<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Security &#187; Forensics</title>
	<atom:link href="http://ipsecs.com/web/?cat=47&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://ipsecs.com/web</link>
	<description>Who Owns Who Now?</description>
	<lastBuildDate>Fri, 24 May 2013 02:06:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=</generator>
		<item>
		<title>Network &amp; Computer Forensics</title>
		<link>http://ipsecs.com/web/?p=267</link>
		<comments>http://ipsecs.com/web/?p=267#comments</comments>
		<pubDate>Thu, 08 Dec 2011 12:26:44 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Forensics]]></category>
		<category><![CDATA[Presentation]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=267</guid>
		<description><![CDATA[I had presented general method of network &#38; computer forensics for Depkominfo at November, 23th, 2011.Â  You can enjoy my presentation on my slideshare below: Network &#38; Computer Forensic View more presentations from Don Anto]]></description>
				<content:encoded><![CDATA[<p>I had presented general method of network &amp; computer forensics for Depkominfo at November, 23th, 2011.Â  You can enjoy my presentation on my slideshare below:</p>
<p><center>
<div style="width:425px" id="__ss_10294155"> <strong style="display:block;margin:12px 0 4px"><a href="http://www.slideshare.net/djantoxz1/network-computer-forensic" title="Network &amp; Computer Forensic " target="_blank">Network &amp; Computer Forensic </a></strong> <iframe src="http://www.slideshare.net/slideshow/embed_code/10294155" width="425" height="355" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe>
<div style="padding:5px 0 12px"> View more <a href="http://www.slideshare.net/" target="_blank">presentations</a> from <a href="http://www.slideshare.net/djantoxz1" target="_blank">Don Anto</a> </div>
</p></div>
<p></center></p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=267</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>Hiding Sniffer From Rootkit Hunters</title>
		<link>http://ipsecs.com/web/?p=240</link>
		<comments>http://ipsecs.com/web/?p=240#comments</comments>
		<pubDate>Sun, 29 May 2011 18:40:14 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Forensics]]></category>
		<category><![CDATA[Anti Forensic]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Malware]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=240</guid>
		<description><![CDATA[Several years ago, i create backdoor which sends root shell to attacker without opening TCP/UDP port. Reverse shell is sent to attacker based on packet sniffed by backdoor. I can easily hide the file and process created by rootkit with system call redirection. But wait, i remember some things, common mistakes which usually left by [...]]]></description>
				<content:encoded><![CDATA[<p>Several years ago, i create backdoor which sends root shell to attacker without opening TCP/UDP port. <a href="http://stuff.ipsecs.com/files/knock-reverse.txt">Reverse shell</a> is sent to attacker based on packet sniffed by backdoor. I can easily hide the file and process created by rootkit with system call redirection. But wait, i remember some things, common mistakes which usually left by attacker, here are their mistakes:</p>
<ul>
<li>Mesh up with binary file hash checksum, since i use kernel based rootkit this is not my concern.</li>
<li>Forget to hide files, directory, process, tcp/udp ports.</li>
<li>Forget to hide kernel rootkit from detection command likes lsmod, modinfo, modstat, kldstat.</li>
<li>Forget to hide interface promiscuous mode and network sniffers.</li>
<li>Above mistake can be detected by common rootkit hunters like <a href="http://www.chkrootkit.org/">chkrootkit</a> and <a href="http://sourceforge.net/projects/rkhunter/">rkhunters</a></li>
</ul>
<p>So what should we do?! My kernel rootkit almost solve all that mistakes except hiding my sniffer from chkrootkit. Rkhunter shows no anomaly but chkrootkit shows my sniffer.<br />
<code><br />
eth0: PACKET SNIFFER(/opt/_xhidex_/_xhidex_getraw[14848])<br />
</code><br />
System administrator will aware that someone runs sniffer on their machine, i did some hack to solve this issue which finally i decide to hack chkrootkit. Some years ago, i found someone did rush trick by aliasing chkrootkit to &#8216;cat &lt;some_static_file&gt;&#8217;. I bet that system administrator can quickly detect this trick. Fortunately chkrootkit is just shell script so we can modify this file easily. Here, you can <a href="http://core.ipsecs.com/malpatch/0x03-chkrootkit.diff">download</a> freely chkrootkit patch to hide your sniffers.</p>
<p>After patch being applied on chkrootkit, below are chkrootkit output:<br />
<code><br />
eth0: not promisc and no packet sniffer sockets<br />
</code><br />
