Table of Contents for
System Forensics, Investigation, and Response, 3rd Edition

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition System Forensics, Investigation, and Response, 3rd Edition by Easttom Published by Jones & Bartlett Learning, 2017
  1. Cover Page
  2. Contents
  3. System Forensics, Investigation, and Response
  4. Title Page
  5. Copyright Page
  6. Content
  7. Preface
  8. About the Author
  9. PART I Introduction to Forensics
  10. CHAPTER 1 Introduction to Forensics
  11. What Is Computer Forensics?
  12. Understanding the Field of Digital Forensics
  13. Knowledge Needed for Computer Forensics Analysis
  14. The Daubert Standard
  15. U.S. Laws Affecting Digital Forensics
  16. Federal Guidelines
  17. CHAPTER SUMMARY
  18. KEY CONCEPTS AND TERMS
  19. CHAPTER 1 ASSESSMENT
  20. CHAPTER 2 Overview of Computer Crime
  21. How Computer Crime Affects Forensics
  22. Identity Theft
  23. Hacking
  24. Cyberstalking and Harassment
  25. Fraud
  26. Non-Access Computer Crimes
  27. Cyberterrorism
  28. CHAPTER SUMMARY
  29. KEY CONCEPTS AND TERMS
  30. CHAPTER 2 ASSESSMENT
  31. CHAPTER 3 Forensic Methods and Labs
  32. Forensic Methodologies
  33. Formal Forensic Approaches
  34. Documentation of Methodologies and Findings
  35. Evidence-Handling Tasks
  36. How to Set Up a Forensic Lab
  37. Common Forensic Software Programs
  38. Forensic Certifications
  39. CHAPTER SUMMARY
  40. KEY CONCEPTS AND TERMS
  41. CHAPTER 3 ASSESSMENT
  42. PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
  43. CHAPTER 4 Collecting, Seizing, and Protecting Evidence
  44. Proper Procedure
  45. Handling Evidence
  46. Storage Formats
  47. Forensic Imaging
  48. RAID Acquisitions
  49. CHAPTER SUMMARY
  50. KEY CONCEPTS AND TERMS
  51. CHAPTER 4 ASSESSMENT
  52. CHAPTER LAB
  53. CHAPTER 5 Understanding Techniques for Hiding and Scrambling Information
  54. Steganography
  55. Encryption
  56. CHAPTER SUMMARY
  57. KEY CONCEPTS AND TERMS
  58. CHAPTER 5 ASSESSMENT
  59. CHAPTER 6 Recovering Data
  60. Undeleting Data
  61. Recovering Information from Damaged Media
  62. File Carving
  63. CHAPTER SUMMARY
  64. KEY CONCEPTS AND TERMS
  65. CHAPTER 6 ASSESSMENT
  66. CHAPTER 7 Email Forensics
  67. How Email Works
  68. Email Protocols
  69. Email Headers
  70. Tracing Email
  71. Email Server Forensics
  72. Email and the Law
  73. CHAPTER SUMMARY
  74. KEY CONCEPTS AND TERMS
  75. CHAPTER 7 ASSESSMENT
  76. CHAPTER 8 Windows Forensics
  77. Windows Details
  78. Volatile Data
  79. Windows Swap File
  80. Windows Logs
  81. Windows Directories
  82. Index.dat
  83. Windows Files and Permissions
  84. The Registry
  85. Volume Shadow Copy
  86. Memory Forensics
  87. CHAPTER SUMMARY
  88. KEY CONCEPTS AND TERMS
  89. CHAPTER 8 ASSESSMENT
  90. CHAPTER 9 Linux Forensics
  91. Linux and Forensics
  92. Linux Basics
  93. Linux File Systems
  94. Linux Logs
  95. Linux Directories
  96. Shell Commands for Forensics
  97. Kali Linux Forensics
  98. Forensics Tools for Linux
  99. CHAPTER SUMMARY
  100. KEY CONCEPTS AND TERMS
  101. CHAPTER 9 ASSESSMENT
  102. CHAPTER 10 Macintosh Forensics
  103. Mac Basics
  104. Macintosh Logs
  105. Directories
  106. Macintosh Forensic Techniques
  107. How to Examine a Mac
  108. Can You Undelete in Mac?
  109. CHAPTER SUMMARY
  110. KEY CONCEPTS AND TERMS
  111. CHAPTER 10 ASSESSMENT
  112. CHAPTER 11 Mobile Forensics
  113. Cellular Device Concepts
  114. What Evidence You Can Get from a Cell Phone
  115. Seizing Evidence from a Mobile Device
  116. JTAG
  117. CHAPTER SUMMARY
  118. KEY CONCEPTS AND TERMS
  119. CHAPTER 11 ASSESSMENT
  120. CHAPTER 12 Performing Network Analysis
  121. Network Packet Analysis
  122. Network Traffic Analysis
  123. Router Forensics
  124. Firewall Forensics
  125. CHAPTER SUMMARY
  126. KEY CONCEPTS AND TERMS
  127. CHAPTER 12 ASSESSMENT
  128. PART III Incident Response and Resources
  129. CHAPTER 13 Incident and Intrusion Response
  130. Disaster Recovery
  131. Preserving Evidence
  132. Adding Forensics to Incident Response
  133. CHAPTER SUMMARY
  134. KEY CONCEPTS AND TERMS
  135. CHAPTER 13 ASSESSMENT
  136. CHAPTER 14 Trends and Future Directions
  137. Technical Trends
  138. Legal and Procedural Trends
  139. CHAPTER SUMMARY
  140. KEY CONCEPTS AND TERMS
  141. CHAPTER 14 ASSESSMENT
  142. CHAPTER 15 System Forensics Resources
  143. Tools to Use
  144. Resources
  145. Laws
  146. CHAPTER SUMMARY
  147. KEY CONCEPTS AND TERMS
  148. CHAPTER 15 ASSESSMENT
  149. APPENDIX A Answer Key
  150. APPENDIX B Standard Acronyms
  151. Glossary of Key Terms
  152. References
  153. Index

Cellular Device Concepts

As with the Windows, Linux, and Macintosh operating systems, it is important that you fully understand the technology of cell phones and other devices before you explore the forensic analysis of the devices. In this section, you will learn the essential concepts and technologies used in mobile devices. These are basic concepts that you need to understand in order to be able to conduct forensics on cellular devices.

Terms

The first place to start is with terminology. This section introduces a number of terms—along with brief definitions—that are relevant to mobile technology. It is important that you be comfortable with the terms in this section.

Mobile Switching Center

A mobile switching center (MSC) is the switching system for the cellular network, responsible for routing calls between base stations and the public switched telephone network (PSTN). MSCs are used in 1G, 2G, 3G, and Global System for Mobile (GSM) communications networks. You will learn about 3G and GSM networks later in this section. The MSC processes all the connections between mobile devices and between mobile devices and landline phones.

Base Transceiver Station

The base transceiver station (BTS) is the part of the cellular network responsible for communications between the mobile phone and the network switching system. The BTS, together with a base station controller (BSC), makes up the base station system (BSS). The BSC is a central controller coordinating the other pieces of the BSS. The BSS is the combined radio transceiver equipment between the actual cellular devices and the MSC.

Home Location Register

The home location register (HLR) is a database used by the MSC that contains subscriber data and service information. It is related to the visitor location register (VLR), which is used for roaming phones.

Subscriber Identity Module

The subscriber identity module (SIM) is a memory chip that stores the International Mobile Subscriber Identity (IMSI). It is intended to be unique for each phone and is what you use to identify the phone. Many modern phones have removable SIMs, which means you could change out the SIM and essentially have a different phone with a different number. A SIM card contains its unique serial number—the ICCID—the IMSI, security authentication, and ciphering information. The SIM will also usually have network information, services the user has access to, and two passwords. Those passwords are the personal identification number (PIN) and the personal unlocking code (PUK).

Electronic Serial Number

Electronic serial numbers (ESNs) are unique identification numbers developed by the U.S. Federal Communications Commission (FCC) to identify cell phones. They are now used only in code division multiple access (CDMA) phones, whereas GSM and later phones use the International Mobile Equipment Identity (IMEI) number. The first 8 bits of the ESN identify the manufacturer, and the subsequent 24 bits uniquely identify the phone. The IMEI is used with GSM and Long Term Evolution (LTE), as well as other types of phones.

Personal Unlocking Code

The personal unlocking code (PUK) is a code used to reset a forgotten PIN. Using the code returns the phone to its original state, causing loss of most forensic data. If the code is entered incorrectly 10 times in a row, the device becomes permanently blocked and unrecoverable.

Integrated Circuit Card Identifier

Each SIM is identified by its integrated circuit card identifier (ICCID). These numbers are engraved on the SIM during manufacturing. This number has subsections that are very important for forensics. This number starts with the issuer identification number (IIN), which is a seven-digit number that identifies the country code and issuer, followed by a variable-length individual account identification number to identify the specific phone, and a check digit.

