51,99 €
An explanation of the basic principles of data This book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operation system or environment, thus it is applicable to all work environments, cyber investigation scenarios, and technologies. The text is written in a step-by-step manner, beginning with the elementary building blocks of data progressing upwards to the representation and storage of information. It inlcudes practical examples and illustrations throughout to guide the reader.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 432
Veröffentlichungsjahr: 2012
Contents
Preface
Acknowledgments
Chapter One: The Fundamentals of Data
Base 2 Numbering System: Binary and Character Encoding
Communication in a Two-State Universe
Electricity and Magnetism
Building Blocks: The Origins of Data
Growing the Building Blocks of Data
Moving Beyond Base 2
American Standard Code for Information Interchange
Character Codes: The Basis for Processing Textual Data
Extended ASCII and Unicode
Summary
Notes
Chapter Two: Binary to Decimal
American Standard Code for Information Interchange
Computer as a Calculator
Why is this Important in Forensics?
Data Representation
Converting Binary to Decimal
Conversion Analysis
A Forensic Case Example: An Application of the Math
Decimal to Binary: Recap for Review
Summary
Chapter Three: The Power of HEX: Finding Slivers of Data
What the HEX?
Bits and Bytes and Nibbles
Nibbles and Bits
Binary to HEX Conversion
Binary (HEX) Editor
The Needle within the Haystack
Summary
Notes
Chapter Four: Files
Opening
Files, File Structures, and File Formats
File Extensions
Changing a File’s Extension to Evade Detection
Files and the HEX Editor
File Signature
ASCII is not Text or HEX
Value of File Signatures
Complex Files: Compound, Compressed, and Encrypted Files
Why do Compound Files Exist?
Compressed Files
Forensics and Encrypted Files
The Structure of Ciphers
Summary
Notes
Appendix 4A: Common File Extensions
Appendix 4B: File Signature Database
Appendix 4C: Magic Number Definition
Appendix 4D: Compound Document Header
Chapter Five: The Boot Process and the Master Boot Record (MBR)
Booting Up
Primary Functions of the Boot Process
Forensic Imaging and Evidence Collection
Summarizing the BIOS
BIOS Setup Utility: Step by Step
The Master Boot Record (MBR)
Partition Table
Hard Disk Partition
Summary
Notes
Chapter Six: Endianness and the Partition Table
The Flavor of Endianness
Endianness
The Origins of Endian
Partition Table within the Master Boot Record
Summary
Notes
Chapter Seven: Volume versus Partition
Tech Review
Cylinder, Head, Sector, and Logical Block Addressing
Volumes and Partitions
Summary
Notes
Chapter Eight: File Systems—FAT 12/16
Tech Review
File Systems
Metadata
File Allocation Table (FAT) File System
Slack
HEX Review Note
Directory Entries
File Allocation Table (FAT)
How is Cluster Size Determined?
Expanded Cluster Size
Directory Entries and the FAT
FAT Filing System Limitations
Directory Entry Limitations
Summary
Appendix 8A: Partition Table Fields
Appendix 8B: File Allocation Table Values
Appendix 8C: Directory Entry Byte Offset Description
Appendix 8D: FAT 12/16 Byte Offset Values
Appendix 8E: FAT 32 Byte Offset Values
Appendix 8F: The Power of 2
Chapter Nine: File Systems—NTFS and Beyond
New Technology File System
Partition Boot Record
Master File Table
NTFS Summary
exFAT
Alternative Filing System Concepts
Summary
Notes
Appendix 9A: Common NTFS System Defined Attributes
Chapter Ten: Cyber Forensics: Investigative Smart Practices
The Forensic Process
Forensic Investigative Smart Practices
Time
Summary
Note
Chapter Eleven: Time and Forensics
What is Time?
Network Time Protocol
Timestamp Data
Keeping Track of Time
Clock Models and Time Bounding: The Foundations of Forensic Time
MS-DOS 32-Bit Timestamp: Date and Time
Date Determination
Time Determination
Time Inaccuracy
Summary
Notes
Chapter Tweleve: Investigation: Incident Closure
Forensic Investigative Smart Practices
Step 5: Investigation (Continued)
Step 6: Communicate Findings
Characteristics of a Good Cyber Forensic Report
Report Contents
Step 7: Retention and Curation of Evidence
Step 8: Investigation Wrap-Up and Conclusion
Investigator’s Role as an Expert Witness
Summary
Notes
Chapter Thirteen: A Cyber Forensic Process Summary
Binary
Binary—Decimal—ASCII
Data Versus Code
HEX
From Raw Data to Files
Accessing Files
Endianness
Partitions
File Systems
Time
The Investigation Process
Summary
Appendix
Glossary
About the Authors
Index
Founded in 1807, John Wiley & Sons is the oldest independent publishing company in the United States. With offices in North America, Europe, Asia, and Australia, Wiley is globally committed to developing and marketing print and electronic products and services for our customers’ professional and personal knowledge and understanding.
The Wiley Corporate F&A series provides information, tools, and insights to corporate professionals responsible for issues affecting the profitability of their company, from accounting and finance to internal controls and performance management.
Copyright © 2012 by John Wiley & Sons, Inc. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. For more information about Wiley products, visit our web site at www.wiley.com.
Library of Congress Cataloging-in-Publication Data:
Marcella, Albert J.
Cyber forensics : from data to digital evidence / Albert J. Marcella, PhD, CISA, CISM, Frederic Guillossou, CISSP, CCE.
pages cm.—(The Wiley Corporate F&A series)
Includes index.
ISBN 978-1-118-27366-1 (hardback); ISBN 978-1-118-28268-7 (ebk); ISBN 978-1-118-28505-3 (ebk); ISBN 978-1-118-28731-6 (ebk)
1. Forensic sciences—Technological innovations. 2. Electronic evidence. 3. Evidence, Criminal. 4. Criminal investigation. 5. Computer crimes—Investigation. I. Guillossou, Frederic, 1970 - II. Title.
HV8073.5.M168 2012
363.250285—dc23 2011048568
Al Marcella
To my wife
Diane . . . .
A sunbeam to warm you,
A moonbeam to charm you,
A sheltering angel, so nothing can harm you.
May you always know how happy you make me, and how much I love you! Love doesn’t make the world go round; love is what makes the ride worthwhile.
Thank you for sharing with me, the ride of a lifetime.
∞ + 1
Fredric Guillossou
To my wife and daughter
Alexandra and Nathalie
The happy memories of the past, the joyful moments of the present, and the hope and promise of the future.
Preface
THE ROLE AND RESPONSIBILITY of a cyber forensic investigator is to accurately report upon actions taken to expertly identify, extract, and analyze those data that will ultimately represent evidential matter as part of an investigation of an individual who is suspected of engaging in unauthorized activities.
As an expert, a cyber forensic investigator who heavily relies upon the automated, generated results of a forensic software tool, without an intimate knowledge of how the results have been achieved, is risking not only his or her professional reputation but also the potential of a successful outcome to an investigation.
Data, the primordial building blocks of information as we know it, begins life as nothing more than electrical impulses representing an existence or lack thereof, of an electrical charge. Knowing just how these pulses end up as data, and how these data then end up as potential evidence, is an essential skill for a cyber forensic investigator.
The evolution of bits and bytes into data and finally into human-understandable text is not rocket science; somewhat technical yes, but not beyond the reach or understanding of the professional looking to gain a greater understanding of HOW data become digital forensic evidence, WHERE to look for this evidence, buried beneath hundreds of millions of bytes of data, and WHY specific data may lead the investigator to the proverbial “smoking gun.”
