323c440556620eb1483894826ed67dc3.ppt
- Количество слайдов: 61
X-Ways Capture & Evidor Prepared by: Radwan Abu-Jassar Supervised by: Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT), Jordan 1
Contents n n Computer Forensics. X-Ways Capture: Definition, How it works, Structure of the configuration file “capture. ini”, and Tips. 2
Computer Forensics n n Obtaining evidence of criminal activity from information systems. Involves the application of both computer technology and legal expertise to obtain from computer hardware and software evidence of intrusion, misuse, theft, or other criminal activities. 3
X-Ways Capture n n Specialized computer forensics tool for the evidence collection phase of a forensic investigation that captures Windows and Linux live systems. Employs various methods to search the running computer for indications of resident encryption software and detects an active ATA password protection. 4
n n Dumps the physical RAM and images all connected media to a user-defined output path. Saves you from unnecessarily returning empty-handed after pulling the plug and imaging hard disks the conventional way when you discover that the relevant files are encrypted. 5
6
How It Works n 1. 2. X-Ways Capture consists of two modules: Windows 2000/XP. Linux (Intel x 86 architecture each, no matter whether workstation or server). 7
n The program executes the following steps unless you specify a different procedure in the configuration file: - Dumps of the physical RAM and (under Windows only) the virtual memory of all running processes. 8
- Detects the ATA password protection status and any present host-protected area (HPA). - Checks for active encryption software. - Images attached media physically. 9
1. Program start, operating system detection a. The Windows module detects the exact Windows version and prevents an execution under Linux+Wine. The Linux module detects the exact Linux version and is not executable under Windows. 10
b. The command line parameters are parsed. The output path can be specified with the command line. With -i <filename> you may specify a configuration file other than the standard “capture. ini”. 11
c. X-Ways Capture asks the user for the output path, where images, the log, and all other files are written, if no such path was passed as a command line parameter. The path needs to be an absolute one. 12
d. The current date and time are retrieved from the system and always used as a prefix in the notation YYYY-MM-DD, HH-MM-SS. The advantage of this notation is that all file browsers list files with such a prefix in chronological order. Optionally, the steps Get. User. Date, Get. User. Time ask the user for the time, to be able to verify later whether the system clock was off. 13
e. The configuration file used is added to the log so that there is no doubt later about how XWays Capture was configured. [steps] name: Append. Ini 14
f. Optionally, additional information can be logged through the Ask command Ask "Enter text“ will prompt “Enter text” and wait for the user to enter information. Alternatively, Ask "Enter IP address" ? ? ? will prompt for an IP address, and validate the input, where ? equals any character. 15
2. Memory dump a. The physical RAM is dumped to the output path as a raw image file, as far as access is not prevented by missing administrator or root rights or so-called Linux Security Enhancements. [steps]-Name: Dump. Physical. Memory. It is normal that Windows prevents several rather small regions in memory from being accessed. A warning will be issued if so. 16
b. Under Windows only: The virtual memory of each process will be dumped to a file. The filename is composed of the common prefix and the name and the number of the process. [steps]-Name: Dump. Process. Memory 17
c. d. The list of running processed is logged. [steps]-Name: Dump. Process. List The list of driver names is written to a file (Windows: Dump. Driver. List, Linux: Append. To. Log /proc/modules) 18
3. ATA hard disk check a. Generally under Windows, under Linux with root rights only: The model designation of ATA hard disks and their security settings (password protection) are detected. [steps]Name: ATACheck - Support for security mode feature set y/n. 19
- Security mode aktive y/n. Hard disk locked y/n. Security freeze lock y/n. Security level high/ maximum. 20
Functionality cannot be guaranteed for S-ATA disks. Results for non-ATA disks (in particular hardware RAIDs), if output, are undefined. 21
b. Under Windows only: Check for active HPA (host-protected area) and notification of the result. ([steps]Name: HPACheck) 22
c. List drives and partitions This step logs information about the mapping between partitions and hard disks. For each partition, its associated disk and start offset on that disk are given. 23
