Digital Forensics: Methods and Tools for Retrieval and Analysis of Security
Total Page:16
File Type:pdf, Size:1020Kb
NORGES TEKNISK-NATURVITENSKAPELIGE UNIVERSITET FAKULTET FOR INFORMASJONSTEKNOLOGI, MATEMATIKK OG ELEKTROTEKNIKK MASTEROPPGAVE Kandidatens navn: Andreas Grytting Furuseth Fag: Datateknikk Oppgavens tittel (norsk): Oppgavens tittel (engelsk): Digital Forensics: Methods and tools for re- trieval and analysis of security credentials and hidden data. Oppgavens tekst: The student is to study methods and tools for retrieval and analysis of security credentials and hidden data from different media (including hard disks, smart cards, and network traffic). The student will perform prac- tical experiments using forensic tools and attempt to identify possibilities for automating evidence analysis with respect to e.g. passwords, crypto- graphic keys, encrypted data, steganography, etc. The student will also study the correlation of identified security credentials from different media in order to improve the possibility of successful identification and decryp- tion of encrypted data. Oppgaven gitt: 28. Januar 2005 Besvarelsen leveres innen: 1. August 2005 Besvarelsen levert: 15. Juli 2005 Utført ved: Institutt for datateknikk og informasjonsvitenskap Q2S - Centre for Quantifiable Quality of Service in Communication Systems Veileder: Andr´e Arnes˚ Trondheim, 15. Juli 2005 Torbjørn Skramstad Faglærer Abstract Steganography is about information hiding; to communicate securely or conceal the existence of certain data. The possibilities provided by steganography are appealing to criminals and law enforcement need to be up-to-date. This master thesis provides investigators with insight into methods and tools for steganog- raphy. Steganalysis is the process of detecting messages hidden using steganography and is examined together with methods to detect steganography usage. This report proposes digital forensic methods for retrieval and analysis of steganog- raphy during a digital investigation. The result is the following list of methods to defeat steganography: • Physical crime scene investigation • Steganalysis • Detection of steganography software • Traces of steganography software • Locating pairs of carrier/stego-files • Key word search and activity monitoring • Suspect’s computer knowledge • Unlikely files • Locating steganography keys • Hidden storage locations These proposed methods are examined using scenarios. From the examination of steganography and these cases, it is concluded that the recommended meth- ods can be automated and increase the chances for an investigator to detect steganography. i Preface This thesis is a result from work done as the part of a master’s degree from the Department of Computer and Information Science, NTNU. The title of the project is “Digital Forensics: Methods and tools for retrieval and analysis of se- curity credentials and hidden data” and has been proposed by Andr´e Arnes˚ from Q2S - Centre for Quantifiable Quality of Service in Communication Systems. Arnes˚ also did the supervising of this master thesis. The focus of the project is on studying steganography in the context of digital forensics. The thesis covers tools and methods for steganography and how these can be detected. The objective is to create digital forensic methods to detect steganography, which can be used in the process of a digital investigation. I would like to thank everybody who supported me and inspired me to work on this project, especially Andr´e Arnes˚ and Professor Torbjørn Skramstad for guidance and motivation. Trondheim, July 15, 2005 Andreas Grytting Furuseth iii Contents Abstract i Preface iii 1 Introduction 3 1.1 Motivation .............................. 3 1.2 Introduction to digital forensics ................... 4 1.3 Introduction to steganography ................... 4 1.3.1 The use for steganography .................. 5 1.4 Interpretation of scope ....................... 5 1.5 Document organization ....................... 6 2 Digital Forensics 7 2.1 Forensic Science ............................ 7 2.2 Digital Forensic ............................ 8 2.3 Forensic methodology ........................ 8 2.3.1 An integrated digital investigation process ......... 9 2.3.2 Chain of Custody and Integrity documentation ...... 11 2.4 Digital forensic tools ......................... 12 2.4.1 Acquisition tools ....................... 12 2.4.2 Documenting evidence .................... 12 2.4.3 Analysis tools ......................... 13 2.4.4 Automatic identification of known software and files ... 14 2.4.5 Tool summary ........................ 14 3 Steganography 15 3.1 Introduction to steganography ................... 15 3.2 Terminology .............................. 16 3.2.1 Simple steganography .................... 17 3.2.2 Secret key steganography .................. 