Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf ·...

27
Forensics & Anti- Forensics YingJian Wang [email protected] 2007-11-15

Transcript of Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf ·...

Page 1: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

Forensics & Anti- Forensics

YingJian [email protected]

2007-11-15

Page 2: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

2

Who Am I ?

• The Orgenizer of XCon• The Founder of XFocus Team• The CEO of HYXA Science Techonlogy

Co., Ltd • Sr. Researcher of Institute for

Internet Behavior, TsinghuaUniversity

• ……

Page 3: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

3

Agenda

• Forensics –Demo : File Slack and Delete File –Demo : Link File Analyse–Demo : USB Removal Storage Analyse

• Anti-Forensics • Forensics in Hack• What is our problems that we had

Solved

Page 4: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

4

Presentation Attention

• Clue Relationship Analyse• Technical details• Technology extend

Page 5: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

5

What do the Forensics do?

• Find more file about your case• Find the relationships between file

and file• Let the suspect can NOT deny• ……

Page 6: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

6

Forensics Process

• Get Evidence–Software:DD, Ghost, Encase, FTK ……–Hardware:DriveLock, Logicube MD5 &

Sonix, UltraBlock, Solo3 ……

• Analyse Evidence–Data Recovery–File Check (Find, Encrypt, Signature…)

Page 7: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

7

Forensics & Investigation

• What is it different with Forensics and Inverstigation ?–Forensics:

• We had deduce who is the suspect , now need prove it is him.

• We know what will be found (keyword…).

– Inverstigation:• We don’t know who is the suspect , we need

find some clues• We need check every file by possible file

time, file format etc .

Page 8: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

8

Forensics Tools

• Business Software:–EnCase, Forensics ToolKit, Fact-Based Investigation, MacForensicsLab……

• Free Software:–DD, WinAudit, Fau, Nigilant32, Helix……

Page 9: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

9

3 Parts

• Data Recovery & Searches• Application & System log ( File &

Registry )• Removable Storage

Page 10: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

10

Data Recovery & Searches

• Everybody know how about delete a file & format a vol can be recoveried

• But After Disk defragment ?After format and Install new OS ?

• Yes, we can find some infor yet

Page 11: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

11

File Slack

Logistic Size

Physical Size

2K

1.6K

0.4KFile Slack

Page 12: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

12

Demo

• Internet Access Check :Background: Some Department ‘s

computer only access intranet or don’t connect any computer.

Intention: Check if access lawless netMethod: Find http , ftp , cookie …

Page 13: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

13

Application & System log

• Log File : *.evt *.log etc …• For example:

–AOL Messager%Windows%\aim95\*.dat, *.tmp

–Acrobat: HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\xxxx\AVGeneralHKEY_CURRENT_USER\Software\Adobe\Acrobat\xxxx\Weblink\xxxx

Page 14: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

14

Application & System log

–Google ToolbarHKEY_CURRENT_USER\Software\Google\NavClient\1.0, 1.1%AppData%\Google\Local Search History\google*web.w

–Cute ftp%ProgramFiles%\GlobalSCAPE\CuteFTP\sm.dat , sm.bak%ProgramFiles%\GlobalSCAPE\CuteFTP\log

Page 15: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

15

Demo: Link File Analyse

• Link File relate to target object including:–Files–Applications–External drives–Printers – Folders

Page 16: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

16

Inside the Link File

• The Created, accessed and last written time of the object

• Name• Full path of object • Volume lable• Volume ID• ……

Page 17: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

17

Demo: USB Removal Storage Analyse

• USB Thumb Drive Process– Review SetupAPI.log

• Section header for date and time of install• Device manufacturer and name • Device unique ID

– Review Registry Entries• USBstor Key• Subkey for device name uniqueID & ParentID Prefix• Mounted Devices key• To map dos Device entry to ParentID Prefix

– Review VolumeID• Physical drive volume ID from volume boot record• Link File

Page 18: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

18

Anti-Forensics

• Wipe can reply all Host Forensics Tools• Counterfeit Evidence• Chicanery : If you want to hack, you can

make a been hacked environment.• When you can’t wipe log , you might let

forensics become very complex and very difficult

• If you are hacking a honeypot and 3 administrators are looking anything , how to do?

Page 19: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

19

Forensics in Hack

• By Forensics Tools, we can recovery and find more file quickly and exact

• We can get more information about administrator, enlarge hack harvest

• Data Analyse

Page 20: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

20

Our Problem

• We can touch the target machine , but we don’t have the user password–We want to know “******” Password–We want to See EFS file content–We want to know password in DPAPI

• MSN, Outlook, FTP, IE Saved Password ……

–We want to know the SAM password –……

Page 21: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

21

Done

• We can crack SAM password to ClearText by P4 2.8G & Memory 1G–From SAM, SamDump, Password Hash–Lowercase+Capital+Digital+Symbol

• Ciphertext Space is 62n (n is passwd length )• If n=14, we need maximal 3 mins maximum

–Lowercase+Capital+Digital• Ciphertext space is 97n (n is passwd length )• If n=14, we need 40 mins maximum

Page 22: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

22

Done

• EFS had been cracked.

EFS Encryption EFS Decryption

Page 23: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

23

Done

• We can get ClearText or HashText–We can log on windows system–We can check EFS file–We can put the axe in the helve –……

Page 24: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

24

Question ?

Page 25: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

25

Thank you

• Thank you for your Patience!• Thank you for Vangelis invite me !• Sorry for my bad English !

Page 26: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

26

Waitting For You!

• XFocus Team–http://www.xfocus.org

• XCon–XFocus Information Security Conference–http://xcon.xfocus.org

• We Research the Projects:–Vulnerability Discovery –Mobile Hack & Exploitation & Forensics–GSM/CDMA/WCDMA Security

Page 27: Forensics & Anti- Forensics - Power Of Communitypowerofcommunity.net/poc2007/casper.pdf · Anti-Forensics • Wipe can reply all Host Forensics Tools • Counterfeit Evidence •

감사합니다 !!!

[email protected]