- what is computer forensics
the interest of figuring out what happened, when it happened, how it happened, and who .was involved
This can be for the purpose of performing a root cause analysis of a computer system that had failed or is not operating properly,
or to find outwho is responsible for misuse of computer systems
or perhaps who committed a crime using a computer system or against a computer system
for conducting computing investigationscomputer forensic techniques and methodologies are commonly used
Think about a murder case or a case of financial fraud. What do the investigators involved in these cases need to ? What happened, when did itascertain , how did it happen, and whohappen .was involved
The preservation, identification, extraction, interpretation, and documentation of computer evidence, to include the rules of evidence, legal processes, integrity of evidence, factual reporting of the information found, and providing expert opinion in a court of law or other legal and/or administrative proceeding whatas to .was found
References:
http://www.csisite.net/forensics.htm
http://www.computerforensicsworld.com
http://www.craigball.com
http://en.wikipedia.org/wiki/Computer_forensics
http://swizardb.blogspot.com/search/label/Computer%20Forensics
- Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way
suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.that is
- Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible.
- Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way
- The Open Computer Forensics Architecture (OCFA) is an distributed open-source computer forensics framework used to analyze digital media within a digital forensics laboratory environment.
.The framework was built by the Dutch national police - Open Computer Forensics Architecture
- The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework built by the "Dutch National Police Agency". The main goal is to automate the digital forensic process to speed up the investigation and give tactical investigators direct access to the seized data through an
search and browse interface...easy to use - DFF (Digital Forensics Framework) is a free and Open Source computer forensics software built on top of a dedicated Application Programming Interface (API).
both by professional and non-expert people in order to quickly and easily collect, preserve and reveal digital evidence without compromising systems and data. - See more at http://www.toolwar.com/2014/06/dff-digital-forensics-framework.html#sthash.gC97vxd2.dpufIt can be used - Digital Forensics Framework
- Preserve digital chain of custody: Software write blocker, the cryptographic hash calculation.
, a conceptual framework for the analysis of digital evidence built on top of a Cloud infrastructure, which aims to embody the concept of “Forensics as a service”.AlmaNebula - EnCase is a suite of digital forensics products by Guidance Software. The software comes in several forms designed for forensic,
cyber security and e-discovery use.
https://en.wikipedia.org/wiki/Open_Computer_Forensics_Architecture
The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework built by the Dutch National Police Agency [KLPD/Dutch]. The main goal is to automate the digital forensic process to speed up the investigation and give tactical investigators direct access to the seized data through an easy to use search and browse interface.
http://ocfa.sourceforge.net/
http://www.forensicfocus.com/index.php?name=News&file=article&sid=477
Exploring the Open Computer Forensics Architecture
Automate the forensics process with the Dutch police department's Open Computer Forensics Architecture. http://www.linux-magazine.com/Issues/2008/93/OCFA
Automate the forensics process with the Dutch police department's Open Computer Forensics Architecture. http://www.linux-magazine.com/Issues/2008/93/OCFA
DFF is an Open Source computer forensics platform built on top of a dedicated Application Programming Interface (API). DFF proposes an alternative to the aging digital forensics solutions used today. Designed for simple use and automation, the DFF interface guides the user through the main steps of a digital investigation so it can be used by both professional and non-expert to quickly and easily conduct a digital investigation and perform incident response.
http://www.arxsys.fr/
Access to local and remote devices: Disk drives, removable devices, remote file systems
Read standard digital forensics file formats: Raw, Encase EWF, AFF 3 file formats
Virtual machine disk reconstruction: VMWare (VMDK) compatible
Windows and Linux OS forensics: Registry, Mailboxes, NTFS, EXTFS 2/3/4, FAT 12/16/32 file systems
Quickly triage and search for (meta-) data: Regular expressions, dictionaries, content search, tags, timeline.
Recover hidden and deleted artifacts: Deleted files/folders, unallocated spaces, carving
Volatile memory forensics: Processes, local files, binary extraction, network connections
http://tools.kali.org/forensics/dff
http://www.sciencedirect.com/science/article/pii/S1877050913006315
http://www.sciencedirect.com/science/article/pii/S1877050913006315
- Built on the EnCase Enterprise platform are market-leading electronic discovery and
cyber security solutions, EnCase , EnCase Cybersecurity, and EnCase Analytics. They empower organizations to respond to litigation discovery requests, perform sensitive data discovery for complianceeDiscovery , conduct a speedy and thorough security incident response, and reveal previously hidden advanced persistent threats or malicious insider activity.purposes
http://www.guidancesoftware.com/
- Forensic Toolkit- FTK
http://www.accessdata.com/products/digital-forensics/ftk
- IBM i2 provides intelligence analysis, law enforcement and fraud investigation solutions. i2 offerings deliver flexible capabilities that help combat crime, terrorism and fraudulent activity.
