SlideShare a Scribd company logo
1 of 28
Download to read offline
Forensic Challenges with Cloud Computing




Brent Muir - 2012
   Types of Cloud Computing
   Facing the Unknown – Backend Infrastructure
   Accessing the Cloud (remote, datacenters)
   Types of Data (VM filesystems, loose files,
    emails, etc)
   The “Grey” area – Jurisdiction and Legislation
   Forensically “sound” procedures (industry best
    practice)
   Real-world examples:
    ◦ Australian Cloud Storage Provide (CSP)
    ◦ Microsoft SkyDrive
   Recommendations
   Two types of Cloud technologies:

    ◦ Cloud Processing (e.g. Amazon EC2):
      Distributed processing power available on-demand that
       speeds up resource intensive procedures
         Examples: password cracking, video rendering

    ◦ Cloud Storage (e.g. Dropbox, SkyDrive, iCloud, etc):
      Remotely stored files that are available over the internet
       from any location without the need for localised storage
       solutions
         Examples: email, office documents, photos, videos

               Hybrid Mix:
Hybrid Mix:

◦ Cloud solutions that provide file storage and fully
  virtualised infrastructure to replace traditional
  hardware
  Example: Virtual Machines (VMs) hosted in the cloud
   Variety of hardware and infrastructure
    available to create a private cloud

   Depending on complicity of provider this may
    remain an unknown

   Depending on Persons Of Interest (POI)
    involved in investigation may require covert
    access
   Datacenters
    ◦ If local will be the fastest solution
         Requires assistance from host
         Using hosts infrastructure

   Remote
    ◦ Depending on host might not be possible to attend
      physical datacenter
       Accessing over the internet requires patience
         Slow
         Prone to drop-outs
       Possibility to “push” the content out of the cloud rather than
        pulling it down
         Requires assistance from host
         Using hosts infrastructure
   VM data
    ◦ Various file sytems (depending on OS involved)
      Common - FAT, NTFS, Ext2/3, HFS+
      Virtual – VMware FS, ReFS
      Disk Images: VMDK, VHD

   Loose files
    ◦ Graphic Files: JPG, GIF, PNG, PSD, etc
    ◦ Video Files: MP4, MOV, AVI, WMV, FLV, etc
    ◦ Document Files: DOC, PDF, XLS, PPT, etc

   Emails
    ◦ Varies depending on host provider
   CSP User Account Details
    ◦ Financial information used to create accounts (if
      applicable)
    ◦ Contact information

   Network Logs
    ◦ IP addresses of users/accounts
    ◦ Dates and times of logins
   Crimes committed over the internet?
    ◦ Who has jurisdiction?


   Geographical nature of “Cloud”
    ◦ Often replicated across various datacenters
    ◦ Not necessarily in same country as Person Of
      Interest (POI)
    ◦ Country (and CSP) hosting content may not have
      any legal requirement (or willingness) to cooperate
   Depends on countries involved
    ◦ Hosting content
    ◦ Where CSP business is registered


   Australia:
    ◦ Cybercrime Act 2001
      Schedule 1- Computer offences

    ◦ Criminal Code Act 1995
      478.1 Unauthorised access to, or modification of, restricted
       data
   Standard forensic procedure requires read-
    only access to potential evidence items
    ◦ No write-blocker for the internet
   Each Cloud host will have different
    infrastructure
   Emails: always ensure export type includes
    headers
   VMs: capture RAM, try to get VM HDD images
   Storage: Try to capture without modification
    of MAC times
   Logs: network
   Providing storage and
    processing services
    ◦ Including hybrid VM hosting
   Person Of Interest (POI) had multiple VMs
    hosted on service
    ◦ VMs running Windows Server 2008 R2

   CSP backend running Linux in datacenter
    ◦ Non-standard file system (which is common to
      datacenters due to size limitations of Ext2, Ext3,
      etc)
    ◦ Frontend running “Open Xen” control panel

   Initially given wrong address
    ◦ Warrant issued for business address, not datacenter
   VMs were running live
    ◦ Changed user credentials
    ◦ Captured RAM
      Over internet connection
      Utilised FTK Imager


   Limited tools available to CSP Admins from
    control panel
    ◦ While running live converted VMs to NTFSClone
      images as only available option
   Had to attend physical datacenter to retrieve
    converted images (NTFSClone) due to time
    constraints
    ◦ Alternative was to download over internet – very slow!