In communicating the results of a cyber forensic investigation, responding to the question “How did you identify the specific data you examined to reach your conclusion?” by eluding to your use of a specific cyber forensic tool without a thorough understanding of how that tool “achieved” its answer, could be professionally dangerous.
Reliance on the software to produce an answer, without a solid understanding of the HOWs, WHATs, WHYs, and the theory and logic behind how the answer was attained is akin to submitting all of the correct answers to a mathematics exam and failing, because you did not show your work. Knowing the answer without knowing how you achieved the answer or how to explain how the answer was achieved is having only half of a solution.
The book you are about to read will provide you with the specific knowledge to speak confidently about the validity of the data identified, accessed, and analyzed as part of a comprehensive cyber forensic investigation.
We start small, in fact very small . . . bits and bytes small, explaining the origins of data and progressing onward, addressing concepts related to data storage, boot records, partitions, volumes, and file systems, and how each of these are interrelated and essential in a cyber forensic investigation. The role each plays in an investigation and what type of evidential data may be identified within each of these areas.
Also addressed are two often overlooked topics which impact almost every cyber-based investigation: endianness and time. Each of these topics rightly deserve their own chapter and are discussed in-depth with respect to their impact and influence on data and ultimately on the identification of digital evidence.
In an effort to more effectively introduce specific information technology (IT) and cyber forensic concepts and discuss critical cyber forensic processes, we proudly introduce Ronelle Sawyer and Jose McCarthy, employees who become involved in the theft of intellectual property.
Ronelle and Jose’s activities and actions are discussed throughout the book as an ongoing case, designed to provide the reader with specific examples of the application of the cyber forensic concepts discussed throughout the 12 primary chapters of this book. Although the case and characters are fictitious, the scenario presented is not.
Along with this case, we have developed and present an exemplar forensic investigation report (Forensic Investigations, ABC Inc.), which appears as an Appendix to this book. This exemplar report provides the reader with a basic forensic report template, which summarizes the forensic investigation and case data as it would be compiled for submission to a respective authorized recipient. We realize that there are many varied ways in which the results of an investigation may be compiled and presented; the report included herein is an example of one such way.
While each investigation is unique, there will be similarities and as each case is unique on to itself, a generalized investigation approach can be constructed. We have provided you, the reader, with generalized Investigative Smart Practices (ISPs) as you hone and develop your individualistic investigative processes. These are not “best practices,” but “smart practices” steps, procedures, and actions, which in general, can be applied to most cyber forensic case/investigations.
It would be illogical to try to present an investigative procedure or methodology and claim that it is universal, that it can be applied in all instances under all circumstances. As such, our ISPs cast the widest net and are applicable to most general investigative cases. It is up to you the reader to add to this base, adding specific, specialized company, department, or agency steps and procedures, which will result in a uniquely identifiable case-by-case investigative process.
Regardless of your confidence in the data identified via your investigative efforts or through the use of any specific or generalized cyber forensic software, take to heart the Russian proverb, “doveryai, no proveryai,” made famous by the late Ronald Reagan: “trust but verify!”
This book will provide you with a comprehensive examination and discussion of the science of cyber forensic investigations, what is happening behind the scenes to data and why, what to look for and where to find it . . . progressing logically, from data to digital evidence.
Al Marcella and Fred Guillossou
Acknowledgments
AS AUTHORS, LET’S be frank: It is almost impossible to be fully honest when assessing one’s own work. It’s also impossible to be fully independent or even neutral when attempting to assess or evaluate what one has written, no matter how hard one tries.
Thus, to remedy this truism, we, as most dedicated authors, reach out to colleagues, peers, and sometimes even to strangers (well, the publisher does) to provide us with a truly independent assessment and review of what we have written.
This assessment can occur at various stages of the development of a book, such as the one you are about to read, in segments or chapters, during its formative development stages, as a completed, draft manuscript or even once the last keystroke has been struck and development is finalized.
