Module 5: Defeating Anti-Forensics Techniques

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Program Packers

- A program used to compress or encrypt the executable programs - Hide attack tools from being detected through reverse-engineering by modifying the original entry point of the executable - Some of the widely used tools are UPX, BurnEye, Exe Stealth Packer, Smart Packer Pro, etc - These programs that require a password to be run are considered to be strong, whereas, those that do not require a password are vulnerable to static analysis

DNS Monitoring

- Attacker sends packets across a network with the destination IP address coming from an inactive subnet and source IP address coming from a rarely used network - When network monitoring tools come across such packets, they might make a reverse DNS request in an attempt to resolve the hostname of the source IP address - If the attacker is able to monitor the DNS server and identify the reverse DNS request, he/she can conclude packets are being monitored

Overwriting Metadata

- Attackers can use tools to wipe the contents of media, that action itself might draw the attention of investigators, therefore the attackers cover their tracks by overwriting the metadata (i.e. access times), rendering the construction of timeline difficult - Ex: timestomp, part of the metasploit framework is used to change MACE attributes of a file - Another way to confuse the investigator is by accessing the computer in a way such that no metadata is generated - Ex: mounting a partition as read-only, or accessing it through the raw device, prevents file metadata from being updated - Setting windows registry key "HKLM\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisableLastAccessUpdate" to 1 disables updating accessed timestamp

Artifact Wiping Methods

- Disk Wiping utilities- Involves erasing data from the disk by deleting its links to memory blocks and overwriting the memory contents - File Wiping utilities- Deletes individual files and file table entries from an OS - Disk Degaussing/destruction utilities- physical destruction of device - Disk formatting- wipes its address tables and unlinks all the files, does not erase data present

Detecting File Extension Mismatch

- Every digital file contains a signature that is located in the first 20 bytes of the file - Tools such as Hex Editor Neo, Hex Workshop, etc. can be used to get the hex view of the file and identify the file signature by examining first 20 bytes of the file - In signature analysis, the file header and its extension mismatch can be identified - Autopsy, use "Extension Mismatch Detected" module to identify whether an attempt has been made to tamper the file extension of the known file types

Detecting hosts in "promiscuous mode"

- Many network forensics tools use an Ethernet interface in promiscuous mode to capture all packets on the LAN - Often, these tools are not configured in such a way that they do not transmit on the network that is being examined - Thus, they can be detected by the way they respond to pings, ARPs, and malformed IP packets

Data Encryption

- One of the commonly used techniques to defeat forensics investigation process - Intruders use strong encryption algorithms to encrypt data of investigative value, which renders it virtually unreadable without the designated key - Additionally, most encryption programs are capable of performing additional functions, including use of a key file, full-volume encryption, and plausible deniability; that makes the investigator's job more difficult - Cryptanalysis can be used to decrypt encrypted data

Detecting Overwritten Data/Metadata

- To detect timestamp forgery on NTFS file system, the forensic investigator can employ forensic tools such as analyzeMFT to compare $STANDARD INFORMATION and $FILENAME attributes -- analyzeMFT.py is designed to fully parse the MFT file from an NTFS filesystem, and produce an output in CSV or bodyfile format - When the $FILE_NAME creation date and $STANDARD_INFORMATION creation date (for any file) does not match, it indicates that the file has been time stomped

Detecting USB devices

- To enumerate the devices that are connected to the system, use the following PS command: Get-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Enum\USBDTORE\*\*\ | Select FriendlyName - In windows registry these entries are located at: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR\Disk&Ven_[VendorName]&Prod_[ProductName]&Rev_1.00\[serialNo]

Unpacking Program Packers

- To unpack/extract the original program executable file from the packer, the investigator should identify the tool used to pack the executable file - Exeinfo PE tool can analyze the code to identify the packer tool - Ex: If UPX is the utility used to pack the program - To unpack the program packer, use the UPX utility command: upx.exe -d -o [unpacked_file_name] [packer_file_name]