   NTFSClone is non-standard compressed image
    ◦ Inability to see MBR (partition only)
    ◦ Unable to be interpreted by any forensic suite
      Uncompressed image in Linux to standard partition
       ntfsclone --restore-image /dev/hda1/backup.img -o
       /dev/sdb1/backup.dd
   Also attempted to image VMs live via FTK
    Imager over internet connection
    ◦ Three VMs (20 GB each)
    ◦ Failed multiple times
    ◦ Very slow
      Gave up with partial images after 10 days (none
       completed correctly)
   Client originally after deleted contents from
    previously existing VMs
    ◦ POI was trashing VMs and creating new ones every
      2 weeks!

   CSP had no way of knowing what physical
    infrastructure previous VMs existed on
    ◦ Once deleted from system all resources reallocated
      to the “pool”
    ◦ All storage/processing allocated on the fly when
      end users setup a new VM
   CSP fully cooperative and willing to comply
    with warrant
    ◦ Handed over POIs content
      Due to the fact that POI had been paying for service
       with stolen credit card numbers

* Had it been another user who had purchased the
    services legitimately not sure if CSP would have been
    as cooperative
    ◦ Due to the fact that CSP had not broken any laws directly
    ◦ T&S and T&C negates legal liability (grey area of law
      which has not been challenged in court)
   Providing storage services
   25 GB plus an extra 5 GB of “synced” storage
    per account
   Ability to have unlimited accounts
    ◦ Potential to link accounts
    ◦ Share data across unlimited accounts
   POI storing illicit content (documents, photos
    & videos) and communications
   Unless “synced” nothing stored locally
    ◦ Not even “local” geographically speaking
      Content replicated across numerous Microsoft
       datacenters around the world
   POI popped-up during an investigation
    ◦ Admitted to having material and emails stored on
      SkyDrive
      Legally signed over account
   Email:
    ◦ Microsoft’s “Hotmail Connector” for Outlook
      Locally download all email and attachments to a PST
        PST can be imported into favourite forensic suite (X-Ways,
         EnCase, FTK, Nuix, etc)
    ◦ During email “sync” kept dropping out
      Had to be restarted numerous times before all content
    ◦ Contacted Microsoft Law Enforcement Portal to find
      alternative to Hotmail Connector
      None currently exists
   Other Content:
    ◦ 2 Options:
      Windows Live Mesh
        Sync folder/s and download content
          Can then be imaged or added to logical evidence container
          5GB limitation to content synced through Mesh


      Individually download each item through web browser
        Potentially affecting MAC times, but not metadata

      No other solution suggested by Microsoft Law
       Enforcement Portal
   Multi Lateral Agreements (MLAT)
    ◦ Send content host preservation notice
      Generally takes account/s offline
      Snapshot of all data taken

    ◦ Approximately 18 month process once paperwork
      is filed to receive content from host

    ◦ Must provide all paperwork in accordance with the
      host country (generally USA)
   Multi Lateral Agreements (MLAT)

                                       Local Agency




                                                               Attorney-General
                Microsoft
                                                               Department (ACT)




                      US Court Order                  USA Department
                         Produced                      of Justice (D0J)
   Use of standalone internet-enabled machine
    to capture remote content
    ◦ Forensically wiped upon job completion
   Preservation request sent to CSP (assuming
    legally compliant)
   Consult with technical people employed by
    CSP prior to “capture”
   Expect the unexpected: non-standard file
    systems (eg. Oracle FS)
   Choo, K. (2010) “Cloud computing: Challenges
    and future directions”, Trends & issues in crime
    and criminal justice no. 400,
    Australian Institute of Criminology.

   Lillard, Terrence (2010) Digital forensics for
    network, Internet, and cloud computing,
    Syngress, USA.

   Martini, B. & Choo, K. (2012) “An integrated
    conceptual digital forensic framework for cloud
    computing”, Digital Investigation, Volume 9,
    Issue 2, November 2012, Pages 71–80.
   Criminal Code Act 1995

   Cybercrime Act 2001

   Telecommunications (Interception) Act 1979
Trying to bottle the cloud   forensic challenges with cloud computing

More Related Content

What's hot

2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - publicSandro Suffert
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011CTIN
 
us-16-Nipravsky-Certificate-Bypass-Hiding-And-Executing-Malware-From-A-Digita...
us-16-Nipravsky-Certificate-Bypass-Hiding-And-Executing-Malware-From-A-Digita...us-16-Nipravsky-Certificate-Bypass-Hiding-And-Executing-Malware-From-A-Digita...
us-16-Nipravsky-Certificate-Bypass-Hiding-And-Executing-Malware-From-A-Digita...Tom Nipravsky
 
Cloudoc against ransomware_Eng
Cloudoc against ransomware_EngCloudoc against ransomware_Eng
Cloudoc against ransomware_Engsang yoo
 
Foundation of Digital Forensics
Foundation of Digital ForensicsFoundation of Digital Forensics
Foundation of Digital ForensicsVictor C. Sovichea
 
Leveraging NTFS Timeline Forensics during the Analysis of Malware
Leveraging NTFS Timeline Forensics during the Analysis of MalwareLeveraging NTFS Timeline Forensics during the Analysis of Malware
Leveraging NTFS Timeline Forensics during the Analysis of Malwaretmugherini
 
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cOracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cNabeel Yoosuf
 
Memory Forensic - Investigating Memory Artefact
Memory Forensic - Investigating Memory ArtefactMemory Forensic - Investigating Memory Artefact
Memory Forensic - Investigating Memory ArtefactSatria Ady Pradana
 
Transparent Data Encryption
Transparent Data EncryptionTransparent Data Encryption
Transparent Data EncryptionJohn Magnabosco
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answerssankar palla
 
Encase Forensic
Encase ForensicEncase Forensic
Encase ForensicMegha Sahu
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletionsnehal1010
 
Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)James Konol
 
Active directory job_interview_preparation_guide
Active directory job_interview_preparation_guideActive directory job_interview_preparation_guide
Active directory job_interview_preparation_guideabdulkalamattari
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletionvitam,berhampur
 

What's hot (20)

2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public
 
Windows registry forensics
Windows registry forensicsWindows registry forensics
Windows registry forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
us-16-Nipravsky-Certificate-Bypass-Hiding-And-Executing-Malware-From-A-Digita...
us-16-Nipravsky-Certificate-Bypass-Hiding-And-Executing-Malware-From-A-Digita...us-16-Nipravsky-Certificate-Bypass-Hiding-And-Executing-Malware-From-A-Digita...
us-16-Nipravsky-Certificate-Bypass-Hiding-And-Executing-Malware-From-A-Digita...
 
Ntfs forensics
Ntfs forensicsNtfs forensics
Ntfs forensics
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
Ten Myths About Recovery Deleted Files
Ten Myths About Recovery Deleted FilesTen Myths About Recovery Deleted Files
Ten Myths About Recovery Deleted Files
 
Cloudoc against ransomware_Eng
Cloudoc against ransomware_EngCloudoc against ransomware_Eng
Cloudoc against ransomware_Eng
 
Foundation of Digital Forensics
Foundation of Digital ForensicsFoundation of Digital Forensics
Foundation of Digital Forensics
 
Leveraging NTFS Timeline Forensics during the Analysis of Malware
Leveraging NTFS Timeline Forensics during the Analysis of MalwareLeveraging NTFS Timeline Forensics during the Analysis of Malware
Leveraging NTFS Timeline Forensics during the Analysis of Malware
 
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cOracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12c
 
Memory Forensic - Investigating Memory Artefact
Memory Forensic - Investigating Memory ArtefactMemory Forensic - Investigating Memory Artefact
Memory Forensic - Investigating Memory Artefact
 
Transparent Data Encryption
Transparent Data EncryptionTransparent Data Encryption
Transparent Data Encryption
 
Windows Registry
Windows RegistryWindows Registry
Windows Registry
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answers
 
Encase Forensic
Encase ForensicEncase Forensic
Encase Forensic
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)
 
Active directory job_interview_preparation_guide
Active directory job_interview_preparation_guideActive directory job_interview_preparation_guide
Active directory job_interview_preparation_guide
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 

Viewers also liked

Malware SPAM - March 2013
Malware SPAM - March 2013Malware SPAM - March 2013
Malware SPAM - March 2013Brent Muir
 
Booting an image as a forensically sound vm in virtual box
Booting an image as a forensically sound vm in virtual boxBooting an image as a forensically sound vm in virtual box
Booting an image as a forensically sound vm in virtual boxBrent Muir
 
Malware SPAM - January 2013
Malware SPAM - January 2013Malware SPAM - January 2013
Malware SPAM - January 2013Brent Muir
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsBrent Muir
 
Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0Brent Muir
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5Brent Muir
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolBrent Muir
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingBrent Muir
 