17 3.2.3 Public key steganography .................. 17 3.2.4 A formal model of steganography .............. 18 3.3 Steganography and cryptography .................. 19 3.4 Digital watermarking ......................... 19 3.5 Usage of steganography ....................... 20 3.5.1 Steganography encountered in digital forensics ...... 21 3.6 Classification of information hiding ................. 22 3.7 Different methods for embedding .................. 24 v vi CONTENTS 3.7.1 Data appending ....................... 24 3.7.2 Adding comments ...................... 25 3.7.3 File headers .......................... 25 3.7.4 Spatial domain ........................ 25 3.7.5 Transform domain ...................... 25 3.7.6 Statistics-aware embedding ................. 25 3.7.7 Pseudo-random embedding ................. 26 3.8 Classification of steganography software .............. 26 3.8.1 Steganography software generations ............ 26 3.8.2 Steganography software strength .............. 26 3.8.3 Steganography software availability ............. 27 3.8.4 The classification ....................... 27 4 Analysis of steganography software 29 4.1 Introduction .............................. 29 4.2 Description of EzStego ........................ 30 4.2.1 Usage of EzStego ....................... 31 4.2.2 Detection of EzStego ..................... 31 4.2.3 Message extraction ...................... 33 4.3 Description of Mandelsteg ...................... 33 4.3.1 Usage of Mandelsteg ..................... 33 4.3.2 Detection of Mandelsteg ................... 34 4.3.3 Message extration ...................... 34 4.4 Description of Spam Mimic ..................... 35 4.4.1 Usage of Spam Mimic .................... 35 4.4.2 Detection of Spam Mimic .................. 36 4.4.3 Message extraction ...................... 36 4.5 Description of Snow ......................... 36 4.5.1 Usage of Snow ........................ 36 4.5.2 Detection of Snow ...................... 38 4.5.3 Message extraction ...................... 38 4.6 Description of Outguess ....................... 38 4.6.1 Usage of Outguess ...................... 38 4.6.2 Detection of Outguess .................... 41 4.6.3 Message extraction ...................... 41 4.7 Description of appendX ....................... 42 4.7.1 Usage of appendX ...................... 42 4.7.2 Detection of appendX .................... 44 4.7.3 Message extraction ...................... 44 4.8 Description of Invisible Secrets ................... 44 4.8.1 Usage of Invisible Secrets .................. 44 4.8.2 Detection of Invisible Secrets ................ 45 4.8.3 Message extraction ...................... 45 4.9 Discussion ............................... 47 5 Steganalysis 49 5.1 Introduction .............................. 49 5.2 Introduction to steganalysis ..................... 49 5.2.1 The Prisoner’s Problem ................... 49 5.3 Description of steganalysis ...................... 50 CONTENTS vii 5.4 Attacks on steganography ...................... 51 5.4.1 Steganalysis and digital forensics .............. 51 5.4.2 Steganalysis: Detection of stego-messages ......... 52 5.4.3 Extracting hidden information ............... 54 5.4.4 Disabling hidden information ................ 55 6 Analysis of steganalysis software 57 6.1 Introduction .............................. 57 6.1.1 Disabling hidden information ................ 58 6.2 Description of StegSpy ........................ 58 6.2.1 Usage of StegSpy ....................... 58 6.2.2 Examination of StegSpy ................... 58 6.3 Description of Stegdetect ...................... 60 6.3.1 Usage of Stegdetect ..................... 60 6.3.2 Examination of Stegdetect .................. 60 6.4 Description of Stegbreak ....................... 61 6.4.1 Usage of Stegbreak ...................... 61 6.4.2 Examination of Stegbreak .................. 61 6.5 Description of Stego Suite ...................... 62 6.5.1 Usage of Stego Suite ..................... 62 6.5.2 Examination of Stego Watch ................ 62 6.6 Description of StegAnlyzer ...................... 62 6.6.1 Usage of StegAnalyzer .................... 62 6.6.2 Examination of StegAnalyzer ................ 62 6.7 Discussion ............................... 63 7 Digital forensics and steganography 65 7.1 Defeating steganography ....................... 65 7.1.1 Physical crime scene investigation ............. 66 7.1.2 Steganalysis .......................... 66 7.1.3 Detection of steganography software ............ 67 7.1.4 Traces of steganography software .............. 67 7.1.5 Locating pairs of carrier/stego-files ............. 67 7.1.6 Key word search and activity monitoring ......... 68 7.1.7 Suspect’s computer knowledge ............... 68 7.1.8 Unlikely files ......................... 68 7.1.9 Locating steganography keys ................ 69 7.1.10 Hidden storage locations