Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Digital Forensics and the Most Famous Egg How did Humpty Dumpty fall? Humpty Dumpty sat on a wall, Humpty Dumpty had a great fall. All the king's horses and all the king's men Couldn't put Humpty together again Reasons for Humpty’s Fall • • • • • He was pushed He jumped He was inebriated The wall was structurally unsound He faked his own demise Agenda • • • • • Chain of Custody Data Sources & Imaging Data Types Types of Cases What to Look For in Forensic Provider Chain of Custody Data Sources • Memory • Hard Drives – Rotational v. SSD – RAID – Encryption • Mobile • Removable Media • Cloud Memory • What was going through Humpty’s mind? Hard Drives Mobile Removable Media Cloud What Do We Know? • • • • • • • • Largest egg producer We don’t have RAM We have his computer No encryption or RAID Always carried his smartphone Used a tablet at home and on the road Never seen using removable media Might have had cloud accounts Data Types • • • • Actual Files Deleted Files Email Operating System Files Actual Files • DOCX, XLSX, PPTX, PDF, JPG – Content – Metadata • File System • File • LNK – Metadata • CLUE: Keyword search for “poached” turns up 2 hits. Deleted Files • • • • Can be found anywhere Due to both user and system activity Mass deletions in short timeframe = RED FLAG Greater chance of recovery IF – Less time from file deletion – Less activity on the disk • CLUE: Found deleted JPG. Recovered Photo Email Files • • • • • Outlook Lotus Notes Windows Mail Mozilla Thunderbird Webmail • CLUE: No email files, but webmail URL’s found in Internet History. Windows Operating System Files • • • • • • Registry Event Logs Browser LNK Prefetch MFT and USN Journal Registry Analysis • • • • • • C:\Windows\System32\Config C:\Users\<user_name>\NTUSER.dat MRU & Jump Lists Shellbags USB History CLUE: New USB drive plugged in 7 days prior to Humpty’s death. Last plugged into the PC the morning of Humpty’s death. 2nd USB drive plugged in same day. Browser Artifacts • • • • • Depends upon the browser IE, Firefox and Chrome All very different & rapidly changing Index.dat, SQLite, JSON CLUE: Carve for webmail content, but no meaningful fragments, BUT we find a new email address and domain that looks interesting. Mobile Artifacts • • • • • Device Encryption & Passcodes Volatile Data ~2M app’s between Android & iPhone Most rely on plist or SQLite structure Common ones are handled by mobile forensics suites • CLUE: Words With Friends has a chat feature. Removable Media • • • • Write-block it Physical image best, unless encrypted PC USB PC USB • CLUE: Term sheet between Humpty Dumpty Eggs and Chicken Little Enterprises found. What Do We Know? • Pam’s recipe for Eggs Benedict from the Internet saved to the desktop. • Deleted JPG originating from Humpty’s phone puts him at Chicken Little’s house when the thumb drive is inserted. • Internet history reveals new email address. Subpoena shows communication with the baker about expansion plan. • Words With Friends shows chat log with “Ace” • 1st USB drive contains term sheet between Humpty Dumpty Eggs and Chicken Little Enterprises • 2nd USB drive is unknown HD & CL Hatch a Plan to Corner the Egg Market • Humpty Dumpty and Chicken Little conspire to establish an egg cartel and expand. • Part of the egg-spansion is into other food goods, like hollandaise. • Humpty pretexts the baker with a phony email address to get his recipe. (Turns out it’s really PAM’s) • Baker finds out about Humpty’s plans. • Baker pushes Humpty and copies the recipe. – Butcher & Candlestick maker both have alibies. Push Button Forensics Forensic Analysis QUESTIONS? Mike Lombardi Vertigrate [email protected] (602) 283-1212