SlideShare a Scribd company logo
1 of 91
Linux Forensics




            SANTOSH KHADSARE
Windows
Advantages:
• Easy to understand.
• GUI interface.

Disadvantages:
• Less Secure.
• More vulnerable.
Linux
Advantages:
• High security.
• More tools and automation.

Disadvantages:
• Hard to understand interface.
• Difficult to administrate.
Windows versus Linux
  Server Type           Windows          Linux

Web Server        IIS             Apache


Database Server   Spl             Mysql,Postgresql


DNS Server        Own             Bind


FTP Server        Own             PROFTPD


Email Server      MS exchange     Sendmail, Qmail
Before Linux
• In 80’s, Microsoft’s DOS was the dominated OS
  for PC
• Apple MAC was better, but expensive
• UNIX was much better, but much, much more
  expensive. Only for minicomputer for commercial
  applications
• People was looking for a UNIX based system,
  which is cheaper and can run on PC
• Both DOS, MAC and UNIX were proprietary, i.e.,
  the source code of their kernel is protected
• No modification is possible without paying high
  license fees
GNU project

–   Established in 1984 by Richard Stallman, who
    believes that software should be free from
    restrictions against copying or modification in
    order to make better and efficient computer
    programs
                  GNU is a recursive acronym for “GNU's Not Unix”
                  Aim at developing a complete Unix-like operating
                  system which is free for copying and modification
                  Companies make their money by maintaining and
                  distributing the software, e.g. optimally packaging the
                  software with different tools (Redhat, Slackware,
                  Mandrake, SuSE, etc)
                  Stallman built the first free GNU C Compiler in 1991.
                  But still, an OS was yet to be developed
Beginning of Linux


–   A famous professor Andrew Tanenbaum
    developed Minix, a simplified version of UNIX
    that runs on PC
–   Minix is for class teaching only. No intention for
    commercial use
–   In Sept 1991, Linus Torvalds, a second year
    student of Computer Science at the University
    of Helsinki, developed the preliminary kernel of
    Linux, known as Linux version 0.0.1
Beginning of Linux
What is good about using
        Linux for forensics?

–   Most tools are free of charge .
–   Most tools are open source (Allows you to
    know exactly what the tool is doing).
–   Environment is very flexible.
–   When tools are used properly, evidence should
    stand up in court.
limitations of using Linux for
               forensics?
–   Most tools are free - you don’t get any tech
    support and may not be able to call the author
    in to court if necessary .
–   Most tools are open source, which allows
    those who oppose you in court to scour the
    code for bugs and try to call the tool into
    question.
–   Environment is very flexible - it is often difficult
    to decide what is the best way to do something
    and there are no universally accepted
    standard procedures.
limitations of using Linux for
              forensics?
–   Free tools are not as full featured as
    commercial packages.
–   Tools are significantly more complicated to
    use than commercial packages and most
    involve using the command line.
–    In many operations, especially when imaging,
    you can destroy your work or even your
    original evidence with a typo.
Linux is Growing in Popularity
• Each new version becoming more user friendly.
  – Disk installation no longer confusing.
  – Installation interface more intuitive.
  – Graphical environment becoming much more mature.
• More and more companies are embracing &
  supporting Linux.
  – IBM has teams of developers working on it.
  – Apple’s OS now has a UNIX-like core.
  – Novell is now in the Linux business.
• More and more devices are now running Linux
  – Personal Devices: Cell Phones & PDA’s.
  – Electronics: Video Recorders, MP3 Players.
Why Linux
• Linux is a powerful operating system.
   – Many web sites use Linux as the operating system.
   – Even Steve Ballmer of Microsoft said Linux has 60% of the server
     market in 2008.
   – Tolerant of a range of hardware platforms without special
     configuration.
• Computer Forensics need to be able to consider server
  forensics.
   – Forensic issues can happen on server platforms too.
• Host-Based forensic tools often run on linux platforms.
   –   Free platform
   –   Flexible and reliable
   –   Easier to access low-level interfaces
   –   Good forensic qualities.
   –   Will consider Caine (a Linux live cd) for host-based forensics,
       which runs The Forensic Toolkit and Autopsy.
Linux Shell
                                                              whoami
                                                      ls                      pwd
   Shell interprets the command and                        Bash, Tcsh, Zsh
    request service from kernel
   Similar to DOS but DOS has only one
    set of interface while Linux can select                    Kernel
    different shell
     –   Bourne Again shell (Bash), TC shell
         (Tcsh), Z shell (Zsh)
   Different shell has similar but different functionality
   Bash is the default for Linux
   Graphical user interface of Linux is in fact an application program work on
    the shell
GRUB
• GNU GRUB (short for GNU GRand Unified
  Bootloader) is a boot loader package from
  the GNU Project.
• GRUB is the reference implementation of
  the Multiboot Specification, which provides
  a user the choice to boot one of multiple
  operating systems installed on a computer
  or select a specific kernel configuration
  available on a particular operating system's
  partitions.
KERNEL
KERNEL
• Typically, a kernel (or any comparable center of an operating
  system) includes an interrupt handler that handles all
  requests or completed I/O operations that compete for the
  kernel's services, a scheduler that determines which
  programs share the kernel's processing time in what order,
  and a supervisor that actually gives use of the computer to
  each process when it is scheduled.
• A kernel may also include a manager of the operating
  system's address spaces in memory or storage, sharing
  these among all components and other users of the kernel's
  services. A kernel's services are requested by other parts of
  the operating system or by application programs through a
  specified set of program interfaces sometimes known as
  system calls.
KERNEL
KERNEL VERSION
• UBUNTU 11.0 running
• What is kernel version?
KERNEL VERSION
• UBUNTU 11.0 –say company name
• TYPE umane –r to find the kernel .
• UBUNTU 11.0 has 2.6.38 kernel
  version.
• We can also kind kernel when we
  start a linux machine. (GRUB)
Kernel
KDE and GNOME
KDE and GNOME
• KDE      and    GNOME        are   two    desktop
  environments (collection of software that
  provides certain functionality and a look and feel
  for operating systems) that run on operating
  systems that use X Window System (mostly
  Unix, Linux, Solaris, FreeBSD, and Mac OS X).
•
   KDE’s main programming language is C++. The
  main reason for this is that the main functionality
  of KDE is coded using QT, which is written in C+
  +. It takes approximately 210MBs to install the
  base system of KDE.
KDE and GNOME
• GNOME’s main programming language is C,
  because the tool kit used to write GNOME is GTK+
  and it is written in C. Approximately 180 MB is
  required to install the base system of GNOME .