Malware Spam February 2013
Malware Spam February 2013Malware Spam February 2013
Malware Spam February 2013Brent Muir
 
Cloud Computing Forensic Science
 Cloud Computing Forensic Science  Cloud Computing Forensic Science
Cloud Computing Forensic Science David Sweigert
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersBrent Muir
 
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Manoj Kumar
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloudAzure Group
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 

Viewers also liked (20)

Malware SPAM - March 2013
Malware SPAM - March 2013Malware SPAM - March 2013
Malware SPAM - March 2013
 
Booting an image as a forensically sound vm in virtual box
Booting an image as a forensically sound vm in virtual boxBooting an image as a forensically sound vm in virtual box
Booting an image as a forensically sound vm in virtual box
 
Malware SPAM - January 2013
Malware SPAM - January 2013Malware SPAM - January 2013
Malware SPAM - January 2013
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
 
Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage Tool
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
 
Malware Spam February 2013
Malware Spam February 2013Malware Spam February 2013
Malware Spam February 2013
 
Cloud Computing Forensic Science
 Cloud Computing Forensic Science  Cloud Computing Forensic Science
Cloud Computing Forensic Science
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
 
The Cloud: Privacy and Forensics
The Cloud: Privacy and ForensicsThe Cloud: Privacy and Forensics
The Cloud: Privacy and Forensics
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloud
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 

Similar to Trying to bottle the cloud forensic challenges with cloud computing

219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptxSachinGosavi15
 
The State of Decentralized Storage
The State of Decentralized StorageThe State of Decentralized Storage
The State of Decentralized StorageCoinGecko
 
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICXPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICThe Linux Foundation
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackAjinkya Nikam
 
PyConline AU 2021 - Things might go wrong in a data-intensive application
PyConline AU 2021 - Things might go wrong in a data-intensive applicationPyConline AU 2021 - Things might go wrong in a data-intensive application
PyConline AU 2021 - Things might go wrong in a data-intensive applicationHua Chu
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
User Focused Security at Netflix: Stethoscope
User Focused Security at Netflix: StethoscopeUser Focused Security at Netflix: Stethoscope
User Focused Security at Netflix: StethoscopeJesse Kriss
 
DV01 Ten Things You Always Wanted to Know About Windows Azure But Were Afraid...
DV01 Ten Things You Always Wanted to Know About Windows Azure But Were Afraid...DV01 Ten Things You Always Wanted to Know About Windows Azure But Were Afraid...
DV01 Ten Things You Always Wanted to Know About Windows Azure But Were Afraid...Ronald Widha
 
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...John Bambenek
 
Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsBob Marcus
 
Internet of Things and Edge Compute at Chick-fil-A
Internet of Things and Edge Compute at Chick-fil-AInternet of Things and Edge Compute at Chick-fil-A
Internet of Things and Edge Compute at Chick-fil-ABrian Chambers
 
Bitcoin blockchains and distributed satellite management control
Bitcoin blockchains and distributed satellite management controlBitcoin blockchains and distributed satellite management control
Bitcoin blockchains and distributed satellite management controlramycaspi
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Egress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data ExfiltrationEgress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data ExfiltrationCTruncer
 
Ravi ubana presentation on cloud
Ravi ubana presentation on cloudRavi ubana presentation on cloud
Ravi ubana presentation on cloudRavi Ubana
 
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgradeNext generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgradeJisc
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataInderjeet Singh
 
UWP apps development - Part 3
UWP apps development - Part 3UWP apps development - Part 3
UWP apps development - Part 3Jiri Danihelka
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeekNightHyderabad
 

Similar to Trying to bottle the cloud forensic challenges with cloud computing (20)

219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
 
The State of Decentralized Storage
The State of Decentralized StorageThe State of Decentralized Storage
The State of Decentralized Storage
 
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICXPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 
PyConline AU 2021 - Things might go wrong in a data-intensive application
PyConline AU 2021 - Things might go wrong in a data-intensive applicationPyConline AU 2021 - Things might go wrong in a data-intensive application
PyConline AU 2021 - Things might go wrong in a data-intensive application
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
User Focused Security at Netflix: Stethoscope
User Focused Security at Netflix: StethoscopeUser Focused Security at Netflix: Stethoscope
User Focused Security at Netflix: Stethoscope
 
DV01 Ten Things You Always Wanted to Know About Windows Azure But Were Afraid...
DV01 Ten Things You Always Wanted to Know About Windows Azure But Were Afraid...DV01 Ten Things You Always Wanted to Know About Windows Azure But Were Afraid...
DV01 Ten Things You Always Wanted to Know About Windows Azure But Were Afraid...
 
