Table of Contents for
System Forensics, Investigation, and Response, 3rd Edition

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition System Forensics, Investigation, and Response, 3rd Edition by Easttom Published by Jones & Bartlett Learning, 2017
  1. Cover Page
  2. Contents
  3. System Forensics, Investigation, and Response
  4. Title Page
  5. Copyright Page
  6. Content
  7. Preface
  8. About the Author
  9. PART I Introduction to Forensics
  10. CHAPTER 1 Introduction to Forensics
  11. What Is Computer Forensics?
  12. Understanding the Field of Digital Forensics
  13. Knowledge Needed for Computer Forensics Analysis
  14. The Daubert Standard
  15. U.S. Laws Affecting Digital Forensics
  16. Federal Guidelines
  17. CHAPTER SUMMARY
  18. KEY CONCEPTS AND TERMS
  19. CHAPTER 1 ASSESSMENT
  20. CHAPTER 2 Overview of Computer Crime
  21. How Computer Crime Affects Forensics
  22. Identity Theft
  23. Hacking
  24. Cyberstalking and Harassment
  25. Fraud
  26. Non-Access Computer Crimes
  27. Cyberterrorism
  28. CHAPTER SUMMARY
  29. KEY CONCEPTS AND TERMS
  30. CHAPTER 2 ASSESSMENT
  31. CHAPTER 3 Forensic Methods and Labs
  32. Forensic Methodologies
  33. Formal Forensic Approaches
  34. Documentation of Methodologies and Findings
  35. Evidence-Handling Tasks
  36. How to Set Up a Forensic Lab
  37. Common Forensic Software Programs
  38. Forensic Certifications
  39. CHAPTER SUMMARY
  40. KEY CONCEPTS AND TERMS
  41. CHAPTER 3 ASSESSMENT
  42. PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
  43. CHAPTER 4 Collecting, Seizing, and Protecting Evidence
  44. Proper Procedure
  45. Handling Evidence
  46. Storage Formats
  47. Forensic Imaging
  48. RAID Acquisitions
  49. CHAPTER SUMMARY
  50. KEY CONCEPTS AND TERMS
  51. CHAPTER 4 ASSESSMENT
  52. CHAPTER LAB
  53. CHAPTER 5 Understanding Techniques for Hiding and Scrambling Information
  54. Steganography
  55. Encryption
  56. CHAPTER SUMMARY
  57. KEY CONCEPTS AND TERMS
  58. CHAPTER 5 ASSESSMENT
  59. CHAPTER 6 Recovering Data
  60. Undeleting Data
  61. Recovering Information from Damaged Media
  62. File Carving
  63. CHAPTER SUMMARY
  64. KEY CONCEPTS AND TERMS
  65. CHAPTER 6 ASSESSMENT
  66. CHAPTER 7 Email Forensics
  67. How Email Works
  68. Email Protocols
  69. Email Headers
  70. Tracing Email
  71. Email Server Forensics
  72. Email and the Law
  73. CHAPTER SUMMARY
  74. KEY CONCEPTS AND TERMS
  75. CHAPTER 7 ASSESSMENT
  76. CHAPTER 8 Windows Forensics
  77. Windows Details
  78. Volatile Data
  79. Windows Swap File
  80. Windows Logs
  81. Windows Directories
  82. Index.dat
  83. Windows Files and Permissions
  84. The Registry
  85. Volume Shadow Copy
  86. Memory Forensics
  87. CHAPTER SUMMARY
  88. KEY CONCEPTS AND TERMS
  89. CHAPTER 8 ASSESSMENT
  90. CHAPTER 9 Linux Forensics
  91. Linux and Forensics
  92. Linux Basics
  93. Linux File Systems
  94. Linux Logs
  95. Linux Directories
  96. Shell Commands for Forensics
  97. Kali Linux Forensics
  98. Forensics Tools for Linux
  99. CHAPTER SUMMARY
  100. KEY CONCEPTS AND TERMS
  101. CHAPTER 9 ASSESSMENT
  102. CHAPTER 10 Macintosh Forensics
  103. Mac Basics
  104. Macintosh Logs
  105. Directories
  106. Macintosh Forensic Techniques
  107. How to Examine a Mac
  108. Can You Undelete in Mac?
  109. CHAPTER SUMMARY
  110. KEY CONCEPTS AND TERMS
  111. CHAPTER 10 ASSESSMENT
  112. CHAPTER 11 Mobile Forensics
  113. Cellular Device Concepts
  114. What Evidence You Can Get from a Cell Phone
  115. Seizing Evidence from a Mobile Device
  116. JTAG
  117. CHAPTER SUMMARY
  118. KEY CONCEPTS AND TERMS
  119. CHAPTER 11 ASSESSMENT
  120. CHAPTER 12 Performing Network Analysis
  121. Network Packet Analysis
  122. Network Traffic Analysis
  123. Router Forensics
  124. Firewall Forensics
  125. CHAPTER SUMMARY
  126. KEY CONCEPTS AND TERMS
  127. CHAPTER 12 ASSESSMENT
  128. PART III Incident Response and Resources
  129. CHAPTER 13 Incident and Intrusion Response
  130. Disaster Recovery
  131. Preserving Evidence
  132. Adding Forensics to Incident Response
  133. CHAPTER SUMMARY
  134. KEY CONCEPTS AND TERMS
  135. CHAPTER 13 ASSESSMENT
  136. CHAPTER 14 Trends and Future Directions
  137. Technical Trends
  138. Legal and Procedural Trends
  139. CHAPTER SUMMARY
  140. KEY CONCEPTS AND TERMS
  141. CHAPTER 14 ASSESSMENT
  142. CHAPTER 15 System Forensics Resources
  143. Tools to Use
  144. Resources
  145. Laws
  146. CHAPTER SUMMARY
  147. KEY CONCEPTS AND TERMS
  148. CHAPTER 15 ASSESSMENT
  149. APPENDIX A Answer Key
  150. APPENDIX B Standard Acronyms
  151. Glossary of Key Terms
  152. References
  153. Index

Seizing Evidence from a Mobile Device

Once you are ready to seize evidence from the mobile device, remember the following rules:

  • If you are going to plug the phone into a computer, make sure the phone does not synchronize with the computer. This is particularly important with the iPhone, which routinely auto-syncs.

  • Follow the same advice you follow for PCs. Make sure you touch the evidence as little as possible, and document what you do to the device.

One of the most important things to do is to make sure you don’t accidentally write data to the mobile device. For example, if you plug an iPhone into your forensic workstation, you want to make sure you don’t accidentally write information from your workstation to the iPhone.

If the forensic workstation is a Windows machine, you can use the Windows Registry to prevent the workstation from writing to the mobile device. Before connecting to a Windows machine, find the Registry key HKEY_LOCAL_MACHINE\System\Current Controlset\StorageDevicePolicies, set the value to 0x00000001, and restart the computer. This prevents that computer from writing to mobile devices that are connected to it.

Although Forensic Toolkit and EnCase can both image a phone for you, there are other products made specifically for phone forensics:

  • Oxygen Forensics—This is a full forensic tool capable of imaging and examining iPhones and Android phones. It provides a number of user-friendly tools for extracting specific data such as contacts, social media data, and the like.

  • Cellabrite—This is probably the most widely known phone forensics tool. It is used heavily by federal law enforcement. It is a very robust and effective tool. The only downside to Cellabrite, that I am aware of, is the high cost. It is the most expensive phone forensics tool on the market.

  • MobileEdit—There are several variations of this product. MobileEdit Lite is the most forensically advanced version of MobileEdit. This is a very easy-to-use tool that can aid a forensic examiner in extracting data from cell phones.

  • Data Doctor—This product recovers all Inbox and Outbox data and all contact data, and it has an easy-to-use interface. Most important, it has a free trial version, but there is a cost for the full version. It is available from http://www.simrestore.com.

  • Sim Card Data Retrieval Utility—This product is available from http://shareme.com/details/sim-card-data-retrieval-utility.html. It retrieves Inbox and sent message data as well as contact data. It runs on various Windows versions. There is a license fee associated with this product.

  • Device Seizure—This is available from Paraben Software at http://www.paraben.com. There is a license fee associated with this product. Paraben makes a number of forensic products.

  • Forensic SIM Cloner—This tool is used to clone SIM cards, allowing you to perform forensic analysis of the SIM card. http://forensic-sim-cloner.software.informer.com/1.2/

Forensics for a Windows 8 or 10 phone is done in much the same way as forensics for a Windows 8 or 10 PC or laptop. The only issue is to make certain the phone does not synchronize with the forensic workstation. A similar issue arises with the Android. Because it is based on Linux, many of the same forensic techniques can be applied. Keep in mind that a handheld portable device probably will not have all the same logs that a PC or server has, but if the operating system is the same, then the forensics will be largely the same.