- Autopsy® is a digital forensics platform and
interface to The Sleuth Kit® and other digital forensics tools. Itgraphical by law enforcement, military, and corporate examiners to investigate what happened on a computeris used
http://www.sleuthkit.org/autopsy/
- The Sleuth Kit® is a collection of
tools and a C library that allows you to analyze disk images and recover files from them.command line behind the scenes in Autopsy and many other open source and commercial forensics tools.It is used
http://www.sleuthkit.org/
- SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3
the SANS Incident Forensic Toolkit (SIFT) Workstation for incident response and digital forensics use and made it available to the whole community as a public service. The free SIFT toolkit, that can match any modern incident response and forensic tool suite,
http://digital-forensics.sans.org/community/downloads
- The Volatility Framework
The Volatility Foundation is an independent 501(c) (3) non-profit organization that maintains and promotes open source memory forensics with The Volatility Framework.
http://www.volatilityfoundation.org/
- FTK Imager
FTK Imager is a data preview and imaging tool that allows you to examine files and folders on local hard drives, network drives, CDs/DVDs, and review the content of forensic images or memory dumps
http://accessdata.com/product-download/digital-forensics/ftk-imager-lite-version-3.1.1
- dc3dd
A patch to the GNU
https://sourceforge.net/projects/dc3dd/
- CAINE (Computer Aided
INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensicsprojec
http://www.caine-live.net/
bulk_extractor
http://tools.kali.org/forensics/bulk-extractor
-
is contained on several live CDs and VMs. Some of themGuymager more often than others. Take care toare updated one with a recent version ofchose Guymager forensic imager for media acquisition.
http://guymager.sourceforge.net/
is a collection of libraries thatlibyal are used to access various data formats, such as the OLE Compound File or NT File System. The original use case for the libraries is for analyzing data formats or their content for analysis in digital forensics and incident response (DFIR).the context of
- a Python-based backend engine for the tool log2timeline.
The initial purpose of
https://github.com/log2timeline/plaso/wiki
plaso is a Python-based backend engine for the tool log2timeline.
Rekall is an advanced forensic and incident response framework. While it began life purely as a memory forensic framework, it has now evolved into a complete platform
- The
Rekall Framework isa completely open collection of tools, implemented in Python under the Apache and GNUGeneral Public License, for the extraction and analysis of digital artifacts computer systems.
- Exercise 2 - Track User Mode Process Allocations
Heap allocations
- Mainline NT Heap
– Services allocation requests of sizes less than 64 KB. - Low Fragmentation Heap
– Composed of sub-segments that service allocation requests offixed size blocks. VirtualAlloc – Services allocation requests of sizes greater than 64 KB.
There are two concepts to understand in this area:
- Reserved memory: Reserves an address range for usage but does not
acquire memory resources.
- Committed memory: Ensures that either physical memory or page file space will be available
if the addresses are referenced .
https://docs.microsoft.com/en-us/windows-hardware/test/wpt/memory-footprint-optimization-exercise-2
Heaps
- Forensic Analysis of Windows User-Space Applications Through Heap Allocations
Why
Forensically
Users interact directly with applications.
Applications interact with the OS kernel.
Challenges for user-space analysis
So many
Current tools and techniques
Why is page translation in
Have to consider shared memory (Prototype PTEs).
Some memory forensic tools are
Associate random data with the content of user space memory. (Very dangerous from an evidentiary perspective.).
Conclusions
For the first time, a FOSS memory analysis framework supports reliable user space address translation
Prototype PTE, Page file, Transitioned PDEs
High-quality address translation is essential in order
Thorough heap analysis enables seeing memory through an app's own abstractions.
https://pdfs.semanticscholar.org/aed3/087a4f3c36dc4e1becfa8cc5b9fb0af4d6fa.pdf
- Incident Forensics Lifecycle
GCTI certification
CTI - cyber threat intelligence
Diamond Model and Cyber Kill-Chain
Incident response lifecycle
preparation
identification
recovery
lessons learn
Digital forensics lifecycle
collection
examination
analysis
reporting
Cyber Kill-Chain
used for identification and prevention of cyber intrusions and describes 7 stages of a cyber attack
reconnaissance (and precursors)
weaponization
delivery
exploitation
installation
command and control
actions on objectives
https://cyberforensicator.com/2019/03/24/incident-forensics-lifecycle/
No comments:
Post a Comment