Forensic Discovery (Addison-Wesley Professional Computing Series) / Edition 1

Forensic Discovery (Addison-Wesley Professional Computing Series) / Edition 1

ISBN-10:
020163497X
ISBN-13:
9780201634976
Pub. Date:
12/30/2004
Publisher:
Addison-Wesley
ISBN-10:
020163497X
ISBN-13:
9780201634976
Pub. Date:
12/30/2004
Publisher:
Addison-Wesley
Forensic Discovery (Addison-Wesley Professional Computing Series) / Edition 1

Forensic Discovery (Addison-Wesley Professional Computing Series) / Edition 1

Hardcover

$49.99 Current price is , Original price is $49.99. You
$49.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

"Don't look now, but your fingerprints are all over the cover of this book. Simply picking it up off the shelf to read the cover has left a trail of evidence that you were here.

"If you think book covers are bad, computers are worse. Every time you use a computer, you leave elephant-sized tracks all over it. As Dan and Wietse show, even people trying to be sneaky leave evidence all over, sometimes in surprising places.

"This book is about computer archeology. It's about finding out what might have been based on what is left behind. So pick up a tool and dig in. There's plenty to learn from these masters of computer security."
—Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software and Building Secure Software

"A wonderful book. Beyond its obvious uses, it also teaches a great deal about operating system internals."
—Steve Bellovin, coauthor of Firewalls and Internet Security, Second Edition, and Columbia University professor

"A must-have reference book for anyone doing computer forensics. Dan and Wietse have done an excellent job of taking the guesswork out of a difficult topic."
—Brad Powell, chief security architect, Sun Microsystems, Inc.

"Farmer and Venema provide the essential guide to 'fossil' data. Not only do they clearly describe what you can find during a forensic investigation, they also provide research found nowhere else about how long data remains on disk and in memory. If you ever expect to look at an exploited system, I highly recommend reading this book."
—Rik Farrow, Consultant, author of Internet Security for Home and Office

"Farmer and Venema do for digital archaeology what Indiana Jones did for historical archaeology. Forensic Discovery unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder."
—Richard Bejtlich, technical director, ManTech CFIA, and author of The Tao of Network Security Monitoring

"Farmer and Venema are 'hackers' of the old school: They delight in understanding computers at every level and finding new ways to apply existing information and tools to the solution of complex problems."
—Muffy Barkocy, Senior Web Developer, Shopping.com

"This book presents digital forensics from a unique perspective because it examines the systems that create digital evidence in addition to the techniques used to find it. I would recommend this book to anyone interested in learning more about digital evidence from UNIX systems."
—Brian Carrier, digital forensics researcher, and author of File System Forensic Analysis

The Definitive Guide to Computer Forensics: Theory and Hands-On Practice

Computer forensics—the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators—is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject.

Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever.

The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a wide variety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins.

After reading this book you will be able to

  • Understand essential forensics concepts: volatility, layering, and trust
  • Gather the maximum amount of reliable evidence from a running system
  • Recover partially destroyed information—and make sense of it
  • Timeline your system: understand what really happened when
  • Uncover secret changes to everything from system utilities to kernel modules
  • Avoid cover-ups and evidence traps set by intruders
  • Identify the digital footprints associated with suspicious activity
  • Understand file systems from a forensic analyst's point of view
  • Analyze malware—without giving it a chance to escape
  • Capture and examine the contents of main memory on running systems
  • Walk through the unraveling of an intrusion, one step at a time

The book's companion Web site contains complete source and binary code for open source software discussed in the book, plus additional computer forensics case studies and resource links.


Product Details

ISBN-13: 9780201634976
Publisher: Addison-Wesley
Publication date: 12/30/2004
Series: Addison-Wesley Professional Computing Series
Edition description: First Edition
Pages: 217
Product dimensions: 7.20(w) x 9.58(h) x 0.77(d)

About the Author

Dan Farmer is author of a variety of security programs and papers. He is currently chief technical officer of Elemental Security, a computer security software company. Together he and Wietse Venema, have written many of the world's leading information security and forensics packages, including the SATAN network security scanner and the Coroner's Toolkit.

Wietse Venema has written some of the world's most widely used software, including TCP Wrapper and the Postfix mail system. He is currently a research staff member at IBM Research. Together, he and Dan Farmer have written many of the world's leading information security and forensics packages, including the SATAN network security scanner and the Coroner's Toolkit.

Read an Excerpt

Today, only minutes pass between plugging in to the Internet and being attacked by some other machine—and that's only the background noise level of nontargeted attacks. There was a time when a computer could tick away year after year without coming under attack. For examples of Internet background radiation studies, see CAIDA 2003, Cymru 2004, or IMS 2004.

With this book, we summarize experiences in post-mortem intrusion analysis that we accumulated over a decade. During this period, the Internet grew explosively, from less than a hundred thousand connected hosts to more than a hundred million (ISC 2004). This increase in the number of connected hosts led to an even more dramatic—if less surprising—increase in the frequency of computer and network intrusions. As the network changed character and scope, so did the character and scope of the intrusions that we faced. We're pleased to share some of these learning opportunities with our readers.

In that same decade, however, little changed in the way that computer systems handle information. In fact, we feel that it is safe to claim that computer systems haven't changed fundamentally in the last 35 years—the entire lifetime of the Internet and of many operating systems that are in use today, including Linux, Windows, and many others. Although our observations are derived from today's systems, we optimistically expect that at least some of our insights will remain valid for another decade.What You Can Expect to Learn from This Book

The premise of the book is that forensic information can be found everywhere you look. With this guiding principle in mind, we develop tools to collect information from obviousand not-so-obvious sources, we walk through analyses of real intrusions in detail, and we discuss the limitations of our approach.

