SlideShare une entreprise Scribd logo
1  sur  68
Why are there so many tools left at the end of the money?




Richard Austin MS, CISSP
Southern Polytechnic State University

ADVANCED DIGITAL FORENSICS
WITH OPEN SOURCE TOOLS
IT Elder Flatulence
Bio
                                       My First Computer

   Richard is a 30+ year veteran of the IT industry in positions ranging from
    software developer to security architect. Before beginning a career as an
    independent cybersecurity consultant and educator, he was focused on
    technology and processes for successfully protecting the 14PB storage area
    network infrastructure within the global IT organization of a Fortune 25
    company.
   MS degree with a concentration in information security from Kennesaw State
    University, a DHS/NSA recognized National Center of Academic Excellence in
    Information Assurance Education.
   Active member of SNIA's Security Technical Working Group.
   Active member of the Cloud Security Alliance’s Trusted Cloud Initiative.
   Senior Member of both the IEEE and ACM and also a member of the IEEE
    Computer Society, CTIN, ISC(2) and the Atlanta Chapter of Infragard .
   Book review columnist for IEEE Cipher, the newsletter of the IEEE Computer
    Society Technical Committee on Security and Privacy
   A published author frequently writing and presenting on storage networking
    security, ethics and digital forensics.


                         Advanced Digital Forensics with Open Source Tools
Forensics is Changing

Digital forensics was once solely concerned with
just collecting and analyzing disk images from a
cold, dead system but much useful information
         leaves few durable traces on disk




               Advanced Digital Forensics with Open Source Tools
Two New Areas

 Live memory collection and analysis
 Registry analysis




 Though commercial tools are available, Open
    Source tools provide much of the same
                 functionality

               Advanced Digital Forensics with Open Source Tools
Collecting Live Memory




          Advanced Digital Forensics with Open Source Tools
Why Live Memory?

 The bad people are very interested in forensic
  technology and follow quite closely what we do
   Contrary to popular opinion, this stuff ain’t secret
   They know that we image disks so they do things that
    don’t leave disk traces
     Memory-only malware
 A lot of information may not leave clearly
  discernable disk traces
   Open network connections
   Active encryption – data may only be in plaintext while
    the system is running

                 Advanced Digital Forensics with Open Source Tools
How do you do it?

 Just like any other forensic task
   You collect the data
   You extract information from it
 So what’s all the hub bub, bub?
   IAxx architectures don’t have a “DUMP” button
     Rely on software to dump main memory (the
      infamous BSOD and crashdump)
   Reading memory dumps is the province of O/S
    level debuggers
     Great tools but you have to be a Windows/*UX
      internals guru to understand and use them
                Advanced Digital Forensics with Open Source Tools
Remember!

 When working with a compromised system,
 remember you’re working with Satan’s
 computer
   You have no clue what the attacker may have
    done to it




                 Advanced Digital Forensics with Open Source Tools
Issues

 User mode access to the .PhysicalMemory
  object was removed in Vista/2003 and later
   This was a serious security issue – it’s gone; not
    coming back; get over it!
   Many older live memory acquisition tools no
    longer work
 For Vista/2003 and later, a utility must load a
  kernel mode driver to get access to physical
  memory
   Some vendors call this an “agent”

                 Advanced Digital Forensics with Open Source Tools
Issues

 Running a program to collect memory
  contents does change the state of memory
  (and maybe disk)
   Can’t be helped
   If physical memory is full, something may be
    swapped out when you run the program
   Documented, repeatable process is key
 You are only collecting physical memory
   Swapped out pages will not be in the image

                Advanced Digital Forensics with Open Source Tools
Data Triage




•Consider the order of volatility
    •Relevance of the type of information to the case under investigation


                       Advanced Digital Forensics with Open Source Tools
Lots of Options

 Memoryze from Mandiant
  http://www.mandiant.com/software/memory
  ze.htm
 The usual forensic vendors have their tools
 I’ll be demoing winxxdd (community edition)
  from http://www.moonsols.com/products/
   This free version does have limitations such as not
    running from a removable device or via a script.


                Advanced Digital Forensics with Open Source Tools
Win32dd




          Advanced Digital Forensics with Open Source Tools
Hash the Image




         Advanced Digital Forensics with Open Source Tools
Points to Remember

 You must be able to run a program as
  ADMINISTRATOR on the system
   For remote access:
     psexec
     Remote Desktop
     Etc
   This does change the state of the system
     Students are surprised to see win32dd in the list of
      running processes


                  Advanced Digital Forensics with Open Source Tools
Analyzing the Memory Image
OK, I got it but what do I do with it?