To achieve this sought after assessment, we have reached out to individuals whom we respect, asking them to critically review our work and to provide us with the benefit of their expertise and extensive knowledge in the fields of cyber forensics, audit, information technologies, e-discovery, and investigative sciences, as they critiqued the book you are about to read.
We are thankful for their assessment and suggestions for improvement, as they have provided us with valuable insights into refining our text and providing you the reader, with the most accurate and technically current material related to the emerging and evolving field of cyber forensic investigation and analysis.
While it is not possible to individually acknowledge all of the reviewers who have assessed our work, as some will forever remain anonymous, the authors would like to personally thank the following individuals for their insights, time, and involvement in making our development efforts result in a better overall examination and presentation of the science of cyber forensics.
To the following professionals, we say a heartfelt thank you . . .
Don Caniglia, CEGIT, CISA, CISM, FLMI
President
IT Risk Management Services, LLC
Richard J. Dippel, JD, MBA, CPA
Assistant Professor of Accounting
George Herbert Walker School of Business & Technology
Webster University
Linda C. Ertel, CISA
Security Compliance Analyst
Independent Reviewer
Steve Grimm
Webster Groves Police Department Detective
The Greater St. Louis Regional Computer Crime Education and Enforcement Group
Detective Andy Hrenak, CFCE/A+/ACE/DFCB
Hazelwood Police Department
RCCEEG Forensic Examiner
Jeff Lukins, CISSP, CEH, MCSE, MSE
Deputy IT Sec. Mgr., NASA MITS
Dynetics Technical Services, Inc.
Doug Menendez, CISA, CIA
Audit Manager
Graybar Electric Company
Bruce Monahan, CIA, CISA, CFE, CPCU
Chief Audit Executive
Selective Insurance Group, Inc.
Greg Strauss, CCE
Computer Forensics Expert
Independent Reviewer
Although not reviewers, we also wish to thank Ronelle and Jose, for providing us with a more personal means by which we were able to convey technical, cyber forensic concepts through a realistic case example. Thank you both!
Sincerely,
Al Marcella, Ph.D., CISA, CISM
Frederic Guillossou, CISSP, CCE
CHAPTER ONE
The Fundamentals of Data
THIS BOOK IS DESIGNED to address the fundamental concepts found in the emerging and rapidly evolving field of cyber forensics.
Before one can profess to be knowledgeable and fully cognizant of the breadth encompassing the professional discipline of cyber forensics, a foundation, rooted in the basics of information technology, data storage, handling, and processing, as well as how data is moved and manipulated, is essential.
For the cyber forensic investigator, data is evidence. Understanding how evidence emerges from data is pivotal; however, more important is being able to confidently articulate how evidential data was identified, collected, and processed.
As a cyber forensic investigator, simply pressing buttons or checking off options in a forensic software suite, without the knowledge of what is happening behind the scenes, creates a potential liability. Understanding the “life cycle” of data is pivotal, from its humble beginnings as electronic bits, evolving into bytes, characters, then words, finally emerging as a language, as information, and perhaps eventually as evidence.
This book will provide a platform for both broadening as well as enhancing your skills in the basic elements of information technology as the technology supports and is embedded within the science of cyber forensic investigations.
As you read this book, you will encounter words that have been italicized. These words represent key concepts and are more fully defined by a working definition, which is included within a glossary at the end of the book. Should you desire an explanation of any italicized word, please refer to this glossary.
As with most tasks, one must crawl prior to walking and certainly before dashing off in a full run. Therefore, our first chapter begins naturally, at the beginning, with a discussion of the prime building blocks of data and how as a society we carbon-based humans have learned to communicate with a silicon-based technology—computers.
BASE 2 NUMBERING SYSTEM: BINARY AND CHARACTER ENCODING
Modern humans use character sets (or alphabets) to represent written sounds and words. In many alphabets, including Latin-based alphabets, each symbol or letter has its own phonetic sound.
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