   After the recent rebranding,“KDE” actually refers to
  the whole collection of applications including the
  desktop environment while GNOME refers to a
  desktop environment alone.
File management
Directory Tree
Directory Tree
                              (root)




When you log on the the Linux OS
using your username you are
automatically located in your
home directory.
• /bin System binaries, including the command shell
• /boot Boot-up routines
• /dev Device files for all your peripherals
• /etc System configuration files
• /home User directories
• /lib Shared libraries and modules
• /lost+found Lost-cluster files, recovered from a disk-check
• /mnt Mounted file-systems
• /opt Optional software
•/proc Kernel-processes pseudo file-system
• /root Administrator’s home directory
• /sbin System administration binaries
•/usr User-oriented software
• /var Various other files: mail, spooling and logging
Directories
• /bin : This contains commands a user can run, like ‘ls’, but
  which might be needed during boot.
• /dev : This contains devices, like the mouse.
• /home : This is where users store their files.
• /tmp : Temporary storage for users and the system
• /var : System files which can change.
• /etc : System config files which don’t change
• /lib : Where all the system libraries live
• /proc : Files which represent the running system (like
  processes).
• /sbin : Commands which only an administrator would
  want.
• /usr : Commands which are never needed during bootup.
The most important subdirectories
      inside the root directory are:

•   /bin : Important Linux commands available to the average user.
•   /boot : The files necessary for the system to boot. Not all Linux
    distributions use this one. Fedora does.
•   /dev : All device drivers. Device drivers are the files that your
    Linux system uses to talk to your hardware. For example,
    there's a file in the /dev directory for your particular make and
    model of monitor, and all of your Linux computer's
    communications with the monitor go through that file.
•   /etc : System configuration files.
•   /home : Every user except root gets her own folder in here,
    named for her login account. So, the user who logs in with linda
    has the directory /home/linda, where all of her personal files are
    kept.
•   /lib : System libraries. Libraries are just bunches of
    programming code that the programs on your system use to get
    things done.
The most important subdirectories
          inside the root directory are:

•   /mnt : Mount points. When you temporarily load the contents of a
    CD-ROM or USB drive, you typically use a special name under /mnt.
    For example, many distributions (including Fedora) come, by
    default, with the directory /mnt/cdrom, which is where your CD-ROM
    drive's contents are made accessible.
•   /root : The root user's home directory.
•   /sbin : Essential commands that are only for the system
    administrator.
•   /tmp : Temporary files and storage space. Don't put anything in here
    that you want to keep. Most Linux distributions (including Fedora)
    are set up to delete any file that's been in this directory longer than
    three days.
•   /usr : Programs and data that can be shared across many systems
    and don't need to be changed.
•   /var : Data that changes constantly (log files that contain information
    about what's happening on your system, data on its way to the
    printer, and so on).
Important Subdirectories inside the
           root directory are:

• /proc : virtual file sys(imp for forensics).
• /etc/passwd: contains all user specific info.
• /etc/shadow: stores password.
Home directory
• You can see what your home directory is
  called by entering
• pwd (print current working directory)
Useful commands:
           Command             Description
ls                   List dir and files

dir                  See directory

Ifconfig             See IP address config

Useradd              Add new user

Reboot               Reboot machine

Su                   Switch user

Wget                 To download any file for internet

Top                  See process activity

Ps                   Display processes
Useful commands:
          Command            Description
Vmstat              Sys activity, hardware and sys info

Uptime              Tell how long sys is running

Free                Memory usages

Df –h               See hard disk space

Cp                  Copy file or folder

Lostat              Average CPU load, disk activity

Sar                 Collect and report sys activity

Ping                Test contv

Netstat             Network statistics
Useful commands:
          Command              Description
Iptraf              Eal time network statistics

Tcpdump             Detailed network traffic analysis

Cat                 Displays contents of the file

vim                 Opens text editor

Mount               Mounts dir

Cd                  Change dir

Mkdir               Make dir

Rmdir               Remove dir

Pwdshow             Show present working dir
The PROMPT
• Once you log into your machine, you are at
  the prompt. Here you can perform your
  commands.
• Everything on linux is either a file or a
  directory.
• A file which is executed becomes a
  process.
• Processes can be seen as files too.
• Devices, such as scanners and hard drives
  are also files.
File System
●Windows uses letters of the alphabet to
 represent different devices and different hard
 disk partitions. Under Windows, you need to
 know what volume (C:, D:,...) a file resides on
 to select it, the file's physical location is part
 of it's name.
●In Linux all directories are attached to the root
 directory, which is identified by a forward-
 slash, "/". - root.
● For example, below are some second-level
 directories:
File System
●# - shell command.
●# fdisk -l /*list partitions*/
●/dev/sda1
   /dev – device
   /sda1 or /hda1
      • sd – SATA /*SATA- tech to read/write data*/
      • hd – IDE
      • a
File System
 Sd ..a/b/c/d.....1/2/3.....
   • a – primary master
   • b – primary slave
   • c – secondary master
   • d – secondary slave
   • 1/2/3... – first/second/third partition
File System
●# fdisk /dev/sda /*’m’ for help*/
●(if type ‘l’ it will list all available file sys with their
 Id e.g. Windows -7 and Linux -83)
●(‘q’ to quit)
●/dev/sda1 - sys reserve
●/dev/sda2 - is C:
●(windows makes 2 partitions: 100 Mb(from 100 GB)
 for sys reserve and remaining C: (100GB))
File System
Redirection

• If you end a command with “>”, its output goes to
  a file.
• If you end a command with “<“, its input comes
  from a file.
Linux Help


●man
●info
●command –help
●Forums.
Man -k


• You can keyword search for commands
• For instance, what commands show a
  calendar?

$ man -k calendar
cal          (1) - displays a calendar
cal          (1p) - print a calendar
difftime     (3p) - compute the difference…
man command
  –   The “-k” option
        ● man –k print
  –   Manual pages are divided in 8 sections:
        
            User commands
           System calls
           Libc calls
           Devices
           File formats and protocols
           Games
           Conventions, macro packages and so
            forth
        
            System administation
  –   To select correct section, add section
      number:
        ● man 1 passwd, man 5 passwd
info command


●A program for reading documentation,
 sometimes a replacement for manual pages
●Example : info ls
Linux Boot Sequence
• Start your computer that has Linux installed.

                      B IO S P o s t


                L in u x B o o t L o a d e r


                 L i n u x K e r n e l I n it


                     I n it P ro g r a m


                B a s h S h e ll S ta r t e d
RUN LEVELS
•   They initiate sys call which interact with kernel.
•   Run level 0 : shutdown.
•   Run level 1 : single user interface.
•   Run level 2 : multi user without NFS(new file sys) support.
•   Run level 3 : multi user with NFS(new file sys) support.
•   Run level 4 GUI.
•   Run level 5 restart.
Boot sequence summary

•BIOS
•Master Boot Record (MBR)
•LILO or GRUB
•Kernel
•init
•Run Levels
The Linux Environment
 What exactly is Linux?
• "Linux" is just an OS kernel
• the rest is additional Open Source Software
• together they are a "Linux Distribution"
• [Knoppix, Ubuntu, Redhat, Novell/SuSe]

Large choice of GUI and/or commandline
environments
• most popular are KDE and Gnome
• Unix-like, Mac-like, MSWindows-like, NeXT-like
• advanced shell environments
• web front-ends, GUI front-ends
• [KDE, Gnome, Windowmaker, bash, zsh, emacs, mc]
The Linux Environment
Forensic boot CDs
• fully installed Linux environment on bootable CD or
DVD
• non-mount booting
• large pre-installed forensic toolset
• Knoppix based

Most up to date (at the moment)
• FCCU GNU/Linux Forensic Boot CD (Belgian Federal
Computer Crime Unit)
• Helix (US e-fense Inc.)

