Windows Forensic Analysis 82
Don Wolf writes "Computer forensics is a rapidly growing discipline and an even faster growing business. Whether it's the natural progression of technological science pertaining to crime or perhaps the digression of a few elite information security professionals, computer forensics is every so slowly gaining credibility in the otherwise PhD dominated field of criminal science. Computer evidence continues to be showcased in some of the most high-profile and controversial court cases in history, from the murder case of Lasie Peterson to the multi-billion dollar Enron scandal. Whether society will allow it or not, computer forensics geeks will play pivotal roles in the prevalence of justice." Keep reading for the rest of Don's review.
While on the road to computer forensic enlightenment I realized early on that many parallels existed between computer forensics and incident response. A number of great authors have published books on incident response, one of which is a gentleman by the name of Harlan Carvey. So when a friendly but cleverly personalized bookstore email rolled in with Harlan's newest book showcased, I thought it might be worthwhile to see what he's been up to.Windows Forensic Analysis DVD Toolkit | |
author | Harlan Carvey |
pages | 416 |
publisher | Syngress |
rating | 9 |
reviewer | Don Wolf |
ISBN | 9781597491563 |
summary | Incident Response and Cybercrime Investigation Secrets |
The book titled "Windows Forensic Analysis", takes a hands-on and in-depth approach to forensic discovery of Windows systems. Some may scoff at the mere suggestion that a point-and-click operating system necessitates the granular analysis of forensics, but make no mistake, beyond Windows' simplicity are numerous complex elements, sometimes cryptic, and many undocumented.
Always looking for a tip here and there, I found more Windows forensics tips here than I have anywhere else. While I've read only about half-a-dozen books on operating system forensics, this one stands out because the material is clearly drawn from the author's experience which, in my opinion, lends real credibility to the book. Granted, technical books are always reviewed for accuracy and truthfulness, but this one carries its own weight with the sheer amount of tips and real-life sidebars. No hash tables, no unnecessary screen dumps, and certainly no reprinted Microsoft documentation. The author does a great job on footnoting and includes plenty of links to additional information. Additionally, there are sections dedicated for FAQ's, as well as "tools and traps".
Having read the book through, I can tell you it flows well from chapter to chapter and continues to draw you in, somewhat unusual for a technical reference — when was the last time you were drawn into a textbook? I'm not sure how one decides to organize the chapters, but I suspect it was not a random decision. Looking back I can see that there is a logical order to the chapter sequence, perhaps suggesting an order in which to forensically process a Windows computer. The book starts with 'live' response, followed by memory analysis, registry analysis, file analysis, and finally rootkit detection — analysis in order of volatility I suppose.
I've heard a lot of praise regarding this books chapter on registry analysis, some claiming it to be worth the price of the book alone. Don't be mislead to believe that it is the crux or single focus of the book, it's not. In my opinion the reason the chapter stands out is because most forensics analysts I've met aren't particularly strong in the area of registry analysis and therefore may find the chapter a revelation. It's true, the chapter is strong and offers exceptional insight, however, I found the book to be almost equally weighted chapter by chapter.
I personally found the chapter regarding memory analysis to be a stand-out. RAM has the potential to store a ton of evidence, however, it's always been viewed as extremely volatile. Not only is it likely to be flushed with a power-cycle, but it's also susceptible to be purged simply through the normal actions of a computer user, or in our case, forensic analysts. I was happy to see a good section on the pros and cons of dumping the many different areas of physical memory. The author proves that there is life after a reboot and demonstrates how to recover at least partial RAM contents from various areas.
Overall there is plenty of theory, plenty of technique, and plenty of command-line examples. On the subject of command-line examples, the author provides a great collection of scripts and examples on the accompanying DVD. The examples all appear to work as describe, a rarity given the many possible computer configurations, just the same the author is thoughtful enough to point out possible exceptions and explanations when there is an opportunity for a particular command or technique to fail.
If I can quote a comment made by one of my associates, he said "The book provided more than just tips and techniques, it provides food for thought and helps one develop their own personal approach to Windows forensics". I totally agree. Furthermore, I found that while I learned a few new things, I also finished the book with lots of questions in mind. Is that a shortcoming of the book? No. Based on the detailed coverage of the book, I was able to identify my own shortcomings and areas I need to explore further. If you want to pursue Windows forensics and already have a good understanding of the principals and ethics of computer forensics, I highly suggest starting with this book.
You can purchase Windows Forensic Analysis DVD Toolkit from amazon.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Lots of online stuff too (Score:2, Interesting)
http://blogs.msdn.com/slavao/archive/2005/01/30/363428.aspx [msdn.com]
Lots of this is applicable to any platform, not just Windows.
