SlideShare une entreprise Scribd logo
Digital Forensics
Practical Workshop
Who am I?
Tim Fletcher
@TimJDFletcher
http://blog.night-shade.org.uk
What are we going to cover?
Brief legal overview
Where can you find digital evidence
Collecting and preserving digital evidence
Examining digital evidence
Documenting the process
What am I not going to cover
Digital Forensics is a massive area and this
workshop only scratches the surface
Windows commercial tools
Network forensics
Report writing
So what, why do I care about this?
Understanding the landscape, what information
can be retrieved
Forensics Readiness, eg collecting FDE keys
Incident response
Ever been asked to “have a look at” what
someone has been doing?
Legal Overview
First I’m not a lawyer, but I have studied some
of the key acts involved.
Respect other people’s privacy
Have a plan if you find something unexpected
eg child pornography or terrorist material
ACPO Guidelines
Who are they - Association of Chief Police
Officers
Set guidelines on procedures for all police
forces in England and Wales
The guidelines are well thought out
Principle 1
No action taken by law enforcement agencies,
persons employed within those agencies or
their agents should change data which
may subsequently be relied upon in court.
In circumstances where a person finds it
necessary to access original data, that person
must be competent to do so and be able to give
evidence explaining the relevance and the
implications of their actions.
Principle 2
Principle 3
An audit trail or other record of all processes
applied to digital evidence should be created
and preserved. An independent third
party should be able to examine those
processes and achieve the same result.
Principle 4
The person in charge of the investigation has
overall responsibility for ensuring that the law
and these principles are adhered to.
Collecting Evidence
If you are examining digital evidence in a
workplace, consult HR and get permission in
writing.
If you are doing this professionally make sure
you have advice and support from a real
lawyer.
Chain of evidence
It is absolutely critical to be able to account for
what happened to an exhibit such as a
computer from the moment it was seized to the
moment it was examined by a forensic
examiner.
Fear the words “I’ve had a quick look…..”
Training
For learning and training purposes the key
point is that you should only examine kit you
own, and if in doubt seek advice from a real
lawyer.
Today you will get an iPhone and a Windows
system image to examine
Attribution
Digital evidence proves “a computer” did
something
Proving who was using the computer at the
time can be challenging.
Digital evidence can be considered “hearsay”
Where do you find digital evidence?
Desktops / Laptops
Embedded devices, eg home routers
Servers / Home NAS units
Cell phones
The Cloud
Public Internet / Social Media
Tools for collecting
Disk imaging - depends on your budget
Write blockers - hardware is expensive
Software can work
Collect to a blank disk - SSDs help here
otherwise 4 pass badblocks test
Key point - practice and test
How do you gather evidence?
Pull the power, ship it to the lab…...
When would this work?
When wouldn’t this work?
What about cloud storage?
What about Mobile devices?
What about full disk encryption?
Imaging normal computers
If the computer is active
Document the screen / gather artifacts
Assess if there is encryption
Do you need to image the RAM?
Secure the system and plan investigation
Imaging FDE computers
Who has the password?
Gather evidence without powering off?
Other evidence sources, logs or backups?
Exploit firewire or thunderbolt?
Cold boot attack - only get 1 go
Mobile devices
Passcodes / PINs
Backups?
Cloud storage?
Hardware flaws?
Remember - Faraday bags to stop remote wipe
NAS units and servers
Vast amounts of data
How do you find what matters?
Are you invading others privacy?
What is the business impact of seizure?
Where are they and who owns them?
Mostly just normal computers
Examining Digital Evidence
Understand the context
Consider what you are looking for
Build and understand a timeline
Digital Triage - what is the context?
Understand your adversary
Examine what matters
Reduce the evidence you have
Eliminate noise - eg NIST hash DB
What are you looking for?
Image files
Geolocation
Emails / Messages
Meta data
Content
Browser history
Timelines
What happened when?
Who or what caused it to happen?
What order did things happen in?
Correlation with other sources
System logs, Social Media
Can often point to new sources of evidence
Tool selection
There are 100s of tools that let you examine
systems, pick those you are comfortable with.
Autopsy - web front end to “the sleuthkit”
Standard unix tools find, strings and etc
Other tools - exiftool, sqlitebrowser
Windows tools - nirsoft and sysinternals
Volatility - Memory forensics
Mobile devices
Is the device jailbroken or joined to a MDM
Can you get the PIN?
Specialist software tools
iOS - Elcomsoft
Older Apple hardware - Limera1n
Android - ADB
Training - II
Virtualisation is very powerful for learning and
training
Resettable state - test your tool or technique
and then reset the VM
Dump RAM contents without complex tools
Documentation
Remember ACPO principle 3
Contemporaneous notes, paper or electronic
Video and photographic evidence is powerful
Log system sessions eg ssh
Your evidence bags
32GB memory stick containing
iPhone4 image - raw nand, key bag and
encrypted disk image
Windows XP disk image
1GB memory stick image
Remember - chain of evidence
Windows XP
Simple unencrypted computer
iOS exploitation demo
Using iphone-dataprotection
https://code.google.com/p/iphone-dataprotection/
iPhone 4 - note this doesn’t work on newer
models
Exploits the bootloader, uploads a ramdisk
Lets you bruteforce the PIN and extract the
NAND
What do you know?
Fluffy the dog has been dognapped!
The owner has been told to meet at a pub
The dognapper might have scouted the area
An iPhone and laptop have been seized
Can you find evidence that the owner of them
was involved?
What you are looking for
Photos
Emails
SMS messages
Documents
Internet History
Tools to use
sha1sum - check your images
Autopsy - apt-get install autopsy
Exiftool - apt-get install perl-exiftool
SQLitebrowser - apt-get install…..
Kali Linux - Bootable from the Memory Stick
Autopsy
Perl based web front end to The SleuthKit
Allows file browsing of disk images
Search for text strings
Build file timelines
Extract raw disk sectors
Interesting files on the memory stick
Memory Stick: MemoryStick.raw.gz
Windows: WindowsXP.raw.gz
iPhone: d0c3eaaaa2/d0c3eaaaa2-data.dd.gz
Checksums: sha1sums
Starting points
Most user files in iOS are under /var/mobile
iOS includes lots of SQLite databases
The memory stick might tell you where to look
Recycle Bin and Web history
How would I do this?
Copy disk images to high speed storage
Import into Autopsy
Timeline the disk images
Catch low hanging fruit first
Photos
Web history
Email

Contenu connexe

Tendances

Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
Antonio Sanz Alcober
 
computer forensics
computer forensicscomputer forensics
computer forensics
Akhil Kumar
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
Muzzammil Wani
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
ahmad abdelhafeez
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Singgih Prasetya
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
gamemaker762
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & TomorrowDigital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Pankaj Choudhary
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
Novizul Evendi
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Oldsun
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Ramesh Ogania
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Neilg42
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Digital investigation
Digital investigationDigital investigation
Digital investigation
unnilala11
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
Soumen Debgupta
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
Muzzammil Wani
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
Chaitanya Dhareshwar
 
computer forensics
computer forensicscomputer forensics
computer forensics
Vaibhav Tapse
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
yash sawarkar
 

Tendances (20)

Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & TomorrowDigital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Similaire à Digital Forensics Workshop

N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
sai Nagaragiri
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
Tiago Henriques
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Shashi Mishra
 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD
Davide Gabrini
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdf
feetshoemart
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
Ollie Whitehouse
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
pable2
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
Mayank Diwakar
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
gitagrimston
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
ShanaAneevan
 
Computer forensics basics
Computer forensics basicsComputer forensics basics
Computer forensics basics
Jarle Thorsen
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Webrazzi
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
Mariano Amartino
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
Dario Caliendo
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
amiable_indian
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Daksh Verma
 

Similaire à Digital Forensics Workshop (20)

N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdf
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
 
Computer forensics basics
Computer forensics basicsComputer forensics basics
Computer forensics basics
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 

Dernier

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Dernier (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Digital Forensics Workshop

