Teamviewer Forensics

Teamviewer Forensics

TeamViewer Forensics Written by: Colby Lahaie Researched by: Colby Lahaie & David Leberfinger The Senator Patrick Leahy Center for Digital Investigation Champlain College Date Jan 29, 2013 Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents Contents .................................................................................................................................................................................. 1 1 Introduction .................................................................................................................................................................... 3 1.1 Background ............................................................................................................................................................. 3 1.2 Terminology ............................................................................................................................................................ 3 1.3 Research Questions................................................................................................................................................. 4 2 Methodology and Methods ............................................................................................................................................ 4 3 Results ............................................................................................................................................................................. 5 3.1 Versions of TeamViewer ......................................................................................................................................... 5 3.2 Specifications .......................................................................................................................................................... 5 3.2.1 Physical Test Computer Specifications ............................................................................................................ 5 3.2.2 Victim VM Specifications ................................................................................................................................. 5 3.2.3 Suspect VM Specifications .............................................................................................................................. 6 3.3 Installing TeamViewer ............................................................................................................................................. 6 3.3.1 TeamViewer Access Control............................................................................................................................ 8 3.3.2 TeamViewer Installation Type ........................................................................................................................ 8 3.4 Remote Access ........................................................................................................................................................ 9 3.4.1 TeamViewer Remote Control Window ........................................................................................................... 9 3.5 Remote Control ....................................................................................................................................................... 9 3.5.1 Remote Control Access Prompt .................................................................................................................... 10 3.5.2 Suspect’s Mouse Pointer ............................................................................................................................... 10 Figure 3.4.1 – Suspect Tool Bar ..................................................................................................................................... 11 3.6 Transferring Files ................................................................................................................................................... 11 Version: 0.1 – Document Name: TeamViewer Forensics Report– Review Date: MM/DD/YYYY Page 1 of 22 Patrick Leahy Center for Digital Investigation (LCDI) 3.6.1 File Box .......................................................................................................................................................... 11 Figure 3.5.1.1 – TeamViewer File Box ........................................................................................................................... 11 3.6.2 File Transfer................................................................................................................................................... 11 Figure 3.5.2.1 – TeamViewer File Transfer ................................................................................................................... 13 Figure 3.5.2.2 – TeamViewer File Transfer Event Log ................................................................................................... 13 3.7 Communication ........................................................................................................ Error! Bookmark not defined. Figure 3.6.1 – TeamViewer Communication Panel .......................................................... Error! Bookmark not defined. 3.8 Meetings .................................................................................................................. Error! Bookmark not defined. 3.8.1 Remote Control during a Meeting ................................................................... Error! Bookmark not defined. Figure 3.7.1.1 – TeamViewer Meeting Panel ................................................................... Error! Bookmark not defined. 3.9 Recording Sessions ................................................................................................................................................ 13 3.10 Malicious Intent .................................................................................................................................................... 14 3.11 Log Files ................................................................................................................................................................. 16 Figure 3.10.1 – TeamViewer Log File ............................................................................................................................ 17 Figure 3.10.1 – TeamViewer Log File ............................................................................................................................ 17 Figure 3.10.2 – TeamViewer Log File ............................................................................................................................ 18 3.12 Registry Changes ................................................................................................................................................... 18 Figure 3.11.1 – RegShot Comparison ............................................................................................................................ 18 Figure 3.11.2 - RegShot Comparison ............................................................................................................................. 19 4 Conclusion ..................................................................................................................................................................... 20 5 Further Work ................................................................................................................................................................. 21 6 References .................................................................................................................................................................... 21 Version: 0.1 – Document Name: TeamViewer Forensics Report– Review Date: MM/DD/YYYY Page 2 of 22 Patrick Leahy Center for Digital Investigation (LCDI) 1 Introduction Remote viewing or remote access software allows individual access to a computer when physical access to the computer is not possible or convenient. With remote viewing software, a user can access his or her computer from wherever he or she is instead. Unlike typical File Transfer Protocols (FTP), which only allows you to transfer files, you have the ability to edit, modify, and view everything on the hosting computer, without having to save or move information to a flash drive for later use. If a user needs to share his or her desktop or transfer files between computers, remote access software is one option. There are many varieties of remote viewing and remote accessing software around, but there is one tool in particular that we will be looking at, the software TeamViewer. Remote desktop software is widely used because of its many capabilities and low cost to users. TeamViewer has many different versions, which are

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    22 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us