Adam Daniel Ruxcon 2014 Introduction Who Am I Stared working in - - PowerPoint PPT Presentation

adam daniel ruxcon 2014 introduction who am i stared
SMART_READER_LITE
LIVE PREVIEW

Adam Daniel Ruxcon 2014 Introduction Who Am I Stared working in - - PowerPoint PPT Presentation

The Devil Is In The Detail Adam Daniel Ruxcon 2014 Introduction Who Am I Stared working in Data Recovery and Data Conversion in 1992 with Doctor Disk. Begun working in Computer Forensics in 1998 with Forensic Data Services.


slide-1
SLIDE 1

The Devil Is In The Detail

Adam Daniel – Ruxcon 2014

slide-2
SLIDE 2

Introduction – Who Am I

Devil in the Detail – Ruxcon 2014 Page 2

  • Stared working in Data Recovery and Data Conversion in

1992 with Doctor Disk.

  • Begun working in Computer Forensics in 1998 with

Forensic Data Services.

  • Worked for Deloitte and Ernst and Young in their

forensic and eDiscovery divisions for a number of years.

  • Original Ruxcon crew (Did the 1st talk at the 1st rux in

2003).

  • Now a Manager with Ferrier Hodgson Forensic IT.
slide-3
SLIDE 3

Computer Forensic Tools – A Brief History

Devil in the Detail – Ruxcon 2014 Page 3

Direct Disk and Binary/Hex editors

  • Nortons Disk Edit
  • Winhex
  • Acronis
  • Media Tools
  • Linux Binary Editors\Custom Recovery Tools

Capabilities

  • Direct Disk Access
  • Media data surface analysis in hex.
  • File system analysis (Partition tables, FAT tables, MFT).
  • Simple keyword searching (no indexing).
  • Data recovery and extraction (File system repair, simple carving)
slide-4
SLIDE 4

Computer Forensic Tools – A Brief History

Devil in the Detail – Ruxcon 2014 Page 4

Dedicated Forensic Analysis tools.

  • Encase (Expert Witness)
  • Forensic Tool Kit (FTK)
  • Xways (Winhex)
  • FEX – Forensic Explorer (Just released)

Capabilities

  • Media data surface analysis in hex.
  • File system analysis.
  • Artefact Analysis.
  • Compound file support.
  • Advanced keyword searching (indexing in FTK, bookmarks).
  • File viewers.
  • Galley Viewer
  • Data Carving, Data recovery.
  • Advanced Scripting (Enscript)
  • Advanced categorisation (FTK)
slide-5
SLIDE 5

Computer Forensic Tools – A Brief History

Devil in the Detail – Ruxcon 2014 Page 5

Advanced File Analysis and legal review.

  • NUIX
  • Intella
  • Legal review platforms (Relativity, Ringtail, EDT)

Capabilities

  • Advanced meta data extraction.
  • Compound file support.
  • Advanced keyword searching (Complex Queries).
  • Text Analytics, Visual Analytics.
  • File format support.
  • Data Carving, Data recovery.
  • Advanced Scripting (Nuix).
  • Advanced legal review functionality
slide-6
SLIDE 6

Computer Forensic Tools – A Brief History

Devil in the Detail – Ruxcon 2014 Page 6

Artefact Analysis and Timeline Generation. (Point and Click scriptkiddy forensics?)

  • Log2timeline
  • Internet Evidence Finder
  • Various individual tools, scripts, parsers.

Capabilities

  • Individual Artefact analysis modules
  • Visual Timeline generation (IEF)
  • Non-standard artefact modules
  • Centralised reporting
  • Expanding support for new analysis techniques

(Shellbags, Cloud storage)