Networks

Although this section covers terms as well, they are terms specific to networks. Therefore, they are listed separately. Knowing the types of networks used may be the most fundamental part of understanding mobile devices. The network-specific terms are as follows:

  • Global System for Mobile (GSM) communications—The Global System for Mobile (GSM) communications is a standard developed by the European Telecommunications Standards Institute (ETSI). Basically, GSM is the 2G network.

  • Enhanced Data Rates for GSM Evolution (EDGE)Enhanced Data Rates for GSM Evolution (EDGE) does not fit neatly into the 2G-3G-4G continuum. It is technically considered 2G+, but was an improvement on GSM (2G), so it can be considered a bridge between 2G and 3G technologies.

  • Universal Mobile Telecommunications System (UMTS)Universal Mobile Telecommunications System (UMTS) is a 3G standard based on GSM. It is essentially an improvement of GSM.

  • Long Term Evolution (LTE)—Long Term Evolution (LTE) is a standard for wireless communication of high-speed data for mobile devices. This is what is commonly called 4G.

  • Wireless Fidelity (Wi-Fi)—Most cellular phones and other mobile devices today are able to connect to Wi-Fi networks. Wireless networking has become the norm, and free Wi-Fi hotspots can be found in restaurants, coffee shops, hotels, homes, and many other locations.

Operating Systems

Today’s mobile devices are complex computer systems. Whether you prefer an Android, Windows, or Apple phone, the phone will have an operating system. The same is true for tablets. Therefore, it is important to have some basic understanding of the major operating systems used on mobile devices.

iOS

The iOS operating system is used by iPhone, iPod, and iPad. It is a relatively new operating system, originally released in 2007 for the iPod Touch and the iPhone. The user interface is completely based on touching the icons directly. It supports what Apple calls gestures: swipe, drag, pinch, tap, and so on. The iOS operating system is derived from OS X.

There are four layers to iOS. The first is the Core OS layer. This is the heart of the operating system. Next is the Core Services layer, which is how applications interact with the iOS. Next is the Media layer, which is responsible for music, video, and so on. Finally, there is the Cocoa Touch layer, which responds to the aforementioned gestures.

In normal operations, iOS uses the HFS+ file system, but it can use FAT32 when communicating with a PC. The iOS contains several elements in the data partition:

  • Calendar entries

  • Contacts entries

  • Note entries

  • iPod_control directory (this directory is hidden)

  • iTunes configuration

  • iTunes music

Of particular interest to forensic investigation is the folder iPod_control\device\sysinfo. This folder contains two very important pieces of information:

  • Model number

  • Serial number

The iOS runs on iPhones, iPods, and iPads. This means that once you are comfortable with the operating system on one Apple device, you should be comfortable with any Apple device. This applies not just to the features that users interact with, but also to the operating system fundamentals. Thus, if you have experience with forensics on an iPhone, you will have no problem conducting a forensic analysis of an iPad.

Android

The Android operating system is a Linux-based operating system, and it is completely open source. If you have a programming and operating systems background, you may find it useful to examine the Android source code from http://source.android.com.

Android was first released in 2003 and is the creation of Rich Miner, Andy Rubin, and Nick Sears. Google acquired Android in 2005, but it still keeps the code open source. The versions of Android have been named after sweets:

  • Version 1.5 Cupcake

  • Version 1.6 Donut

  • Version 2.0–2.1 Éclair

  • Version 2.2 Froyo

  • Version 2.3 Gingerbread

  • Version 3.1–3.2 Honeycomb

  • Version 4.0 Ice Cream Sandwich

  • Version 4.1–4.2 Jelly Bean

  • Version 4.4 Kitkat, released in 2013

  • Version 5.0 Lollipop, released in November 2014

  • Version 6.0 Marshmallow, released in October 2015

  • Version 7.0 Nougat, released in August 2016

The differences from version to version usually involve adding new features, not a radical change to the operating system. This means that if you are comfortable with version 1.6 (Donut), you will be able to do forensic examination on version 4.2 (Jelly Bean).

Although the Android source code is open source, each vendor may make modifications. This means even the partition layout can vary. However, there are common partitions that are present on most Android devices (phones or tablets).

  • The boot loader partition is necessary for hardware initialization and loading the Android kernel. This is unlikely to have forensically important data.

  • The boot partition has the information needed to boot up. Again, this is unlikely to have forensically important data.