Anti-Forensics Countermeasures

- Train and educate the forensic investigator about anti-forensics - Validate the results of examination using multiple tools - Impose strict laws against illegal use of anti-forensics tools - Understand the anti-forensic techniques and their weaknesses - Use latest and updated CFTs and test them for vulnerabilities - Save data in secure locations - Use intelligent decompression libraries to defend against compression bombs - Replace weak file heuristics with stronger ones

Anti-Forensics Techniques that Minimize Footprint

- Use of fake and stolen identities - Running OSes from live CDs/DVDs/USB - Use of Virtual Machine - Use of Cloud services - Memory injection and syscall proxying - Userland execve technique

Using Stream Detector

-A forensic tool that identifies all hidden files such as images, videos, text, and executables within Alternate Data Streams present on NTFS drives -Can detect the hidden streams on actual file directory and lists hidden stream file name, stream type, size of the stream, etc. -This tool can be used to detect and extract hidden streams, delete the file and unwanted streams

Winrtgen

-A graphical Rainbow Tables Generator -Supports LM, FastLM, NTLM, LMCHALL, HalfLMCHALL, NTLMCHALL, MSCACHE, MD2, MD4, MD5, SHA1, RIPEMD160, MySQL323, MySQLSHA1, CiscoPIX, ORACLE, SHA-2 (256), SHA-2 (384), and SHA-2 (512) hashes

SSD File Carving on APFS

-Acquire the disk image of APFS from a TRIM disabled SSD in a forensic manner -Examine the forensically acquired evidence file to recover deleted data -Tools AppleXsoft File Recovery for Mac Disk Doctors Mac Data Recovery R-Studio for Mac Data Rescue 4 Stellar Phoenix Mac Data Recovery 321Soft Data Recovery Disk Drill for Mac Mac Data Recovery Guru Cisdem DataRecovery 3 TestDisk for Mac

Password Cracking Using Cain & Abel

-Allows recovery of various kind of passwords by sniffing the network, and cracking encrypted passwords using dictionary, brute-force, and cryptanalysis attacks -Covers some security aspects/weaknesses present in a protocol's standards, authentication methods and caching mechanisms -The program does not exploit any software vulnerabilities or bugs that could not be fixed with minimum effort

Trail Obfuscation

-Anti-forensic technique used to confuse, disorient, and divert the forensic examination process -Attackers mislead investigators via log tampering, false e-mail header generation, timestamp modification, and various file headers' modification Some techniques include: -Log cleaners -Spoofing -Misinformation -Zombie accounts -Trojan commands

Alternate Data Streams

-Attackers use this to hide data in Windows NTFS and cannot be revealed through command line or Windows Explorer - Allows attacker to hide any number of streams into one single file without modifying the file size, functionality, etc, except the file date - the file date can be modified using anti-forensics tools like TimeStomp - In some cases, these hidden __ can be used to remotely exploit a web server

Password Types

-Cleartext Passwords - transmitted and stored without any encryption -Obfuscated Passwords - passwords are stored or communicated after encrypting, can be decrypted by applying a reverse algorithm -Password Hashes - signatures of the original password, one-way algorithm that cannot be reversed

Password Cracking Using Rainbow Crack

-Cracks hashes with rainbow tables -Uses time-memory tradeoff algorithm to crack hashes -May take a long time to pre-compute the table, but once the pre-computation is finished, hashes stored in the table can be cracked with much better performance than a brute-force cracker

Anti-Forensic Techniques

-Data/File Deletion -Password Protection -Steganography -Data Hiding in File System Structures -Trail Obfuscation -Artifact Wiping -Overwriting Data/Metadata -Encryption -Program Packers -Minimizing Footprint

Password Cracking Using PwDump7

-Extracts LM and NTLM password hashes of local user accounts from the database -Dumps the password hashes (OWFs) from NT's SAM database -It is also capable of dumping protected files -Requires admin privileges on the remote system

Goals of Anti-Forensics

-Interrupt and prevent information collection -Make difficult the investigator's task of finding evidence -Hide traces of crime or illegal activity -Compromise the accuracy of a forensics report or testimony -Delete evidence that an anti-forensics tool has been run