Re: (Score:1)
Oh... (Score:1, Funny)
Re:Oh... (Score:4, Funny)
I don't have any experience in this myself. (Score:5, Funny)
However, what I am really writing to say is that people used to ask him what he did for a living, and he'd respond:
"Oh, I'm in the child porn business."
Guys who are in that line of work tend to have rather dark senses of humor
Re: (Score:2)
Re:I don't have any experience in this myself. (Score:5, Funny)
Oh. Waaaaiiiiitttt.....
Re: (Score:2)
Re: (Score:2)
The problem is the WHO that is doing the analysis (Score:1, Informative)
Anyone who believes there is even *ONE* honest law enforcement agent in the entire U.S.A, probably even the entire world, is incredibly naive.
--Signed... an unfortunate victim of a crooked cop who planted bogus evidence on my computer systems after perjuring himself on affid
Re:The problem is the WHO that is doing the analys (Score:2)
1. md5sum the suspect drive image
2. dd it to an acquisition drive
3. md5 the acquired image and the checksums must match
4. All of this with you and your lawyer and the plaintiff's lawyer (if applicable) present so that you can make notes of the md5sum, the size of the image, the drive serial number and so on.
The acquired image is left wi
Re: (Score:1)
md5summing or not, all the trust is placed in the prosecutor's lab. There are too many opportunities for wrongdoing.
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
but who would use 50,000 megabit keys to deal with the quantum threat?
Re: (Score:2)
Re: (Score:1)
Open wifi along a busy road was most likely to blame.
Beware the MD5 defense (Score:2, Interesting)
There are cases where the use of MD5, which is considered broken quite thoroughly, will get the case thrown out of court. See Bruce Schneier's blog entry about the MD5 defense [schneier.com]. Time to upgrade your hash algorithm. Some smart lawyers are able to use the fact that MD5 is broken to make a judge believe that the evidence could have been doctored to produce an MD5 collision with planted evidence.
Re: (Score:2)
Re:The problem is the WHO that is doing the analys (Score:2)
To be fair, half of that is regular old stupidity and incompetence, rather than actual corruption. Lawyers and police are much the same as everybody else: most of them are idiots who are not capable of doing their job correctly.
Re: (Score:2)
and the word of the anonymous coward is to be taken as gospel truth.
at least on Slashdot.
the geek who brings this attitude into court has two strikes against him even if can make the argument plausible in his own case.
Re: (Score:1)
Anyone who believes there is even *ONE* honest law enforcement agent in the entire U.S.A, probably even the entire world, is incredibly naive.
--Signed... an unfortunate victim of a crooked cop who planted bogus evidence on my computer systems after perjuring himself on affidavit's to get search warrants for them
Ahh yes, another over generalization brought to us by a fellow slashdot user. I think you are the naive one if you believe 1 crooked cop is representative of the whole.
Re: (Score:1)
i have seen way toooo many clueless people run forensics tools expecting to find the smoking gun.
the tools are like 15% of the job.
it is smartness and more to really make it work.
sorry scriptkiddies!
Where's the chapter on... (Score:3, Interesting)
..getting certified in your local area? Texas, for example, requires you have a P.I. license for computer forensic work, but online resources on how to actually GET one are mighty scarce...
Getting a P.I. in Texas is very difficult. (Score:2, Insightful)
Re: (Score:1)
I understnad the desire by the State of Texas to regulate a marketplace that has significant opportunities for abuse/legal ramifications. Hence, getting a Private Investigators license makes sense, as does a variety of security consultants. These people can carry guns, can directly interface with the populace and if the wrong characters were introduced to the field, well a lot of bad things could happen to people directly. So, I understand and agree with
Re:Where's the chapter on... (Score:4, Insightful)
Also, there are several good certifications out there, such as CCE and GCFA (SANS/GIAC). I know there are others that are only available to law enforcement (which I am not).
I find two things troubling about this trend:
1. It seems to be an effort for PIs to grab a new market and ensure their exclusive access to a market. (I know - police can do this, but I'm talking about making a profit doing it.)
2. Whenever governments start to regulate qualifications for a profession, qualified people are going to be left out or unqualified people will be let in. Either they insist on one specific certification or accreditation, and excellent people without the cert suffer, or they "grandfather" current practitioners and we obtain people who are not qualified. An alternative to the traditional "grandfather" clause could be to "grandfather" current practitioners and give them a license cycle (or some other reasonable period) to meet the requirements. E.g., if the license lasts for two years, you have two years to meet the official requirements or your license will lapse.
