11th national investigations symposium sinden.pdf · 2017-05-18 · 11th national investigations...

52
11 th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations 10 November 2016 David Sinden Electronic Evidence Specialist

Upload: others

Post on 05-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

11th National Investigations Symposium

Making the most of electronic data How Computer Forensics can assist

investigations

10 November 2016 David Sinden

Electronic Evidence Specialist

Page 2: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Introduction

10 years Computer Forensics 8 years private sector Global Fraud, Bribery and Corruption

cases Last 18 months at NSW ICAC

2

Page 3: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Objective

Insight into the wealth of electronic information available for investigations

How to make most of it and where it is located

Focus on Email and Mobile Phones Hints & Tips

3

Presenter
Presentation Notes
No live demo’s unfortunately
Page 4: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Electronic Data Overview

Growing phenomenally • IBM – 2.5 exabytes (2 billion gigabytes) was

generated every day in 2012 • 90 per cent of the data in the world today has

been created in the last two years • World’s data volume expected to grow 40 per

cent per year, and 50 times by 2020

4

Presenter
Presentation Notes
Electronic data is part of every investigation today
Page 5: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Electronic Data Growth

5

Presenter
Presentation Notes
Average hard drive size in computers these days growing to 1TB
Page 6: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Electronic Data

More systems Interconnected Greater data sharing IoT devices – Cameras, Fridges etc. Car Infotainment Systems

6

Presenter
Presentation Notes
Mention syncing phones with cars Forensic tools to collect data from cars
Page 7: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Digital Forensic Challenges

Subjects wiser, cover trail App developers starting to use encryption Technology and platforms change at rapid

pace

7

Presenter
Presentation Notes
New apps being developed every day
Page 8: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Email Forensics

Presenter
Presentation Notes
Most investigations involve email Often provides information which can open up the investigation Who is talking to who, other parties involved
Page 9: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Corporate Email Systems

Microsoft Exchange/Outlook Lotus Domino/Notes Novell GroupWise

9

Page 10: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Email Applications

Outlook Express Windows Mail Mozilla Thunderbird Windows Live Mail Pegasus

10

Presenter
Presentation Notes
Non corporate environment
Page 11: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Email Applications

Fox mail SeaMonkey Mail The Bat!

11

Presenter
Presentation Notes
Slightly more obscure
Page 12: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Apple Mac

Mail – eml, emlx Mbox Eudora Microsoft Entourage Outlook for Mac

Different storage formats

12

Page 13: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Microsoft Exchange/Outlook

EDB database – hierarchical • Public and Private Mail stores

Private contains user mailboxes Found on servers Tip: Should be dismounted before

collecting

13

Presenter
Presentation Notes
Most common in organisations
Page 14: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Outlook Data Files

Found on local computer PST – Personal Storage Table OST – Offline Storage Table

• Synchronised copy downloaded to computer – can still read and compose messages if connection interrupted

• Restored messages are synchronised

14

Presenter
Presentation Notes
PST – Download and store emails from web service providers such as gmail, hotmail etc. Can also archive emails
Page 15: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Microsoft Exchange/Outlook

What happens when a user deletes a message?

Delete - Deleted items folder Soft delete – deleted items folder to

Recoverable Items folder. Also covers shift + Delete

15

Presenter
Presentation Notes
Common question can I get from investigators can we recover those emails? Soft delete deleted items folder is emptied and moves to recoverable items folder
Page 16: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Microsoft Exchange/Outlook

Dumpster – Recoverable items Retention Policy based Purge after 14 days (default), 28 days or

never!

16

Presenter
Presentation Notes
Dumpster old name After deleted items folder emptied use Recover Deleted Items folder for set period Policy differs between organisations
Page 17: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Microsoft Exchange/Outlook Other ways to recover deleted emails? EDB, OST, PST are databases Carving looking for message structures

I still can’t find that deleted email?

17

Presenter
Presentation Notes
When a message is deleted it’s not deleted until overwritten or the database is purged Forensic tools can carve for deleted content in EDB, OST and PST files Look outside the box at alternative data sources
Page 18: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Email Journaling Systems

MailMarshall

IronPort

18

Presenter
Presentation Notes
Can record every communication in an organisation, sometimes in full detail
Page 19: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Archiving Systems

Commvault, Enterprise Vault etc.. May separate attachments from emails Leave behind a stub file with a link Tip: Extracts don’t always provide all the

information – look for missing attachments

19

Presenter
Presentation Notes
Deduplication, reduce storage footprint
Page 20: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Tape Backups

Snapshot based Understand the backup schedule daily,

weekly, monthly Takes time to restore and fails often

20

Presenter
Presentation Notes
Least favourite for all parties involved Not so easy for forensic investigators if provided with tape, passwords, software catalog etc. Need infrastructure to read
Page 21: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Where is technology heading?