Storage location of Recycle Bin

-Location on FAT file systems On older FAT , it is located in Drive:\RECYCLED -Location on NTFS file systems On windows 2000, NT, and XP it is located in Drive:\RECYCLER\<SID> On Windows Vista and later, it is located in Drive:\$Recycle.Bin\<SID>

Timestomp

-One of the most widely used trail obfuscation tools that allow deletion or modification of timestamp-related information on files -Metasploit framework tool

$I File Metadata

-Original file name -Original file size -The data and time the file was deleted -Unique identifying number -The drive number in which the file was stored

Steganalysis Methods/Attacks

-Steg-only - only the stego object is available for anlaysis -Known-stego - has the stego algoruthm and both the cover medium and the stego-object -Known-message - access to hidden message and stego-oject -Chosen-message - generates stego objects from a known message to identify steg algorithms -Chosen-stego - access to the stego-object and algorithm -Chi-square - probability analysis to test whether the stego object and original data are the same -Distinguishing statistical - analyzes embedded algorithm used to detect distinguishing statistical changes -Blind classifier - fed with the original data to learn the resemblance

Challenge of Steganalysis

-Suspect information stream may or may not have encoded hidden data -Efficient and accurate detection of hidden content within digital images is difficult -The message might have been encrypted before inserting into a file or signal -Some of the suspect signals or files may have irrelevant data or noise encoded into them

3 types of passwords in BIOS Setup

-System password -Admin password -HDD password Note: bypassing BIOS password can unlock System and Admin password but not the HDD password

Recovering Deleted Partitions

-The MBR partition table contains the records of the primary and extended partitions of a disk -When a partition is deleted from a disk, the entries with respective to deleted partition are removed by the computer form the MBR partition table -Investigators use tools such as R-Studio and EaseUS Data Recovery Wizard to scan the disk for lost partitions and recover them -These automated tools perform full disk scan, looks for deleted partition information and reconstruct the partition table entry for deleted partition

HDD File Carving on Windows

-The forensic image file is acquired using tools such as FTK imager and DD utility and examined using Autopsy -Autopsy recovers the deleted data from the evidence file

SSD File Carving on Linux System

-The forensically acquired image from TRIM disabled SSD should be examined using file carving tools such as Autopsy, R-Studio, etc -In autopsy, the carved data from the forensic evidence file is displayed under the appropriate data source with heading "$CarvedFiles"

Recycle Bin Forensics

-The original files pertaining to the $I files are not visible in the Recycle Bin folder when, --$I file is corrupt or damaged --The attacker/insider deletes $I files from the Recycle Bin -During forensic investigation, the investigator should check for the $R files in the Recycle Bin directory to counter the anti-forensic technique used by the attacker -If the metadata files related to the original files are not present in the folder, then the investigator can use 'copy' command to recover the deleted files ($R files) --Command: copy <$R* (or file name)> <Destination Directory>

Methods to bypass/reset BIOS password

-Using a manufacturer's backdoor password to the BIOS -Using password cracking software -Resetting the CMOS using jumpers or solder beads -Removing the CMOS battery for at least 10 min

File Carving on Linux

-When a file is deleted from Linux using the command /bin/rm/, the inode pointing to the file gets removed but the file remains on the disk until it is overwritten with new data -If a running process keeps a file open and then removes the file, the file contents are still on the disk, and other programs will not reclaim the space -The second extended file system (ext2) is designed in such a way that it shows several places where data can be hidden -It is required to note that if an executable erases itself, its contents can be retrieved from a /proc memory image --The command cp /proc/$PID/exe/tmp/file creates a copy of a file in /tmp -Tools that can be used to recover deleted files from Linux Stellar Phoenix Linux Data Recovery Ddrescue R-Studio for Linux Data Recovery for Linux Kernel for Linux Data Recovery Autopsy Scalpel Mondo Rescue Foremost TestDisk PhotoRec

SSD File Carving on Windows

-When a forensic investigator performs file carving on a forensic image file acquired from a TRIM enabled SSD, it is not possible to recover deleted data from the disk -Tools such as Autopsy, Ease US Data Recovery, etc. can be used to carve data from the disk -When autopsy is employed to perform file carving on an evidence file, the software lists the file names but the deleted data cannot be recovered -When performing data acquisition, the investigator should check status of the SSD's TRIM feature -If TRIM is disabled SSD's the forensic investigator can perform file carving to recover lost data from the drive