Lesson which can be taken is that people talk so much things about rootkit, backdoor, malware, worm, botnet but they ussually forget to secure their toys. Starting now, install your tool on your own system before install them on some else machine. Check if gnu standard utility, chkrootkit, and rkhunter can detect your tool. The other lesson is that rootkit hunters should check itself so it can check its integrity. This check can be based on hash or other secure method so self detection can be perform accurately. As workaround for system administrator, after doing rootkit hunter installation please save its hash checksum. Please save both MD5 and SHA checksum to guarantee rootkit hunter integrity.</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=240</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>More About Computer Forensics</title>
		<link>http://ipsecs.com/web/?p=153</link>
		<comments>http://ipsecs.com/web/?p=153#comments</comments>
		<pubDate>Fri, 07 May 2010 10:08:42 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Forensics]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=153</guid>
		<description><![CDATA[Computer forensics is part of information security in finding legal evidence on computers and digital storage media. You can find more about forensics resource on internet which some of them are free, yeah it&#8217;s free! We have Open Source Computer Forensics Manual at http://oscfmanual.sourceforge.net. We also have cool article (book) entitled with &#8220;Forensic Discovery&#8221; at [...]]]></description>
				<content:encoded><![CDATA[<p>Computer forensics is part of information security in finding legal evidence on computers and digital storage media. You can find more about forensics resource on internet which some of them are free, yeah it&#8217;s free!</p>
<p>We have Open Source Computer Forensics Manual at <a href="http://oscfmanual.sourceforge.net/">http://oscfmanual.sourceforge.net</a>. We also have cool article (book) entitled with &#8220;Forensic Discovery&#8221; at <a href="http://www.porcupine.org/forensics/">http://www.porcupine.org/forensics/</a> which published freely and completed with some tools. You can followÂ  <a href="http://blogs.sans.org/computer-forensics/">http://blogs.sans.org/computer-forensics/ </a>or read First Responders Guide to Computer Forensics at <a href="http://www.cert.org/archive/pdf/FRGCF_v1.3.pdf">CERT</a>.</p>
<p>Finally, you can download some free book about forensics and information security <a href="http://gog.gateit.net/books/">here</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=153</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Anti-Computer Forensics</title>
		<link>http://ipsecs.com/web/?p=106</link>
		<comments>http://ipsecs.com/web/?p=106#comments</comments>
		<pubDate>Mon, 13 Jul 2009 02:50:32 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Forensics]]></category>
		<category><![CDATA[Anti Forensic]]></category>
		<category><![CDATA[Incidents]]></category>
		<category><![CDATA[Investigation]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=106</guid>
		<description><![CDATA[DEFINITION Anti-forensics has only recently been recognized as a legitimate field of study. Within this field of study, numerous definitions of anti-forensics abound. One of the more widely known and accepted definitions comes from Dr. Marc Rogers of Purdue University. Dr. Rogers uses a more traditional â€œcrime sceneâ€ approach when defining anti-forensics. â€œAttempts to negatively [...]]]></description>
				<content:encoded><![CDATA[<p><strong>DEFINITION</strong><br />
Anti-forensics has only recently been recognized as a legitimate field of study. Within this field of study, numerous definitions of anti-forensics abound. One of the more widely known and accepted definitions comes from Dr. Marc Rogers of Purdue University. Dr. Rogers uses a more traditional â€œcrime sceneâ€ approach when defining anti-forensics. â€œAttempts to negatively affect the existence, amount and/or quality of evidence from a crime scene, or make the analysis and examination of evidence difficult or impossible to conductâ€.</p>
<p><img class="alignleft" src="http://static.howstuffworks.com/gif/computer-forensic-5.jpg" alt="" width="295" height="168" />A more abbreviated definition is given by Scott Berinato in his article entitled, The Rise of Anti-Forensics. â€œAnti-forensics is more than technology. It is an approach to criminal hacking that can be summed up like this: Make it hard for them to find you and impossible for them to prove they found you.â€ Interestingly, neither author takes into account using anti-forensics methods to ensure the privacy of one&#8217;s personal data.</p>
<p><strong>Sub-Categories</strong><br />
Anti-forensics methods are often broken down into several sub-categories to make classification of the various tools and techniques simpler. One of the more widely accepted subcategory breakdowns was developed by Dr. Marcus Rogers. He has proposed the following sub-categories, data hiding, artifact wiping, trail obfuscation and attacks against the CF (computer forensics) process/tools.<span id="more-106"></span></p>
<p><strong>Purpose &amp; Goals</strong><br />