Cloud Service • Office 365 • Built in legal hold and discovery feature

Virtual Machines VM - Emulation Web based mail – difficult to see on a

local computer Mobile Device Email Apps

21

Presenter
Presentation Notes
Virtual machines can make it easier to collect VMWare, Virtual Box Tip: Can’t get email from Mail App unless jailbroken
Page 22: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Mobile Forensics

Presenter
Presentation Notes
Such a large topic, so will talk about Apple iTunes Backups Like email, important source of electronic information
Page 23: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Smartphone Evolution – 1994 IBM Simon

23

Page 24: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

2000 – Ericsson R380

24

Page 25: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

2002 – Palm Treo

25

Page 26: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

2003 - Blackberry

26

Page 27: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

2007

27

Page 28: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Smartphone Platforms

Android (Marshmallow, Nougat next) Apple iOS (10) Windows 10 Mobile Blackberry 10

All are enhancing security

28

Presenter
Presentation Notes
Android largest market share in Australia Focus on iOS perhaps most talked about
Page 29: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Apple iOS

Interesting fact – non public code names • Mainly ski resorts

• 9.1 Boulder • 9.2 Castlerock • 9.3 Eagle • 10.0 Whitetail

29

http://www.imore.com/ios-version-codenames

Page 30: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Apple iOS

Protected by passcode – Simple V Complex

No Passcode? – Lockdown trust file from computer

30

Page 31: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iTunes Backups

Local PC and Cloud Copy of everything on device Automatic sync on computers with iTunes

software installed (unless disabled)

31

Page 32: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iTunes Backup Location

Mac: ~/Library/Application Support/MobileSync/Backup/ Windows XP: \Documents and

Settings\(username)\Application Data\Apple Computer\MobileSync\Backup\ ...

Windows Vista, Windows 7,8 and 10: \Users\(username)\AppData\Roaming\Apple Computer\MobileSync\Backup\

32

Page 33: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iTunes Backups

UDID Unique identifier

Matches folder name

33

Page 34: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iTunes Backups

Non readable format Uniquely named files 40 digit alphanumeric hex value no file

extension

34

Page 35: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iTunes Backups

SHA1 hash value of the file path appended to respective domain name and ‘-’

e.g.HomeDomain-Library/SMS/sms.db Consistent across phones unless apple

changes the architecture How to decode these filenames and the

data? 35

Presenter
Presentation Notes
Domain name is apple’s design architecture
Page 36: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iTunes Backups

4 Metadata files

36

Page 37: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iTunes Backups

Info.plist – Device details – name, IMEI Manifest.mbdb – Info about all other files Manifest.plist – Passcode set, encrypted,

last backup computer name, date Status.plist – Details about the backup,

state, date and version

37

Page 38: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iTunes Backups

What about encrypted backups? Password only entered once and oft

forgotten

38

Page 39: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iTunes Backups

Attacks: brute force, dictionary… Word list from computer Acquire memory

39

Page 40: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Passwords….

40

Presenter
Presentation Notes
Passwords are a challenge to the forensic investigator Sometimes human behaviour is predictable 10s of passwords lose track of them written down, same password Open source intel Password management applications
Page 41: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Passwords

Apple Mac Keychain • Password management system • Stores passwords for applications, servers,

web sites, WiFi Passwords, even iTunes • Keychain Access GUI OS X • Encrypted normally password of the computer • Windows need alternative tools to view

41

Page 42: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Mac OS X Keychain App

42

Page 43: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iCloud

Cloud credentials recovered from phone or backup

Many tools that can acquire data from the cloud with credentials

Appropriate Legal authority required Where is the data even stored?

43

Page 44: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iTunes Backups

The iTunes Backup might have been

deleted, what now?

44

Page 45: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Volume Snapshot Service (VSS)

VSS – Volume Snapshot Service

• Backup feature included in Microsoft Windows • Vista, 7,8,10 and Server 2008, 2012

45

Page 46: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

VSS

Right click volume (C) Select properties Previous Versions tab

46

Page 47: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

VSS

47

Page 48: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

VSS

48

Each backup can be viewed on machine it was created on

Third party tools can parse them Not all files backed up e.g. OST You might find iTunes backups that were

thought deleted

Page 49: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

iTunes Backups

49

Tip: Delete button doesn’t appear to delete data

Page 50: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Other Challenges for Investigations

Non searchable documents • Optical Character Recognition (OCR) • OCR not perfect not brilliant with handwriting • Never assume every piece of data is

searchable

50

Presenter
Presentation Notes
OCR is not perfect and can make mistakes especially with bad scans and handwritten documents
Page 51: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Other Challenges for Investigations

Screenshots SMS messages

51

Page 52: 11th National Investigations Symposium Sinden.pdf · 2017-05-18 · 11th National Investigations Symposium Making the most of electronic data How Computer Forensics can assist investigations

Any questions?

52