national software reference library computer forensics tool … · 2020. 4. 14. · pda forensics...

17
Computer Forensics Standards: National Software Reference Library Computer Forensics Tool Testing Computer Forensics Reference Data Sets PDA Forensics Research Computer Forensics Standards: Computer Forensics Standards: National Software Reference Library National Software Reference Library Computer Forensics Tool Testing Computer Forensics Tool Testing Computer Forensics Reference Data Sets Computer Forensics Reference Data Sets PDA Forensics Research PDA Forensics Research Barbara Guttman [email protected] September 21, 2007

Upload: others

Post on 29-Aug-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

Computer Forensics Standards:

National Software Reference Library

Computer Forensics Tool Testing

Computer Forensics Reference Data Sets

PDA Forensics Research

Computer Forensics Standards:Computer Forensics Standards:

National Software Reference LibraryNational Software Reference Library

Computer Forensics Tool TestingComputer Forensics Tool Testing

Computer Forensics Reference Data SetsComputer Forensics Reference Data Sets

PDA Forensics ResearchPDA Forensics Research

Barbara [email protected] 21, 2007

Page 2: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

Computer Forensics in NIST

• Goals of Computer Forensics Projects• Support use of automated processes

into the computer forensics investigations

• Provide stable foundation built on scientific rigor to support the introduction of evidence and expert testimony in court

Page 3: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

Goals of CF at NIST

• Provide international standard reference data that tool makers and investigators can use in investigations (NSRL)

• Establish computer forensic tool testing methodology (CFTT)

• Provide test material for proficiency testing and lab-based tool testing (CFReDs)

• Research emerging PDA forensics

Page 4: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

NSRL Project

Page 5: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

What is the NSRL?

The National Software Reference Library is:• A physical collection of over 8,000

software packages• A database of 34 million file “fingerprints”

and additional information to uniquely identify each file

• A Reference Data Set (RDS) extracted from the database onto CD, used by law enforcement, investigators and researchers

Page 6: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

Use of the RDS

• Eliminate known files from the examination process using automated means

• Discover expected file name with unknown contents

• Identify origins of files• Look for malicious files, e.g., hacker tools• Provide rigorously verified data for

forensic investigations• Used by many forensics tools (ILook,

EnCase, FTK)

Page 7: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

RDS Field Use Example

Windows 2000 operating system software contains 5933 images which are known gifs, icons, jpeg files

You are looking for images on a computer which is running Windows 2000.

By using the RDS and an analysis program the investigator would not have to look at these files to complete his investigation.

e.g.,

Page 8: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

Are Hashes “broken”?

• Both MD-5 and SHA-1 have been shown to have weaknesses

• The weaknesses do not affect the use of hashes for forensic analysis• Hash attacks are not “pre-image”

attacks

Page 9: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

Computer Forensics Tool Testing

(CFTT)

Page 10: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

A Problem for Investigators

Do forensic tools work as they should?• Software tools must be …

• Tested: accurate, reliable & repeatable• Peer reviewed• Generally accepted

• … by whom?• Results of a forensic analysis must

be admissible in court

Page 11: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

Project Tasks

• Identify forensics functions• Develop specification for each

category• Peer review of specification• Test methodology for each function• Report results

Page 12: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

Tool Testing"Does it meet specifications?"

Specifications"What should it do?"

Test Methodology"How do we test it?"

ForensicCommunityFeedback

Hardware Write Blocker (HWB) Tool Specification

HWB Assertions and Test Plan

NIJ: Test Results for HWB Device:FastBloc IDE (Firmware Version 16)

NIJ Test Results for HWB Device:Digital Intelligence Firefly 800 IDE

Execute HWB Test Cases

NIJ Test Results for HWB Device:MyKey NoWrite

NIJ Test Results for HWB Device:ICS ImageMasster DriveLock IDE

NIJ Test Results for HWB Device:WiebeTech FireWire DriveDoc Combo

NIJ Test Results for HWB Device:Digital Intelligence UltraBlock SATA

Test Reports"How well did a Tool do?"

Publish HWB Reports ThroughNational Institute of Justice

NIJ

Page 13: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

Benefits of CFTT

Benefits of a forensic tool testing program• Users can make informed choices

• Odd sector problem

• Reduce challenges to admissibility of digital evidence

• Moussaoui case

• Tool creators make better tools• Safeback 2.18• EnCase documentation

Page 14: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

NIST

Standard Reference Computer

Forensic Test Sets

CFReDS

Page 15: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

Uses of CFReDS

• The CFReDS project provides documented sets of simulated digital evidence.

• Uses for Data Sets• Calibration of Forensic Tools• Proficiency Testing• Tool Testing• Training

Page 16: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

Graphics

Multimedia

Application Dataand Documents

Baseline File-SystemImages

Prototype Data Sets

Russian Team Room (Big-endian, UTF-8)

Hacking Case

Mac Image (Multiple File-Systems)

Rhino Hunt

Page 17: National Software Reference Library Computer Forensics Tool … · 2020. 4. 14. · PDA Forensics Research Barbara Guttman bguttman@nist.gov September 21, 2007. Computer Forensics

PDA Forensics

• NIST also performs research on PDA forensics including mobile phones

• Provide overview information and guidelines