Bypassing Windows User Password by Booting Live CD/USB

-When the user account of a Windows machine is locked, the investigator should bypass the password to get access to the machine -In such case, boot the machine from the Live CD/USB (here, CAINE LIVE CD/DVD is used) to get access to the machine's hard disk and its contents

File Carving on Windows

-Windows tracks its files/folders on a hard drive using the pointers that tells the system where the file begins and ends -When a file is deleted from the hard drive, the pointer to the file gets deleted but the contents of the file remains on the disk -In other words, the deleted files can be recovered from the hard disk until the sectors containing the contents of the file are overwritten with new data -File carving in SSDs is different from HDDs since file deleted from the TRIM (enabled by default) enabled SSDs cannot be recovered -Data recovery tools such as Autopsy, Recover My Files, Ease US Recovery wizard, R-Studio for Windows, etc can be used for recovering deleted files/folders from Windows

Steg Detection Tools

-zsteg -StegoVeritas -Stegextract -StegoHunt -Steganography Studio -Virtual Steganography Laboratory (VSL)

Rainbow Table

A precomputed table that contains word lists in the form of dictionary files and brute force lists and their hash values

Steganography

A technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain confidentiality of data

Artifact Wiping

Anti-forensics technique that involves deleting or destroying evidence files permanently using various tools and techniques.

Lazesoft Recover My Password Tool

Creates a bootable CD/USB that can be used to reset/unlock Windows user password when the login credentials of the account are lost Steps: -Boot machine to the USB boot drive and select "Lazesoft Recovery Suite to load the utility" -Click on "Password Recovery" -Select "Reset Windows Password" -Click "Next" -Select Windows Installation to be unlocked from the list, for example, Microsoft Windows 10 x64 Edition -Click "Next" to get the User account list -Select the "User Account" to be unlocked -Click "Next" -Click "Reset/Unlock" Button to unlock the selected User account password -Now, click "Reboot" option to restart the machine and the OS loads without prompting for a user password

Password Cracking Techniques

Dictionary - dictionary file run against user accounts Brute Force - every possible combination Rule-Based - some information about password is known (algorithm/length/complexity), combination attack

Password Cracking Using L0phtCrack and Ophcrack

L0phtCrack: -A password auditing and recovery application packed with features such as scheduling, hash extraction from 64-bit Windows versions, and network monitoring and decoding -Helps recover lost Microsoft Windows passwords by using dictionary, hybrid attacks, rainbow tables, and brute-force attacks Ophcrack: -A windows password cracker based on rainbow tables -Comes with a GUI and runs on multiple platforms

Application Password Cracking Tools

Office Password Cracking: -Software Stellar Phoenix Office Password Recovery -Online Password Recovery -Office Password Genius -Office Password Recovery Lastic -SmartKey Office Password Recovery PDF Cracking Software: -PDF password recovery -PDF password genius -Smartkey PDF Password Recovery -Tenorshare PDF Password Recovery -Guaranteed PDF Decrypter ZIP Password Cracking Software: -Accent ZIP Password Recovery -ZIP Password Genius -SmartKey ZIP Password Recovery -KRyLack ZIP password recovery -Stellar Phoenix Zip Password Recovery RAR Cracking Software: -Accent RAR Password Recovery -RAR Password Genius -cRARk 5.1 -SmartKey RAR Password Recovery -KRyLack RAR Password Recovery

Other Password Cracking Tools

Offline NT Password & Registry Editor Password Unlocker Bundle ProActive System Password Recovery John the Riper Wfuzz Active@ Password Changer Passware Kit Standard Windows Password Unlocker LSASecretsView LCP Password Cracker Kon-Boot Windows Password Recovery Tool Hash Suite Windows Password Breaker Windows Password Recovery Password Recovery Bundle iSunshare Windows Password Geniu THC-Hydra Medusa

