small block disk forensics and triage
play

Small-block Disk Forensics and Triage Outline Disk Structure. - PowerPoint PPT Presentation

Small-block Disk Forensics and Triage Outline Disk Structure. Triage. File Signatures. Discriminators. Contraband Identification. Sector-based Hashing. Conclusions. Author: Prof Bill Buchanan Small Block Disk Forensics and


  1. Small-block Disk Forensics and Triage · Outline · Disk Structure. · Triage. · File Signatures. · Discriminators. · Contraband Identification. · Sector-based Hashing. · Conclusions. Author: Prof Bill Buchanan

  2. Small Block Disk Forensics and Triage Outline Author: Prof Bill Buchanan

  3. Collection Preservation Analysis Reporting ACPO Good Practice Guide for Computer-Based Evidence · No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court. · In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that Outline person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions. · An audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result. Disk Forensics · The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to. Author: Prof Bill Buchanan Outline

  4. Collection Preservation Analysis Reporting This time could be measured in weeks, months or even years. Some Current Issues · Creating a drive image can be a lengthy process . For example 1.5TB can take one day to image. Time = 1.5 TB / 20 MBps (Firewire) = 75,000 seconds = 20 hours. · Number of devices to be imagined increases by the da y. We now have mobile phones, USB drives, cameras, netbooks, notebooks, iPads, etc. Outline · Need for real-time analysis . This might include border control applications. · Need for first responder analysis . · Need to discover whether the power should be taken away before imaging . There may be some evidence present, that could be destroyed if the power is taken away. Disk Forensics · Damaged systems may be difficult to analyse . · Complex systems with high computing requirements, especially with memory to buffer data, are required to analysis. Author: Prof Bill Buchanan Outline

  5. Small Block Disk Forensics and Triage Triage Author: Prof Bill Buchanan

  6. · Does it have contraband material? · Does it have running processes/ threads that require to be preserved? · Will the system destroy itself if we shut it down? · What’s the make -up of the content on Return with the system? Triage no issues · Will networked/Cloud infrastructure information be lost? Outline Send for analysis Disk Forensics Collection Preservation Analysis Reporting Author: Prof Bill Buchanan Outline

  7. · Sample disk for contraband. · Examine processes/threats. · Analyse registry/file structure. · Check for errors. · Check for system configuration, hardware, etc. · Check connected devices and network connections. · Examine for encrypted content. Return with · Examine for malware and check virus Triage no issues protection. · User/audit log activity. · Examine memory. · Check location information. Triage Send for analysis Disk Forensics Collection Preservation Analysis Reporting Author: Prof Bill Buchanan What to check?

  8. Forensics and Triage Small Block Disk Disk Structures Author: Prof Bill Buchanan

  9. Disk File Allocation Table Cluster 0 Cluster N Cluster 0 Allocation Allocation Cluster 1 Sec1 SecN Sec1 SecN Cluster 2 Allocation No of Clusters: N No of sectors per cluster: 1, 2, 4, 6, 16, 32, 64 or 128 No of bytes per sector: 512 bytes, 1KB, 2KB or 4KB Structure Cluster N Allocation Disk Forensics For 16-bit Cluster entry -> 2 16 entries -> 65,536 (64K) – FAT16 For 28-bit Cluster entry -> 2 28 entries -> 268,435,456 (256M) – FAT32 Author: Prof Bill Buchanan FAT

  10. Disk File Allocation Table Cluster 0 Cluster N Cluster 0 Allocation Cluster 1 Allocation Sec1 SecN Sec1 SecN Cluster 2 Allocation No of Clusters: N No of sectors per cluster: 1, 2, 4, 6, 16, 32, 64 or 128 No of bytes per sector: 512 bytes, 1KB, 2KB or 4KB Example: FAT16 - 64 sectors per cluster, 512 Bytes per sector Structure = 32kB per cluster Disk space = 64K * 32KB = 2048MB = 2 GB Cluster N Allocation FAT32 - 16 sectors per cluster, 512 Bytes per sector = 8kB per cluster Disk Forensics Disk space = 256M * 8KB = 2048GB = 2TB For 16-bit Cluster entry -> 2 16 entries -> 65,536 (64K) – FAT16 For 28-bit Cluster entry -> 2 28 entries -> 268,435,456 (256M) – FAT32 Author: Prof Bill Buchanan FAT

  11. Directory Entry FAT16 FileName1 Start Cluster No. Cluster 0 Allocation FileName2 Start Cluster No. Allocation Cluster 1 FileName3 Start Cluster No. Cluster 2 Allocation Disk Cluster 2 Cluster 1 Cluster 0 Cluster N Allocation Structure Cluster 3 Allocation Disk Forensics 0x0000 Available 0x0002 – 0xFFeF Next Cluster 0xFFF7 Bad Cluster Cluster N 0xFFFF Last Cluster Author: Prof Bill Buchanan FAT16 Example