                          Advanced Digital Forensics with Open Source Tools
Volatility

 https://www.volatilesystems.com/default/volatili
  ty
 Open Source, written in Python
   Python is a well-known scripting language
   Download Python from www.activestate.com
 The 1.3 version only supports XP SP2 and SP3
   Version 1.4 in in RC and supports Vista and Windows 7
    as well as incorporating many improvements
     http://code.google.com/p/volatility/
     Already installed on REMnux

                  Advanced Digital Forensics with Open Source Tools
Update

 Volatility 2.0 is now released!!!
   Includes a standalone Windows installer




                Advanced Digital Forensics with Open Source Tools
Using Volatility

 Very simple command-line interface:
   python volatility command –f image_file
     1.4 adds --profile=profile to identify the O/S
 Notable commands:
   ident – descriptive information about the dump file
   datetime – date/time information for the dump file
      (included in ident)
     pslist – list of processes
     files – list of files open for each process
     connections – open network connections
     sockets – open sockets
                    Advanced Digital Forensics with Open Source Tools
ident



 In 1.4, this command becomes imageinfo




                Advanced Digital Forensics with Open Source Tools
pslist




         Advanced Digital Forensics with Open Source Tools
Scan vs List

 Some commands have two versions – list and
  scan
 The difference is that list follows the normal way
  of doing things
   e.g., listing processes by following the EPROCESS list
 scan scans through memory looking for data
  structures (e.g., _EPROCESS)
   Psscan will find terminated and de-linked processes
    (one stealth technique used by rootkits)
   The scan version is much slower because it is scanning
    memory contents rather than walking a linked list
                 Advanced Digital Forensics with Open Source Tools
psscan




                                                             Terminated
                                                                 FTP
                                                              processes




         Advanced Digital Forensics with Open Source Tools
files




        Advanced Digital Forensics with Open Source Tools
connections



                                                             FTP




         Advanced Digital Forensics with Open Source Tools
Connections vs Connscan2




         Advanced Digital Forensics with Open Source Tools
sockets




          Advanced Digital Forensics with Open Source Tools
netscan

 For Vista and later, these are consolidated into
  netscan




     Sample output taken from the Volatility 1.4 wiki
     http://code.google.com/p/volatility/wiki/CommandReference#netscan




                             Advanced Digital Forensics with Open Source Tools
Protocol Numbers




         Advanced Digital Forensics with Open Source Tools
And the Registry

 Locating the Registry -- hivelist




               Advanced Digital Forensics with Open Source Tools
Listing Keys




         Advanced Digital Forensics with Open Source Tools
Examining Values




         Advanced Digital Forensics with Open Source Tools
Services – Where malware
hides




         Advanced Digital Forensics with Open Source Tools
What does it all mean?

 Working with memory
  contents does require a
  bit of knowledge about
  what it all means
 These are two good
  reference books on
  how Windows really
  works and what you’re
  looking at in a memory
  dump
                  Advanced Digital Forensics with Open Source Tools
BUT What About Vista, …?

 Volatility is nice but it only works on XP. So if you
  need to look at memory on Vista, Server 2003,
  etc, you’re back to using strings ….
   Of course not:
     1.4 is in RC and is installed in the REMnux CD (and virtual
      appliance)
     And other tools are a little more arcane but they work
        The Windows Debugging Tools can be used to analyze a
         Windd dump IFF it’s made in crashdump format (-d option)
        http://www.msuiche.net/con/BlackHat_Webcast_New_Fron
         tiers_in_Forensics.pdf

                   Advanced Digital Forensics with Open Source Tools
Active Processes




         Advanced Digital Forensics with Open Source Tools
Don’t get too comfortable …
Particularly Part
III on Anti-
Forensics




                    “In war the will is directed at an animate object that reacts.”
                                      Carl Von Clausewitz, On War




                       Advanced Digital Forensics with Open Source Tools
Registry Extraction and Analysis




          Advanced Digital Forensics with Open Source Tools
Windows Registry

 The Windows registry has been found to
  contain a treasure trove of information useful
  to the forensic analyst
   The good news is that disk imaging includes the
    registry
 New tools are simplifying the process of
  extracting this information in a useful format



                Advanced Digital Forensics with Open Source Tools
Nomenclature

            Value                                        Data
                                Type




Key

Subkey




           Advanced Digital Forensics with Open Source Tools
Registry File Locations
System             %WINDIR%system32configSystem
SAM                %WINDIR%system32configSam
Security           %WINDIR%system32configSecurity
Software           %WINDIR%system32configSoftware
NTUSER.DAT         Documents and SettingsUser


   Simply extract these files from the image
       Security on NTUSER.DAT may prevent copying so use the type command to
        make a copy:
        type NTUSER.DAT>somewhere else




                          Advanced Digital Forensics with Open Source Tools
Note

 I’m going to be showing some representative
  samples of the information available and the
  things they imply about events in the real
  world.
 If you get lost in the key-value wilderness,
  don’t despair – it’s all in the book.
   What book? Be patient.




               Advanced Digital Forensics with Open Source Tools
Mounting images

 You need to extract the registry files out of
  the disk image
   P2Explorer is a very useful tool provided free by
    Paraben
     http://www.paraben.com/p2-explorer.html
     It allows you to mount disk images on a Windows
      system (free edition only works on 32-bit versions)
   OSFMount from PassMark software is another
    option
     Works on both 32 and 64 bit Windows

                 Advanced Digital Forensics with Open Source Tools
Mounting An Image




         Advanced Digital Forensics with Open Source Tools
Mounting An Image




         Advanced Digital Forensics with Open Source Tools
Accessing Registry Files




         Advanced Digital Forensics with Open Source Tools
Advantages of Mounted Image

 Mounting the image basically gives you read-
  only access to the contents of the image as a
  drive letter
   Windows Explorer, anti-malware, etc, can be used
   No need to export everything in advance




               Advanced Digital Forensics with Open Source Tools
Other Options

 FTKImager is a free download from
  AccessData (developers of The Forensic
  Toolkit)
 It can be used to open a disk image and
  export the registry files




              Advanced Digital Forensics with Open Source Tools
Exporting Registry Files
Imager can open most of the
common image formats (dd,
EnCase, etc)




                         Advanced Digital Forensics with Open Source Tools
Exporting Registry Files
Once the image is
opened, students see a
familiar directory tree
and just have to
navigate to the registry
file locations


Files are exported by
right clicking the file
and selecting “Export”
from the menu




                           Advanced Digital Forensics with Open Source Tools
Analyzing the Registry




          Advanced Digital Forensics with Open Source Tools
Resource
        This is an excellent book that covers
         many of the registry analysis tasks in
           detail
            RegRipper is the tool used for analyzing
             the registry after it is collected
            http://www.regripper.net/RegRipper/ and
             also available on the tools CD that
             accompanies the book
            You can read my book review at
             http://www.ieee-
             security.org/Cipher/BookReviews
             (shameless self-promotion)


             Advanced Digital Forensics with Open Source Tools
The Case: Price Software

 Tom Warner is suspected of industrial espionage
   He was upset about being passed over for a VP
    position
   He is alleged to have set up a quid pro quo deal with a
    competitor
   He may have colluded with Leslie Stowle in other
    actions
 The forensic analyst has been given an image of
  Tom’s Windows workstation
 Let’s see what kinds of information can be found
                  Advanced Digital Forensics with Open Source Tools
Plugins

 RegRipper comes with a wide variety of
  plugins for examining registry information
   Plugins are basically Perl scripts




                 Advanced Digital Forensics with Open Source Tools
Running Plugins: winver

 You have the option to run the Perl scripts
  directly if you have Perl (and the right
  libraries) installed or you can use rip.exe
 rip –r registry file –p plugin




               Advanced Digital Forensics with Open Source Tools
USB Devices
Identifying use of a thumb drive




               Advanced Digital Forensics with Open Source Tools
Command Line
C:DATARegRipper>rip -r ..PSCRegistryntuser.dat -p mp2
Launching mp2 v.20080324
MountPoints2
SoftwareMicrosoftWindowsCurrentVersionExplorerMountPoints2
LastWrite Time Mon Jan   3 21:59:36 2005 (UTC)


 Drives:
   A   Wed Sep 29 21:00:05 2004 (UTC)
   D   Wed Sep 29 21:00:05 2004 (UTC)
   C   Wed Sep 29 21:00:05 2004 (UTC)
   E   Fri Oct 29 17:46:24 2004 (UTC)