I would strongly recommend continuing ed (which the good certs require) as well, just like doctors, nurses, and engineers (as well as others).
Re: (Score:1)
Hell
Re:Where's the chapter on... (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Technically, you only need a PI license if you're going to be testifying in a court room.
Technically, no. Check the bolded text here:
"The Private Security Act construes an investigator as one who obtains information related to the "identity, habits, business, occupation, knowledge, efficiency, loyalty, movement, location, affiliations, associations, transactions, acts, reputation, or character of a person; the location, disposition, or recovery of lost or stolen property; the cause or responsibility for a fire, libel, loss, accident, damage, or injury to a person or to property; or for the purpose of securing evidence for use in court.
It also covers insurance claims, t'would appear...
And the moral is... (Score:2)
Re: (Score:2)
Like what, encrypting your disk? Or encrypting your memory? Or realizing that both memory encryption and full disk encryption can both be defeated with physical access?
Re: (Score:2)
Re: (Score:2)
Firewire is a security risk.
If society doesn't allow it? (Score:1)
If society won't allow something, it wouldn't play a pivotal role.
Re: (Score:1)
I took a class on Forensics last bi-term. (Score:2)
Re: (Score:1)
Re: (Score:2)
Well, again, that is certainly true if you leave Windows out of the equation, but is complete Bullshit in a Windows scenario. From your first post:
So how did I miss your point again? You don't say Firefox keeps a lot of cruft around, you say both Operating Systems do, which, again, is complete bullshi
Re: (Score:3, Insightful)
Hiding place?
Windows has to store the result of all your pointing and clicking and radio button selection somewhere. How do you expect the back button in Windows Explorer to work, for example, if your last visited directory wasn't recorded somewhere?
The only scary part in all this is the registry itself. Almost as bad is that if you don't h
Re: (Score:2)
Re: (Score:2)
I cited a trivial example, but that said, there's numerous (countless, perhaps) places where history of all sorts is typically recorded, by Windows Explorer, by the Run or Open With dialog boxes, by different parts of Windows, by installed applications, and so on. Most people rely on such things as their Star
Re: (Score:1)
Careers in computer forensics (Score:1)
I have a strong background in security, networking, PCs/desktop (going all the way back to WFW 3.11), servers, databases, firewalls, IPS, etc, and was looking at adding Forensics to my skillset. I'm genuinely interested in the topic and think I'd be good at it if I put my mind
Re: (Score:1, Informative)
Re: (Score:1)
Recipe for a bad cop:
* 1 brilliant young adult with good intentions
* 1 hopelessly corrupt legal system
* 1 underfunded municipal system (i.e. all of them!)
* 4 years
Yields 1 serving of careless police agent, every time. Serve cold.
Re: (Score:1)
Re: (Score:2)
Most of the people I know and work with that are in computer forensics are either in law enforcement or consulting work. Some very large corporations have the need of a forensic analyst or two but not many. The general preference is to hire an outsider to do the work, someone that is not part of the corporate political scene.
The one other place that hires forensic ana
Re: (Score:1)
massive growth market (Score:1)
Re: (Score:1)
what are those akronyms?
Re: (Score:2)
Just a guess.
Re: (Score:1)
My juror experience in a computer forensics trial (Score:4, Interesting)
The case was simple, the defendant had been caught by his wife viewing the explicit material, the wife took the computer tower to the police along with several floppy disks (this was 6 years ago). The defendant had deleted all the materials, but the forensics expert found the recently viewed material still on the hard drive.
The computer forensics expert detailed how he recovered the material, by imaging the hard drive and recovering the access dates. The floppies also contained some explicit materials, again which were deleted but then recovered, apparently it was impossible to recover the access dates on the floppy files, the forensic expert testified that some of the dates were in fact accurate, and some not, when from my brief overview, it was obvious that most of the dates were innacurate, so basically the forensics expert screwed up and didn't know what he was talking about in regards to the dates recovered from the floppy.
The interesting part of the case was that the defendent was charged with 53 counts of "sexual exploitation of children, possession" (having child porn) and 2 counts of "sexual exploitation of children, creating, making, or preparing". Those last 2 counts were charged because the defendant copied the pictures onto a floppy disk, not because he filmed it or put it on a website, he was making a backup of the files. I'm relieved to say that the jury agreed that making a backup of the files is not the same as "creating, making, or preparing", but we did find the guy guilty for possession.
