71
Hands-on: Capturing an Image with AccessData FTK Imager

Hands-on: Capturing an Image with AccessData FTK Imager

Embed Size (px)

Citation preview

Page 1: Hands-on: Capturing an Image with AccessData FTK Imager

Hands-on:Capturing an Image with AccessData

FTK Imager

Page 2: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 2

Capturing an Image with AccessData FTK Imager

• Included on AccessData Forensic Toolkit• View evidence disks and disk-to-image files• Makes disk-to-image copies of evidence drives– At logical partition and physical drive level– Can segment the image file

• Evidence drive must have a hardware write-blocking device– Or the USB write-protection Registry feature enabled

• FTK Imager can’t acquire drive’s host protected area

Page 3: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 3

Capturing an Image with AccessData FTK Imager (continued)

Page 4: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 4

• Steps– Boot to Windows– Connect evidence disk to a write-blocker– Connect target disk to write-blocker– Start FTK Imager– Create Disk Image• Use Physical Drive option

Capturing an Image with AccessData FTK Imager (continued)

Page 5: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 5

Capturing an Image with AccessData FTK Imager (continued)

Page 6: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 6

Capturing an Image with AccessData FTK Imager (continued)

Page 7: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 7

Capturing an Image with AccessData FTK Imager (continued)

Page 8: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 8

Capturing an Image with AccessData FTK Imager (continued)

Page 9: Hands-on: Capturing an Image with AccessData FTK Imager

Creating a Virtual Machine

Page 10: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 10

Understanding Virtual Machines

• Virtual machine– Allows you to create a representation of another

computer on an existing physical computer• A virtual machine is just a few files on your

hard drive– Must allocate space to it

• A virtual machine recognizes components of the physical machine it’s loaded on– Virtual OS is limited by the physical machine’s OS

Page 11: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 11

Page 12: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 12

Understanding Virtual Machines (continued)

• In computer forensics– Virtual machines make it possible to restore a

suspect drive on your virtual machine• And run nonstandard software the suspect might have

loaded

• From a network forensics standpoint, you need to be aware of some potential issues, such as:– A virtual machine used to attack another system

or network

Page 13: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 13

Creating a Virtual Machine

• Two popular applications for creating virtual machines– VMware and Microsoft Virtual PC

• Using Virtual PC– You must download and install Virtual PC first

Page 14: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 14

Creating a Virtual Machine (continued)

Page 15: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 15

Creating a Virtual Machine (continued)

Page 16: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 16

Creating a Virtual Machine (continued)

Page 17: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 17

Creating a Virtual Machine (continued)

• You need an ISO image of an OS– Because no OSs are provided with Virtual PC

• Virtual PC creates two files for each virtual machine:– A .vhd file, which is the actual virtual hard disk– A .vmc file, which keeps track of configurations you

make to that disk• See what type of physical machine your virtual

machine thinks it’s running– Open the Virtual PC Console, and click Settings

Page 18: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 18

Creating a Virtual Machine (continued)

Page 19: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 19

Creating a Virtual Machine (continued)

Page 20: Hands-on: Capturing an Image with AccessData FTK Imager

Current Computer Forensic Tools

Page 21: Hands-on: Capturing an Image with AccessData FTK Imager

Analyze Data

Page 22: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 22

Using AccessData Forensic Toolkit to Analyze Data

• Supported file systems: FAT12/16/32, NTFS, Ext2fs, and Ext3fs

• FTK can analyze data from several sources, including image files from other vendors

• FTK produces a case log file• Searching for keywords– Indexed search– Live search– Supports options and advanced searching

techniques, such as stemming

Page 23: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 23

Using AccessData Forensic Toolkit to Analyze Data (continued)

Page 24: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 24

Using AccessData Forensic Toolkit to Analyze Data (continued)

Page 25: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 25

Using AccessData Forensic Toolkit to Analyze Data (continued)

• Analyzes compressed files• You can generate reports– Using bookmarks

Page 26: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 26

Using AccessData Forensic Toolkit to Analyze Data (continued)

Page 27: Hands-on: Capturing an Image with AccessData FTK Imager

Recovering Password

Page 28: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 28

Recovering Passwords

• Techniques– Dictionary attack– Brute-force attack– Password guessing based on suspect’s profile

• Tools– AccessData PRTK– Advanced Password Recovery Software Toolkit– John the Ripper

Page 29: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 29

Recovering Passwords (continued)

• Using AccessData tools with passworded and encrypted files– AccessData offers a tool called Password

Recovery Toolkit (PRTK)• Can create possible password lists from many sources

– Can create your own custom dictionary based on facts in the case

– Can create a suspect profile and use biographical information to generate likely passwords

Page 30: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 30

Recovering Passwords (continued)

Page 31: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 31

Recovering Passwords (continued)

Page 32: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 32

Recovering Passwords (continued)