Within the field of digital forensics there is much debate over the purpose and goals of anti-forensic methods. The common conception is that anti-forensic tools are purely malicious in intent and design. Others believe that these tools should be used to illustrate deficiencies in digital forensic procedures, digital forensic tools, and forensic examiner education. This sentiment was echoed at the 2005 Blackhat Conference by anti-forensic tool authors, James Foster and Vinnie Liu. They stated that by exposing these issues, forensic investigators will have to work harder to prove that collected evidence is both accurate and dependable. They believe that this will result in better tools and education for the forensic examiner.</p>
<p><strong>DATA HIDING</strong><br />
Data hiding is the process of making data difficult to find while also keeping it accessible for future use. â€œObfuscation and encryption of data give an adversary the ability to limit identification and collection of evidence by investigators while allowing access and use to themselves.â€ ome of the more common forms of data hiding include encryption, steganography, and other various forms of hardware/software based data concealment. Each of the different data hiding methods makes digital forensic examinations difficult. When the different data hiding methods are combined, they can make a successful forensic investigation nearly impossible.</p>
<p><strong>Encryption</strong><br />
One of the more commonly used techniques to defeat computer forensics is data encryption. In a presentation he gave on encryption and anti-forensic methodologies the Vice President of Secure Computing, Paul Henry, referred to <a title="Encryption" href="http://en.wikipedia.org/wiki/Encryption">encryption</a> as a â€œforensic analysis&#8217;s nightmareâ€.</p>
<p>The majority of publicly available encryption programs allow the user to create virtual encrypted disks which can only be opened with a designated key. Through the use of modern encryption algorithms and various encryption techniques these programs make the data virtually impossible to read without the designated key.</p>
<p>File level encryption encrypts only the file contents. This leaves important information such as file name, size and timestamps unencrypted. Parts of the content of the file can be reconstructed from other locations, such as temporary files, swap file and deleted, unencrypted copies.</p>
<p>Most encryption programs have the ability to perform a number of additional functions that make digital forensic efforts increasingly difficult. Some of these functions include the use of a keyfile, full-volume encryption, and plausible deniability. The widespread availability of software containing these functions has put the field of digital forensics at a great disadvantage.</p>
<p><strong>Steganography</strong><br />
<a title="Steganography" href="http://en.wikipedia.org/wiki/Steganography">Steganography</a> is a technique where information or files are hidden within another file in an attempt to hide data by leaving it in plain sight. â€œSteganography produces dark data that is typically buried within light data (e.g., a non-perceptible digital watermark buried within a digital photograph).â€ Some experts have argued that the use of steganography techniques are not very widespread and therefore shouldnâ€™t be given a lot of thought. Most experts will agree that steganography has the capability of disrupting the forensic process when used correctly.</p>
<p>According to Jeffrey Carr, a 2007 edition of Technical Mujahid (a bi-monthly terrorist publication) outlined the importance of using a steganography program called Secrets of the Mujahedeen. According to Carr, the program was touted as giving the user the capability to avoid detection by current <a title="Steganalysis" href="http://en.wikipedia.org/wiki/Steganalysis">steganalysis</a> programs. It did this through the use of steganography in conjunction with file compression.</p>
<p><strong>Other Forms of Data Hiding</strong><br />
Other forms of data hiding involve the use of tools and techniques to hide data throughout various different locations in a computer system. Some of these places can include â€œmemory, slack space, hidden directories, bad blocks, alternate data streams, hidden partitions.â€ One of the more well known tools that is often used for data hiding is called Slacker (part of the <a class="mw-redirect" title="Metasploit" href="http://en.wikipedia.org/wiki/Metasploit">Metasploit</a> framework). Slacker breaks up a file and places each piece of that file into the <a class="mw-redirect" title="Slack space" href="http://en.wikipedia.org/wiki/Slack_space">slack space</a> of other files, thereby hiding it from the forensic examination software. Another data hiding technique involves the use of bad sectors. To perform this technique, the user changes a particular sector from good to bad and then data is placed onto that particular cluster. The belief is that forensic examination tools will see these clusters as bad and continue on without any examination of their contents.</p>
<p><strong>ARTIFACT WIPING</strong><br />
The methods used in artifact wiping are tasked with permanently eliminating particular files or entire file systems. This can be accomplished through the use of a variety of methods that include disk cleaning utilities, file wiping utilities and disk degaussing/destruction techniques.</p>
<p><strong>Disk Cleaning Utiliies</strong><br />
Disk cleaning utilities use a variety of methods to overwrite the existing data on disks. The effectiveness of disk cleaning utilities as anti-forensic tools is often challenged as some believe they are not completely effective. Experts who donâ€™t believe that disk cleaning utilities are acceptable for disk sanitization base their opinions off current DOD policy, which states that the only acceptable form of sanitization is degaussing. Disk cleaning utilities are also criticized because they leave signatures that the file system was wiped, which in some cases is unacceptable. Some of the widely used disk cleaning utilities include <a title="Darik's Boot and Nuke" href="http://en.wikipedia.org/wiki/Darik%27s_Boot_and_Nuke">DBAN</a>, <a title="Srm (Unix)" href="http://en.wikipedia.org/wiki/Srm_%28Unix%29">srm</a>, KillDisk, PC Inspector and CyberScrubs cyberCide. Another option which is approved by the NIST and the NSAis CMRR Secure Erase, which uses the Secure Erase command built into the ATA specification.</p>
<p><strong>File Wiping Utilities</strong><br />
File wiping utilities are used to delete individual files from an operating system. The advantage of file wiping utilities is that they can accomplish their task in a relatively short amount of time as opposed to disk cleaning utilities which take much longer. Another advantage of file wiping utilities is that they generally leave a much smaller signature than disk cleaning utilities. There are two primary disadvantages of file wiping utilities, first they require user involvement in the process and second some experts believe that file wiping programs donâ€™t always correctly and completely wipe file information. Some of the widely used file wiping utilities include R-Wipe &amp; Clean, Eraser, Aevita Wipe &amp; Delete and CyberScrubs PrivacySuite.</p>
<p><strong>Disk Degaussing / Destruction Techniques</strong><br />
Disk degaussing is a process by which a magnetic field is applied to a digital media device. The result is a device that is entirely clean of any previously stored data. Degaussing is rarely used as an anti-forensic method despite the fact that it is an effective means to ensure data has been wiped. This is attributed to the high cost of degaussing machines, which are difficult for the average consumer to afford. A more commonly used technique to ensure data wiping is the physical destruction of the device. The NIST recommends that â€œphysical destruction can be accomplished using a variety of methods, including disintegration, incineration, pulverizing, shredding and meltingâ€.</p>
<p><strong>TRAIL OBFUSCATION</strong><br />
The purpose of trail obfuscation is to confuse, disorientate and divert the forensic examination process. Trail obfuscation covers a variety of techniques and tools that include â€œlog cleaners, spoofing, misinformation, backbone hopping, zombied accounts, trojan commandsâ€. One of the more widely known trail obfuscation tools is Timestomp (part of the Metasploit framework). Timestomp gives the user the ability to modify file metadata pertaining to access, creation and modification times/dates. By using programs such as Timestomp, a user can render any number of files useless in a legal setting by directly calling in to question the files credibility.</p>
<p>Another well known trail-obfuscation program is Transmogrify (also part of the Metasploit framework). In most file types the header of the file contains identifying information. A (.jpg) would have header information that identifies it as a (.jpg), a (.doc) would have information that identifies it as (.doc) and so on. Transmogrify allows the user to change the header information of a file, so a (.jpg) header could be changed to a (.doc) header. If a forensic examination program or operating system were to conduct a search for images on a machine, it would simply see a (.doc) file and skip over it.</p>
<p><strong>ATTACKS AGAINST COMPUTER FORENSICS</strong><br />
In the past anti-forensic tools have focused on attacking the forensic process by destroying data, hiding data, or altering data usage information. Anti-forensics has recently moved into a new realm where tools and techniques are focused on attacking forensic tools that perform the examinations. These new anti-forensic methods have benefited from a number of factors to include well documented forensic examination procedures, widely known forensic tool vulnerabilities and digital forensic examiners heavy reliance on their tools.</p>
<p>During a typical forensic examination, the examiner would create an image of the computers disks. This keeps the original computer (evidence) from being tainted by forensic tools. Hashes are created by the forensic examination software to verify the integrity of the image. One of the recent anti-tool techniques targets the integrity of the hash that is created to verify the image. By affecting the integrity of the hash, any evidence that is collected during the subsequent investigation can be challenged.</p>
<p><strong>OTHER REFERENCES</strong><br />
Some presentations about anti computer forensic can be downloaded in <a href="http://ws.hackaholic.org/slides/AntiForensics-CodeBreakers2006-Translation-To-English.pdf">here</a> and <a href="http://simson.net/ref/2007/slides-ICIW.pdf">here</a>.</p>
<p>This article is taken, ripped, and modified from http://en.wikipedia.org/wiki/Anti-computer_forensics.</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=106</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Computer Forensics</title>
		<link>http://ipsecs.com/web/?p=71</link>
		<comments>http://ipsecs.com/web/?p=71#comments</comments>
		<pubDate>Tue, 12 May 2009 09:15:05 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Forensics]]></category>
		<category><![CDATA[Incidents]]></category>
		<category><![CDATA[Investigation]]></category>
		<category><![CDATA[Management]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=71</guid>
		<description><![CDATA[Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums. Computer forensics is also known as digital forensics. The goal of computer forensics is to explain the current state of a digital artifact. The term digital artifact can include a computer system, a storage medium (such [...]]]></description>
				<content:encoded><![CDATA[<p><strong>Computer forensics</strong> is a branch of <a title="Forensic science" href="http://en.wikipedia.org/wiki/Forensic_science">forensic science</a> pertaining to legal evidence found in computers and digital storage mediums. Computer forensics is also known as <em>digital forensics.</em></p>
<p>The goal of computer forensics is to explain the current state of a <em>digital artifact.</em> The term digital artifact can include a computer system, a storage medium (such as a hard disk or CD-ROM), an electronic document (e.g. an email message or JPEG image) or even a sequence of packets moving over a computer network. The explanation can be as straightforward as &#8220;what information is here?&#8221; and as detailed as &#8220;what is the sequence of events responsible for the present situation?&#8221;</p>
<p>The field of Computer Forensics also has sub branches within it such as Firewall Forensics, <a title="Database Forensics" href="http://en.wikipedia.org/wiki/Database_Forensics">Database Forensics</a> and Mobile Device Forensics.</p>
<p>There are many reasons to employ the techniques of computer forensics:</p>
<ul>
<li>In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases).</li>
<li>To recover data in the event of a hardware or software failure.</li>
<li>To analyze a computer system after a break-in, for example, to determine how the attacker gained access and what the attacker did.</li>
<li>To gather evidence against an employee that an organization wishes to terminate.</li>
<li>To gain information about how computer systems work for the purpose of debugging, performance optimization, or reverse-engineering.<span id="more-71"></span></li>
</ul>
<p>Special measures should be taken when conducting a forensic investigation if it is desired for the results to be used in a <a class="mw-redirect" title="Court of law" href="http://en.wikipedia.org/wiki/Court_of_law">court of law</a>. One of the most important measures is to assure that the evidence has been accurately collected and that there is a clear chain of custody from the scene of the crime to the investigator&#8212;and ultimately to the court. In order to comply with the need to maintain the integrity of digital evidence, British examiners comply with the Association of Chief Police Officers (A.C.P.O.) guidelines<sup id="cite_ref-0" class="reference"><a href="http://en.wikipedia.org/wiki/Computer_forensics#cite_note-0"><span>[</span>1<span>]</span></a></sup>. These are made up of four principles as follows:-</p>
<p>Principle 1: No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court.</p>
<p>Principle 2: In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.</p>
<p>Principle 3: An audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.</p>
<p>Principle 4: The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.</p>
<h3><span class="mw-headline">The Forensics Process<br />
</span></h3>
<p>There are five basic steps to the computer forensics:</p>
<ol>
<li>Preparation (of the investigator, not the data)</li>
<li>Collection (the data)</li>
<li>Examination</li>
<li>Analysis</li>
<li>Reporting</li>
</ol>
<p>The investigator must be properly trained to perform the specific kind of investigation that is at hand.</p>
<p>Tools that are used to generate reports for court should be validated. There are many tools to be used in the process. One should determine the proper tool to be used based on the case.</p>
