Title: Advance Digital Forensic
1Advance Digital Forensic
2Agenda
- What is Computer Forensic?
- Gathering evidence from windows memory
- Advance registry forensic.
- Analyzing network data to collect evidence
3Computer Forensics the laws
- First Law of Computer Forensics
-
- There is evidence of every action.
- Harlan Carveys Corollary Once you understand
what actions or conditions create or modify an
artifact, then the absence of that artifact is
itself an artifact.
4Tip of the Digital Iceberg
Data as seen by a casual observer using common
tools (Explorer Window, cmd shell, web browser
etc. )
Data as seen by Forensic Investigators using his
sophisticated toolkit. May include deleted data,
hidden data, unauthorized information and records
of illegal activity!
5Windows Memory Forensic
- Extracting windows login credentials from RAM
image. - Extracting running processes.
- Extracting user assist keys from RAM
- Viewing registry keys for all open process.
6Extracting windows login credentials from RAM
image.
- Volatility modules used
- hivescan python volatility hivescan -f
ltfilenamegt - hivelist python volatility hivelist -f
ltfilenamegt -o ltoffset valuegt - Hashdump volatility hashdump -f ltfilenamegt (-y
System Hive Offset)(-s SAM Hive Offset) - Use of CAIN Abel to crack the hashes obtained.
7Extracting user assist keys from RAM
- Load the image in Encase and search for the
keyword HRZR_EHACNGU which is UEME_RUNPATH.
Keywords are HRZR_EHACNGU.\.rkr - HRZR_EHACNGU.\.yax
- Decrypt the results using ROT13-decryptor.
8Advance Registry Forensic
9Windows Registry
- Registry files are essentially databases
containing information and settings for - Hardware
- Software
- Users
- Preferences
- A registry hive is a group of keys, subkeys, and
values in the registry that has a set of
supporting files containing backups of its data. - In Windows 98, the registry files are named
User.dat and System.dat. - In Windows Millennium Edition, the registry files
are named Classes.dat, User.dat, and System.dat. - In Win XP, the registry files are available in
C\windows\system32\config folder
10Mining Windows Registry
- Multiple forensic avenues in the registry!
- System and User-specific settings
- UserAssist
- MuiCache
- MRU Lists
- ProgramsCache
- StreamMRU
- Shellbags
- Usbstor
- IE passwords
- and many more!
11Mining Windows Registry
- Multiple forensic avenues in the registry!
- System and User-specific settings- NTUSER.DAT
- UserAssist - HKCU/software/microsoft/windows/curre
ntversion/Explorer/UserAssist - MuiCache - HKCU/Software/Microsoft/Windows/ShellNo
Roam/MUICache - MRU Lists - HKCU/software/microsoft/windows/curren
tversion/Explorer/RunMRU - ProgramsCache HKCU/Software/Microsoft/Windows/Cur
rentVersion/Explorer/StartPage - StreamMRU - HKCU/software/microsoft/windows/curren
tversion/Explorer/StreamMRU - Shellbags HKCU/Software/Microsoft/Windows/Shell/
BagMRU - Usbstor - HKLM/System/CurrentControlSet/Enum/USBSt
or - and many more!
- Demo
12Tools to analyze registry
- Regripper open source tool. Developed by Harlen
Carvey. Coding is done in PERL language - Windows registry analyzer
- Windows registry recovery.
- Timestamp Dcode.
13Network Forensic
14The Security Process and Network Forensics
15Overall approach
- Study the network architecture.
- Determine network traffic capture mechanisms at
appropriate points and get a copy of the capture
file. - Determine devices that should/could be generating
logs, especially those that are pertinent to case
in hand. - Determine vendors of these devices.
- Determine logging functionality, and logging
configuration. - Assemble appropriate log analysis tools, and
objectives of the analysis - String searches
- Pattern searches
16Tools for analyzing captured network traffic
- Network Miner
- Netwitness
- Wireshark
- Winhex
17Case study of Network Forensic
18(No Transcript)
19- Thank you!
- Questions and Answers!!
- Kush Wadhwa, EnCE, CEH, RHCE
- Contact Number 919717188544
- Email Address - kushwadhwa_at_gmail.com