 Volumes:
   {3622c883-1069-11d9-b601-806d6172696f}     Wed Sep 29 21:02:41 2004 (UTC)
   {707f5caa-29d2-11d9-99eb-000c291e65ae}     Fri Oct 29 18:09:55 2004 (UTC)
   {3622c880-1069-11d9-b601-806d6172696f}     Wed Sep 29 21:02:41 2004 (UTC)
   {3622c881-1069-11d9-b601-806d6172696f}     Wed Sep 29 21:03:24 2004 (UTC)


 Remote Drives:
   ##2kadvserver#Users#twarner    Wed Sep 29 21:03:22 2004 (UTC)
   ##psc-ws-03#c$   Fri Oct   1 05:58:52 2004 (UTC)
   ##2kadvserver#Management    Fri Oct   1 05:54:14 2004 (UTC)
   ##2kadvserver#Software     Fri Oct   1 05:54:50 2004 (UTC)
   ##2kadvserver#Software Development     Fri Oct   1 05:54:37 2004 (UTC)



                                         Advanced Digital Forensics with Open Source Tools
Running Plugins: recentdocs




         Advanced Digital Forensics with Open Source Tools
The GUI

                                  A GUI (rr.exe) is
                                   available
                                  It provides access to
                                   plugin files that collect
                                   commonly used
                                   plugins into a single file
                                   and run them as a
                                   group



          Advanced Digital Forensics with Open Source Tools
Plugin Files

 Some sets of plugins are so commonly used
  together they are listed in a plugin file
     rip –r registryfile -f plugingfile
   The plugin file is just a list of plugings to be run




                  Advanced Digital Forensics with Open Source Tools
Network Config




 Excerpt from the SYSTEM plugin report
 Pretend you didn’t notice “Guidance Software”

                 Advanced Digital Forensics with Open Source Tools
The Software Hive


 The disk image had large blocks of binary 0’s –
  wonder how that happened?




                 Advanced Digital Forensics with Open Source Tools
Sources of Images
Garfinkel’s Forensic Corpora




                        Advanced Digital Forensics with Open Source Tools
Scenarios

 Simson Garfinkel of the NPS is working under
  a NSF grant to produce scenarios and
  associated forensic images for use in teaching
  digital forensics
 Two scenarios are currently available at
  http://domex.nps.edu/corp/scenarios




               Advanced Digital Forensics with Open Source Tools
M57

2009-M57 "Patents" scenario

  This scenario involves a small company called M57
   which was engaged in prior art searches for
   patents. The fictional company is contacted by
   the local police in November 2009 after a person
   purchases a computer from Craigslist and
   discovers "kitty porn" on the computer. The
   police trace the computer back to the M57
   company.
Includes an instructor’s packet!!!

               Advanced Digital Forensics with Open Source Tools
Nitroba

Nitroba University Harassment Scenario

 This scenario involves a harassment case at
  the fictional Nitroba University.




              Advanced Digital Forensics with Open Source Tools
Summary

 Digital forensic practice must evolve to keep
  pace
   Live memory analysis for volatile information lost
    when a system is shutdown or restarted
 The Windows registry is a rich mine of
  information




                Advanced Digital Forensics with Open Source Tools
Questions?




 EMAIL raustin2@spsu.edu if you’d like a PDF of
  the slides
                 Advanced Digital Forensics with Open Source Tools

Contenu connexe

Tendances

Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
Bit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesBit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesLumension
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts MD SAQUIB KHAN
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registrysomutripathi
 
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsMemory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsJared Greenhill
 
Next Generation Memory Forensics
Next Generation Memory ForensicsNext Generation Memory Forensics
Next Generation Memory ForensicsAndrew Case
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Process injection - Malware style
Process injection - Malware styleProcess injection - Malware style
Process injection - Malware styleSander Demeester
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoTouhami Kasbaoui
 
Network Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting ToolsNetwork Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting ToolsJoseph Bugeja
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 
Os detection with arp
Os detection with arpOs detection with arp
Os detection with arpDavid Clark
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static AnalysisHossein Yavari
 

Tendances (20)

Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Bit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesBit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it Compares
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
 
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsMemory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
 
NMap
NMapNMap
NMap
 
Next Generation Memory Forensics
Next Generation Memory ForensicsNext Generation Memory Forensics
Next Generation Memory Forensics
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Process injection - Malware style
Process injection - Malware styleProcess injection - Malware style
Process injection - Malware style
 
Registry forensics
Registry forensicsRegistry forensics
Registry forensics
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
Event Viewer
Event ViewerEvent Viewer
Event Viewer
 
Network Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting ToolsNetwork Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting Tools
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
Os detection with arp
Os detection with arpOs detection with arp
Os detection with arp
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 

En vedette

[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...OWASP Turkiye
 
2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - publicSandro Suffert
 
July132000
July132000July132000
July132000CTIN
 
Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Shuvo Sarker
 
G Infomgnt
G InfomgntG Infomgnt
G InfomgntCTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Sleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGSleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGEduardo Chavarro
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7RIAH ENCARNACION
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics00heights
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Mark Matienzo
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionSeccuris Inc.
 