  12. Directory Entry FAT16 Text.tst 0 Help.doc 1 Me.jpg 2 3 4 Disk 5 6 Cluster 2 Cluster 1 Cluster 0 Text.tst Help.doc 7 Structure 8 Cluster 5 Cluster 3 Cluster 4 Help.doc Cluster 8 Cluster 6 Cluster 7 Allocation Me.jpg Disk Forensics Me.jpg 0x0000 Available 0x0002 – 0xFFeF Next Cluster 0xFFF7 Bad Cluster Cluster N 0xFFFF Last Cluster Author: Prof Bill Buchanan Fragmentation

  13. Directory Entry FAT16 Text.tst 1 0 0x0005 Help.doc 0 0xFFFF 1 Me.jpg 8 0x0000 2 3 0x0000 4 0x0000 Disk 0xFFFF 5 6 0xFFFF Cluster 1 Cluster 2 Cluster 0 Help.doc Text.tst 7 0x0000 Structure 8 0x0006 Cluster 5 Cluster 3 Cluster 4 Help.doc Cluster 8 Cluster 6 Cluster 7 Allocation Me.jpg Disk Forensics Me.jpg 0x0000 Available 0x0002 – 0xFFeF Next Cluster 0xFFF7 Bad Cluster Cluster N 0xFFFF Last Cluster Author: Prof Bill Buchanan Fragmentation

  14. Forensics and Triage Small Block Disk File Signatures Author: Prof Bill Buchanan

  15. File Allocation Table: 1.txt 2.doc Test.doc -Delete.gif [deleted] Simple search for a graphic file will not find the deleted file Deep Analysis GIF89 Forensic Deep scan of the Disk (byte-by-byte) Author: Prof Bill Buchanan Analysis

  16. Prof. PLUM Change name from: Mypic.gif To Mypic.gif Mypic.dll Obfuscation Mypic.dll Prof. PLUM REVOLVER BALLROOM Forensic GIF89 a… . Author: Prof Bill Buchanan File Analysis

  17. Sig File ext File type 0x474946 *.gif GIF files GIF89a *.gif GIF files 0xFFD8FF *.jpg JPEG files JFIF *.jpg JPEG files 0x504B03 *.zip ZIP files 0x25504446 *.pdf PDF files %PDF *.pdf PDF files 0x0A2525454F460A *.pdf PDF file .%%EOF. *.pdf PDF file Obfuscation Data hiding Author: Prof Bill Buchanan File signature

  18. Sig File ext File type 0x006E1EF0 *.ppt PPT 0xA0461DF0 *.ppt PPT 0xECA5C100 *.doc Doc file 0x000100005374616E64617264204A6574204442 *.mdb Microsoft database Standard Jet DB *.mdb Microsoft database 0x2142444E *.pst PST file !BDN *.pst PST file 0x0908100000060500 *.xls XLS file 0xD0CF11E0A1B11AE1 *.msi MSI file 0xD0CF11E0A1B11AE1 *.doc DOC 0xD0CF11E0A1B11AE1 *.xls Excel 0xD0CF11E0A1B11AE1 *.vsd Visio 0xD0CF11E0A1B11AE1 *.ppt PPT 0x504B030414000600 *.docx Microsoft DOCX file Obfuscation 0x504B030414000600 *.pptx Microsoft PPTX file 0x504B030414000600 *.xlsx Microsoft XLSX file Data hiding Author: Prof Bill Buchanan File signature

  19. Sig File ext File type 0x465753 *.swf SWF file FWS *.swf SWF file 0x494433 *.mp3 MP3 file ID3 *.mp3 MP3 file 0x4C00000001140200 *.lnk Link file 0x4C01 *.obj OBJ file 0x4D4D002A *.tif TIF graphics MM *.tif TIF graphics 0x000000186674797033677035 *.mp4 MP4 Video ftyp3gp5 *.mp4 MP4 Video 0x300000004C664C65 *.evt Event file LfLe *.evt Event file Obfuscation 0x38425053 *.psd Photoshop file 8BPS *.psd Photoshop file 0x4D5A *.ocx Active X 0x415649204C495354 *.avi AVI file AVI LIST *.avi AVI file 0x57415645666D7420 *.wav WAV file WAVEfmt *.wav WAV file Rar! *.rar RAR file 0x526172211A0700 *.rar RAR file 0x6D6F6F76 *.mov MOV file Data hiding moov *.mov MOV file Author: Prof Bill Buchanan File signature

  20. Prof. PLUM Change name from: Mypic.gif To Myphoto.jpg Mypic.dll Obfuscation Prof. PLUM Myphoto.dll REVOLVER BALLROOM … .JFIF... Forensic Header: FFD8 Length: <2 bytes> Next: 4A,46,49,46,00 ( “JFIF” ) Author: Prof Bill Buchanan File name changing (JPEG)

  21. Meta-data Is still stored in file (but 16-bit Graphic has been character imported into format) PowerPoint (cookie_transpare nt_32colors.gif) Obfuscation Forensic Author: Prof Bill Buchanan File name changing (JPEG)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend