computer forensics: you can run but you can't hide

96
Digital Forensics & IR You can run, but you can’t hide

Upload: antonio-sanz-alcober

Post on 08-May-2015

341 views

Category:

Technology


1 download

DESCRIPTION

A talk describing the field of computer forensics and its relation with incident response. Live forensics, timelines, registry, smartphones, cloud forensic, ethics, writing and defending reports are issues that will be covered.

TRANSCRIPT

Page 1: Computer Forensics: You can run but you can't hide

Digital Forensics & IR

You can run, but you can’t hide

Page 2: Computer Forensics: You can run but you can't hide

Antonio Sanz

IT Systems & Security Manager

Expert witness

@antoniosanzalc

http://www.equipoazul.es

Page 3: Computer Forensics: You can run but you can't hide

#SanPepeEINA

Page 4: Computer Forensics: You can run but you can't hide

WTF DFIR bro?

Boring legal stuff

Forensic magic

Stand-up guy

Wanna more ?

Page 5: Computer Forensics: You can run but you can't hide

There is a war out there

Page 6: Computer Forensics: You can run but you can't hide

Cybercrime

Page 7: Computer Forensics: You can run but you can't hide

Cyberespionage

Page 8: Computer Forensics: You can run but you can't hide

Child pornography

Page 9: Computer Forensics: You can run but you can't hide

Digital

Forensics

Incident

Response

Page 10: Computer Forensics: You can run but you can't hide

IR : Respond to an incident

Page 11: Computer Forensics: You can run but you can't hide

Digital forensics : Post-mortem

Page 12: Computer Forensics: You can run but you can't hide

Locard’s exchange principle

Page 13: Computer Forensics: You can run but you can't hide

This is not a pipe

Page 14: Computer Forensics: You can run but you can't hide

This is not a pipe

Page 15: Computer Forensics: You can run but you can't hide

It’s all about evidence, stupid !

Page 16: Computer Forensics: You can run but you can't hide

No fancy 3D tools like CSI

Page 17: Computer Forensics: You can run but you can't hide

Techniques, tools and procedures

Page 18: Computer Forensics: You can run but you can't hide

People could go to prison

Page 19: Computer Forensics: You can run but you can't hide

Identification

Adquisition

Preservation

Analysis

Dissemination

Digital forensics phases

Legal stuff here

and here

Tech yeah!

Page 20: Computer Forensics: You can run but you can't hide

WTF DFIR bro?

Boring legal stuff

Forensic magic

Stand-up guy

Wanna more ?

Page 21: Computer Forensics: You can run but you can't hide

Acquisition

Page 22: Computer Forensics: You can run but you can't hide

Mobile devices

Page 23: Computer Forensics: You can run but you can't hide

RAID, SAN, NAS, VM

Page 24: Computer Forensics: You can run but you can't hide

Cloud storage

Page 25: Computer Forensics: You can run but you can't hide

Game consoles,

ebooks, DVR …

Page 26: Computer Forensics: You can run but you can't hide

Gotta catch ‘em all

Page 27: Computer Forensics: You can run but you can't hide

Should I pull the plug ?

Page 28: Computer Forensics: You can run but you can't hide

Use a cond …

A write blocker

Page 29: Computer Forensics: You can run but you can't hide

Whole enchilada

Get the whole enchilada

Page 30: Computer Forensics: You can run but you can't hide

Preservation

is king

Page 31: Computer Forensics: You can run but you can't hide

31

Chain of custody

Page 32: Computer Forensics: You can run but you can't hide

OBEY THE CHAIN

Page 33: Computer Forensics: You can run but you can't hide

WTF DFIR bro?

Boring legal stuff

Forensic magic

Stand-up guy

Wanna more ?

Page 34: Computer Forensics: You can run but you can't hide

Bad guys want to hide … but they

need to run

Page 35: Computer Forensics: You can run but you can't hide

Remember Locard: Artifacts

Page 36: Computer Forensics: You can run but you can't hide

Live forensics

Page 37: Computer Forensics: You can run but you can't hide

Order

of

Volatility

Page 38: Computer Forensics: You can run but you can't hide

Cold boot attacks

Page 39: Computer Forensics: You can run but you can't hide
Page 40: Computer Forensics: You can run but you can't hide

Preservation

is king

Page 41: Computer Forensics: You can run but you can't hide

Standard forensics

Page 42: Computer Forensics: You can run but you can't hide

Recover deleted data

Recover deleted data

Page 43: Computer Forensics: You can run but you can't hide

How

filesystems

work

Page 44: Computer Forensics: You can run but you can't hide

Good times, MAC times

Page 45: Computer Forensics: You can run but you can't hide

Making history

Page 46: Computer Forensics: You can run but you can't hide

Space / Time Analysis

Page 47: Computer Forensics: You can run but you can't hide

47

Don’t delete your history. Or do it, it doesn’t matter

Page 48: Computer Forensics: You can run but you can't hide

Prefetch

Dogs can’t prefetch

Page 49: Computer Forensics: You can run but you can't hide

Your Instant

Messages

belong to us

Page 50: Computer Forensics: You can run but you can't hide
Page 51: Computer Forensics: You can run but you can't hide

Recycle bin are gold mines

Page 52: Computer Forensics: You can run but you can't hide

52

Registry knows where your porn is

Page 53: Computer Forensics: You can run but you can't hide

Every USB you plugged could be used against you

Page 54: Computer Forensics: You can run but you can't hide
Page 55: Computer Forensics: You can run but you can't hide

Where did you say you hide your crap?.

