Advance Digital Forensic - PowerPoint PPT Presentation

1 / 19
About This Presentation
Title:

Advance Digital Forensic

Description:

Data as seen by Forensic Investigators using his sophisticated toolkit. ... Pattern searches. 16. Tools for analyzing captured network traffic. Network Miner ... – PowerPoint PPT presentation

Number of Views:418
Avg rating:3.0/5.0
Slides: 20
Provided by: syman8
Category:

less

Transcript and Presenter's Notes

Title: Advance Digital Forensic


1
Advance Digital Forensic
2
Agenda
  • What is Computer Forensic?
  • Gathering evidence from windows memory
  • Advance registry forensic.
  • Analyzing network data to collect evidence

3
Computer Forensics the laws
  • First Law of Computer Forensics
  • There is evidence of every action.
  • Harlan Carveys Corollary Once you understand
    what actions or conditions create or modify an
    artifact, then the absence of that artifact is
    itself an artifact.

4
Tip of the Digital Iceberg
Data as seen by a casual observer using common
tools (Explorer Window, cmd shell, web browser
etc. )
Data as seen by Forensic Investigators using his
sophisticated toolkit. May include deleted data,
hidden data, unauthorized information and records
of illegal activity!
5
Windows Memory Forensic
  • Extracting windows login credentials from RAM
    image.
  • Extracting running processes.
  • Extracting user assist keys from RAM
  • Viewing registry keys for all open process.

6
Extracting windows login credentials from RAM
image.
  • Volatility modules used
  • hivescan python volatility hivescan -f
    ltfilenamegt
  • hivelist python volatility hivelist -f
    ltfilenamegt -o ltoffset valuegt
  • Hashdump volatility hashdump -f ltfilenamegt (-y
    System Hive Offset)(-s SAM Hive Offset)
  • Use of CAIN Abel to crack the hashes obtained.

7
Extracting user assist keys from RAM
  • Load the image in Encase and search for the
    keyword HRZR_EHACNGU which is UEME_RUNPATH.
    Keywords are HRZR_EHACNGU.\.rkr
  • HRZR_EHACNGU.\.yax
  • Decrypt the results using ROT13-decryptor.

8
Advance Registry Forensic
9
Windows Registry
  • Registry files are essentially databases
    containing information and settings for
  • Hardware
  • Software
  • Users
  • Preferences
  • A registry hive is a group of keys, subkeys, and
    values in the registry that has a set of
    supporting files containing backups of its data.
  • In Windows 98, the registry files are named
    User.dat and System.dat.
  • In Windows Millennium Edition, the registry files
    are named Classes.dat, User.dat, and System.dat.
  • In Win XP, the registry files are available in
    C\windows\system32\config folder

10
Mining Windows Registry
  • Multiple forensic avenues in the registry!
  • System and User-specific settings
  • UserAssist
  • MuiCache
  • MRU Lists
  • ProgramsCache
  • StreamMRU
  • Shellbags
  • Usbstor
  • IE passwords
  • and many more!

11
Mining Windows Registry
  • Multiple forensic avenues in the registry!
  • System and User-specific settings- NTUSER.DAT
  • UserAssist - HKCU/software/microsoft/windows/curre
    ntversion/Explorer/UserAssist
  • MuiCache - HKCU/Software/Microsoft/Windows/ShellNo
    Roam/MUICache
  • MRU Lists - HKCU/software/microsoft/windows/curren
    tversion/Explorer/RunMRU
  • ProgramsCache HKCU/Software/Microsoft/Windows/Cur
    rentVersion/Explorer/StartPage
  • StreamMRU - HKCU/software/microsoft/windows/curren
    tversion/Explorer/StreamMRU
  • Shellbags HKCU/Software/Microsoft/Windows/Shell/
    BagMRU
  • Usbstor - HKLM/System/CurrentControlSet/Enum/USBSt
    or
  • and many more!
  • Demo

12
Tools to analyze registry
  • Regripper open source tool. Developed by Harlen
    Carvey. Coding is done in PERL language
  • Windows registry analyzer
  • Windows registry recovery.
  • Timestamp Dcode.

13
Network Forensic
14
The Security Process and Network Forensics
15
Overall approach
  • Study the network architecture.
  • Determine network traffic capture mechanisms at
    appropriate points and get a copy of the capture
    file.
  • Determine devices that should/could be generating
    logs, especially those that are pertinent to case
    in hand.
  • Determine vendors of these devices.
  • Determine logging functionality, and logging
    configuration.
  • Assemble appropriate log analysis tools, and
    objectives of the analysis
  • String searches
  • Pattern searches

16
Tools for analyzing captured network traffic
  • Network Miner
  • Netwitness
  • Wireshark
  • Winhex

17
Case study of Network Forensic
18
(No Transcript)
19
  • Thank you!
  • Questions and Answers!!
  • Kush Wadhwa, EnCE, CEH, RHCE
  • Contact Number 919717188544
  • Email Address - kushwadhwa_at_gmail.com
Write a Comment
User Comments (0)
About PowerShow.com