4. Check for active encryption software n n This step is comprised of several stages, which depend on the operating system. Under Windows, the following methods are employed to check for indications of active encryption, where the first positive result causes any following method to be omitted, unless flagged as mandatory in the configuration file: 24
a. Encryption. Check. Process. List: The names of active processes are matched against a list with the names of known Windows-based encryption software programs, specified in the section [Search. Processes. For Encryption]. For example, the name of the resident service/process of PGP Desktop 9. 02 is “PGPserv. exe”. 25
b. Check. Driver. List. For. Encryption: Searches the driver list creating by Dump. Driver. List for driver names taken from the section [Search. Driver. List. For. Encryption]. If the driver list has not been created yet, it is produced for this step. 26
c. Encryption. Check. Process. Memory: ] The loaded. exe files of all running processes are searched for keywords that appear in the [Search. Process. Memory] section of the configuration file, both in the ASCII and the Unicode character set. With this approach, XWays Capture can identify a known encryption software product even if its. exe file has been renamed such that the running process has an unexpected name. Suitable keywords are e. g. internal program names or copyright notices as they appear the version information within. exe files. E. g. “PGPsdk. Service” is the internal name of the service “PGPserv. exe”. 27
d. Encryption. Check. Disk. Sectors: Unless access is prevented by missing administrator rights: Certain sectors on each hard disk are read with two different methods. The results are compared. Different results indicate that the hard disk is encrypted by a resident software such as “Secure. Doc” or “Compu. Sec”. 28
e. Encryption. Check. All. Files All files on NTFS drives are checked for EFS encryption. This stage is usually the most timeconsuming one in this section, depending on the number of files on NTFS drives. This test excludes the drive that X-Ways Capture was started from as well as the output drive. This step is useful only if Logicalbackup is skipped, since Logical. Backup will always copy and report EFS files under Windows. The parameter network controls whether this step affects network drives. +network enables encryption search on network drives, -network disables this. –network is the default. 29
f. Check. For. Bit. Locker. Volumes All mounted volumes are checked for a Bit. Locker signature. 30
n a. Linux: Certain files are searched depending on the Encryption. Check. File command in the [steps] section. For each such command there is one [Encryption. Check. File] section. Each such command needs to be followed by the path and name of the file to be searched. The same name and path needs to be the first line of the corresponding [Encryption. Check. File] section. The remainder of the corresponding [Encryption. Check. File] section contains the keywords to be searched. By default, the files /proc/mounts and /proc/modules are searched. 31
n The names of active processes are matched against a list with the names of known Linux-based encryption software programs, specified in the section [Search Processes. For. Encryption]. 32
5. Physical Imaging ([steps] name: Physical. Imaging) n In this step, X-Ways Capture creates images of physical disks if deemed necessary or forced. Physical imaging means that disks are copied sectorwise, not file-wise. 33
a. b. c. If hard disk encryption has been detected by the step Encryption. Check. Disk. Sectors or a currently unlocked ATA password protection has been detected by ATACheck, that particular disk is imaged. If ATA password protection has been detected, yet Capture cannot clearly identify the affected hard disk, all hard disks are imaged. If this step is forced, then all disks will be imaged. 34
n Hard disks to exclude can be specified in the configuration file (see below). The hard disk from which Capture is run and the hard disk with the output path are automatically excluded. The imaging process requires that the user that is logged on has the necessary rights. In the case of a software-encrypted, but currently readable hard disk, the data that is read from the hard disk is decrypted by the encryption software. 35
The images can either be raw (“dd”) images or evidence files (. e 01 files). The size of the segments can be configured in the [settings] section. Evidence files can be optionally compressed. Under Linux, the list of attached media is taken from /proc/partitions. Floppy disks and net drives are omitted generally. Under Windows optical media are omitted, too. Optical media, net drives or specific file systems can be excluded from physical imaging through the configuration file. 36
