CFC Week 7: Memory and network forensics

CFC Week 7: Memory and network forensics

Learning outcomes

  • Define the fundamental aspects of computer and network forensics.
  • Describe the data collection processes through the different abstraction layers.
  • List the kind of evidence that can be obtained from volatile memory and non-persistent network data.

Device forensics

target the OS and the data structures present in the system

What are primary sources of evidence in device forensics?

are storage devices:

  1. Hard disk drives (HDDs)
  2. Solid state drives (SSDs)
  3. External media (USB sticks)

How to understand the data stored on devices?

Use Data abstraction layers:

  1. Physical media : - lowest level examinations

    • Access through host bus adapter (HBA) interface
    • which implement low-level operations: SATA and SCSI
  2. Block devices : block device is an abstract device of fixed size block

    use term sector as unites for magnetic hard disks

    Data acquisition at the block level is done through imaging

  3. File system : aims to organise the block storage into a file-based store

    provide files with attributes (name, size, owner, timestamps, access permissions, etc.)

  4. Application artefacts : where we find executable binaries, libraries, configuration and log files and registry entries

What is the physical data acquisition in device forensics?

is the process of obtaining data directly from hardware media,

without the mediation of any potentially untrusted third-party software

we also use logical data acquisitions which relies on one or more software layers as intermediaries

Characteristics of SSDs

SSDs use semiconductors to store data

two memory areas:

  1. one area is used to save data
  2. one area is used as a cache

SSD blocks need to be written twice in order to be reused:

  1. First write to reset the state
  2. Second write to store the data

File content carving

aims to recover the data by reassembling file contents from fragments

why this works? Most file formats have specific beginning and end tags

Four types of file content, require different carving approaches:

  1. Contiguous : The header of file A is followed by the contents of file A and ends with a footer of that file

  2. Nested : The header of file A is followed by a part of that file’s content, then the header of file B is present followed by the content and footer of that file. A finished after B.

  3. Bifragmented : The Header and some part of file A followed by some unrealted data then followed by remains

    The recovery of this file will depend on how easily the unrealted data is recognised

  4. Interleaved : The content of file A is mixed with File B, A finished before B

Why we are interested in doing Memory forensics?

Data can persist for quite a long time in volatile memory Volatile memory can contain useful information which hard disk does not (en/decryption key)

How to perform offline memory forensics

Freeze the RAM of a computer

What a forensic analyst must know about memory forensics?

  • What are the things that might change across time?
  • What are the things that will not?
  • How presenting evidence from memory can impact your investigation

What are the challenges behind live forensics?

  1. In live forensics, we’re unsure whether evidence will be accepted or not.
  2. Extract evidence from memory is not easy and takes long time

What does generally change?

Process information
identifying correlated user actions and file system activities, potentially demonstrating their intent
  • Running processes
  • Threads and loaded systems modules
  • Copy of the individual processes’ code, stack, heap, code and data segments
Artefacts and fragments
Caching disk and network data tends to leave traces in memory for a long time
File information
  • open files
  • shared libraries
  • shared memory
  • anonymously mapped memory
Network connections
  • closed network connections
  • protocol information
  • sending and receiving queues of data not yet send or delivered

Network forensics

monitor and analyse the computer network traffic for information gathering, legal evidence or intrusion detection

Why is the difference between network forensics with other digital forensics

  • network investigations focus on volatile and dynamic information

  • because network traffic is transmitted and then lost

  • Thus the data would be actively collected

What are two common scenarios in network forensics?

Security
  • monitor a network for anomalous traffic and identify intrusion.
  • when attacker has erased all log files on a compromised host
Law enforcement
  • reassemble transferred files
  • search for keywords
  • parse human communication

What are two strategies in network forensics?

  1. “catch-it-as-you-can”
    • all packets are captured and written to storage for analysis
    • require large amounts of storage
  2. “stop, look, listen”
    • each packet is analysed in a rudimentary way in memory
    • only certain meta information is saved
    • require more processing capabilities

What method we apply to network forensics on ethernet layer?

Use sniffer to eavedrop the beta stream: Wireshark and tcpdump

Wireless forensics

collect and analyse wireless network traffic that can correspond to plain data or with a broad usage of.

Licensed under CC BY-NC-SA 4.0
Last updated on May 07, 2022 17:16 +0100
comments powered by Disqus
Cogito, ergo sum
Built with Hugo
Theme Stack designed by Jimmy