Raidprep
RaidprepRaidprep
RaidprepCTIN
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsMike Spaulding
 

En vedette (20)

[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public
 
July132000
July132000July132000
July132000
 
Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7-cheat-sheet
Windows 7-cheat-sheetWindows 7-cheat-sheet
Windows 7-cheat-sheet
 
Sleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGSleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKING
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 
Raidprep
RaidprepRaidprep
Raidprep
 
File carving tools
File carving toolsFile carving tools
File carving tools
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 

Similaire à Open Source Forensics

Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons Amr Nasr
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfHow to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfuzair
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshortVincent Ohprecio
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics reportyash sawarkar
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory ForensicsIIJ
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docxsmile790243
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Vipin George
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012Rian Yulian
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesSandeep Kumar Seeram
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkitsamiable_indian
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for EveryoneNikhil Mittal
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 

Similaire à Open Source Forensics (20)

Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfHow to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshort
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics report
 
Deft v7
Deft v7Deft v7
Deft v7
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory Forensics
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
DR FAT
DR FATDR FAT
DR FAT
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on Examples
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkits
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 

Plus de CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsCTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Nra
NraNra
NraCTIN
 
Live Forensics
Live ForensicsLive Forensics
Live ForensicsCTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Edrm
EdrmEdrm
EdrmCTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassCTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrimeCTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search WarrantsCTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector ConcernsCTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking OverviewCTIN
 
M Compevid
M CompevidM Compevid
M CompevidCTIN
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The DayCTIN
 

Plus de CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 
M Compevid
M CompevidM Compevid
M Compevid
 
L Scope
L ScopeL Scope
L Scope
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
 