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
 
Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical Systems
 
Internet of Things and Edge Compute at Chick-fil-A
Internet of Things and Edge Compute at Chick-fil-AInternet of Things and Edge Compute at Chick-fil-A
Internet of Things and Edge Compute at Chick-fil-A
 
Bitcoin blockchains and distributed satellite management control
Bitcoin blockchains and distributed satellite management controlBitcoin blockchains and distributed satellite management control
Bitcoin blockchains and distributed satellite management control
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Egress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data ExfiltrationEgress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data Exfiltration
 
Ravi ubana presentation on cloud
Ravi ubana presentation on cloudRavi ubana presentation on cloud
Ravi ubana presentation on cloud
 
Mis05
Mis05Mis05
Mis05
 
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgradeNext generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
UWP apps development - Part 3
UWP apps development - Part 3UWP apps development - Part 3
UWP apps development - Part 3
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 

Trying to bottle the cloud forensic challenges with cloud computing

  • 1. Forensic Challenges with Cloud Computing Brent Muir - 2012
  • 2. Types of Cloud Computing  Facing the Unknown – Backend Infrastructure  Accessing the Cloud (remote, datacenters)  Types of Data (VM filesystems, loose files, emails, etc)  The “Grey” area – Jurisdiction and Legislation  Forensically “sound” procedures (industry best practice)  Real-world examples: ◦ Australian Cloud Storage Provide (CSP) ◦ Microsoft SkyDrive  Recommendations
  • 3. Two types of Cloud technologies: ◦ Cloud Processing (e.g. Amazon EC2):  Distributed processing power available on-demand that speeds up resource intensive procedures  Examples: password cracking, video rendering ◦ Cloud Storage (e.g. Dropbox, SkyDrive, iCloud, etc):  Remotely stored files that are available over the internet from any location without the need for localised storage solutions  Examples: email, office documents, photos, videos Hybrid Mix:
  • 4. Hybrid Mix: ◦ Cloud solutions that provide file storage and fully virtualised infrastructure to replace traditional hardware  Example: Virtual Machines (VMs) hosted in the cloud
  • 5. Variety of hardware and infrastructure available to create a private cloud  Depending on complicity of provider this may remain an unknown  Depending on Persons Of Interest (POI) involved in investigation may require covert access
  • 6. Datacenters ◦ If local will be the fastest solution  Requires assistance from host  Using hosts infrastructure  Remote ◦ Depending on host might not be possible to attend physical datacenter  Accessing over the internet requires patience  Slow  Prone to drop-outs  Possibility to “push” the content out of the cloud rather than pulling it down  Requires assistance from host  Using hosts infrastructure
  • 7. VM data ◦ Various file sytems (depending on OS involved)  Common - FAT, NTFS, Ext2/3, HFS+  Virtual – VMware FS, ReFS  Disk Images: VMDK, VHD  Loose files ◦ Graphic Files: JPG, GIF, PNG, PSD, etc ◦ Video Files: MP4, MOV, AVI, WMV, FLV, etc ◦ Document Files: DOC, PDF, XLS, PPT, etc  Emails ◦ Varies depending on host provider
  • 8. CSP User Account Details ◦ Financial information used to create accounts (if applicable) ◦ Contact information  Network Logs ◦ IP addresses of users/accounts ◦ Dates and times of logins
  • 9. Crimes committed over the internet? ◦ Who has jurisdiction?  Geographical nature of “Cloud” ◦ Often replicated across various datacenters ◦ Not necessarily in same country as Person Of Interest (POI) ◦ Country (and CSP) hosting content may not have any legal requirement (or willingness) to cooperate
  • 10. Depends on countries involved ◦ Hosting content ◦ Where CSP business is registered  Australia: ◦ Cybercrime Act 2001  Schedule 1- Computer offences ◦ Criminal Code Act 1995  478.1 Unauthorised access to, or modification of, restricted data
  • 11. Standard forensic procedure requires read- only access to potential evidence items ◦ No write-blocker for the internet  Each Cloud host will have different infrastructure  Emails: always ensure export type includes headers  VMs: capture RAM, try to get VM HDD images  Storage: Try to capture without modification of MAC times  Logs: network
  • 12. Providing storage and processing services ◦ Including hybrid VM hosting
