Effective Discovery Techniques In Computer Crime Cases.

26
Effective Discovery Techniques In Computer Crime Cases

Transcript of Effective Discovery Techniques In Computer Crime Cases.

Page 1: Effective Discovery Techniques In Computer Crime Cases.

Effective DiscoveryTechniques In Computer Crime Cases

Page 2: Effective Discovery Techniques In Computer Crime Cases.

Introduction

Page 3: Effective Discovery Techniques In Computer Crime Cases.

Storm’s Edge Technologies

IT Consulting Company servicing the Dallas/Fort worth area. Services

PC Support and Custom Built PCs Server Support and Custom Built Server Network Support Firewall Support Web Site Development/Hosting Custom Application Development Computer Forensics Disaster/Data Recovery Services

Page 4: Effective Discovery Techniques In Computer Crime Cases.

Contact Information

Daniel A. FitzGerald

P.O. Box 8995

Fort Worth, TX 76124

Email: [email protected]

Phone: 817.496.4956

Fax: 817.496.3435

Web: www.stormsedge.com

Page 5: Effective Discovery Techniques In Computer Crime Cases.

Forensic Process

Page 6: Effective Discovery Techniques In Computer Crime Cases.

Overview

Page 7: Effective Discovery Techniques In Computer Crime Cases.

Stage of the Forensic Process

Page 8: Effective Discovery Techniques In Computer Crime Cases.

Stage of the Forensic Process

Page 9: Effective Discovery Techniques In Computer Crime Cases.

Stage of the Forensic Process

Page 10: Effective Discovery Techniques In Computer Crime Cases.

Stage of the Forensic Process

Page 11: Effective Discovery Techniques In Computer Crime Cases.

Stage of the Forensic Process

Page 12: Effective Discovery Techniques In Computer Crime Cases.

Forensic Timeline

Page 13: Effective Discovery Techniques In Computer Crime Cases.

Computers or Spies?

What can we determine from a PC Users Passwords Web-Sites viewed Documents opened Pictures viewed Age of PC Last Reboot Time What files have been accessed,

deleted, modified, etc…

Page 14: Effective Discovery Techniques In Computer Crime Cases.

Computers or Spies?

What can we determine from a PC Who created the document When documents were printed What software created the document What devices where used Who has used the PC What software has recently be used When the OS was installed The possibilities too numerous to list!

Page 15: Effective Discovery Techniques In Computer Crime Cases.

Integrating the PC

Registry Files contain an abundant amount of information to include Usernames/Passwords for email,

websites, and programs Internet Sites visited along with

date/times Search Terms used on Google and

other search engines. Recent file activity/access List of software installed

Page 16: Effective Discovery Techniques In Computer Crime Cases.

Integrating the PC

Registry Files contain an abundant amount of information to include Screen Saver required Password User Logon Required or Not Date Windows was Installed Date each user last logged on. Etc…

Page 17: Effective Discovery Techniques In Computer Crime Cases.

Integrating the PC

PC Event Logs can provide some insight into the use of a PC Change in System Time Boot/Startup Times Problems with drivers & devices

Because the event logs generally cover a time period of several months they can provide a good history of activity.

Page 18: Effective Discovery Techniques In Computer Crime Cases.

Other Files

INI files are used by programs to store information/configuration. Plain Text Safe for Export

LNK (Short Cut) files will often provide insight to the users programs

Start Menu will give you a list of the common program they run/access.

Page 19: Effective Discovery Techniques In Computer Crime Cases.

Alibi with a PC

Establish who was using the PC UserID/Password Screen Saver w/Password User Specific knowledge like logging

into MySpace web-site.

Establish PC has the correct time Check BIOS date vs. windows date Check Event Log for time sync events

Page 20: Effective Discovery Techniques In Computer Crime Cases.

Alibi with a PC

Determine Activity and Time File Dates (Creation, Access, Modified) Web-Site Activity Email Activity Printer Activity

Page 21: Effective Discovery Techniques In Computer Crime Cases.

Classified/Sensitive Data

How to perform a Forensic Analysis when you can not possess the data. Identify who has secured the evidence Determine local policies in providing access Process the Forensic Image files Review any Sensitive Data on-site Generate Report

Extract non-sensitive files for processing in your own forensic lab.

Request a review and copy of the report to ensure no classified/sensitive data is exported.

Page 22: Effective Discovery Techniques In Computer Crime Cases.

Extracting Non-Sensitive Files

Files to Extract for later processing Registry Files Event Logs INI Files LNK Files Access Database of all files

FTK will create this as part of its normal processing of the Forensic Image Files.

EnCase will need to export a CSV file.

Page 23: Effective Discovery Techniques In Computer Crime Cases.

What is …

Slack Space – The area between the end of the file and the end of the cluster.

Free Space – The area available to store data including areas where files were stored but have been deleted.

Unallocated Space – The area of a device that is not covered by a partition. This would include any deleted partitions.

Swap File – File used to cache memory to the hard drive

Hibernation File – File used to store memory to the hard drive when hibernating

Page 24: Effective Discovery Techniques In Computer Crime Cases.

How Do I?

Prove a USB Key was used on a PC Prove an Image was viewed Recover Deleted Files Determine if a user has opened a file Prove a file was copied/moved Find out when a file was deleted Demonstrate a PC was used remotely Show who created a file Etc…..

Page 25: Effective Discovery Techniques In Computer Crime Cases.

Open Questions

Page 26: Effective Discovery Techniques In Computer Crime Cases.

Storm’s Edge Technologies

Daniel A. FitzGerald

P.O. Box 8995

Fort Worth, TX 76124

Email: [email protected]

Phone: 817.496.4956

Fax: 817.496.3435

Web: www.stormsedge.com