<h3><span class="mw-headline">Collecting Digital Evidence</span></h3>
<p>Digital evidence can be collected from many sources. Obvious sources include computers, cell phones, digital cameras, hard drives, CD-ROM, USB memory devices, and so on. Non-obvious sources include settings of digital thermometers, black boxes inside automobiles, RFID tags, and web pages (which must be preserved as they are subject to change).</p>
<p>Special care must be taken when handling computer evidence: most digital information is easily changed, and once changed it is usually impossible to detect that a change has taken place (or to revert the data back to its original state) unless other measures have been taken. For this reason it is common practice to calculate a <a class="mw-redirect" title="Cryptographic hash" href="http://en.wikipedia.org/wiki/Cryptographic_hash">cryptographic hash</a> of an evidence file and to record that hash elsewhere, usually in an investigator&#8217;s notebook, so that one can establish at a later point in time that the evidence has not been modified since the hash was calculated.</p>
<p>Other specific practices that have been adopted in the handling of digital evidence include:</p>
<ul>
<li>Imaging computer media using a writeblocking tool to ensure that no data is added to the suspect device.</li>
<li>Establish and maintain the chain of custody.</li>
<li>Documenting everything that has been done.</li>
<li>Only use tools and methods that have been tested and evaluated to validate their accuracy and reliability.</li>
</ul>
<p>Some of the most valuable information obtained in the course of a forensic examination will come from the computer user. An interview with the user can yield valuable information about the system configuration, applications, encryption keys and methodology. Forensic analysis is much easier when analysts have the user&#8217;s passphrases to access encrypted files, containers, and network servers.</p>
<p>In an investigation in which the owner of the digital evidence has not given consent to have his or her media examined (as in some criminal cases) special care must be taken to ensure that the forensic specialist has the legal authority to seize, copy, and examine the data. Sometimes authority stems from a search warrant. As a general rule, one should not examine digital information unless one has the legal authority to do so. Amateur forensic examiners should keep this in mind before starting any unauthorized investigation.</p>
<h4><span class="mw-headline">Live vs. Dead analysis</span></h4>
<p>Traditionally computer forensic investigations were performed on data at rest&#8212;for example, the content of hard drives. This can be thought of as a <strong>dead analysis.</strong> Investigators were told to shut down computer systems when they were impounded for fear that digital time-bombs might cause data to be erased.</p>
<p>In recent years there has increasingly been an emphasis on performing analysis on live systems. One reason is that many current attacks against computer systems leave no trace on the computer&#8217;s hard drive&#8212;the attacker only exploits information in the computer&#8217;s memory. Another reason is the growing use of cryptographic storage: it may be that the only copy of the keys to decrypt the storage are in the computer&#8217;s memory, turning off the computer will cause that information to be lost.</p>
<h3><span class="mw-headline">Imaging electronic media (evidence)</span></h3>
<p>The process of creating an exact duplicate of the original evidentiary media is often called <strong>Imaging.</strong> Using a standalone hard-drive duplicator or software imaging tools such as <a class="new" title="DCFLdd (page does not exist)" href="http://en.wikipedia.org/w/index.php?title=DCFLdd&amp;action=edit&amp;redlink=1">DCFLdd</a> or <a class="new" title="IXimager (page does not exist)" href="http://en.wikipedia.org/w/index.php?title=IXimager&amp;action=edit&amp;redlink=1">IXimager</a>, the <em>entire</em> <a class="mw-redirect" title="Hard drive" href="http://en.wikipedia.org/wiki/Hard_drive">hard drive</a> is completely duplicated. This is usually done at the <a title="Disk sector" href="http://en.wikipedia.org/wiki/Disk_sector">sector</a> level, making a bit-stream copy of every part of the user-accessible areas of the hard drive which can physically store data, rather than duplicating the filesystem. The original drive is then moved to secure storage to prevent tampering. During imaging, a write protection device or application is normally used to ensure that no information is introduced onto the evidentiary media during the forensic process.</p>
