Teacher
Professional
- Messages
- 2,669
- Reaction score
- 829
- Points
- 113
Hello, running in the shadows! Hello, random carders. Big FAQ on computer forensics rolled up. If you have ever had to understand someone else's computer, and not just format it, it means that you have already been involved in computer forensics, i.e. forensic science! The only difference is that specialists in this field have much more tasks. Let's take a closer look at what it is?
Go:
The tasks of computer forensics specialists include: analysis of traffic, system failures, user errors and various information security incidents, keeping records of them and searching for hidden data and other possible traces of hacking, detecting uncontrolled system changes and software failures, violations of access rules and non-compliance with the "Information Security" policy or recommendations. In this article, we'll look at utilities and links to useful resources that will help you gain a deeper understanding of the art of forensic science.
Forensic science — computer forensics
The word "Forensic science" appeared in Russian from the English word Forensics, which means the science of investigating evidence or, simply put, computer forensics.
Experts in the field of forensic analysis are indispensable if you need to quickly detect and analyze information security incidents, for example, hacking a web server or the causes of confidential information leakage, encryption of confidential data, etc. In such cases, forensic experts are assigned the following tasks::
- understand how to implement hacking;
- build an attack scenario;
- restore the attack history;
- Collect the remaining traces of the attack;
- develop the necessary security measures to prevent such attacks and, if possible, other attacks, improving the overall information security process.;
- reduce and repair the damage caused.
Currently, more and more large and not-so-large companies are required to organize a specialized department or at least a staff of several forensic experts. These companies include not only companies in the field of information technology, but also companies that are far from it, for example, financial (since most of the evidence can be found in computer systems when investigating financial crimes), etc.
A separate topic is the investigation of targeted attacks, or APT. Their essence boils down to hacking target systems using a variety of attack vectors, tools, sophisticated techniques and methods that are unknown until now. By the way, there are quite a few good articles on this topic on our channel.
Needless to say, predictive tasks are traditionally present in CTF as well? Therefore, knowledge of at least basic investigative techniques is essential. And we'll look at some of the commonly used tools that are used on CTF below.
Classification of computer forensics
Any science tends to be divided into smaller topics. To finally feel at the institute, let's estimate the classification map of computer forensics.
- Computer forensics - it includes everything related to the search for hacking artifacts on the local machine: analysis of RAM, HDD, registry, OS logs, and so on.
- Network forensics, as the name implies, is related to investigations in the field of the network stack — for example, dumping and parsing network traffic to identify such interesting things as RAT, reverse shell, backdoor tunnels, and the like.
- Forensic data analysis is dedicated to analyzing files, data structures, and binary sequences left over from an attack or used in an intrusion.
- Mobile device forensics deals with everything that concerns the features of data extraction from Android and iOS.
- Hardware forensic - examination of hardware and technical devices. This area is the least popular and most difficult. This includes analyzing data at a low level (microcontroller, firmware or BIOS), studying the specific features of the device, for example, the frequency range of the Wi-Fi transmitter or the internal skimmer device installed on ATMs.
Methods and techniques of computer forensics
As with malware analysis, there are two main approaches to examining a compromised machine:
- static
- dynamic analysis
Dynamic analysis, or live analysis, uses slicing from snapshots of a system running under various conditions to get a complete picture of what is happening. For example, malware tends to delete its code and traces of infection after certain actions. And if a snapshot of the hacked system was taken before this point, there is a real chance to get data about what this malware was doing on the victim's computer. Accordingly, screenshots, logs of network connections, transmitted traffic, and a comparison of the state of the OS file system before and after the incident can serve as a file of electronic certificates.
There is a good article (PDF) in English, which briefly describes and compares these methods.
Basic forensic tools
The first thing you need to do at the beginning of a computer forensic examination is to collect and store information so that you can then restore the chronology and behavioral picture of the incident.
Let's take a look at what tools should be included by default in the tools of a forensic expert. Let's start with the most important thing-removing the disk image for further analysis in the laboratory.
Always be clear and clear about what action you are taking and why you are doing it. Incorrect use of the programs listed in the text of the article may lead to loss of information or distortion of the obtained data (evidence). Neither the author of the channel nor the admins are responsible for any damage caused due to improper use of the materials in this article.
That's all for today, cyberstalkers! Read the continuation of this article on the channel next. Stay tuned.
The big FAQ on computer forensics continues. If you've ever had to understand someone else's computer, then this article is for you. If you want to learn how to understand this, then this is also for you. The beginning of this article on our channel earlier.
Go:
Creating a disk, partition, or individual sector image:
- FTK Imager is a good tool for cloning storage media in Windows.
- dc3dd (and also adulau/dcfldd) - improved versions of the standard dd console utility in Linux.
- Guymager is a specialized application for creating exact copies of media (written in C++, based on Qt).
- Paragon or Acronis — all-in-one combines for viewing, creating, modifying, copying any data, partitions, or individual sectors.
