thomas chan thomas chan
play

Thomas Chan Thomas Chan Computer Forensic Investigator EnCE, ACE, - PowerPoint PPT Presentation

Curriculum Vitae Thomas Chan Thomas Chan Computer Forensic Investigator EnCE, ACE, CFCE, CBE, A+ Licensed Private Detective 14 years in Computer Forensics PC Forensics Executive Inspector General US Postal Inspector


  1. Curriculum Vitae • Thomas Chan Thomas Chan – Computer Forensic Investigator • EnCE, ACE, CFCE, CBE, A+ – Licensed Private Detective • 14 years in Computer Forensics – PC Forensics – Executive Inspector General – US Postal Inspector PCForensics@live.com

  2. InPrivate Browsing Not really private PCForensics@live.com

  3. Microsoft’s Internet Explorer 7 - • InPrivate Browsing is described as follows: PCForensics@live.com

  4. http://windows.microsoft.com/en-us/internet-explorer/products/ie-9/features/in-private

  5. InPrivate browsing is manually invoked:  Browsing history  Temporary internet files  Form data  Cookies  user names  passwords PCForensics@live.com

  6. Why do Websites collect information? PCForensics@live.com

  7. Click for Profit • Websites generate revenue – based on the number of times a user clicks on the website’s ads – pictures – information buttons – add to cart – click to purchase, etc. PCForensics@live.com

  8. Data • Websites gather visitor’s information by pushing files to users’ computers: • index.dat • cookies • Websites want unrestricted access to data via users’ browsers: • Number of visits by a user. • Things of interest to user PCForensics@live.com

  9. PRIVACY • Pop-up blockers • Ad blockers • InPrivate Browsing – limit the amount of information the websites need to stay in business. – Block advertising from Retailers selling products PCForensics@live.com

  10. Are your secrets safe from your boss or significant other? • Dating sites? • Match.com? • Yahoo Emails? • Internet Surfing? • Embarrassing pictures? PCForensics@live.com

  11. Embarrassing pictures? • Cat

  12. Scenario • Subject contends material found on computer was automatically downloaded by websites. • Subject denies personal involvement or responsibility. PCForensics@live.com

  13. Involuntary vs. Voluntary • done without will or conscious control. • independent of one's will; not by one's own choice. • done by intention, and not by accident. PCForensics@live.com

  14. Intent • If user opens a new browser window, the user must activate InPrivate browsing by Ctrl+Shift+P or from the menu. • InPrivate browsing does not automatically activate. • InPrivate activated for each window opened. PCForensics@live.com

  15. What do we find? • When In Private browsing is manually turned on – PrivacIE folder created. • URLs visited stored in the user’s PrivacIE folder. PCForensics@live.com

  16. Data Files • Websites gather visitor’s information by pushing files to users’ computers: • index.dat • cookies PCForensics@live.com

  17. INDEX.DAT • An index.dat is a database file that stores web addresses, searches, and recently opened files. • Index.dat files located on a user’s computer contain information of Web sites visited. PCForensics@live.com

  18. Types of Index.dat • Cookies • History • Temporary Internet • PrivacIE PCForensics@live.com

  19. Windows 7 stores Index.dat files in the following locations: • C:\Users\<Username>\AppData\Roaming \Microsoft\Windows\ Cookies \index.dat PCForensics@live.com

  20. Cookies • C:\Users\<Username>\AppData\Roaming\ Microsoft\Windows\ Cookies \low\index.dat Windows Vista, Windows 7 or Windows 8 PCForensics@live.com

  21. Cookies • A cookie is a data file sent from a Web Page server. • A cookie may contain an ID number, domain name, expiration date, tracking information, login names, and pages visited. • A web site stores your user account information in a cookie, so it can welcome you back. • Cookies are text files but not for spam or pop-up advertisements. PCForensics@live.com

  22. Temporary Internet files • C:\Users\<Username>\AppData\Local\ Microsoft\Windows\ Temporary Internet Files \Content.IE5\index.dat PCForensics@live.com

  23. History • C:\Users\<UserName>\AppData\Local\ Microsoft\Windows\ History \Content.IE5\index.dat PCForensics@live.com

  24. InPrivate browsing creates a folder named PrivacIE in these locations: • C:\users\<username>\AppData\Roaming\ Microsoft\Windows\ PrivacIE \index.dat • C:\users\<username>\AppData\Roaming\ Microsoft\Windows\ PrivacIE \Low\index.dat PCForensics@live.com

  25. Test PCForensics@live.com

  26. Turn on InPrivate PCForensics@live.com

  27. Go to Match.com PCForensics@live.com

  28. Create Account

  29. Create Profile

  30. 12 matches

  31. Opportunity?

  32. Chemistry

  33. Forensic software • Search terms

  34. What could we find? • Rabbit

  35. Search Terms PCForensics@live.com

  36. EnCase

  37. Anyone look familiar?

  38. Anyone we know?

  39. • URLs visited are stored in the user’s PrivacIE folder. PCForensics@live.com

  40. Mfehidin001.etl - PrivacIE PCForensics@live.com

  41. MFEHIDIN001

  42.  What happens when you make a request to a website? PCForensics@live.com

  43. Index.dat • IE (Cache) Index.dat shows HTTP/1.1 200 OK response from website to user request. PCForensics@live.com

  44. 200 OK is the standard response for successful HTTP requests to a website. – The actual response depends on what user wants. • In a GET request, the response will contain the requested resource. • In a POST request, the response will contain a description or result of the action. PCForensics@live.com

  45. EnCase PCForensics@live.com

  46. Results • PrivacIE folder created using InPrivate browsing. • Indication of Websites responses to user requests through browser. PCForensics@live.com

  47. Conclusion • User deliberately invoked InPrivate browsing. • Website responses caused by deliberate actions of user. PCForensics@live.com

  48. InPrivate Browsing • How about Microsoft Edge Browser?

  49. Microsoft Edge

  50. Disclaimer: Neither confirm nor deny the events. Plausible deniability.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend