Listen to a recent interview with Richard Bejtlich, author of Extrusion Detection: Security Monitoring for Internal Intrusions, Real Digital Forensics: Computer Security and Incident Response, and The Tao of Network Security Monitoring: Beyond Intrusion Detection. Listen to the podcast now.
You can't succeed in the field of computer forensics without hands-on practiceand you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice.
From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software.
You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.
Inside, you will find in-depth information on the following areas:
Responding to live incidents in both Windows and Unix environments
Determining whether an attack has actually occurred
Assembling a toolkit you can take to the scene of a computer-related crime
Analyzing volatile data, nonvolatile data, and files of unknown origin
Safely performing and documenting forensic duplications
Collecting and analyzing network-based evidence in Windows and Unix environments
Reconstructing Web browsing, e-mail activity, and Windows Registry changes
Tracing domain name ownership and the source of e-mails
Duplicating and analyzing the contents of PDAs and flash memory devices
The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting.
© Copyright Pearson Education. All rights reserved.
About the Authors.
I. LIVE INCIDENT RESPONSE.
1. Windows Live Response.
2. Unix Live Response.
II. NETWORK-BASED FORENSICS.
3. Collecting Network-Based Evidence.
4. Analyzing Network-Based Evidence for a Windows Intrusion.
5. Analyzing Network-Based Evidence for a Unix Intrusion.
III. ACQUIRING A FORENSIC DUPLICATION.
6. Before You Jump Right In...
7. Commercial-Based Forensic Duplications.
8. Noncommercial-Based Forensic Duplications.
IV. FORENSIC ANALYSIS TECHNIQUES.
9. Common Forensic Analysis Techniques.
10. Web Browsing Activity Reconstruction.
11. E-Mail Activity Reconstruction.
12. Microsoft Windows Registry Reconstruction.
13. Forensic Tool Analysis: An Introduction to Using Linux for Analyzing Files of Unknown Origin.
14. Forensic Tool Analysis: A Hands-On Analysis of the Linux File aio.
15. Forensic Tool Analysis: Analyzing Files of Unknown Origin (Windows).
V. CREATING A COMPLETE FORENSIC TOOL KIT.
16. Building the Ultimate Response CD.
17. Making Your CD-ROM a Bootable Environment.
VI. MOBILE DEVICE FORENSICS.
18. Forensic Duplication and Analysis of Personal Digital Assistants.
19. Forensic Duplication of USB and Compact Flash Memory Devices.
20. Forensic Analysis of USB and Compact Flash Memory Devices.
VII. ONELINE-BASED FORENSCIS.
21. Tracing E-Mail.
22. Domain Name Ownership.
Appendix: An Introduction to Perl.
Most of the scenarios you will find throughout this book are very similar to types of cases we investigate every day. We used the same tools attackers use when establishing a foothold in your network, the same methods rogue employees make use of to steal your trade secrets, and used the same media we typically collect when we created the evidence files found on the DVD. Although we attempted to thoroughly investigate each company name we used for our scenarios, we want to state that none of this data was collected from computers within companies with coincidentally similar names or IP addresses.
The book begins by presenting methodologies used for the collection and analysis of computer forensic data. Then, the book presents methods for compiling toolkits you can take with you to the scene of a computer related crime. The book concludes by providing methodologies for deeper forensic analysis and solutions for when you run into other types of computer media such as USB memory and Palm devices.
While computer forensic software tends to be commercially dominated, which means you would have to pay a hefty licensing fee just to get your feet wet, we wholeheartedly believe in open source because of the documented methodologies and availability of the source code. Reproducibility and documentation of methodologies is the corner stone to any forensic science. Therefore, you will find most techniques we recommend utilize a freely available and publicly documented toolset. That will allow you to examine the evidence found on the DVD without having to purchase additional software. When we do talk about commercial software to help round out your knowledge base, we will point it out in the text so that you are fully aware.
You will find that this book will take a practical hands-on approach to solving problems we frequently encounter when performing computer related investigations. This book will not contain pages and pages about the theory of computer forensics. What it will contain are techniques you can employ immediately to solve your problems when performing an analysis. We hope you enjoy the Real Digital Forensics experience.
mount /dev/cdrom /mnt/realdigitalforensics
Off of the DVD root directory you will find another directory named after the scenario. Typically this directory has the same name as the victim company's name. For example, to find the "JBR Bank's Intrusion" scenario, you would navigate to the "jbr_bank" directory on the DVD. Within the scenario directory you will find more subdirectories. Each subdirectory contains a particular type of evidence that the investigator collected. If the investigator acquired a forensic duplication, you can find the corresponding data in the "forensic_duplication" directory. If the responder performed a live response, the "live_response" directory will contain the relevant data, and so on.
Most of the data on the DVD is stored in native format. The live response data is plain text, memory dumps are binary files, and so on. When you want to examine a forensic duplication you will notice that the files are compressed. This was done because the duplications can be up to four gigabytes in size when they are uncompressed, and would not fit on a single DVD. Therefore, be warned you may want to have ten to twenty gigabytes of working room on your hard drive when you analyze this evidence. To analyze a forensic duplication, you must first copy the evidence from the DVD to your local hard drive and uncompress the duplication. The forensic duplications can be uncompressed with Winzip (www.winzip.com) in Windows or unzip/gzip in Unix.
The data on the DVD represents our best efforts to mirror the real world scenarios we encounter every day. We were forced, unfortunately, to perform some post processing so that we did not distribute copies of commercial software. Therefore, some system related files on the victim machines containing the Windows operating system had zeros written over it. The original size of the file and directory structure we kept "as is" to simulate a real machine.
With what we said in mind, please load up your DVD and follow along with our many examples. We invite you to visit our web site, http://www.realdigitialforensics.com, for updates to the text, links to forensics tools, and other information to make your incident response and forensics duties pleasurable.
We would not be where we are now if we forgot to acknowledge our families for their understanding throughout the process: Keith J. Jones: Andrea Carol (my beautiful wife), Aiden Christopher (my toddler who has already learned how to hunt big game), and Madeleine Leslie (my silent and stealthy infant); Richard Bejtlich: Amy and Elise Bejtlich; Curtis W. Rose: XXXXX.
And I, Keith J. Jones, am humbled to thank and work with the brilliant Richard Bejtlich and Curtis Rose. I want to thank both of these authors for taking time out of their personal lives to work on this project. I have learned a lot of what I know now about computer forensics from each of these individuals.
- Keith J. Jones
"To my wife Amy and our daughter Elise: thank you for reminding me that family is all that remains when careers and computers are put in proper perspective."
Curtis W. Rose
Download the Index
file related to this title.