For anyone thinking about getting into this field, you're likely to have to view a lot of really f*ing disgusting photos, then look at them closely and document everything about those photos. You really are going to need a good stomach for viewing that stuff, I know I probably couldn't do it because just seeing the photos submitted as evidence was enough to almost make me sick, I couldn't imagine having that guys job and have to be exposed to those things all the time.
Re:My juror experience in a computer forensics tri (Score:2, Funny)
How hard is it to slipstream a Knoppix CD with truecrypt and all of your codecs, open the case of your laptop and disconnect the hard drive (just in case), pull the battery out of your laptop so you can just pull the plug and have instant off, find a hotspot to download your porn at, boot up on the Knoppix CD, create an encrypted truecrypt volum
Re: (Score:1)
Re:My juror experience in a computer forensics tri (Score:1)
First of all, I think it is unfair to say that all Police officers plant evidence. There are some really decent and intelligent LEOs out there. And.. There are some really indecent and dumb LEOs out there too..
In my field (and Digital Forensics is my field), there is too much room for error to automatically assume that because someone has CP on their machine, they must be guilty of the criminal act of possessing it, or because they may have had in in a shared folder they must b
Re: (Score:1)
^ I completely agree with that, I was worried throughout the trial that I would have to educate the jury on simple terms they used in the trial and how the defendant was found with the CP on his computer. Luckily though, it was pretty much moot, since it was obvious that he intentionally was viewing t
Physical Memory Analysis (Score:2, Informative)
Rootkit.com: has been researching physical memory for years http://www.rootkit.com/newsread.php?newsid=130 [rootkit.com], but in a slightly different context (hiding vs finding).
Bla
The past tense of "mislead" (Score:1)
Lassie Peterson? (Score:2)
Any other books on computer forensics? (Score:2)
Re: (Score:2)
I think that the majority of others are specialty training guides provided to those in the field, or just basic knowledge gained from experience.
If you really want to learn more, download Sleuthkit/Autopsy [sleuthkit.org] (Sleuthkit is cmd line forensics tools, Autopsy is a web-based frontend to them) and just play. They're FOSS, and you'll learn more this way than any other. The tools were also written by Brian Carrier, author of the boo
Windows Machine Forensic Analysis..... (Score:4, Funny)
CPU: Dual AMD dual core Opteron 276 processors.
Sound Card: SoundBlaster Audigy II
Video Card: ATI Radeon 8800 GT
Memory: 4 GB PC 2700 ECC-Registered.
Hard Disk: 2x 500GB, 1x 200GB
Power Supply: 550W
Notes: Prior to death, subject complained of memory loss, cognitive difficulty after recovering from sleep mode, frequent lock-ups, severe lethargy after sleeping, confusion and sluggishnes when completing complex tasks. Previous medical history notes several near-fatal seizures, necessitating the "re-learning" of basic functions on several different occasions. Cause of seizures is as yet sill unknown, as episodes appeared to happen seemingly at random, usually during inopportune moments. Previous physician notes that resuscitation of the patient was long and time consuming. Resuscitation was further complicated by the fact that the patient was revied in a "hypnotized" state, refusing tto cooperated with medicall staff unless the correct 16-digit alphanumeric "key" was spoken to them, with the key changing after each resuscitation.
Previous Treatments Administered By Last Attending Physician:
Prescribed one (1) copy of Linux, but patient refused.
Time Of Death: 0832, 0901, 1055, 1129, 1344, 1508
Method Of Death: Fatal Error
Cause Of Death: Windows
Precedures performed in determining occurence of death:
Subject was BSOD on arrival
Unresponsive to verbal stimuli: (shouting, cursing)
Unresponsive to Sensory stimuli: (hitting, smacking with keyboard)
Additional Notes / Instructions:
As Coroner, it is recommended that the law enforcement agencies involved with the death of the subject investigate Mr. William Henry Gates III, and Steven Anthony Ballmer. Both subjects have known employment at Microsoft Corp. It has been determined by the Office Of The Coroner that a product known colloquially as "Windows", which was/is compiled, manufactured, and sold by Microsoft, while under the direct supervision and control of Mr. Gates and Mr. Ballmer, despite widespread reports of patients expiring from complications and/or adverse reactions after ingesting "Windows".
Book Reviews for Profit (Score:2)
2. Include link to Amazon with a referrer tag
3. Profit!
Thanks for helping me figure out step 2! Is this Slashdot's doing or the submitters?
How to get into computer forensics field? (Score:1)
the hard part is decrypting the BSODs (Score:2)
Thank you for the kind review (Score:1)