Professional Documents
Culture Documents
CHFI v3 Module 01 Computer Forensics in Todays World
CHFI v3 Module 01 Computer Forensics in Todays World
Computer ac g
Forensics Investigator
Version 3
Module I
Computer Forensics in
Today’s
y World
Scenario
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Forensic News
Source: http://www.infoworld.com/article/06/08/10/HNinterceptingemail_1.html
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Module Objective
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Module Flow
Computer forensics
f i Computer ffacilitated
C ili d
Reasons for cyber attacks
flaws and risks crimes
Stages of Rules of
Digital forensics
forensic investigation computer forensics
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Introduction
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
History of Forensics
Definition:
Aim:
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Definition of Computer Forensics
Definition:
“A methodical series of techniques and procedures for gathering
evidence, from computing equipment and various storage devices and
digital media, that can be presented in a court of law in a coherent and
i f l fformat.”
meaningful
- Dr. H.B. Wolfe
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
What is Computer Forensics?
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Need for Computer Forensics
~ I
Issues related
l t d tto collecting
ll ti evidence:
id
• Proper documentation
• Duplicating
l media
d
• Preserving evidence
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Objectives of Computer Forensics
that it can be p
presented as evidence
in a court of law
~ T identify
To id tif th
the evidence
id iin short
h t ti
time,
perpetrator
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Benefits of Forensic Readiness
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Computer Forensics Flaws and Risks
evidence is examined
~ I is
It i still
ill more off an “Art”
“A ” than
h a “Science”
“S i ”
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Computer Facilitated Crimes
crimes
• Speed
• Anonymity
• Fleeting
Fl ti nature
t off evidence
id
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Type of Computer Crimes
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Cyber Crime
These categories are not exclusive and many activities can be characterized
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Modes of Attacks
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Examples of Cyber Crime
• Embezzlement
• Copyright
py g piracy
p y ((software,, movie,, sound recording)
g)
• Child Pornography
• Password trafficking
• Email
E il bombing
b bi & SPAM
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Examples of Cyber Crime (cont’d)
~ The investigation of any crime involves painstaking collection
of clues,, forensic evidence and attention to detail
~ This is more so in these days of ‘white collar’ crime where
documentary evidence plays a crucial role
~ With an increasing number of households and businesses
using
i computers, coupled l d with
i h easy Internet access, iit iis
inevitable that there will be at least one electronic device
found during the course of an investigation
~ This mayy be a computer,
p , but could also be a printer,
p , mobile
phone, and personal organizer
~ This electronic device may be central to the investigation
~ No matter which, the information held on the computer may
b crucial
be i l andd must bbe iinvestigated
i d iin the
h proper manner,
especially if any evidence found is to be relied upon in a court
of law
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Examples of Evidence
Examples of how evidence found in a computer may
assist in the pprosecution or defense of a case are
manifold.
A few of these examples are:
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Key Steps in Forensic Investigations
Step 1: Computer crime is suspected
Step
p 2: Collect p
preliminaryy evidence
S
Step 5: Seize
S i evidence
id at the
h crime
i scene
S
Step 13: Submit
S b i the
h report to the
h client
li
Step 14: If required, attend the court and testify as expert witness
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Rules of Computer Forensics
Minimize the
option of
examining the
original evidence
Document anyy
Follow rules of
change in
evidence
evidence
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Rule for Forensic Investigator
~Examination of a computer
by the technically
inexperienced person will
almost certainly result in
rendering any evidence
found inadmissible in a court
of law
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Accessing Computer Forensics Resources
Joining
J i i a network
t k off
computer forensic
experts and other
professionals
News services
devoted to computer
forensics can also be
a powerful resource
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Maintaining Professional Conduct
forensic investigator
~ I
Investigators
ti t mustt display
di l theth highest
hi h t level
l l off ethics
thi
~ Discuss the case at hand only with the person who has
the
h right
i h to know
k
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Understanding Corporate Investigations
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Digital Forensics
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Case Study: # 1
Password Recovery
y Services
~ A pharmaceutical manufacturer had password protected accounting software
files as part of normal security practices to safeguard confidential
information.
~ After the bookkeeper’s employment was terminated for poor performance,
the Director of Human Resources attempted to open the accounting file and
found the file password protected, as expected.
~ The HR Director obtained a copy of the current password that had been
stored in an envelope in the department safe (as directed by the company’s
security policy).
~ When she attempted to use the password to open the file, she was
unsuccessful.
~ Apparently, the former bookkeeper had changed the password and not
followed the company policy of placing a copy of the password in the safe.
~ The HR Director emailed the password protected accounting file to TRC.
~ We were able to recover the password within a few hours and email it back to
her all in the same afternoon.
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Case Study: #2
Court Upholds Repayment of Fees Incurred in a Computer Forensic
Investigation
~ United States v. Gordon, 393 F.3d 1044 (9th Cir. 2004). After discovering missing
stock shares, an employer suspected embezzlement and requested the defendant’s
laptop computer for examination.
~ The employer
p y specifically
p y told the defendant not to delete anything
y g from the hard drive.
A computer forensic analysis revealed the defendant attempted to overwrite files on the
computer by running “Evidence Eliminator,” a software wiping program, at least five
times the night before he turned over the computer.
~ The defendant was convicted of embezzlement and ordered to pay restitution,
including reimbursing the employer for $1,038,477 of the total $1,268,022 costs spent
on the forensic analysis.
~ On appeal, the defendant argued the trial court should not have awarded the employer
investigation costs,
costs including the costs of the forensic examination
examination.
~ The appellate court rejected this argument and affirmed the district court’s award,
noting the defendant “purposefully covered his tracks as he concealed his numerous
acts of wrongdoing from [his employer] over a period of years.
~ As the victim, [the employer] cannot be faulted for making a concerted effort to pick up
his trail and identify all the assets he took amid everything he worked on.”
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
When An Advocate Contacts The Forensic Investigator, He
Specifies
p How To Approach
pp The Crime Scene
~ Any liabilities from the incident and how they can be managed
~ Finding and prosecuting/punishing (internal versus external culprits)
~ Legal and regulatory constraints on what action can be taken
~ Reputation protection and PR issues
~ When/if to advise partners, customers, and investors
~ How to deal with employees
~ Resolving commercial disputes
~ Any additional measures required
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Enterprise Theory of Investigation (ETI)
l i l ti
legislation, llaw enforcement
f t can ttargett and
d di
dismantle
tl
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Legal Issues
~ Th approach
The h off investigation
i ti ti di diverges with
ith change
h iin
technology
~ Report
p should consist of summaryy of
conclusions, observations and all
appropriate
i t recommendations.
d ti
• How
H could
ld it b
be made
d available
il bl tto an
investigation?
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited
Copyright © by EC-Council
EC-Council All rights reserved. Reproduction is strictly prohibited