  • The recovery partition is used to boot the phone into a recovery console. Although the partition may not have forensically relevant data, sometimes you may need to boot into recovery mode.

  • The user data partition is the one most relevant to forensic investigations. Here you will find the majority of user data, including all the data for apps.

  • The cache partition stores frequently accessed data and recovery logs. This can be very important for forensic investigations.

  • The system partition is not usually important for forensic examinations.

Remember that Android is Linux-based. If you have an image of an Android phone you may be able to execute Linux commands on it. For example, using cat proc/partitions will reveal to you the partitions that exist on the specific phone you are examining.

In addition to these partitions, there are specific directories that may yield forensic evidence:

  • The acct directory is the mount point for the control group and provides user accounting.

  • The cache directory stores frequently accessed data. This will almost always be interesting forensically.

  • The data directory has data for each app. This is clearly critical for forensic examinations.

  • The mnt directory is a mount point for all file systems and can indicate internal and external storage such as SD cards. If you have an Android image, the Linux ls command used on this directory will show you the various storage devices.

To extract data from an Android phone or tablet, it must be in developer mode. How you get there has changed with different versions. Where to access developer mode in certain versions of Android is given here:

  • Developer Options on Gingerbread (Android 2.3):

  • Settings> Applications> Development> USB Debugging

  • Developer Options on Ice Cream Sandwich (Android 4.0):

  • Settings> Developer Options> USB Debugging

  • Developer Options on Jelly Bean (Android 4.1):

  • Settings> Developer Options> USB Debugging

  • Open Settings> About on your Android phone or tablet.

  • Developer Options on Jelly Bean (Android 4.2):

  • If you have a Samsung Galaxy S4, Note 8.0, Tab 3, or any other Galaxy device with Android 4.2, open Settings> More tab> About and tap it.

  • Developer Options on Jelly Bean (Android 4.3):

  • If you have a Galaxy Note 3 or any Galaxy device with Android 4.3, go to Settings> General> About, and then tap the Build Version seven times.

  • Now scroll to the Build Number and tap it seven times.

  • After tapping the Build Number 7 times, you will then see a message “You are now a developer!” If you have a Galaxy S4 or any other Samsung Galaxy device with Android 4.2, the message reads as follows: “Developer mode has been enabled.”

  • Return to the main Settings menu, and now you’ll be able to see Developer Options.

  • Tap on Developer Options and tap on the box in front of USB Debugging to enable it.

  • To disable USB Debugging mode later, you can uncheck the box before the option.

  • To enable Developer Options, go to Settings> Developer Options and tap on the on/off slider at the top of the page.

Another great technique with Android phones is to use the adb (Android Debugging Bridge) shell. Basically, you connect the phone to your forensics workstation with a USB cable, and then use the adb shell to extract data. Some basic adb shell commands are given here:

// launch adb and see available commands
adb
// start a shell; this will let you issue Linux shell commands!
adb shell
// if you have gestures on the phone and you want to
// copy them to the test directory on your system
adb pull /sdcard/gesture ~/test
//uninstall an application (not something you normally
// do in a forensic exam
adb uninstall <packagename>
//list all applications in the order of their memory
//consumption.
adb shell procrank

adb shell is tedious and manual, but can provide an alternative to rather expensive phone forensics software. Of course, you will need to know the Android file structure quite well to effectively use the adb shell.

Windows

Microsoft has produced several variations of Windows aimed at the mobile market. The company’s first foray into the mobile operating system market was Windows CE. That operating system was also released as the Pocket PC 2000, which was based on Windows CE version 3. In 2008, Windows Phone was released. It had a major drawback in that it was not compatible with many of the previous Windows Mobile apps. In 2010, Microsoft released Windows Phone 7.

More recently, Microsoft has moved in the same direction as Apple with Windows 8 being its primary operating system. Windows 8 is shipped on PCs, laptops, phones, and tablets. Microsoft continued this theme with Windows 10. This means that once you are comfortable with the operating system on one device, you are going to be able to conduct forensic examinations on other devices running Windows 8, or Windows 10.

The BlackBerry

The first BlackBerry device was a pager capable of receiving email pages, and it was released in 1999. BlackBerry uses its own proprietary operating system, BlackBerry 10. It is based on the QRNX operating system. BlackBerry supports the major features that other mobile phones support, such as drag and drop and gestures.

In recent years, the market share for BlackBerry has been steadily decreasing. However, you will still find BlackBerry devices in use, and they may be relevant to your forensic investigation.