Dernier

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Open Source Forensics

  • 1. Why are there so many tools left at the end of the money? Richard Austin MS, CISSP Southern Polytechnic State University ADVANCED DIGITAL FORENSICS WITH OPEN SOURCE TOOLS
  • 2. IT Elder Flatulence Bio My First Computer  Richard is a 30+ year veteran of the IT industry in positions ranging from software developer to security architect. Before beginning a career as an independent cybersecurity consultant and educator, he was focused on technology and processes for successfully protecting the 14PB storage area network infrastructure within the global IT organization of a Fortune 25 company.  MS degree with a concentration in information security from Kennesaw State University, a DHS/NSA recognized National Center of Academic Excellence in Information Assurance Education.  Active member of SNIA's Security Technical Working Group.  Active member of the Cloud Security Alliance’s Trusted Cloud Initiative.  Senior Member of both the IEEE and ACM and also a member of the IEEE Computer Society, CTIN, ISC(2) and the Atlanta Chapter of Infragard .  Book review columnist for IEEE Cipher, the newsletter of the IEEE Computer Society Technical Committee on Security and Privacy  A published author frequently writing and presenting on storage networking security, ethics and digital forensics. Advanced Digital Forensics with Open Source Tools
  • 3. Forensics is Changing Digital forensics was once solely concerned with just collecting and analyzing disk images from a cold, dead system but much useful information leaves few durable traces on disk Advanced Digital Forensics with Open Source Tools
  • 4. Two New Areas  Live memory collection and analysis  Registry analysis Though commercial tools are available, Open Source tools provide much of the same functionality Advanced Digital Forensics with Open Source Tools
  • 5. Collecting Live Memory Advanced Digital Forensics with Open Source Tools
  • 6. Why Live Memory?  The bad people are very interested in forensic technology and follow quite closely what we do  Contrary to popular opinion, this stuff ain’t secret  They know that we image disks so they do things that don’t leave disk traces  Memory-only malware  A lot of information may not leave clearly discernable disk traces  Open network connections  Active encryption – data may only be in plaintext while the system is running Advanced Digital Forensics with Open Source Tools
  • 7. How do you do it?  Just like any other forensic task  You collect the data  You extract information from it  So what’s all the hub bub, bub?  IAxx architectures don’t have a “DUMP” button  Rely on software to dump main memory (the infamous BSOD and crashdump)  Reading memory dumps is the province of O/S level debuggers  Great tools but you have to be a Windows/*UX internals guru to understand and use them Advanced Digital Forensics with Open Source Tools
  • 8. Remember!  When working with a compromised system, remember you’re working with Satan’s computer  You have no clue what the attacker may have done to it Advanced Digital Forensics with Open Source Tools
  • 9. Issues  User mode access to the .PhysicalMemory object was removed in Vista/2003 and later  This was a serious security issue – it’s gone; not coming back; get over it!  Many older live memory acquisition tools no longer work  For Vista/2003 and later, a utility must load a kernel mode driver to get access to physical memory  Some vendors call this an “agent” Advanced Digital Forensics with Open Source Tools
  • 10. Issues  Running a program to collect memory contents does change the state of memory (and maybe disk)  Can’t be helped  If physical memory is full, something may be swapped out when you run the program  Documented, repeatable process is key  You are only collecting physical memory  Swapped out pages will not be in the image Advanced Digital Forensics with Open Source Tools
  • 11. Data Triage •Consider the order of volatility •Relevance of the type of information to the case under investigation Advanced Digital Forensics with Open Source Tools
  • 12. Lots of Options  Memoryze from Mandiant http://www.mandiant.com/software/memory ze.htm  The usual forensic vendors have their tools  I’ll be demoing winxxdd (community edition) from http://www.moonsols.com/products/  This free version does have limitations such as not running from a removable device or via a script. Advanced Digital Forensics with Open Source Tools
  • 13. Win32dd Advanced Digital Forensics with Open Source Tools
  • 14. Hash the Image Advanced Digital Forensics with Open Source Tools
  • 15. Points to Remember  You must be able to run a program as ADMINISTRATOR on the system  For remote access:  psexec  Remote Desktop  Etc  This does change the state of the system  Students are surprised to see win32dd in the list of running processes Advanced Digital Forensics with Open Source Tools
  • 16. Analyzing the Memory Image OK, I got it but what do I do with it? Advanced Digital Forensics with Open Source Tools
  • 17. Volatility  https://www.volatilesystems.com/default/volatili ty  Open Source, written in Python  Python is a well-known scripting language  Download Python from www.activestate.com  The 1.3 version only supports XP SP2 and SP3  Version 1.4 in in RC and supports Vista and Windows 7 as well as incorporating many improvements  http://code.google.com/p/volatility/  Already installed on REMnux Advanced Digital Forensics with Open Source Tools