<p>The imaging process is verified by using the <a title="SHA hash functions" href="http://en.wikipedia.org/wiki/SHA_hash_functions">SHA-1</a> <a class="mw-redirect" title="Message digest" href="http://en.wikipedia.org/wiki/Message_digest">message digest</a> <a title="Algorithm" href="http://en.wikipedia.org/wiki/Algorithm">algorithm</a> (with a program such as <tt>sha1sum</tt>) or other still viable algorithms such as <a title="MD5" href="http://en.wikipedia.org/wiki/MD5">MD5</a>. At critical points throughout the analysis, the media is verified again, known as &#8220;hashing&#8221;, to ensure that the evidence is still in its original state. In corporate environments seeking civil or internal charges, such steps are generally overlooked due to the time required to perform them. They are essential for evidence that is to be presented in a court room, however.</p>
<h3><span class="mw-headline">Collecting Volatile Data</span></h3>
<p>If the machine is still active, any intelligence which can be gained by examining the applications currently open is recorded. If the machine is suspected of being used for illegal communications, such as terrorist traffic, not all of this information may be stored on the hard drive. If information stored solely in <a class="mw-redirect" title="Random access memory" href="http://en.wikipedia.org/wiki/Random_access_memory">RAM</a> is not recovered before powering down it may be lost. This results in the need to collect volatile data from the computer at the onset of the response.</p>
<p>Several Open Source tools are available to conduct an analysis of open ports, mapped drives (including through an active VPN connection), and open or mounted encrypted files (containers) on the live computer system. Utilizing open source tools and commercially available products, it is possible to obtain an image of these mapped drives and the open encrypted containers in an unencrypted format. Open Source tools for <a title="IBM PC compatible" href="http://en.wikipedia.org/wiki/IBM_PC_compatible">PCs</a> include <a title="Knoppix" href="http://en.wikipedia.org/wiki/Knoppix">Knoppix</a> and <a class="new" title="Helix (distro) (page does not exist)" href="http://en.wikipedia.org/w/index.php?title=Helix_%28distro%29&amp;action=edit&amp;redlink=1">Helix</a>. Commercial imaging tools include Access Data&#8217;s <a title="Forensic Toolkit" href="http://en.wikipedia.org/wiki/Forensic_Toolkit">Forensic Toolkit</a> and Guidance Software&#8217;s <a title="EnCase" href="http://en.wikipedia.org/wiki/EnCase">EnCase</a> application.</p>
<p>The aforementioned Open Source tools can also scan RAM and Registry information to show recently accessed web-based email sites and the login/password combination used. Additionally these tools can also yield login/password for recently accessed local email applications including MS Outlook.</p>
<p>In the event that partitions with <a title="Encrypting File System" href="http://en.wikipedia.org/wiki/Encrypting_File_System">EFS</a> are suspected to exist, the encryption keys to access the data can also be gathered during the collection process. With Microsoft&#8217;s most recent addition, Vista, and Vista&#8217;s use of BitLocker and the Trusted Platform Module (TPM), it has become necessary in some instances to image the logical hard drive volumes before the computer is shut down.</p>
<p>RAM can be analyzed for prior content after power loss. Although as production methods become cleaner the impurities used to indicate a particular cell&#8217;s charge prior to power loss are becoming less common. However, data held statically in an area of RAM for long periods of time are more likely to be detectable using these methods. The likelihood of such recovery increases as the originally applied voltages, operating temperatures and duration of data storage increases. Holding unpowered RAM below ?Â 60 Â°C will help preserve the residual data by an order of magnitude, thus improving the chances of successful recovery. However, it can be impractical to do this during a field examination.</p>
<h3><span class="mw-headline">Analysis</span></h3>
<p>All digital evidence must be analyzed to determine the type of information that is stored upon it. For this purpose, specialty tools are used that can display information in a format useful to investigators. Such forensic tools include: AccessData&#8217;s <a class="mw-redirect" title="Forensic Tool Kit" href="http://en.wikipedia.org/wiki/Forensic_Tool_Kit">FTK</a>, Guidance Software&#8217;s <a title="EnCase" href="http://en.wikipedia.org/wiki/EnCase">EnCase</a>, and Brian Carrier&#8217;s <a title="The Sleuth Kit" href="http://en.wikipedia.org/wiki/The_Sleuth_Kit">Sleuth Kit</a>. In many investigations, numerous other tools are used to analyze specific portions of information.</p>
<p>Typical forensic analysis includes a manual review of material on the media, reviewing the Windows registry for suspect information, discovering and cracking passwords, keyword searches for topics related to the crime, and extracting e-mail and images for review.</p>
<h3><span class="mw-headline">Reporting</span></h3>
<p>Once the analysis is complete, a report is generated. This report may be a written report, oral testimony, or some combination of the two.</p>
<p><strong>Taken From</strong> : http://en.wikipedia.org/wiki/Computer_forensics</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=71</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
