)

Doctor A Security

Case for discussion … 2

§ Used a

Forensic tools installed

yesterday in his notebook using

colleague’s CD

(5)

Doctor A Security

Case for discussion … 3

§ Unplugged the power

supply of the target

computer

(6)

Doctor A Security

Case for discussion … 4

§ Copied the files of the target

computer to the

Investigation

newly created

partition

(7)

Doctor A Security

Case for discussion … 5

§ Investigator returned to office, his colleague

borrowed his

notebook for

another case,

and returned 2

days later.

(8)

Doctor A Security

The Cost of an Incident

§ Intruder: 2 Hours

§ the time spent to clean up after them:

80 Hours

– not inlcude

v Intrusion Detection (human element)

v Forensic acquisition of disk images

v Restoration of

compromised system v Hardening of

compromised system v Network scanning for

other vulnerable systems

v Communications with

stakeholders

(9)

Doctor A Security

Forensic, for the sake of Forensic?

§ Incident Respond Procedure… .

– .. Snapshot of the victim machine… (?)

§ Decide

– Recovery

v Virus

v Failed Harddisk…

– Forensic (if evidence if important)

v Substantial financial loss v Computer crime

– Intrusion – Theft of

proprietary

information…

(10)

Doctor A Security

Why Forensics is, a little bit, difficult?

1. Too many variables

– Operating systems – Software

application – Cryptography

– Hardware platform – Law

– International

boundaries

– Publicity

(11)

Doctor A Security

Elements of Forensic Readiness

§ How Logging is Done

§ What is Logged

§ Forensic Acquisition

§ Evidence

Handling

(12)

Doctor A Security

How Logging is Done

§ “needle in the haystack”

– Data from an IDS – Centralized logging

§ Time

– time

synchronization becomes an issue.

§ Permissions

§ Reporting

(13)

Doctor A Security

Usefulness of Incident Data

§ The victim system(s) RAM, registers and raw disk

§ The attacking system(s) RAM, registers and raw disk

§ Logs (from the victim and attacking systems as well as intermediary systems)

§ Physical security at the attacking system (e.g.

camera monitoring, etc)

(14)

Doctor A Security

Solid Analysis and Case Building

§ You have to defend

– How you work

– Why you work this way

§ To Juror (non tech)

– If you tell them you have no defined

methodology – Acquit for

Reasonable doubt

§ Methodology become a

Discipline

– Think about car

driving

(15)

Doctor A Security

Document Everything

§ REFUTE because of mishandling??

§ Chain of evidence

– 1 x Conduction the investigation

– 1 x Document

§ What

– Time – Date

– Steps were taken – Name involved

– Whose authority’s

for step.

(16)

Doctor A Security

Crime Scene … . 1

§ Snapshort

– Photograph the scene – Note the scene

v Personal items

– Photograph the actual evidence

v E.g. What’s on the screen

– Open the case carefully

– Photograph the internal

– Document the

internals (e.g. Serial#, cable config – IDE,

SCSI… )

(17)

Doctor A Security

Crime Scene … 2

§ Label the evidence

– Consistently

§ Photograph the evidence with label

§ Document who did what at when.

§ Custodian double checked your list, initials next to yours while at the scene

§ Videotape the team

entrance and evidence

transport, if possible

(18)

Doctor A Security

Evidence transportation

§ Legal

authority?

§ Guard against

electrostatic

discharge

(19)

Doctor A Security

Preparing the Evidence

§ Unpack the evidence

– Document date, … .

§ Visually examine

§ Duplicate IMAGE of hard drive

– Turn off virus

scanning software – Record the time/date

of the CMOS

v Time zone v Accurate

§ Make a second copy

§ Seal the original evidence

– Electrostatic safe – Catalog it

– Initial by everyone

touched.

(20)

Doctor A Security

Forensic Acquisition

§ to preserve the

entire digital crime scene with minimal or no modification of data.

§ Order Of Volatility (OOV) which implies that collecting some data impacts other data.

– CDROM based tool kit

(21)

Doctor A Security

Imaging

§ Backup

– MAC?

– Deleted files?

§ Live system?

§ Open source tools

§ Cryptographic hashes

§ Shutdown vs Poweroff

§ Copy of the copy

(22)

Doctor A Security

Evidence Handling … 1

§ Chain of Custody

– track who had access

§ start when the data is first considered as potential

evidence and should continue through

presentation of the

item as evidence

in court.

(23)

Doctor A Security

Evidence Handling … 2

§ Physical Transport

– FBI

§ Storage

– Paper char at 460F

– Data start

disappearing

at 120F

(24)

Doctor A Security

Examination of Evidence

§ disk image(s) should be

mounted read-

only

(25)

Doctor A Security

Now, you have the evidence…

§ Where do we start?

§ Think like an Intruder

§ And Let’s

start …

(26)

Doctor A Security

Some useful links

General

§ http://www.cybercrime.gov/

§ http://www.e-evidence.info/

§ http://www.forensix.org/

Tools

§ http://www.sleuthkit.org/

§ http://fire.dmzs.com/

Références

Documents relatifs

This paper tackles the problem of selecting among several linear estimators in non-parametric regression; this includes model selection for linear regression, the choice of

Taking advantage of the availability of other data sets of relevance to the parameter under concern, though different, a method is proposed for the synthesis of the initial

Data-driven scene graphs merge a description of the user interface behavior as a data-flow program with a description of its graphics content as a hierarchical structure of vector

This paper tackles the problem of selecting among several linear estimators in non- parametric regression; this includes model selection for linear regression, the choice of

In this paper, we present the utility of a correlation between video-surveillance, metadata (descriptive, dy-namic, analytics results, annotation and comments) and

After each run, the time needed to completely generate the synthetic disk image was assessed, along with the amount of disk space used, number of files deleted, number of files

Norton Utilities and PC Tools, both commercial products designed for data recovery and file management, proved to be very powerful tools for digital forensics and virtually all

For scalability reasons, at each collect, a single end-device is randomly selected among all the end-devices to send the content of its local buffer of data to the monitoring