Full installation:
• learning Linux -> Ubuntu, doing forensics -> Debian
• must strip down automount services
Imaging and Evidence Acquisition
Wide range of supported technologies and media
• ATA, SATA, SCSI, USB, Firewire
• cd, dvd, USB sticks, tapes, floppies, etc

Forensically sound acquisition
• typically any sector-based storage medium accessible
as adevice can be safely imaged
• can acquire an image without mounting drive
• hardware write-blocker not needed for unmounted
devices
• support for handling errors, bad blocks
• [dd, dcfldd, dd_rescue, sdd, AIR, sleuthkit, adepto, grab]
Imaging and Evidence Acquisition
Wide range of supported technologies and media
• ATA, SATA, SCSI, USB, Firewire
• cd, dvd, USB sticks, tapes, floppies, etc

Forensically sound acquisition
• typically any sector-based storage medium accessible
as a
device can be safely imaged
• can acquire an image without mounting drive
• hardware write-blocker not needed for unmounted
devices
• support for handling errors, bad blocks
• [dd, dcfldd, dd_rescue, sdd, AIR, sleuthkit, adepto, grab]
Floppy Disk Analysis
• Insert Floppy
• Obtain SHA hash
Create Floppy Disk Image
• Use dd to create forensic image.
• Compare SHA hash of image against floppy
  to confirm good image.
Identify File System
• Use file utility to identify the file system of floppy
  disk image.
• file utility can identify more than 30 different file
  system types & many more standard file types.
Mount the Image for Analysis
• Create a directory to mount the image against.
• Use mount utility to mount the image, using loop
  back to trick OS into thinking this is a physical
  device.
Obtain SHA Hash of Contents
• Obtain SHA hash of each file on the floppy disk.
• Check file to confirm all looks as expected.
Identify File Contents
• ls to view all the files on floppy.
• file utility to identify file header.
   – Tells us that this is actually a Microsoft Office Document.
View File Contents
• strings utility to extract raw text from a binary file.
Evidential Search Criteria
• Put together keyword list to use in search
  applied against evidence.
  – This screenshot shows the use of the vi editor.
Apply Search List
• Apply the search list against the entire image of the
  floppy by using the grep utility.
View Search Results
• Viewing the Search Results File with cat shows binary,
  so we use strings instead to just view the ASCII text
  from the file. HEX location is shown in [numeric]: I.e.
  “49189:”
Search Hit Example
• xxd utility used to perform a hex dump of data.
• # xxd -s 49189 /evidence/floppy1.img | less
• Note the match giving an address to the Boston Crackdlr
  of 11 Clarendon Apt 6 in Boston’s Back Bay
FILE SYSTEM
SECOND EXTENDED FILE SYSTEM(EXT2)

• Commonly used in Linux.
• Building blocks known as data blocks(4 Kb in
  size) : similar to FAT32 file sys.
• Allocation of blocks similar to FAT32.Thus
  physical sizes and logical sizes in EXT2 differ as
  they do in FAT32.
• Main components:
   Directories.
   Inodes.
   Data blocks.
SECOND EXTENDED FILE SYSTEM(EXT2)

• Directories store the filenames in the file sys and
  the inodes associated with the files.
• In EXT2, files are represented by inodes. An
  inode contains attributes like file type, size,
  access rights, timestamps address of data
  blocks.
• An Inode is similar to a directory entry in FAT32.
  Each inode has a unique no. identifying it.
SECOND EXTENDED FILE SYSTEM(EXT2)

• File sys made up of “block groups” a sequential
  arrangement of a group of data blocks. The
  entire file sys is thus managed as a series of
  block groups.
• Block group meta data is provided by a ‘block
  group descriptor’. It contains a copy of super
  block(size of inode table and file sys), Block
  bitmap(tracks allocation of each data block), part
  of inode table and data blocks.
ext2 Characteristics
• Complicated internal structure to enhance
  performance, but on-disk structure is
  straightforward




                 From: Understanding the Linux Kernel (Bovet/Cesati)
ext2 Directory Structure




                                                        deleted



       From: Understanding the Linux Kernel (Bovet/Cesati)
ext2/3: inode




From: Understanding the Linux Kernel (Bovet/Cesati)
ext3 Characteristics
• Binary compatible with ext2 on-disk
• Reason for existence: huge disks == huge
  amounts of time to restore filesystem
  consistency after improper shutdown
• (Must check inodes, etc.)
• Major improvement over ext2: log that stores
  info about in-progress file operations
• On boot, can check log and quickly restore
  filesystem consistency
• Journaling filesystems: DANGER!
File Deletion: Linux
• ext2 file deletion
   –   Adjust previous directory entry length to obscure deleted record
   –   No reorganization to make space in directories
   –   “first fit” for new directory entries, based on real name length
   –   Directory entry’s inode # is cleared
• ext3 file deletion
   –   Same as for ext2, but…
   –   inode is wiped on file deletion, so block numbers are lost
   –   Major anti-forensics issue!
   –   But directory entry’s inode # isn’t cleared…
Tools
•   Sleuthkit
•   Deft 7.0
•   Helix
•   BackTrack
Sleuthkit
• Linux toolkit for forensics written by Brian
  Carrier
• http://www.sleuthkit.org/
• Command line tools for forensic analysis
  under Linux (and now, Windows…)
• Graphical interface: Autopsy Forensic
  Browser
Sleuthkit (2)
•   Data Unit:
     – dls – copy individual disk blocks
     – dcat – copy ranges of disk “chunks”
     – dstat – determine whether block is allocated
•   Meta Data:
     –   ils – list inodes (e.g., ones corr. to deleted files!)
     –   icat – copy data associated with inode
     –   istat – dump detailed inode info
     –   ifind – find inode associated with a disk block
•   File Name:
     – fls – list files/directories in image
     – ffind – find filename associated with inode
•   File System: fsstat
     – Detailed filesystem information
“Next Generation”
 Digital Forensics
   Meets Linux
Filesystem in Userspace (FUSE)
•    (FUSE)     is   a loadable     kernel    module for Unix-
    like computer operating systems that lets non-privileged
    users     create     their    own file    systems without
    editing kernel code. This is achieved by running file
    system code in user space while the FUSE module
    provides only a "bridge" to the actual kernel interfaces.

• FUSE is particularly useful for writing virtual file systems.
  Unlike traditional file systems that essentially save data
  to and retrieve data from disk, virtual filesystems do not
  actually store data themselves. They act as a view or
  translation of an existing file system or storage device.

