Title: IDAHO STATE POLICE Cyber Crimes Unit
1IDAHO STATE POLICECyber Crimes Unit
- Detective Bret Kessinger
- bret.kessinger_at_isp.idaho.gov
- 208-884-7216
- CFE Richard Goldston
- richard.goldston_at_isp.idaho.gov
- 208-884-7103
2After you have found that youre a victim of a
Network Intrusion, whats next?
- The bottom line for any computer related computer
crime is computer forensics. - Find and present the evidence needed for court.
3GuidanceSoftwares EnCase
4http//www.ilook-forensics.org/
5http//www.x-ways.net/forensics/index-m.html
6www.accessdata.com Forensic Tool kit
7www.Wetstonetech.com
8Leg Work
- Administrators
- Get the passwords
- Users (how many)
- How is the system set up
- Windows, linux, Novell, HP, AS400, Unix, etc.
9Network logs
- What logs avalible
- Get the logs
- Remember a lot of network people do not keep
logs. - Logs take up too much space.
10Volatile Data
- injucted (.dlls)
- cache files
- netstat -an cryptcat -k mypassword 192.168.2.11
9999 - cryptcat -k mypassword -v -l -p 9999 gt
netstat.txt - xscan -host 10.0.20.xx -iis
11Recently Accessed Programs
- check all dates
- Prefectch files (xp-2k3)
12Auto Start
- Check the Registry
- http//www.accessdata.com/media/en_US/print/papers
/wp.Registry_Quick_Find_Chart.en_us.pdf - EnCase has an Enscript available
13Packed and Compressed Files
- Look for packed and compressed files,
- upx, dbx, gz, tgz, gzip, pst, tar,
- tdb ("thumbs.db"), zip, etc.
14Anything Hidden
- Check hidden files
- Alternate Data Stream locations (Accessdatas
Forensic Took Kit)
15Time and Date Analysis
- Time created
- Time last accessed
- (helpful but not all telling)
16Anti-virus and Malware scan
- Run Anti-virus and Malware software.
- If you have Imaged the computer us VMware, Mount
Anything, etc.
17GETDATA.COM
18Vector of Attack
- USB Devices
- Like a U3 thumb drive
- USB Hard drives
- CD Rom
19Users, Shares, Mapped drives
- Any unknown users
- Any files or folders being shared that should not
be - Mapped drive that is no longer there
20Files and Programs
- Installed programs that should not be there
- Organized files that would belong to a particular
program that should not be there
21Keyword Search
- Conduct text search
- Consider grep expressions
- Consider Swap File
- Consider Registry Files
22Signature, hash, File analysis
- EnCase does a nice file and Signature Analysis
- Hash searches and Analysis
23http//www.nist.gov/srd/nistsd28.htm
24http//tech.groups.yahoo.com/group/hashkeeper/
25Restore Evidence to is Native form
- Make an exact copy and boot the copy in the
suspected computer. - Use virtual software
- VMware, MSs Virtual PC
26http//www.vmware.com/
27http//www.microsoft.com/windows/virtualpc/default
.mspx
28What G2 Research do the most of
- Wrongful termination suits
- Employee is fired, six months later sues
- Network Systems people add new user on same
computer or ghost new image onto computer. - Theft of trade secrets
- Employee quits and goes to work for competitor,
taking all of his past work papers - Sometimes employee hacks into his old company and
downloads all the data he can find
29What should IT do
- When a employee leaves get them out of the
network system asap - Image the hard drive or remove it from the
computer. Write down the computers date and
time and label the employees hard drive or image.
Hard drives are cheaper than the law suit.
30(No Transcript)