  • 13. Person Of Interest (POI) had multiple VMs hosted on service ◦ VMs running Windows Server 2008 R2  CSP backend running Linux in datacenter ◦ Non-standard file system (which is common to datacenters due to size limitations of Ext2, Ext3, etc) ◦ Frontend running “Open Xen” control panel  Initially given wrong address ◦ Warrant issued for business address, not datacenter
  • 14. VMs were running live ◦ Changed user credentials ◦ Captured RAM  Over internet connection  Utilised FTK Imager  Limited tools available to CSP Admins from control panel ◦ While running live converted VMs to NTFSClone images as only available option
  • 15. Had to attend physical datacenter to retrieve converted images (NTFSClone) due to time constraints ◦ Alternative was to download over internet – very slow!  NTFSClone is non-standard compressed image ◦ Inability to see MBR (partition only) ◦ Unable to be interpreted by any forensic suite  Uncompressed image in Linux to standard partition ntfsclone --restore-image /dev/hda1/backup.img -o /dev/sdb1/backup.dd
  • 16. Also attempted to image VMs live via FTK Imager over internet connection ◦ Three VMs (20 GB each) ◦ Failed multiple times ◦ Very slow  Gave up with partial images after 10 days (none completed correctly)
  • 17. Client originally after deleted contents from previously existing VMs ◦ POI was trashing VMs and creating new ones every 2 weeks!  CSP had no way of knowing what physical infrastructure previous VMs existed on ◦ Once deleted from system all resources reallocated to the “pool” ◦ All storage/processing allocated on the fly when end users setup a new VM
  • 18. CSP fully cooperative and willing to comply with warrant ◦ Handed over POIs content  Due to the fact that POI had been paying for service with stolen credit card numbers * Had it been another user who had purchased the services legitimately not sure if CSP would have been as cooperative ◦ Due to the fact that CSP had not broken any laws directly ◦ T&S and T&C negates legal liability (grey area of law which has not been challenged in court)
  • 19. Providing storage services  25 GB plus an extra 5 GB of “synced” storage per account  Ability to have unlimited accounts ◦ Potential to link accounts ◦ Share data across unlimited accounts
  • 20. POI storing illicit content (documents, photos & videos) and communications  Unless “synced” nothing stored locally ◦ Not even “local” geographically speaking  Content replicated across numerous Microsoft datacenters around the world  POI popped-up during an investigation ◦ Admitted to having material and emails stored on SkyDrive  Legally signed over account
  • 21. Email: ◦ Microsoft’s “Hotmail Connector” for Outlook  Locally download all email and attachments to a PST  PST can be imported into favourite forensic suite (X-Ways, EnCase, FTK, Nuix, etc) ◦ During email “sync” kept dropping out  Had to be restarted numerous times before all content ◦ Contacted Microsoft Law Enforcement Portal to find alternative to Hotmail Connector  None currently exists
  • 22. Other Content: ◦ 2 Options:  Windows Live Mesh  Sync folder/s and download content  Can then be imaged or added to logical evidence container  5GB limitation to content synced through Mesh  Individually download each item through web browser  Potentially affecting MAC times, but not metadata  No other solution suggested by Microsoft Law Enforcement Portal
  • 23. Multi Lateral Agreements (MLAT) ◦ Send content host preservation notice  Generally takes account/s offline  Snapshot of all data taken ◦ Approximately 18 month process once paperwork is filed to receive content from host ◦ Must provide all paperwork in accordance with the host country (generally USA)
  • 24. Multi Lateral Agreements (MLAT) Local Agency Attorney-General Microsoft Department (ACT) US Court Order USA Department Produced of Justice (D0J)
  • 25. Use of standalone internet-enabled machine to capture remote content ◦ Forensically wiped upon job completion  Preservation request sent to CSP (assuming legally compliant)  Consult with technical people employed by CSP prior to “capture”  Expect the unexpected: non-standard file systems (eg. Oracle FS)
  • 26. Choo, K. (2010) “Cloud computing: Challenges and future directions”, Trends & issues in crime and criminal justice no. 400, Australian Institute of Criminology.  Lillard, Terrence (2010) Digital forensics for network, Internet, and cloud computing, Syngress, USA.  Martini, B. & Choo, K. (2012) “An integrated conceptual digital forensic framework for cloud computing”, Digital Investigation, Volume 9, Issue 2, November 2012, Pages 71–80.
  • 27. Criminal Code Act 1995  Cybercrime Act 2001  Telecommunications (Interception) Act 1979