• In principle, any resource available to a FUSE
  implementation can be exported as a file system.
FUSE (Filesystem in User
               Space)
                                               Filesystem
                                             Implementation
     dd if=/evidence/DEC/img.dd of=copy.dd
                                              FUSE library
                    read()

user space         C library                   C library

kernel space

                                                 FUSE

                       Linux
               Virtual File System
                    Interface                     ext3
                      (VFS)

                                                reiserFS
File carving
• Is the process of reassembling computer files from
  fragments in the absence of filesystem metadata.
• The carving process makes use of knowledge of
  common file structures, information contained in files,
  and heuristics regarding how filesystems fragment data.
• Fusing these three sources of information, a file carving
  system infers which fragments belong together.
• File carving is a highly complex task, with a potentially
  huge number of permutations to try.
• To make this task tractable, carving software typically
  makes extensive use of models and heuristics. This is
  necessary not only from a standpoint of execution time,
  but also for the accuracy of the results.
In-Place File Carving

                             client applications

                                    scalpel_fs


                                                      FUSE
            preview database
                                                              nbd client

                       local drive                            network

                                                             nbd server


                                    Scalpel                             remote drive


G. G. Richard III, V. Roussev, V. Marziale, “In-Place File Carving,” submitted to the Third Annual
IFIP WG 11.9 International Conference on Digital Forensics, 2007.
Better Auditing




Want: Digital Evidence Bags

See: P. Turner, “Unification of Digital Evidence from Disparate Sources (Digital Evidence Bags),” DFRWS 2005
See: Common Digital Evidence Storage Format (CDESF) working group, http://www.dfrws.org/CDESF/.
Better Auditing (2)

                               dd                  scalpel               TSK                    FTK
                                                                                                          …
              Applications
               (User space)
                                     Block-level                                Filesystem
                                     Data Access                                Data Access
                (Kernel)
              Operating
               System                                                                    VFS Interface



                                                                         FDAM



               Digital
              Evidence                               FDAM Block Device

              Container
                                 Import/
                   DEC            Export

                                                        Evidence                              Audit Log
                 (DEB, AFF,                               Data
                  Gfzip …)




G. G. Richard III, V. Roussev, "Toward Secure, Audited Processing of Digital Evidence:
Filesystem Support for Digital Evidence Bags," Research Advances in Digital Forensics, Springer, 2006.
Bluepipe: On the Spot Digital
                Forensics




                                                                 Bluepipe Patterns


Y. Gao, G. G. Richard III, V. Roussev, “Bluepipe: An Architecture for On-the-Spot Digital Forensics,”
International Journal of Digital Evidence (IJDE), 3(1), 2004.
<BLUEPIPE NAME=”findcacti”>
<!-- find illegal cacti pics using MD5 hash dictionary -->
<DIR TARGET=”/pics/” />
<FINDFILE
USEHASHES=TRUE
LOCALDIR=”cactus”
RECURSIVE=TRUE
RETRIEVE=TRUE
MSG="Found cactus %s with hash %h ">
<FILE ID=3d1e79d11443498df78a1981652be454/>
<FILE ID=6f5cd6182125fc4b9445aad18f412128/>
<FILE ID=7de79a1ed753ac2980ee2f8e7afa5005/>
<FILE ID=ab348734f7347a8a054aa2c774f7aae6/>
<FILE ID=b57af575deef030baa709f5bf32ac1ed/>
<FILE ID=7074c76fada0b4b419287ee28d705787/>
<FILE ID=9de757840cc33d807307e1278f901d3a/>
<FILE ID=b12fcf4144dc88cdb2927e91617842b0/>
<FILE ID=e7183e5eec7d186f7b5d0ce38e7eaaad/>
<FILE ID=808bac4a404911bf2facaa911651e051/>
<FILE ID=fffbf594bbae2b3dd6af84e1af4be79c/>
<FILE ID=b9776d04e384a10aef6d1c8258fdf054/>
</FINDFILE>
</BLUEPIPE>
Distributed Digital Forensics




                                                                         750GB
                              750GB




V. Roussev, G. G. Richard III, "Breaking the Performance Wall: The Case for Distributed Digital Forensics,“
Proceedings of the 2004 Digital Forensics Research Workshop (DFRWS 2004), Baltimore, MD
Distributed Digital Forensics
• Scalable
   – Want to support at least IMAGE SIZE / RAM_PER_NODE nodes
• Platform independent
   – Want to be able to incorporate any (reasonable) machine that’s
     available
• Lightweight
   – Horsepower is for forensics, not the framework—less fat
• Highly interactive
• Extensible
   – Allow incorporation of existing sequential tools
   – e.g., stegdetect, image thumbnailing, file classification, hashing,
     …
• Robust
   – Must handle failed nodes smoothly
Distributed Digital Forensics
             (2)
       Worker                  Coordinator                            Worker
                JOIN / LEAVE
                                          HASH / GREP / COMMAND/ …
               CANCEL / EXIT
                                              DONE / REPORT / ERROR
                     FETCH

                     CACHE
                     LOAD

SHUTDOWN   STARTUP
                       STORE

     Local Store
                               Common Store
Distributed Digital Forensics
             (3)

                                         RAID: 504GB
     File Server
     CPU: 2x1.4GHz Xeon   SCSI
     RAM: 2GB




            1Gb            Switch
                           96-port, 10/100/1000 Mb
                           24 Gb Backplane




                                               Node
                                               CPU: 2.4 GHzPentium 4
                                               RAM: 1 GB
Thank you

More Related Content

What's hot

Introduction to forensic imaging
Introduction to forensic imagingIntroduction to forensic imaging
Introduction to forensic imagingMarco Alamanni
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System ForensicsArunJS5
 
Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
 
Ntfs and computer forensics
Ntfs and computer forensicsNtfs and computer forensics
Ntfs and computer forensicsGaurav Ragtah
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
Computer Forensics &amp; Windows Registry
Computer Forensics &amp; Windows RegistryComputer Forensics &amp; Windows Registry
Computer Forensics &amp; Windows Registryaradhanalaw
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts MD SAQUIB KHAN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsMayank Chaudhari
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Forensic artifacts in modern linux systems
Forensic artifacts in modern linux systemsForensic artifacts in modern linux systems
Forensic artifacts in modern linux systemsGol D Roger
 

What's hot (20)

Introduction to forensic imaging
Introduction to forensic imagingIntroduction to forensic imaging
Introduction to forensic imaging
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
Ntfs and computer forensics
Ntfs and computer forensicsNtfs and computer forensics
Ntfs and computer forensics
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Windows Registry
Windows RegistryWindows Registry
Windows Registry
 
Email investigation
Email investigationEmail investigation
Email investigation
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Computer Forensics &amp; Windows Registry
Computer Forensics &amp; Windows RegistryComputer Forensics &amp; Windows Registry
Computer Forensics &amp; Windows Registry
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Forensic artifacts in modern linux systems
Forensic artifacts in modern linux systemsForensic artifacts in modern linux systems
Forensic artifacts in modern linux systems
 

Viewers also liked

Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations ToolsMandy Jenkins
 
Nra
NraNra
NraCTIN
 
July132000
July132000July132000
July132000CTIN
 
G Infomgnt
G InfomgntG Infomgnt
G InfomgntCTIN
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7RIAH ENCARNACION
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics00heights
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...OWASP Turkiye
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformBasis Technology
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
 
F Database
F DatabaseF Database
F DatabaseCTIN
 

Viewers also liked (20)

Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations Tools
 
Nra
NraNra
Nra
 
Digital forensic upload
Digital forensic uploadDigital forensic upload
Digital forensic upload
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
July132000
July132000July132000
July132000
 
