HHS Lesson 8: Forensics
Total Page:16
File Type:pdf, Size:1020Kb
LESSON 8 DIGITAL FORENSICS AND COUNTER FORENSICS Lesson 8: Forensics WARNING The Hacker Highschool Project is a learning tool and as with any learning tool there are dangers. Some lessons, if abused, may result in physical injury. Some additional dangers may also exist where there is not enough research on possible effects of emanations from particular technologies. Students using these lessons should be supervised yet encouraged to learn, try, and do. However ISECOM cannot accept responsibility for how any information herein is abused. The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool Project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license, including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the HHS web page at http://www.hackerhighschool.org/licensing.html. The Hacker Highschool Project is an open community effort and if you find value in this project, we ask that you support us through the purchase of a license, a donation, or sponsorship. 2 Lesson 8: Forensics Table of Contents WARNING...................................................................................................................................................2 Contributors...............................................................................................................................................5 Introduction...............................................................................................................................................6 The Magically Disappearing Data Trick (Where and How to Hide Data).......................................7 First Things First – Large Data Sets.......................................................................................................7 You Can’t Get There From Here.............................................................................................................8 Software Tools.......................................................................................................................................8 Digging the Tunnel...................................................................................................................................9 Passing the Buck...................................................................................................................................9 Working From Home..........................................................................................................................10 Next Things Next – Small Bits of Bytes..............................................................................................10 Swamped by Swaps..........................................................................................................................10 Give 'em Some Slack.........................................................................................................................11 File Makeovers....................................................................................................................................11 The Disappearing Data Magic Trick (Making Data Irrecoverable)................................................12 Wash, Rinse, Repeat..........................................................................................................................12 More Software Tools...............................................................................................................................13 Boot and Nuke...................................................................................................................................13 Eraser....................................................................................................................................................13 Sderase................................................................................................................................................13 Hammer, Drill, Bigger Hammer.........................................................................................................13 Planting a Garden.................................................................................................................................14 Seeding the Garden.........................................................................................................................15 Feed Your Head: Digital Forensics Principles......................................................................................16 Digital Forensic Methodology..........................................................................................................16 Digital Forensics Process....................................................................................................................16 Evidence gets lost all the time!..................................................................................................17 This is an Exercise for Law Enforcement Personnel Only...................................................................17 Home Away from Home, or When Business Gets Too Personal.......................................................18 Software Tools and Collections........................................................................................................19 Data Media Analysis..............................................................................................................................20 Time for a Date...................................................................................................................................20 Getting in Time With Offset.........................................................................................................20 EXIF Data.............................................................................................................................................21 Imaging Tools......................................................................................................................................21 Give Them the Boot(ing)...................................................................................................................21 Deleted Data......................................................................................................................................21 Formatting Media..............................................................................................................................22 Precautions While Collecting Evidence from a Data Storage Device.....................................22 Steganography: A look at security controversy............................................................................23 Steganography: It's Real, It's Easy and It Works.......................................................................24 Steganography Is a Scam..........................................................................................................26 Windows Forensics..................................................................................................................................26 Laptops Are Treasure Troves.............................................................................................................27 Volatile Information...........................................................................................................................27 Tools for Collecting Volatile Information On Windows.................................................................27 Non-volatile Information...................................................................................................................28 Ready? Roll Cameras, Action..........................................................................................................29 Windows Server 2008 Event Log editing and location...........................................................29 Linux Forensics.........................................................................................................................................29 Linux Slack...........................................................................................................................................30 Silly String.............................................................................................................................................30 3 Lesson 8: Forensics Grep.....................................................................................................................................................30 More Command-line Tools...............................................................................................................30 Finding a Haystack in a Needle...........................................................................................................31 Encryption, Decryption and File Formats.......................................................................................31 Feed Your Head: Real Case Studies....................................................................................................33 Mobile Forensics.....................................................................................................................................33