  • Data offsets, contextual data provided.
slide-7
SLIDE 7

Forensic Artefacts –Time Line Analysis

Devil in the Detail – Ruxcon 2014 Page 7

File System

  • MTF, File Entries, FAT, Log, Journal

Registry

  • MU lists, USB Analysis, Proprietary software entries

Link Files

  • Recent Files, Most Used, Shortcuts

Jump Lists

  • Recent Files, Most Used, Shortcuts

Internet History

  • Searches, Web history, Recent files, Webmail, Cloud

Email

  • Sent, Received, Recipient Lists, address books, calendar, Web mail

Instant messenger

  • Discussions, files sent, system access

System Restore Points

  • Registry Backups, File backs, Links files etc

Prefetch

  • Software Access

Shell Bags

  • File access, Software Access
slide-8
SLIDE 8

Time Line Case Study – Online Fraud

Devil in the Detail – Ruxcon 2014 Page 8

  • Australian Manufacturing organisation
  • Numerous Asia-Pac suppliers
  • Approximately $1 million fraud
  • Attacker utilised a weak point in the business

process (supplier IT security, payment process)

  • “Man-in-the-middle” style deception
  • Analysis Tools Used – Nuix, LibPDF, ExifTool
  • Time Line Analysis
slide-9
SLIDE 9

Time Line Case Study – Online Fraud

Page 9

  • Early September 2013
  • Supplier “hacked” by unknown group (1)
  • Causes minor interruption in business processes between supplier and client
  • Hacking incident is mentioned to the client in an informal email. (2)
  • Supplier contact utilises a account for communications with client
  • Attacker begins monitoring supplier operations

1 Supplier Web Mail Client 2

Devil in the Detail – Ruxcon 2014

slide-10
SLIDE 10

Time Line Case Study – Online Fraud

Page 10

  • Late September 2013
  • Supplier sends a payment reminder email to client ($1 million) (3)
  • Attacker observes outgoing email. Creates a web based account with a

name very similar to the supplier’s personal account (4) 4 Supplier Client 3 Web Mail

Devil in the Detail – Ruxcon 2014

slide-11
SLIDE 11

Time Line Case Study – Online Fraud

Page 11

  • Late September 2013
  • Attacker sends an email from the fake account to the client providing new

banking details. States need to change the account due to an audit. (5)

  • Over the course of the next three days the attacker resends this three times

x3

Supplier Client 5 Web Mail

Devil in the Detail – Ruxcon 2014

slide-12
SLIDE 12

Time Line Case Study – Online Fraud

Page 12

  • Late September 2013
  • Client (following standard policies) requests that the change is verified via a

formal letter signed by Supplier MD on company letterhead. (6)

  • Attacker disables the client’s email server with a Denial of Service attack (7)
  • Creates a Yahoo email account under the name of the client account manager

Sends a request to supplier for a document signed by MD “for their records”. Supplier Client 6 7 Yahoo Web Mail

Devil in the Detail – Ruxcon 2014

slide-13
SLIDE 13

Case Study – Recent Online Fraud

Page 13

  • Early October 2013
  • Email to the Supplier uses the same tactics (previous text, sig block etc).
  • Supplier sends a PDF’d letterhead document and sends to the attacker (8)
  • Attacker edits the PDF to reflect the desired bank account changes (9)
  • Attacker sends the altered PDF to the Client. The client now has a formal,

signed request to alter the bank account details on Supplier letterhead (10) 9 Supplier Client 8 10 Yahoo Web Mail

Devil in the Detail – Ruxcon 2014

slide-14
SLIDE 14

Case Study – A Complex Attack

Page 14

  • Early October 2013
  • Supplier had been trying to send a follow up email to the legit client during

the email server downtime. When the server is repaired this email arrives.

  • Client responds that the payment is going through soon (11)
  • Attacker sends an email to the client reinforcing the changed bank account

details. Supplier Client 11 12 Web Mail

Devil in the Detail – Ruxcon 2014

slide-15
SLIDE 15

Time Line Case Study – Online Fraud

Page 15

  • Early October 2013
  • Client makes payment into attackers bank account.
  • Supplier informs Client that payment has not been received (13)
  • Client replies stating that payment should have gone through (14)
  • Attacker replies to this email stating that there have been problems with

their accounts and not to worry about it for a few days (15) 14 Supplier Client 13 15 Web Mail

Devil in the Detail – Ruxcon 2014

slide-16
SLIDE 16

Questions or Comments?

Page 16

Adam.daniel@fh.com.au

Devil in the Detail – Ruxcon 2014

slide-17
SLIDE 17

DON’T LET THE ALIENS PROBE YOUR BUM! JOIN THE RESISTANCE!