Unit B Windows 7
Unit B Windows 7Unit B Windows 7
Unit B Windows 7
 
Windows 7-cheat-sheet
Windows 7-cheat-sheetWindows 7-cheat-sheet
Windows 7-cheat-sheet
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 
Ntfs forensics
Ntfs forensicsNtfs forensics
Ntfs forensics
 
F Database
F DatabaseF Database
F Database
 
Citrix
CitrixCitrix
Citrix
 

Similar to Linux forensics

Linux [2005]
Linux [2005]Linux [2005]
Linux [2005]Raul Soto
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linuxPrasanth V
 
Introduction about linux
Introduction about linuxIntroduction about linux
Introduction about linuxABHISHEK KUMAR
 
Ibm system programming training module 2 - linux basics
Ibm system programming training   module 2 - linux basicsIbm system programming training   module 2 - linux basics
Ibm system programming training module 2 - linux basicsBinsent Ribera
 
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdfintroductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdfEidTahir
 
Programming and problem solving 3
Programming and problem solving 3Programming and problem solving 3
Programming and problem solving 3sushruth kamarushi
 
Introduction to linux ppt
Introduction to linux pptIntroduction to linux ppt
Introduction to linux pptOmi Vichare
 
Introduction to Linux basic
Introduction to Linux basicIntroduction to Linux basic
Introduction to Linux basicf114n
 
Linux command ppt
Linux command pptLinux command ppt
Linux command pptkalyanineve
 
Linux – an introduction
Linux – an introductionLinux – an introduction
Linux – an introductionWingston
 
Linux Operating System. UOG MARGHAZAR Campus
 Linux Operating System. UOG MARGHAZAR Campus Linux Operating System. UOG MARGHAZAR Campus
Linux Operating System. UOG MARGHAZAR CampusSYEDASADALI38
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system pptAchyut Sinha
 
Linux for embedded_systems
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systemsVandana Salve
 

Similar to Linux forensics (20)

Linux [2005]
Linux [2005]Linux [2005]
Linux [2005]
 
Linux
LinuxLinux
Linux
 
Linux for everyone
Linux for everyoneLinux for everyone
Linux for everyone
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 
Linux
Linux Linux
Linux
 
Introduction about linux
Introduction about linuxIntroduction about linux
Introduction about linux
 
Ibm system programming training module 2 - linux basics
Ibm system programming training   module 2 - linux basicsIbm system programming training   module 2 - linux basics
Ibm system programming training module 2 - linux basics
 
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdfintroductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
 
Intro to linux
Intro to linuxIntro to linux
Intro to linux
 
Programming and problem solving 3
Programming and problem solving 3Programming and problem solving 3
Programming and problem solving 3
 
Linux
LinuxLinux
Linux
 
Introduction to linux ppt
Introduction to linux pptIntroduction to linux ppt
Introduction to linux ppt
 
Linux
LinuxLinux
Linux
 
Introduction to Linux basic
Introduction to Linux basicIntroduction to Linux basic
Introduction to Linux basic
 
Linux introduction (eng)
Linux introduction (eng)Linux introduction (eng)
Linux introduction (eng)
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
 
Linux – an introduction
Linux – an introductionLinux – an introduction
Linux – an introduction
 
Linux Operating System. UOG MARGHAZAR Campus
 Linux Operating System. UOG MARGHAZAR Campus Linux Operating System. UOG MARGHAZAR Campus
Linux Operating System. UOG MARGHAZAR Campus
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system ppt
 
Linux for embedded_systems
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systems
 

More from Santosh Khadsare (20)

Cyber fraud (netflix)
Cyber fraud (netflix)Cyber fraud (netflix)
Cyber fraud (netflix)
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Lec 1 apln security(4pd)
Lec  1 apln security(4pd)Lec  1 apln security(4pd)
Lec 1 apln security(4pd)
 
Smart card
Smart cardSmart card
Smart card
 
Guassvirus
GuassvirusGuassvirus
Guassvirus
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Webmail
WebmailWebmail
Webmail
 
Linux Forensics
Linux ForensicsLinux Forensics
Linux Forensics
 
Web server
Web serverWeb server
Web server
 
Samba server
Samba serverSamba server
Samba server
 
Firewall(linux)
Firewall(linux)Firewall(linux)
Firewall(linux)
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Linuxfilesys
LinuxfilesysLinuxfilesys
Linuxfilesys
 
Linuxconcepts
LinuxconceptsLinuxconcepts
Linuxconcepts
 
Introtolinux
IntrotolinuxIntrotolinux
Introtolinux
 
New internet
New internetNew internet
New internet
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 

Recently uploaded

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Linux forensics

  • 1. Linux Forensics SANTOSH KHADSARE
  • 2. Windows Advantages: • Easy to understand. • GUI interface. Disadvantages: • Less Secure. • More vulnerable.
  • 3. Linux Advantages: • High security. • More tools and automation. Disadvantages: • Hard to understand interface. • Difficult to administrate.
  • 4. Windows versus Linux Server Type Windows Linux Web Server IIS Apache Database Server Spl Mysql,Postgresql DNS Server Own Bind FTP Server Own PROFTPD Email Server MS exchange Sendmail, Qmail
  • 5. Before Linux • In 80’s, Microsoft’s DOS was the dominated OS for PC • Apple MAC was better, but expensive • UNIX was much better, but much, much more expensive. Only for minicomputer for commercial applications • People was looking for a UNIX based system, which is cheaper and can run on PC • Both DOS, MAC and UNIX were proprietary, i.e., the source code of their kernel is protected • No modification is possible without paying high license fees
  • 6. GNU project – Established in 1984 by Richard Stallman, who believes that software should be free from restrictions against copying or modification in order to make better and efficient computer programs GNU is a recursive acronym for “GNU's Not Unix” Aim at developing a complete Unix-like operating system which is free for copying and modification Companies make their money by maintaining and distributing the software, e.g. optimally packaging the software with different tools (Redhat, Slackware, Mandrake, SuSE, etc) Stallman built the first free GNU C Compiler in 1991. But still, an OS was yet to be developed
  • 7. Beginning of Linux – A famous professor Andrew Tanenbaum developed Minix, a simplified version of UNIX that runs on PC – Minix is for class teaching only. No intention for commercial use – In Sept 1991, Linus Torvalds, a second year student of Computer Science at the University of Helsinki, developed the preliminary kernel of Linux, known as Linux version 0.0.1
  • 9. What is good about using Linux for forensics? – Most tools are free of charge . – Most tools are open source (Allows you to know exactly what the tool is doing). – Environment is very flexible. – When tools are used properly, evidence should stand up in court.
  • 10. limitations of using Linux for forensics? – Most tools are free - you don’t get any tech support and may not be able to call the author in to court if necessary . – Most tools are open source, which allows those who oppose you in court to scour the code for bugs and try to call the tool into question. – Environment is very flexible - it is often difficult to decide what is the best way to do something and there are no universally accepted standard procedures.
  • 11. limitations of using Linux for forensics? – Free tools are not as full featured as commercial packages. – Tools are significantly more complicated to use than commercial packages and most involve using the command line. – In many operations, especially when imaging, you can destroy your work or even your original evidence with a typo.
  • 12. Linux is Growing in Popularity • Each new version becoming more user friendly. – Disk installation no longer confusing. – Installation interface more intuitive. – Graphical environment becoming much more mature. • More and more companies are embracing & supporting Linux. – IBM has teams of developers working on it. – Apple’s OS now has a UNIX-like core. – Novell is now in the Linux business. • More and more devices are now running Linux – Personal Devices: Cell Phones & PDA’s. – Electronics: Video Recorders, MP3 Players.
  • 13. Why Linux • Linux is a powerful operating system. – Many web sites use Linux as the operating system. – Even Steve Ballmer of Microsoft said Linux has 60% of the server market in 2008. – Tolerant of a range of hardware platforms without special configuration. • Computer Forensics need to be able to consider server forensics. – Forensic issues can happen on server platforms too. • Host-Based forensic tools often run on linux platforms. – Free platform – Flexible and reliable – Easier to access low-level interfaces – Good forensic qualities. – Will consider Caine (a Linux live cd) for host-based forensics, which runs The Forensic Toolkit and Autopsy.
  • 14. Linux Shell whoami ls pwd  Shell interprets the command and Bash, Tcsh, Zsh request service from kernel  Similar to DOS but DOS has only one set of interface while Linux can select Kernel different shell – Bourne Again shell (Bash), TC shell (Tcsh), Z shell (Zsh)  Different shell has similar but different functionality  Bash is the default for Linux  Graphical user interface of Linux is in fact an application program work on the shell
  • 15. GRUB • GNU GRUB (short for GNU GRand Unified Bootloader) is a boot loader package from the GNU Project. • GRUB is the reference implementation of the Multiboot Specification, which provides a user the choice to boot one of multiple operating systems installed on a computer or select a specific kernel configuration available on a particular operating system's partitions.
  • 17. KERNEL • Typically, a kernel (or any comparable center of an operating system) includes an interrupt handler that handles all requests or completed I/O operations that compete for the kernel's services, a scheduler that determines which programs share the kernel's processing time in what order, and a supervisor that actually gives use of the computer to each process when it is scheduled. • A kernel may also include a manager of the operating system's address spaces in memory or storage, sharing these among all components and other users of the kernel's services. A kernel's services are requested by other parts of the operating system or by application programs through a specified set of program interfaces sometimes known as system calls.
  • 19. KERNEL VERSION • UBUNTU 11.0 running • What is kernel version?
  • 20. KERNEL VERSION • UBUNTU 11.0 –say company name • TYPE umane –r to find the kernel . • UBUNTU 11.0 has 2.6.38 kernel version. • We can also kind kernel when we start a linux machine. (GRUB)
  • 23. KDE and GNOME • KDE and GNOME are two desktop environments (collection of software that provides certain functionality and a look and feel for operating systems) that run on operating systems that use X Window System (mostly Unix, Linux, Solaris, FreeBSD, and Mac OS X). • KDE’s main programming language is C++. The main reason for this is that the main functionality of KDE is coded using QT, which is written in C+ +. It takes approximately 210MBs to install the base system of KDE.
  • 24. KDE and GNOME • GNOME’s main programming language is C, because the tool kit used to write GNOME is GTK+ and it is written in C. Approximately 180 MB is required to install the base system of GNOME . After the recent rebranding,“KDE” actually refers to the whole collection of applications including the desktop environment while GNOME refers to a desktop environment alone.
  • 27. Directory Tree (root) When you log on the the Linux OS using your username you are automatically located in your home directory.
  • 28. • /bin System binaries, including the command shell • /boot Boot-up routines • /dev Device files for all your peripherals • /etc System configuration files • /home User directories • /lib Shared libraries and modules • /lost+found Lost-cluster files, recovered from a disk-check • /mnt Mounted file-systems • /opt Optional software •/proc Kernel-processes pseudo file-system • /root Administrator’s home directory • /sbin System administration binaries •/usr User-oriented software • /var Various other files: mail, spooling and logging
  • 29. Directories • /bin : This contains commands a user can run, like ‘ls’, but which might be needed during boot. • /dev : This contains devices, like the mouse. • /home : This is where users store their files. • /tmp : Temporary storage for users and the system • /var : System files which can change. • /etc : System config files which don’t change • /lib : Where all the system libraries live • /proc : Files which represent the running system (like processes). • /sbin : Commands which only an administrator would want. • /usr : Commands which are never needed during bootup.
  • 30. The most important subdirectories inside the root directory are: • /bin : Important Linux commands available to the average user. • /boot : The files necessary for the system to boot. Not all Linux distributions use this one. Fedora does. • /dev : All device drivers. Device drivers are the files that your Linux system uses to talk to your hardware. For example, there's a file in the /dev directory for your particular make and model of monitor, and all of your Linux computer's communications with the monitor go through that file. • /etc : System configuration files. • /home : Every user except root gets her own folder in here, named for her login account. So, the user who logs in with linda has the directory /home/linda, where all of her personal files are kept. • /lib : System libraries. Libraries are just bunches of programming code that the programs on your system use to get things done.
  • 31. The most important subdirectories inside the root directory are: • /mnt : Mount points. When you temporarily load the contents of a CD-ROM or USB drive, you typically use a special name under /mnt. For example, many distributions (including Fedora) come, by default, with the directory /mnt/cdrom, which is where your CD-ROM drive's contents are made accessible. • /root : The root user's home directory. • /sbin : Essential commands that are only for the system administrator. • /tmp : Temporary files and storage space. Don't put anything in here that you want to keep. Most Linux distributions (including Fedora) are set up to delete any file that's been in this directory longer than three days. • /usr : Programs and data that can be shared across many systems and don't need to be changed. • /var : Data that changes constantly (log files that contain information about what's happening on your system, data on its way to the printer, and so on).
  • 32. Important Subdirectories inside the root directory are: • /proc : virtual file sys(imp for forensics). • /etc/passwd: contains all user specific info. • /etc/shadow: stores password.
  • 33. Home directory • You can see what your home directory is called by entering • pwd (print current working directory)
  • 34. Useful commands: Command Description ls List dir and files dir See directory Ifconfig See IP address config Useradd Add new user Reboot Reboot machine Su Switch user Wget To download any file for internet Top See process activity Ps Display processes
  • 35. Useful commands: Command Description Vmstat Sys activity, hardware and sys info Uptime Tell how long sys is running Free Memory usages Df –h See hard disk space Cp Copy file or folder Lostat Average CPU load, disk activity Sar Collect and report sys activity Ping Test contv Netstat Network statistics
  • 36. Useful commands: Command Description Iptraf Eal time network statistics Tcpdump Detailed network traffic analysis Cat Displays contents of the file vim Opens text editor Mount Mounts dir Cd Change dir Mkdir Make dir Rmdir Remove dir Pwdshow Show present working dir
  • 37. The PROMPT • Once you log into your machine, you are at the prompt. Here you can perform your commands. • Everything on linux is either a file or a directory. • A file which is executed becomes a process. • Processes can be seen as files too. • Devices, such as scanners and hard drives are also files.
  • 38. File System ●Windows uses letters of the alphabet to represent different devices and different hard disk partitions. Under Windows, you need to know what volume (C:, D:,...) a file resides on to select it, the file's physical location is part of it's name. ●In Linux all directories are attached to the root directory, which is identified by a forward- slash, "/". - root. ● For example, below are some second-level directories:
  • 39. File System ●# - shell command. ●# fdisk -l /*list partitions*/ ●/dev/sda1  /dev – device  /sda1 or /hda1 • sd – SATA /*SATA- tech to read/write data*/ • hd – IDE • a
  • 40. File System  Sd ..a/b/c/d.....1/2/3..... • a – primary master • b – primary slave • c – secondary master • d – secondary slave • 1/2/3... – first/second/third partition
  • 41. File System ●# fdisk /dev/sda /*’m’ for help*/ ●(if type ‘l’ it will list all available file sys with their Id e.g. Windows -7 and Linux -83) ●(‘q’ to quit) ●/dev/sda1 - sys reserve ●/dev/sda2 - is C: ●(windows makes 2 partitions: 100 Mb(from 100 GB) for sys reserve and remaining C: (100GB))
  • 43. Redirection • If you end a command with “>”, its output goes to a file. • If you end a command with “<“, its input comes from a file.
  • 45. Man -k • You can keyword search for commands • For instance, what commands show a calendar? $ man -k calendar cal (1) - displays a calendar cal (1p) - print a calendar difftime (3p) - compute the difference…
  • 46. man command – The “-k” option ● man –k print – Manual pages are divided in 8 sections:  User commands  System calls  Libc calls  Devices  File formats and protocols  Games  Conventions, macro packages and so forth  System administation – To select correct section, add section number: ● man 1 passwd, man 5 passwd
  • 47. info command ●A program for reading documentation, sometimes a replacement for manual pages ●Example : info ls
  • 48. Linux Boot Sequence • Start your computer that has Linux installed. B IO S P o s t L in u x B o o t L o a d e r L i n u x K e r n e l I n it I n it P ro g r a m B a s h S h e ll S ta r t e d
  • 49. RUN LEVELS • They initiate sys call which interact with kernel. • Run level 0 : shutdown. • Run level 1 : single user interface. • Run level 2 : multi user without NFS(new file sys) support. • Run level 3 : multi user with NFS(new file sys) support. • Run level 4 GUI. • Run level 5 restart.
  • 50. Boot sequence summary •BIOS •Master Boot Record (MBR) •LILO or GRUB •Kernel •init •Run Levels
  • 51. The Linux Environment What exactly is Linux? • "Linux" is just an OS kernel • the rest is additional Open Source Software • together they are a "Linux Distribution" • [Knoppix, Ubuntu, Redhat, Novell/SuSe] Large choice of GUI and/or commandline environments • most popular are KDE and Gnome • Unix-like, Mac-like, MSWindows-like, NeXT-like • advanced shell environments • web front-ends, GUI front-ends • [KDE, Gnome, Windowmaker, bash, zsh, emacs, mc]
  • 52. The Linux Environment Forensic boot CDs • fully installed Linux environment on bootable CD or DVD • non-mount booting • large pre-installed forensic toolset • Knoppix based Most up to date (at the moment) • FCCU GNU/Linux Forensic Boot CD (Belgian Federal Computer Crime Unit) • Helix (US e-fense Inc.) Full installation: • learning Linux -> Ubuntu, doing forensics -> Debian • must strip down automount services
  • 53. Imaging and Evidence Acquisition Wide range of supported technologies and media • ATA, SATA, SCSI, USB, Firewire • cd, dvd, USB sticks, tapes, floppies, etc Forensically sound acquisition • typically any sector-based storage medium accessible as adevice can be safely imaged • can acquire an image without mounting drive • hardware write-blocker not needed for unmounted devices • support for handling errors, bad blocks • [dd, dcfldd, dd_rescue, sdd, AIR, sleuthkit, adepto, grab]
  • 54. Imaging and Evidence Acquisition Wide range of supported technologies and media • ATA, SATA, SCSI, USB, Firewire • cd, dvd, USB sticks, tapes, floppies, etc Forensically sound acquisition • typically any sector-based storage medium accessible as a device can be safely imaged • can acquire an image without mounting drive • hardware write-blocker not needed for unmounted devices • support for handling errors, bad blocks • [dd, dcfldd, dd_rescue, sdd, AIR, sleuthkit, adepto, grab]
  • 55. Floppy Disk Analysis • Insert Floppy • Obtain SHA hash
  • 56. Create Floppy Disk Image • Use dd to create forensic image. • Compare SHA hash of image against floppy to confirm good image.
  • 57. Identify File System • Use file utility to identify the file system of floppy disk image. • file utility can identify more than 30 different file system types & many more standard file types.
  • 58. Mount the Image for Analysis • Create a directory to mount the image against. • Use mount utility to mount the image, using loop back to trick OS into thinking this is a physical device.
  • 59. Obtain SHA Hash of Contents • Obtain SHA hash of each file on the floppy disk. • Check file to confirm all looks as expected.
  • 60. Identify File Contents • ls to view all the files on floppy. • file utility to identify file header. – Tells us that this is actually a Microsoft Office Document.
  • 61. View File Contents • strings utility to extract raw text from a binary file.
  • 62. Evidential Search Criteria • Put together keyword list to use in search applied against evidence. – This screenshot shows the use of the vi editor.
  • 63. Apply Search List • Apply the search list against the entire image of the floppy by using the grep utility.
  • 64. View Search Results • Viewing the Search Results File with cat shows binary, so we use strings instead to just view the ASCII text from the file. HEX location is shown in [numeric]: I.e. “49189:”
  • 65. Search Hit Example • xxd utility used to perform a hex dump of data. • # xxd -s 49189 /evidence/floppy1.img | less • Note the match giving an address to the Boston Crackdlr of 11 Clarendon Apt 6 in Boston’s Back Bay
  • 67. SECOND EXTENDED FILE SYSTEM(EXT2) • Commonly used in Linux. • Building blocks known as data blocks(4 Kb in size) : similar to FAT32 file sys. • Allocation of blocks similar to FAT32.Thus physical sizes and logical sizes in EXT2 differ as they do in FAT32. • Main components:  Directories.  Inodes.  Data blocks.
  • 68. SECOND EXTENDED FILE SYSTEM(EXT2) • Directories store the filenames in the file sys and the inodes associated with the files. • In EXT2, files are represented by inodes. An inode contains attributes like file type, size, access rights, timestamps address of data blocks. • An Inode is similar to a directory entry in FAT32. Each inode has a unique no. identifying it.
  • 69. SECOND EXTENDED FILE SYSTEM(EXT2) • File sys made up of “block groups” a sequential arrangement of a group of data blocks. The entire file sys is thus managed as a series of block groups. • Block group meta data is provided by a ‘block group descriptor’. It contains a copy of super block(size of inode table and file sys), Block bitmap(tracks allocation of each data block), part of inode table and data blocks.
  • 70. ext2 Characteristics • Complicated internal structure to enhance performance, but on-disk structure is straightforward From: Understanding the Linux Kernel (Bovet/Cesati)
  • 71. ext2 Directory Structure deleted From: Understanding the Linux Kernel (Bovet/Cesati)
  • 72. ext2/3: inode From: Understanding the Linux Kernel (Bovet/Cesati)
  • 73. ext3 Characteristics • Binary compatible with ext2 on-disk • Reason for existence: huge disks == huge amounts of time to restore filesystem consistency after improper shutdown • (Must check inodes, etc.) • Major improvement over ext2: log that stores info about in-progress file operations • On boot, can check log and quickly restore filesystem consistency • Journaling filesystems: DANGER!
  • 74. File Deletion: Linux • ext2 file deletion – Adjust previous directory entry length to obscure deleted record – No reorganization to make space in directories – “first fit” for new directory entries, based on real name length – Directory entry’s inode # is cleared • ext3 file deletion – Same as for ext2, but… – inode is wiped on file deletion, so block numbers are lost – Major anti-forensics issue! – But directory entry’s inode # isn’t cleared…
  • 75. Tools • Sleuthkit • Deft 7.0 • Helix • BackTrack
  • 76. Sleuthkit • Linux toolkit for forensics written by Brian Carrier • http://www.sleuthkit.org/ • Command line tools for forensic analysis under Linux (and now, Windows…) • Graphical interface: Autopsy Forensic Browser
  • 77. Sleuthkit (2) • Data Unit: – dls – copy individual disk blocks – dcat – copy ranges of disk “chunks” – dstat – determine whether block is allocated • Meta Data: – ils – list inodes (e.g., ones corr. to deleted files!) – icat – copy data associated with inode – istat – dump detailed inode info – ifind – find inode associated with a disk block • File Name: – fls – list files/directories in image – ffind – find filename associated with inode • File System: fsstat – Detailed filesystem information
  • 78. “Next Generation” Digital Forensics Meets Linux
  • 79. Filesystem in Userspace (FUSE) • (FUSE) is a loadable kernel module for Unix- like computer operating systems that lets non-privileged users create their own file systems without editing kernel code. This is achieved by running file system code in user space while the FUSE module provides only a "bridge" to the actual kernel interfaces. • FUSE is particularly useful for writing virtual file systems. Unlike traditional file systems that essentially save data to and retrieve data from disk, virtual filesystems do not actually store data themselves. They act as a view or translation of an existing file system or storage device. • In principle, any resource available to a FUSE implementation can be exported as a file system.
  • 80. FUSE (Filesystem in User Space) Filesystem Implementation dd if=/evidence/DEC/img.dd of=copy.dd FUSE library read() user space C library C library kernel space FUSE Linux Virtual File System Interface ext3 (VFS) reiserFS
  • 81. File carving • Is the process of reassembling computer files from fragments in the absence of filesystem metadata. • The carving process makes use of knowledge of common file structures, information contained in files, and heuristics regarding how filesystems fragment data. • Fusing these three sources of information, a file carving system infers which fragments belong together. • File carving is a highly complex task, with a potentially huge number of permutations to try. • To make this task tractable, carving software typically makes extensive use of models and heuristics. This is necessary not only from a standpoint of execution time, but also for the accuracy of the results.
  • 82. In-Place File Carving client applications scalpel_fs FUSE preview database nbd client local drive network nbd server Scalpel remote drive G. G. Richard III, V. Roussev, V. Marziale, “In-Place File Carving,” submitted to the Third Annual IFIP WG 11.9 International Conference on Digital Forensics, 2007.
  • 83. Better Auditing Want: Digital Evidence Bags See: P. Turner, “Unification of Digital Evidence from Disparate Sources (Digital Evidence Bags),” DFRWS 2005 See: Common Digital Evidence Storage Format (CDESF) working group, http://www.dfrws.org/CDESF/.
  • 84. Better Auditing (2) dd scalpel TSK FTK … Applications (User space) Block-level Filesystem Data Access Data Access (Kernel) Operating System VFS Interface FDAM Digital Evidence FDAM Block Device Container Import/ DEC Export Evidence Audit Log (DEB, AFF, Data Gfzip …) G. G. Richard III, V. Roussev, "Toward Secure, Audited Processing of Digital Evidence: Filesystem Support for Digital Evidence Bags," Research Advances in Digital Forensics, Springer, 2006.
  • 85. Bluepipe: On the Spot Digital Forensics Bluepipe Patterns Y. Gao, G. G. Richard III, V. Roussev, “Bluepipe: An Architecture for On-the-Spot Digital Forensics,” International Journal of Digital Evidence (IJDE), 3(1), 2004.
  • 86. <BLUEPIPE NAME=”findcacti”> <!-- find illegal cacti pics using MD5 hash dictionary --> <DIR TARGET=”/pics/” /> <FINDFILE USEHASHES=TRUE LOCALDIR=”cactus” RECURSIVE=TRUE RETRIEVE=TRUE MSG="Found cactus %s with hash %h "> <FILE ID=3d1e79d11443498df78a1981652be454/> <FILE ID=6f5cd6182125fc4b9445aad18f412128/> <FILE ID=7de79a1ed753ac2980ee2f8e7afa5005/> <FILE ID=ab348734f7347a8a054aa2c774f7aae6/> <FILE ID=b57af575deef030baa709f5bf32ac1ed/> <FILE ID=7074c76fada0b4b419287ee28d705787/> <FILE ID=9de757840cc33d807307e1278f901d3a/> <FILE ID=b12fcf4144dc88cdb2927e91617842b0/> <FILE ID=e7183e5eec7d186f7b5d0ce38e7eaaad/> <FILE ID=808bac4a404911bf2facaa911651e051/> <FILE ID=fffbf594bbae2b3dd6af84e1af4be79c/> <FILE ID=b9776d04e384a10aef6d1c8258fdf054/> </FINDFILE> </BLUEPIPE>
  • 87. Distributed Digital Forensics 750GB 750GB V. Roussev, G. G. Richard III, "Breaking the Performance Wall: The Case for Distributed Digital Forensics,“ Proceedings of the 2004 Digital Forensics Research Workshop (DFRWS 2004), Baltimore, MD
  • 88. Distributed Digital Forensics • Scalable – Want to support at least IMAGE SIZE / RAM_PER_NODE nodes • Platform independent – Want to be able to incorporate any (reasonable) machine that’s available • Lightweight – Horsepower is for forensics, not the framework—less fat • Highly interactive • Extensible – Allow incorporation of existing sequential tools – e.g., stegdetect, image thumbnailing, file classification, hashing, … • Robust – Must handle failed nodes smoothly
  • 89. Distributed Digital Forensics (2) Worker Coordinator Worker JOIN / LEAVE HASH / GREP / COMMAND/ … CANCEL / EXIT DONE / REPORT / ERROR FETCH CACHE LOAD SHUTDOWN STARTUP STORE Local Store Common Store
  • 90. Distributed Digital Forensics (3) RAID: 504GB File Server CPU: 2x1.4GHz Xeon SCSI RAM: 2GB 1Gb Switch 96-port, 10/100/1000 Mb 24 Gb Backplane Node CPU: 2.4 GHzPentium 4 RAM: 1 GB