n During the imaging process, the hash value of the imaged media is computed and written to the evidence file or in the case of a raw image to a separate file. If during or after the process data is written to the media, the hash value is characteristic of the image only, not of the media any more. 37
5. Logical Copying ([steps] name: Logical. Backup) n If indications of encryption are found in step 3 (except Encryption. Check. Disk. Sectors) or if this step is flagged as mandatory in the configuration file, all files are additionally copied, one by one. This ensures that all files readable at the time of the acquisition are available in an unencrypted state at the time of the forensic analysis as well, even if the subject drive is encrypted or if files are located inside encrypted containers or if an ATA hard disk is password-protected (but unlocked at the time of the acquisition). 38
The copying process retains all filenames and paths in the output path. Under certain circumstances, however, the path and/or name needs to be modified such that the name and path is acceptable in all supported file systems. This is why paths and names are shortened to less than 255 characters if necessary. Shortened paths are collected in a separate subdirectory of the output path named “overlong”. 39
Illegal characters in filenames are replaced. If this leads to duplications of filenames, an incrementing number is inserted directly before the filename extension. The extension remains unchanged by this. All alterations are logged. 40
n Before a file is copied, X-Ways Capture queries the date and time of the file’s last read access. X-Ways Capture restores that original date and time after the file was copied because that timestamp is updated during copying. On Linux file systems and on NTFS, the original last inode or FILE record change timestamp, respectively, (not the timestamp of the last modification of the file itself) is irrevocably lost. 41
This is noted in the log once. This is also why by default this step is executed only after physical imaging. 42
n The output drive letter and the start drive letter of X-Ways Capture are excluded from this step if the computer is running Microsoft Windows. For Linux, all directories sharing the mount point with the start directory or output directory of X-Ways Capture are excluded. Since depending on the source and the destination file system not all metadata makes it to the copy, filenames, paths, file sizes, timestamps, attributes, permissions, owners and group … 43
name (where available) are logged in a separate file list. The file list has the name <prefix>-files-<incrementing number>. txt. 44
n Under Windows, Capture will search all drives for EFS-encrypted files and will copy them, regardless of the results of previous encryption checks. If the previous check did not reveal an encryption module, directories and log entries will be created only for EFSencrypted files, but paths to EFS-encrypted files are maintained. ADS are lost for EFSencrypted files. 45
n The parameter network controls whether this step affects network drives. +network enables this step on network drives, -network disables this. -network is the default. 46
Tips n Under Linux you may use a FAT partition as the output path if the corresponding kernel module is loaded. Under Windows you may prefer NTFS to retain alternate data streams when copying a file logically. 47
n n In order to find out the output path that represents your target hard disk, the following may help. Under Linux, media are usually included automatically in the directory tree, usually under /mnt/ or /media/. With “mount” you may bring up a list of mounted file systems. The output of “df” may help as well. If the output hard disk was prepared with a file “owner. txt” that e. g. contains your name, you can be completely sure to correctly identify your own hard disk. 48
n n No more than one output medium at a time must be attached to a system on which X-Ways Capture is running. Since capture. ini is read only at program start, later changes in the file do not affect Capture. The execution of the program can be aborted at any time by pressing Ctrl+C. 49
n Important: X-Ways Capture must not be copied to or executed on one of the original media that belong to the live system that is to be captured. X-Ways Capture should be run from a CD or an external medium such as a USB stick or USB hard disk (e. g. the output medium). 50
Evidor n n Target group: lawyers, law firms, corporate law and IT security departments, licensed investigators, and law enforcement agencies. What it does: Evidor retrieves the context of keyword occurrences on computer media, not only by examining all files (the entire allocated space, even Windows swap/paging and hibernate files), but also currently unallocated space and so -called slack space. That means it will even find data from files that have been deleted, if physically still existing. 51