Overwriting Data

Overwriting programs (disk sanitizers) work in 3 modes: -Overwrite entire media -Overwrite individual files -Overwrite deleted files on the media

Windows File Recovery Tools

Recover My Files EaseUS Data Recovery Wizard DiskDigger Handy Recovery Quick Recovery Stellar Phoenix Windows Data Recovery Total Recall Advanced Disk Recovery Windows Data Recovery Software R-Studio Orion File Recovery Software Data Rescue PC Recover4all Professional Recuva Active@ File Recovery Pandora Recovery Ontrack EasyRecovery Seagate File Recovery Software Wise Data Recovery Glary Undelete Disk Drill PhotoRec DDR Professional Recovery Software File Scavenger GetDataBack UndeletePlus VirtualLab Active@ UNDELETE WinUndelete R-Undelete

Removing the CMOS battery

Step 1: Shut down the system and disconnect the power plug Step 2: open the CPU cabinet and locate the CMOS battery (silver circular battery) on the motherboard Step 3: Remove the CMOS battery from the socket and keep it out for 20 to 30 minutes, this flushes out the CMOS memory that stores BIOS passwords and other configurations Step 4: Replace the battery and start the system normally Note: sometimes, manufacturers use capacitors to provide backup power to the CMOS battery, if the attempt fails keep the battery out for 24 hours

Detecting Alternate Data Streams

Step 1: cd to the directory to search then execute gci -recurse | % { gi $_.FullName -stream *} | where stream -ne ':$Data' Step 2: investigate directory where ADS files were found Step 3: notepad filename.extension:streamname.extension

Resetting CMOS using Jumpers

Step 1: shut down the system and unplug the power cord Step 2: move the jumper from its default position so that it is across pins 2 and 3; this clears the BIOS/CMOS settings Step 3: Now, turn on the machine to verify that the password has been reset Step 4: If password is cleared, turn off the computer and return the jumper to its original position

Detecting Steganography

Text file: -Alterations are made to the character positions for hiding data -Alterations are detected by looking for text patterns or disturbances, language used, and an unusual amount of blank spaces Image file: -Detected by looking for changes in size, file format, metadata, and color palette pointing to the existence of the hidden data -Statistical analysis method is used for image scanning Audio file: -Statistical analysis method can be used to detect audio steganography as it involves LSB modifications -The inaudible frequencies can be scanned for hidden information -The odd distortions and patterns in the audio graph indicate the existence of the secret data Video file: -Detection of the secret data in video files includes a combination of methods used in image and audio files

Cryptanalysis

The process of decrypting a message without knowing the cipher or key used to encrypt it.

Bypassing Passwords on Powered-Off Computers

What an investigator can do on a powered-off machine: -Bypass BIOS password -Bypass User Password by booting Live CD/USB

What happens when a file is deleted in Windows

When a user deletes a file, the OS does not actually delete the file, but marks the file name in the Master File Table (MFT) with a special character. This character represents that the space once occupied by the file is ready for use. FAT- the OS replaces the first letter of the deleted filename with E5H. Corresponding clusters of that file are marked unused, even though they are not empty. Until these clusters are overwritten, the file can still be recovered. NTFS- marks the index field in the MFT with a special code. The computer now looks at the clusters occupied by that file as being empty. Until these clusters are overwritten, the file can be recovered Recycle Bin- place to store files that are marked for deletion. The exceptions are large files and files from removable media.

$Bitmap file

a record of all used and unused clusters

Anti-Forensics

a set of techniques aimed at complicating or preventing a proper forensics investigation process

File header

a signature (also known as a magic number), which is a constant numeric or text value that determines a file format

File Carving

a technique used to recover files or fragments of files when corrupted, missing or purposely deleted.


संबंधित स्टडी सेट्स

Exam Simulator Chemistry Questions

View Set

Authorship of Ephesians, the Pastorals and 2 Peter

View Set

Primerica: Life Insurance Basics

View Set

ASSESSMENT 1 PRE PROCTORIO FUNDAMENTALS (NURS 100)

View Set

Changes in Period and Phase Shift of Sine and Cosine Functions Assignment

View Set