  • 2. Who am I? Tim Fletcher @TimJDFletcher http://blog.night-shade.org.uk
  • 3. What are we going to cover? Brief legal overview Where can you find digital evidence Collecting and preserving digital evidence Examining digital evidence Documenting the process
  • 4. What am I not going to cover Digital Forensics is a massive area and this workshop only scratches the surface Windows commercial tools Network forensics Report writing
  • 5. So what, why do I care about this? Understanding the landscape, what information can be retrieved Forensics Readiness, eg collecting FDE keys Incident response Ever been asked to “have a look at” what someone has been doing?
  • 6. Legal Overview First I’m not a lawyer, but I have studied some of the key acts involved. Respect other people’s privacy Have a plan if you find something unexpected eg child pornography or terrorist material
  • 7. ACPO Guidelines Who are they - Association of Chief Police Officers Set guidelines on procedures for all police forces in England and Wales The guidelines are well thought out
  • 8. Principle 1 No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data which may subsequently be relied upon in court.
  • 9. In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions. Principle 2
  • 10. Principle 3 An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.
  • 11. Principle 4 The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to.
  • 12. Collecting Evidence If you are examining digital evidence in a workplace, consult HR and get permission in writing. If you are doing this professionally make sure you have advice and support from a real lawyer.
  • 13. Chain of evidence It is absolutely critical to be able to account for what happened to an exhibit such as a computer from the moment it was seized to the moment it was examined by a forensic examiner. Fear the words “I’ve had a quick look…..”
  • 14. Training For learning and training purposes the key point is that you should only examine kit you own, and if in doubt seek advice from a real lawyer. Today you will get an iPhone and a Windows system image to examine
  • 15. Attribution Digital evidence proves “a computer” did something Proving who was using the computer at the time can be challenging. Digital evidence can be considered “hearsay”
  • 16. Where do you find digital evidence? Desktops / Laptops Embedded devices, eg home routers Servers / Home NAS units Cell phones The Cloud Public Internet / Social Media
  • 17. Tools for collecting Disk imaging - depends on your budget Write blockers - hardware is expensive Software can work Collect to a blank disk - SSDs help here otherwise 4 pass badblocks test Key point - practice and test
  • 18. How do you gather evidence? Pull the power, ship it to the lab…... When would this work? When wouldn’t this work? What about cloud storage? What about Mobile devices? What about full disk encryption?
  • 19. Imaging normal computers If the computer is active Document the screen / gather artifacts Assess if there is encryption Do you need to image the RAM? Secure the system and plan investigation
  • 20. Imaging FDE computers Who has the password? Gather evidence without powering off? Other evidence sources, logs or backups? Exploit firewire or thunderbolt? Cold boot attack - only get 1 go
  • 21. Mobile devices Passcodes / PINs Backups? Cloud storage? Hardware flaws? Remember - Faraday bags to stop remote wipe
  • 22. NAS units and servers Vast amounts of data How do you find what matters? Are you invading others privacy? What is the business impact of seizure? Where are they and who owns them? Mostly just normal computers
  • 23. Examining Digital Evidence Understand the context Consider what you are looking for Build and understand a timeline
  • 24. Digital Triage - what is the context? Understand your adversary Examine what matters Reduce the evidence you have Eliminate noise - eg NIST hash DB
  • 25. What are you looking for? Image files Geolocation Emails / Messages Meta data Content Browser history
  • 26. Timelines What happened when? Who or what caused it to happen? What order did things happen in? Correlation with other sources System logs, Social Media Can often point to new sources of evidence
  • 27. Tool selection There are 100s of tools that let you examine systems, pick those you are comfortable with. Autopsy - web front end to “the sleuthkit” Standard unix tools find, strings and etc Other tools - exiftool, sqlitebrowser Windows tools - nirsoft and sysinternals Volatility - Memory forensics
  • 28. Mobile devices Is the device jailbroken or joined to a MDM Can you get the PIN? Specialist software tools iOS - Elcomsoft Older Apple hardware - Limera1n Android - ADB
  • 29. Training - II Virtualisation is very powerful for learning and training Resettable state - test your tool or technique and then reset the VM Dump RAM contents without complex tools
  • 30. Documentation Remember ACPO principle 3 Contemporaneous notes, paper or electronic Video and photographic evidence is powerful Log system sessions eg ssh
  • 31. Your evidence bags 32GB memory stick containing iPhone4 image - raw nand, key bag and encrypted disk image Windows XP disk image 1GB memory stick image Remember - chain of evidence
  • 33. iOS exploitation demo Using iphone-dataprotection https://code.google.com/p/iphone-dataprotection/ iPhone 4 - note this doesn’t work on newer models Exploits the bootloader, uploads a ramdisk Lets you bruteforce the PIN and extract the NAND
  • 34. What do you know? Fluffy the dog has been dognapped! The owner has been told to meet at a pub The dognapper might have scouted the area An iPhone and laptop have been seized Can you find evidence that the owner of them was involved?
  • 35. What you are looking for Photos Emails SMS messages Documents Internet History
  • 36. Tools to use sha1sum - check your images Autopsy - apt-get install autopsy Exiftool - apt-get install perl-exiftool SQLitebrowser - apt-get install….. Kali Linux - Bootable from the Memory Stick
  • 37. Autopsy Perl based web front end to The SleuthKit Allows file browsing of disk images Search for text strings Build file timelines Extract raw disk sectors
  • 38. Interesting files on the memory stick Memory Stick: MemoryStick.raw.gz Windows: WindowsXP.raw.gz iPhone: d0c3eaaaa2/d0c3eaaaa2-data.dd.gz Checksums: sha1sums
  • 39. Starting points Most user files in iOS are under /var/mobile iOS includes lots of SQLite databases The memory stick might tell you where to look Recycle Bin and Web history
  • 40. How would I do this? Copy disk images to high speed storage Import into Autopsy Timeline the disk images Catch low hanging fruit first Photos Web history Email