Regardless of the tool you choose, you should ensure that it is adequate for your forensic needs. The NIST sponsors the Computer Forensics Tool Testing (CFTT) Project (http://www.cftt.nist.gov), which provides a measure of assurance that the tools used in the investigations of computer-related crimes produce valid results. Testing includes a set of core requirements as well as optional requirements. It is a good idea to refer to these standards when selecting a tool.

The NIST also provides general guidelines on how to write a report for a mobile device forensic report. The guidelines say you should include the following:

  • A descriptive list of items submitted for examination, including serial number, make, and model

  • The identity and signature of the examiner

  • The equipment and setup used in the examination

  • A brief description of the steps taken during the examination, such as string searches, graphics image searches, and recovering erased files

  • Supporting materials such as printouts of particular items of evidence, digital copies of evidence, and chain of custody documentation

  • Details of findings:

    • Specific files related to the request

    • Other files, including deleted files, that support the findings

    • String searches, keyword searches, and text string searches

    • Internet-related evidence, such as website traffic analysis, chat logs, cache files, email, and newsgroup activity

    • Graphic image analysis

    • Indicators of ownership, which could include program registration data

    • Data analysis

    • Description of relevant programs on the examined items

    • Techniques used to hide or mask data, such as encryption, steganography, hidden attributes, hidden partitions, and file name anomalies

  • Report conclusions

The iPhone

There are automated processes for breaking an iPhone passcode. XRY is one such tool, which can be found at http://news.cnet.com/8301-1023_3-57405580-93/iphone-passcode-cracking-is-easier-than-you-think/. Keep in mind that the iPhone has only a four-digit pin, which means there are 10,000 possible combinations of the digits 0–9.

If you are using a forensic workstation with iTunes, you can simply plug the iPhone (or iPad/iPod) into the workstation and use iTunes to extract a great deal of information about the phone. This is shown in FIGURE 11-1.

FIGURE 11-1
Apple iPhone iTunes display.

Screenshot reprinted with permission from Apple Inc.

You can immediately notice three important items to document:

  1. The iOS version number

  2. The phone number

  3. The serial number

Notice you can also see where the phone is backed up. That can indicate yet another place you should search during your forensic investigation. Some information in Figure 11-1 has been redacted because this image was taken from an actual phone.

If you have imaged the phone and you then search for information, you may have to look more closely to find some data.

For example, Library_CallHistory_call_history.db has the entire call history. If you cannot view that directly on the phone itself, the database file has all call information. Cookies can be found in the file Library_Cookies_Cookies.plist. This can give you a history of the phone user’s Internet activities. These, and other files, are actually copied to a PC during synchronization. Here are a few of those files:

  • Library_Preferences_com.apple.mobileipod.plist

  • Library_Preferences_com.apple.mobileemail.plist

  • Library_Preferences_com.apple.mobilevpn.plist

The mobileemail.plist file has obvious forensic evidence. It will give you information about email sent and received from the phone. The mobilevpn.plist file can also be interesting. If the user has utilized the phone to communicate over a VPN, this file will have information about that.

Deleted Files

When a file is deleted on the iPhone, iPad, or iPod, it is actually moved to the .Trashes\501 folder. Essentially, the data is still there until it is overwritten, so recently deleted files can be retrieved.

Tools

There are tools specifically for iOS devices. These can be a useful addition to your forensic toolset. Here are few widely used tools:

BlackBerry

First, you should download and install BlackBerry Desktop Manager. Use the following link to select and download the install file that fits your system or version: https://www.blackberry.com/Downloads/entry.do?code=A8BAA56554F96369AB93E4F3BB068C22. Then, you install the Desktop Manager. Once that is done, the steps for imaging the device are rather easy:

  1. Open BlackBerry’s Desktop Manager. Click Options, and then Connection Settings.

  2. If the Desktop Manager hasn’t already done so, select USB-PIN: Device # for connection type. Click OK.

  3. Select Backup and Restore.

  4. Click the Back Up button for a full backup of the device or use the Advanced section for specific data.

  5. Select your destination and save the .ipd file.

This creates a complete backup image of the BlackBerry phone. Once you have that backup on your workstation, you can examine the data and perform a forensic analysis.