n Electronic discovery: Evidor is a particularly easy and convenient way for any investigator to find and gather digital evidence on computer media. Evidor also comes most handy in civil (pre-) litigation if one party wants to examine (inspect) the computers of the other party. Evidor can be used on site for electronic discovery, will not disclose irrelevant proprietary or confidential information and does not impose an undue burden on the responding party in terms of personnel, time and money. Evidor serves as an automated forensic examiner, saving you the cost of many hours of hard manual expert work. Evidor produces reliable, replicable, neutral, and simple results, just as needed before court. Powerful and fast. 52
n IT security: Evidor is also an excellent tool for proving the presence or absence of confidential data on computer media, either to detect a security leak or confirm a lack thereof. With Evidor you often finds remnants (or even intact copies) of classified data that should have been encrypted, securely erased, or should not have existed on a media in the first place. 53
n Additional Toolset: the following products are included in Evidor: a powerful, yet very easy to use data recovery tool (Davory), a tool that deciphers Internet Explorer's internal browsing log file (X-Ways Trace), and last not least a DOSbased hard disk cloning tool (X-Ways Replica). Reason: It is generally highly advisable to work on a copy, not on the original drive. Most Windows environments tend to access a newly attached drive without asking, thereby e. g. altering the last access dates of some files. This is avoided under DOS. 54
n How to use: simply select the disk to examine and provide a list of keywords (such as people's names, e-mail addresses, name of traded goods, etc. ). Evidor will then retrieve the context of all occurrences of the keywords on the disk. When viewing the output file, you will likely find excerpts from documents that are closely related to the keywords, e. g. purchase orders, e-mail messages, address books, time tables, etc. 55
n Evidor can either produce HTML documents (recommended) or plain text files. HTML 2 documents can be easily imported and further processed in MS Excel. In MS Excel you can sort the search term occurrences by search term and occurrence location, you can cut irrelevant results, etc. Plain text files can be viewed in any text editor, MS Word, etc. 56
n X-Ways Trace: Browser log files deciphered. . . a computer forensics tool that allows to track and examine the web browsing activity that took place on a certain computer. Deciphers Internet Explorer's evergrowing internal history/cache file index. dat. Displays complete URLs, date and time of the last visit, user names, file sizes, filename extensions, and more. 57
Allows to sort by any criterion. Reads from a file you specify, or searches complete folders and subfolders, or even entire hard disks in all files, free space, and slack space, for traces of someone having surfed the Internet. Occassionally, accesses to local files are logged, too. You may search for specific domain, file, and user names. All the details compiled by X-Ways Trace can be exported to MS Excel. Part of the Evidor toolset, but also available separately. English, German, and French. 58
n Davory: Easy-to-use data recovery tool. Davory undeletes files and recovers files from logically damaged or formatted drives. Incorporates data recovery technology introduced with Win. Hex and concentrates on ease of use. Offers two separate, fully automated data recovery mechanisms to maximize your chances of success. One mechanism works with files of any type, the other one recovers JPEG (JPG), PNG, GIF, BMP, MS Office (DOC, XLS), Post. Script (EPS), Acrobat (PDF), Quicken (QDF), ZIP, RAR, RIFF (WAV, AVI), and MPEG (MPG). Specifically supports FAT 12, FAT 16, FAT 32, and NTFS. Powerful, yet inexpensive. 59
n As Davory works not only on hard drives, floppy disks, CDs, and DVDs, but also on Compact. Flash cards, Smart. Media cards, memory sticks etc. , it may save your day in particular if you are the owner of a digital camera. Davory can also be put to good use during computer forensic examinations, as you may extract files of certain types or files matching certain filename patterns (like Invoice*. doc) conveniently and quickly with only a few mouse clicks. Available in English, German, and French. Part of the Evidor toolset, but also available separately. English, German, and French. 60
61
323c440556620eb1483894826ed67dc3.ppt