- Mount it with the o-ro attributes
- Connect via blockdev-setro
- Mount as -o ro, loop
Processing generated disk images:
- Imagemounter is a Python utility that works from the command line and helps you quickly mount disk images.
- Libewf is a tool and along with it a library for processing EWF (Encase Image file Format) formats.
- Xmount is a tiny CLI utility for converting disk images to a convenient format while preserving all information and metadata.
Collecting data from hard drives:
- DumpIt is a utility for creating a dump of the machine's RAM. Simple and convenient.
- Encase Forensic Imager - software for creating a database of evidence files.
- Encrypted Disk Detector is another tool for cryptanalysts that helps you search for encrypted TrueCrypt, PGP, and Bitlocker volumes.
- Forensics Acquisition of Websites is a special browser designed to capture web pages and then investigate them.
- Live RAM Capturer is a useful utility for extracting a RAM dump, including applications protected by an anti-debugging or anti-dumping system.
- Magnet RAM Capture - like the previous tool, it is designed to capture RAM of all versions of Windows - from retro Windows XP to Windows 10 (including Windows Server releases).
Analysis of files found on hard drives
- Crowd Inspect - helps you get information about network processes and lists of binaries associated with each process. It also links to VirusTotal and other online malware analysis and reputation services.
- DCode - converts different data types to date and time values.
- Bstrings - a program for searching in binary data, there is support for regular expressions.
- eCryptfs Parser - recursively analyzes the headers of each eCryptfs file in the selected directory or disk and displays a list of encrypted files.
- Encryption Analyzer - a utility for analyzing password-protected and encrypted files with other algorithms, which at the same time analyzes the complexity of encryption and offers decryption options.
- File Identifier - a program for online analysis of the file type based on its own database of signatures, of which there are already more than two thousand.
- Memoryze is a utility for analyzing RAM images, including paging files and extracting data from them.
- ShadowExplorer is a utility for viewing and further extracting files from shadow copies in the Windows system.
- HxD is a small and fast HEX editor.
- Synalyze It! is a HEX editor with template support, but it is fast and there is nothing superfluous in it.
- wxHex Editor is a cross-platform HEX editor with the ability to compare files and a bunch of other features.
Extracting data from files
- Bulk_extractor is a utility for extracting email, IP addresses, and phone numbers from files.
- PhotoRec is a utility for extracting data and image files.
Processing data in RAM
- Forensics, Memory Integrity & Assurance Tool by invtero - a cool and sophisticated framework that works quickly.
- volatility - an open source set of utilities for versatile analysis of physical memory images.
- Rekall is a script for analyzing RAM dumps written in Python.
- KeeFarce - a program for extracting KeePass passwords from memory.
Network stack and browser analysis
- SiLK - a program for collecting, storing, and analyzing network flow data. It is ideal for analyzing traffic on the backbone or border of a large distributed enterprise or medium-sized provider.
- Wireshark is a world-famous network packet sniffer. It has a graphical user interface and a wide range of options for sorting and filtering information.
- NetworkMiner is a network analysis tool for detecting the OS, hostname, and open ports of network nodes by intercepting packets in PCAP format.
- chrome-url-dumper is a tiny program for extracting information from the Google Chrome browser.
- hindsight is another utility for analyzing the history of Chrome.
Analysis of email messages
- EDB Viewer is a powerful utility for viewing Outlook (EDB) files without connecting an Exchange server.
- Mail Viewer is a utility for viewing Outlook Express files, Windows Mail / Windows Live Mail, Mozilla Thunderbird message database, and individual EML files.
- OST Viewer is a utility for viewing Outlook OST files, again without binding to the Exchange server.
- PST Viewer - a variant of the previous utility used to view Outlook PST files.
Search for artifacts on HDD and peripherals
- FastIR Collector is a powerful functional collector of information about the Windows system (registry, file system, services, processes, environment settings, startup, and so on).
- FRED is a cross-platform fast registry analyzer for Windows.
- NTFS USN Journal parser — a parser of USN logs for NTFS volumes.
- RecuperaBit is an NTFS data recovery utility.
Specialized packages and frameworks
- Digital Forensics Framework is an open source platform for data extraction and research. There are options for CLI and GUI.
- The Sleuth Kit and Autopsy are another open source library and collection of command-line tools for analyzing disk images.
- Oxygen Forensic Detective is a universal forensic tool for studying mobile device data. The package of utilities included in it allows you to perform complete data extraction, conduct a comprehensive analysis of data stored on phones and in cloud storage. Available are Forensic Cloud Extractor - a built-in utility program that collects data from cloud storage services; and Forensic Maps, a program that works with geographic information system (GPS)data; Forensic Call Data Expert is a program for importing call data records (so-called CDR files) from any wireless service provider and visually analyzing subscriber connections.
Of course, cyberstalkers are not all tools that can be useful, but only well-known and frequently encountered programs. But even this will be more than enough for you to start your journey in the difficult field of cybercriminalism. And in the final part of this article, we will look at what you need to make your own cyber lab for forensic science classes.