  • 18. Update  Volatility 2.0 is now released!!!  Includes a standalone Windows installer Advanced Digital Forensics with Open Source Tools
  • 19. Using Volatility  Very simple command-line interface:  python volatility command –f image_file  1.4 adds --profile=profile to identify the O/S  Notable commands:  ident – descriptive information about the dump file  datetime – date/time information for the dump file (included in ident)  pslist – list of processes  files – list of files open for each process  connections – open network connections  sockets – open sockets Advanced Digital Forensics with Open Source Tools
  • 20. ident  In 1.4, this command becomes imageinfo Advanced Digital Forensics with Open Source Tools
  • 21. pslist Advanced Digital Forensics with Open Source Tools
  • 22. Scan vs List  Some commands have two versions – list and scan  The difference is that list follows the normal way of doing things  e.g., listing processes by following the EPROCESS list  scan scans through memory looking for data structures (e.g., _EPROCESS)  Psscan will find terminated and de-linked processes (one stealth technique used by rootkits)  The scan version is much slower because it is scanning memory contents rather than walking a linked list Advanced Digital Forensics with Open Source Tools
  • 23. psscan Terminated FTP processes Advanced Digital Forensics with Open Source Tools
  • 24. files Advanced Digital Forensics with Open Source Tools
  • 25. connections FTP Advanced Digital Forensics with Open Source Tools
  • 26. Connections vs Connscan2 Advanced Digital Forensics with Open Source Tools
  • 27. sockets Advanced Digital Forensics with Open Source Tools
  • 28. netscan  For Vista and later, these are consolidated into netscan Sample output taken from the Volatility 1.4 wiki http://code.google.com/p/volatility/wiki/CommandReference#netscan Advanced Digital Forensics with Open Source Tools
  • 29. Protocol Numbers Advanced Digital Forensics with Open Source Tools
  • 30. And the Registry  Locating the Registry -- hivelist Advanced Digital Forensics with Open Source Tools
  • 31. Listing Keys Advanced Digital Forensics with Open Source Tools
  • 32. Examining Values Advanced Digital Forensics with Open Source Tools
  • 33. Services – Where malware hides Advanced Digital Forensics with Open Source Tools
  • 34. What does it all mean?  Working with memory contents does require a bit of knowledge about what it all means  These are two good reference books on how Windows really works and what you’re looking at in a memory dump Advanced Digital Forensics with Open Source Tools
  • 35. BUT What About Vista, …?  Volatility is nice but it only works on XP. So if you need to look at memory on Vista, Server 2003, etc, you’re back to using strings ….  Of course not:  1.4 is in RC and is installed in the REMnux CD (and virtual appliance)  And other tools are a little more arcane but they work  The Windows Debugging Tools can be used to analyze a Windd dump IFF it’s made in crashdump format (-d option)  http://www.msuiche.net/con/BlackHat_Webcast_New_Fron tiers_in_Forensics.pdf Advanced Digital Forensics with Open Source Tools
  • 36. Active Processes Advanced Digital Forensics with Open Source Tools
  • 37. Don’t get too comfortable … Particularly Part III on Anti- Forensics “In war the will is directed at an animate object that reacts.” Carl Von Clausewitz, On War Advanced Digital Forensics with Open Source Tools
  • 38. Registry Extraction and Analysis Advanced Digital Forensics with Open Source Tools
  • 39. Windows Registry  The Windows registry has been found to contain a treasure trove of information useful to the forensic analyst  The good news is that disk imaging includes the registry  New tools are simplifying the process of extracting this information in a useful format Advanced Digital Forensics with Open Source Tools
  • 40. Nomenclature Value Data Type Key Subkey Advanced Digital Forensics with Open Source Tools
  • 41. Registry File Locations System %WINDIR%system32configSystem SAM %WINDIR%system32configSam Security %WINDIR%system32configSecurity Software %WINDIR%system32configSoftware NTUSER.DAT Documents and SettingsUser  Simply extract these files from the image  Security on NTUSER.DAT may prevent copying so use the type command to make a copy: type NTUSER.DAT>somewhere else Advanced Digital Forensics with Open Source Tools
  • 42. Note  I’m going to be showing some representative samples of the information available and the things they imply about events in the real world.  If you get lost in the key-value wilderness, don’t despair – it’s all in the book.  What book? Be patient. Advanced Digital Forensics with Open Source Tools
  • 43. Mounting images  You need to extract the registry files out of the disk image  P2Explorer is a very useful tool provided free by Paraben  http://www.paraben.com/p2-explorer.html  It allows you to mount disk images on a Windows system (free edition only works on 32-bit versions)  OSFMount from PassMark software is another option  Works on both 32 and 64 bit Windows Advanced Digital Forensics with Open Source Tools
  • 44. Mounting An Image Advanced Digital Forensics with Open Source Tools
  • 45. Mounting An Image Advanced Digital Forensics with Open Source Tools
  • 46. Accessing Registry Files Advanced Digital Forensics with Open Source Tools
  • 47. Advantages of Mounted Image  Mounting the image basically gives you read- only access to the contents of the image as a drive letter  Windows Explorer, anti-malware, etc, can be used  No need to export everything in advance Advanced Digital Forensics with Open Source Tools