Page 33: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 33

Recovering Passwords (continued)

• Using AccessData tools with passworded and encrypted files (continued)– FTK can identify known encrypted files and those

that seem to be encrypted• And export them

– You can then import these files into PRTK and attempt to crack them

Page 34: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 34

Page 35: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 35

Recovering Passwords (continued)

Page 36: Hands-on: Capturing an Image with AccessData FTK Imager

Understanding Steganography

Page 37: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 37

Understanding Steganography in Graphics Files (continued)

• Substitution– Replaces bits of the host file with bits of data– Usually change the last two LSBs– Detected with steganalysis tools

• Usually used with image files– Audio and video options

• Hard to detect

Page 38: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 38

Understanding Steganography in Graphics Files (continued)

Page 39: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 39

Understanding Steganography in Graphics Files (continued)

Page 40: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 40

Using Steganalysis Tools

• Detect variations of the graphic image– When applied correctly you cannot detect hidden

data in most cases

• Methods– Compare suspect file to good or bad image

versions– Mathematical calculations verify size and palette

color– Compare hash values

Page 41: Hands-on: Capturing an Image with AccessData FTK Imager

Packet Snifferswireshark lab 으로 바꾸기

(passwd sniffing)

Page 42: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 42

Using Packet Sniffers

• Packet sniffers– Devices or software that monitor network traffic– Most work at layer 2 or 3 of the OSI model

• Most tools follow the PCAP format• Some packets can be identified by examining

the flags in their TCP headers• Tools– Tcpdump– Tethereal

Page 43: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 43

Using Packet Sniffers (continued)

Page 44: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 44

Using Packet Sniffers (continued)

• Tools (continued)– Snort– Tcpslice– Tcpreplay– Tcpdstat– Ngrep– Etherape– Netdude– Argus– Ethereal

Page 45: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 45

Using Packet Sniffers (continued)

Page 46: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 46

Using Packet Sniffers (continued)

Page 47: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 47

Using Packet Sniffers (continued)

Page 48: Hands-on: Capturing an Image with AccessData FTK Imager

Viewing email header

Page 49: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 49

Viewing E-mail Headers

• Learn how to find e-mail headers– GUI clients– Command-line clients– Web-based clients

• After you open e-mail headers, copy and paste them into a text document– So that you can read them with a text editor

• Headers contain useful information– Unique identifying numbers, IP address of sending

server, and sending time

Page 50: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 50

Viewing E-mail Headers (continued)

• Outlook– Open the Message Options dialog box– Copy headers– Paste them to any text editor

• Outlook Express– Open the message Properties dialog box– Select Message Source– Copy and paste the headers to any text editor

Page 51: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 51

Viewing E-mail Headers (continued)

Page 52: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 52

Viewing E-mail Headers (continued)

Page 53: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 53

Page 54: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 54

Viewing E-mail Headers (continued)

• Novell Evolution– Click View, All Message Headers– Copy and paste the e-mail header

• Pine and ELM– Check enable-full-headers

• AOL headers– Click Action, View Message Source– Copy and paste headers

Page 55: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 55

Viewing E-mail Headers (continued)

Page 56: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 56

Viewing E-mail Headers (continued)

Page 57: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 57

Viewing E-mail Headers (continued)

Page 58: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 58

Viewing E-mail Headers (continued)

Page 59: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 59

Viewing E-mail Headers (continued)

• Hotmail– Click Options, and then click the Mail Display Settings– Click the Advanced option button under Message

Headers– Copy and paste headers

• Apple Mail– Click View from the menu, point to Message, and

then click Long Header– Copy and paste headers

Page 60: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 60

Viewing E-mail Headers (continued)

Page 61: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 61

Viewing E-mail Headers (continued)

Page 62: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 62

Viewing E-mail Headers (continued)

• Yahoo– Click Mail Options– Click General Preferences and Show All headers

on incoming messages– Copy and paste headers

Page 63: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 63

Page 64: Hands-on: Capturing an Image with AccessData FTK Imager

Recovering email

Page 65: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 65

Using AccessData FTK to Recover E-mail

• FTK– Can index data on a disk image or an entire drive for

faster data retrieval– Filters and finds files specific to e-mail clients and

servers• To recover e-mail from Outlook and Outlook

Express– AccessData integrated dtSearch

• dtSearch builds a b-tree index of all text data in a drive, an image file, or a group of files

Page 66: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 66

Page 67: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 67

Using AccessData FTK to Recover E-mail (continued)

Page 68: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 68

Page 69: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 69

Using AccessData FTK to Recover E-mail (continued)

Page 70: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 70

Using AccessData FTK to Recover E-mail (continued)

Page 71: Hands-on: Capturing an Image with AccessData FTK Imager

Guide to Computer Forensics and Investigations 71

Using AccessData FTK to Recover E-mail (continued)