Page 56: Computer Forensics: You can run but you can't hide

Event logs

Finding things in logs is like…

Page 57: Computer Forensics: You can run but you can't hide

Too much … metadata

Page 58: Computer Forensics: You can run but you can't hide
Page 59: Computer Forensics: You can run but you can't hide

You’ve got an email

Page 60: Computer Forensics: You can run but you can't hide

Share your downloads with us !

Page 61: Computer Forensics: You can run but you can't hide

Smartphone / Tablets

Page 62: Computer Forensics: You can run but you can't hide

Acquisition is complicated

Page 63: Computer Forensics: You can run but you can't hide

Preservation

is king

Page 64: Computer Forensics: You can run but you can't hide

Yummy extra info …

Yummy data breakfast

Page 65: Computer Forensics: You can run but you can't hide

Virtual Machines

Page 66: Computer Forensics: You can run but you can't hide

Take snapshots like there’s no tomorrow

Page 67: Computer Forensics: You can run but you can't hide

Preservation

is king

Page 68: Computer Forensics: You can run but you can't hide

Network forensics

Page 69: Computer Forensics: You can run but you can't hide

How I Xplico to you dude ?

Page 70: Computer Forensics: You can run but you can't hide

Preservation

is king

Page 71: Computer Forensics: You can run but you can't hide

Cloud computing

Page 72: Computer Forensics: You can run but you can't hide

There’s still traces

There are always traces left

Page 73: Computer Forensics: You can run but you can't hide

WTF DFIR bro?

Boring legal stuff

Forensic magic

Stand-up guy

Wanna more ?

Page 74: Computer Forensics: You can run but you can't hide

Cut to the chase

Page 75: Computer Forensics: You can run but you can't hide

Know your trade

Page 76: Computer Forensics: You can run but you can't hide

Know your enemy

Know your enemy

Page 77: Computer Forensics: You can run but you can't hide

Use more than one tool

Page 78: Computer Forensics: You can run but you can't hide

Missing things tell us a lot

Page 79: Computer Forensics: You can run but you can't hide

Put two and two together

Page 80: Computer Forensics: You can run but you can't hide

Always learn new tricks

Page 81: Computer Forensics: You can run but you can't hide

50% Knowledge

30% Technique

15% Instincts

5% Luck

Page 82: Computer Forensics: You can run but you can't hide

Writing the report > Introducción

> Resumen Ejecutivo

> Entorno del Informe (personas, lugares, fechas)

> Hechos probados iniciales (lo que sabemos)

> Hechos técnicos demostrables (lo que encontramos)

> Conclusiones

> Anexo: Evidencias

Write your report

Page 83: Computer Forensics: You can run but you can't hide

Defending the report > Contrainforme pericial

> Exposición del informe en el juicio

> Validez del técnico

> Validez de las herramientas

> Preguntas de la otra parte

> Mantener la calma, responder lo justo y bien pensado

Defend your report

Page 84: Computer Forensics: You can run but you can't hide

Ethics

Ethics

Page 85: Computer Forensics: You can run but you can't hide

WTF DFIR bro?

Boring legal stuff

Forensic magic

Stand-up guy

Wanna more ?

Page 86: Computer Forensics: You can run but you can't hide

Books

Page 87: Computer Forensics: You can run but you can't hide

Blogs

Page 88: Computer Forensics: You can run but you can't hide

Tools / LiveCDs

Page 89: Computer Forensics: You can run but you can't hide
Page 90: Computer Forensics: You can run but you can't hide

Certifications

Page 91: Computer Forensics: You can run but you can't hide

Conclussions

Page 92: Computer Forensics: You can run but you can't hide

We need DFIR Lots of it

Page 93: Computer Forensics: You can run but you can't hide

Legal issues are critical

Page 94: Computer Forensics: You can run but you can't hide

Many places to look

Have to know where, how & why

Page 95: Computer Forensics: You can run but you can't hide

You can run

You can’t hide

Page 96: Computer Forensics: You can run but you can't hide

If you’re guilty …

we’ll catch you

@antoniosanzalc

http://www.equipoazul.es

http://bit.ly/1h47zfF