  • 48. Other Options  FTKImager is a free download from AccessData (developers of The Forensic Toolkit)  It can be used to open a disk image and export the registry files Advanced Digital Forensics with Open Source Tools
  • 49. Exporting Registry Files Imager can open most of the common image formats (dd, EnCase, etc) Advanced Digital Forensics with Open Source Tools
  • 50. Exporting Registry Files Once the image is opened, students see a familiar directory tree and just have to navigate to the registry file locations Files are exported by right clicking the file and selecting “Export” from the menu Advanced Digital Forensics with Open Source Tools
  • 51. Analyzing the Registry Advanced Digital Forensics with Open Source Tools
  • 52. Resource  This is an excellent book that covers many of the registry analysis tasks in detail  RegRipper is the tool used for analyzing the registry after it is collected  http://www.regripper.net/RegRipper/ and also available on the tools CD that accompanies the book  You can read my book review at http://www.ieee- security.org/Cipher/BookReviews (shameless self-promotion) Advanced Digital Forensics with Open Source Tools
  • 53. The Case: Price Software  Tom Warner is suspected of industrial espionage  He was upset about being passed over for a VP position  He is alleged to have set up a quid pro quo deal with a competitor  He may have colluded with Leslie Stowle in other actions  The forensic analyst has been given an image of Tom’s Windows workstation  Let’s see what kinds of information can be found Advanced Digital Forensics with Open Source Tools
  • 54. Plugins  RegRipper comes with a wide variety of plugins for examining registry information  Plugins are basically Perl scripts Advanced Digital Forensics with Open Source Tools
  • 55. Running Plugins: winver  You have the option to run the Perl scripts directly if you have Perl (and the right libraries) installed or you can use rip.exe  rip –r registry file –p plugin Advanced Digital Forensics with Open Source Tools
  • 56. USB Devices Identifying use of a thumb drive Advanced Digital Forensics with Open Source Tools
  • 57. Command Line C:DATARegRipper>rip -r ..PSCRegistryntuser.dat -p mp2 Launching mp2 v.20080324 MountPoints2 SoftwareMicrosoftWindowsCurrentVersionExplorerMountPoints2 LastWrite Time Mon Jan 3 21:59:36 2005 (UTC) Drives: A Wed Sep 29 21:00:05 2004 (UTC) D Wed Sep 29 21:00:05 2004 (UTC) C Wed Sep 29 21:00:05 2004 (UTC) E Fri Oct 29 17:46:24 2004 (UTC) Volumes: {3622c883-1069-11d9-b601-806d6172696f} Wed Sep 29 21:02:41 2004 (UTC) {707f5caa-29d2-11d9-99eb-000c291e65ae} Fri Oct 29 18:09:55 2004 (UTC) {3622c880-1069-11d9-b601-806d6172696f} Wed Sep 29 21:02:41 2004 (UTC) {3622c881-1069-11d9-b601-806d6172696f} Wed Sep 29 21:03:24 2004 (UTC) Remote Drives: ##2kadvserver#Users#twarner Wed Sep 29 21:03:22 2004 (UTC) ##psc-ws-03#c$ Fri Oct 1 05:58:52 2004 (UTC) ##2kadvserver#Management Fri Oct 1 05:54:14 2004 (UTC) ##2kadvserver#Software Fri Oct 1 05:54:50 2004 (UTC) ##2kadvserver#Software Development Fri Oct 1 05:54:37 2004 (UTC) Advanced Digital Forensics with Open Source Tools
  • 58. Running Plugins: recentdocs Advanced Digital Forensics with Open Source Tools
  • 59. The GUI  A GUI (rr.exe) is available  It provides access to plugin files that collect commonly used plugins into a single file and run them as a group Advanced Digital Forensics with Open Source Tools
  • 60. Plugin Files  Some sets of plugins are so commonly used together they are listed in a plugin file rip –r registryfile -f plugingfile  The plugin file is just a list of plugings to be run Advanced Digital Forensics with Open Source Tools
  • 61. Network Config  Excerpt from the SYSTEM plugin report  Pretend you didn’t notice “Guidance Software” Advanced Digital Forensics with Open Source Tools
  • 62. The Software Hive  The disk image had large blocks of binary 0’s – wonder how that happened? Advanced Digital Forensics with Open Source Tools
  • 63. Sources of Images Garfinkel’s Forensic Corpora Advanced Digital Forensics with Open Source Tools
  • 64. Scenarios  Simson Garfinkel of the NPS is working under a NSF grant to produce scenarios and associated forensic images for use in teaching digital forensics  Two scenarios are currently available at http://domex.nps.edu/corp/scenarios Advanced Digital Forensics with Open Source Tools
  • 65. M57 2009-M57 "Patents" scenario This scenario involves a small company called M57 which was engaged in prior art searches for patents. The fictional company is contacted by the local police in November 2009 after a person purchases a computer from Craigslist and discovers "kitty porn" on the computer. The police trace the computer back to the M57 company. Includes an instructor’s packet!!! Advanced Digital Forensics with Open Source Tools
  • 66. Nitroba Nitroba University Harassment Scenario This scenario involves a harassment case at the fictional Nitroba University. Advanced Digital Forensics with Open Source Tools
  • 67. Summary  Digital forensic practice must evolve to keep pace  Live memory analysis for volatile information lost when a system is shutdown or restarted  The Windows registry is a rich mine of information Advanced Digital Forensics with Open Source Tools
  • 68. Questions?  EMAIL raustin2@spsu.edu if you’d like a PDF of the slides Advanced Digital Forensics with Open Source Tools