Although we illustrate our approach with particular forensic tools in specific system environments, we do not provide cookbooks for how to use those tools, nor do we offer checklists for step-by-step investigation. Instead, we present a background on how information persists, how information about past events may be recovered, and how the trustworthiness of that information may be affected by deliberate or accidental processes.

In our case studies and examples, we deviate from traditional computer forensics and head toward the study of system dynamics. Volatility and the persistence of file systems and memory are pervasive topics in our book. And while the majority of our examples are from Solaris, FreeBSD, and Linux systems, Microsoft's Windows shows up on occasion as well. Our emphasis is on the underlying principles that these systems have in common: we look for inherent properties of computer systems, rather than accidental differences or superficial features.

Our global themes are problem solving, analysis, and discovery, with a focus on reconstruction of past events. This approach may help you to discover why events transpired, but that is generally outside the scope of this work. Knowing what happened will leave you better prepared the next time something bad is about to occur, even when that knowledge is not sufficient to prevent future problems. We should note up front, however, that we do not cover the detection or prevention of intrusions. We do show that traces from one intrusion can lead to the discovery of other intrusions, and we point out how forensic information may be affected by system-protection mechanisms, and by the failures of those mechanisms.Our Intended Audience

We wrote this book for readers who want to deepen their understanding of how computer systems work, as well as for those who are likely to become involved with the technical aspects of computer intrusion or system analysis. System administrators, incident responders, other computer security professionals, and forensic analysts will benefit from reading this book, but so will anyone who is concerned about the impact of computer forensics on privacy.

Although we have worked hard to make the material accessible to nonexpert readers, we definitely do not target the novice computer user. As a minimal requirement, we assume strong familiarity with the basic concepts of UNIX or Windows file systems, networking, and processes.Organization of This Book

The book has three parts: we present foundations first, proceed with analysis of processes, systems, and files, and end the book with discovery. We do not expect you to read everything in the order presented. Nevertheless, we suggest that you start with the first chapter, as it introduces all the major themes that return throughout the book.

In Part I, "Basic Concepts," we introduce general high-level ideas, as well as basic techniques that we rely on in later chapters.


  • Chapter 1, "The Spirit of Forensic Discovery," shows how general properties of computer architecture can impact post-mortem analysis. Many of the limitations and surprises that we encounter later in the book can already be anticipated by reading this chapter.
  • Chapter 2, "Time Machines," introduces the concept of timelining, using examples of host-based and network-based information, including information from the domain name system. We look at an intrusion that stretches out over an entire year, and we show examples of finding time information in non-obvious places.

In Part II, "Exploring System Abstractions," we delve into the abstractions of file systems, processes, and operating systems. The focus of these chapters is on analysis: making sense of information found on a computer system and judging the trustworthiness of our findings.

  • Chapter 3, "File System Basics," introduces fundamental file system concepts, as well as forensic tools and techniques that we will use in subsequent chapters.
  • Chapter 4, "File System Analysis," unravels an intrusion by examining the file system of a compromised machine in detail. We look at both existing files and deleted information. As in Chapter 2, we use correlation to connect different observations, and to determine their consistency.
  • Chapter 5, "Systems and Subversion," is about the environment in which user processes and operating systems execute. We look at subversion of observations, ranging from straightforward changes to system utilities to almost undetectable malicious kernel modules, and detection of such subversion.
  • Chapter 6, "Malware Analysis Basics," presents techniques to discover the purpose of a process or a program file that was left behind after an intrusion. We also discuss safeguards to prevent malware from escaping, and their limitations.

In Part III, "Beyond the Abstractions," we look beyond the constraints of the file, process, and operating system abstractions. The focus of this part is on discovery, as we study the effects of system architecture on the decay of information.

  • Chapter 7, "The Persistence of Deleted File Information," shows that large amounts of deleted file information can survive intact for extended periods. We find half-lives on the order of two to four weeks on actively used file systems.
  • Chapter 8, "Beyond Processes," shows examples of persistence of information in main memory, including the decrypted contents of encrypted files. We find large variations in persistence, and we correlate these variations to operating system architecture properties.

The appendices present background material: Appendix A is an introduction to the Coroner's Toolkit and related software. Appendix B presents our current insights with respect to the order of volatility and its ramifications when capturing forensic information from a computer system.Conventions Used in This Book

In the examples, we use constant-width font for program code, command names, and command input/output. User input is shown in bold constant-width font. We use $ as the shell command prompt for unprivileged users, and we reserve # for super-user shells. Capitalized names, such as Argus, are used when we write about a system instead of individual commands.

Whenever we write "UNIX," we implicitly refer to Solaris, FreeBSD, and Linux. In some examples we include the operating system name in the command prompt. For example, we use solaris$ to indicate that an example is specific to Solaris systems.

As hinted at earlier, many examples in this book are taken from real-life intrusions. To protect privacy, we anonymize information about systems that are not our own. For example, we replace real network addresses with private network addresses such as 10.0.0.1 or 192.168.0.1, and we replace host names or user names. Where appropriate, we even replace the time and time zone.Web Sites

The examples in this book feature several small programs that were written for the purpose of discovery and analysis. Often we were unable to include the entire code listing because the additional detail would only detract from the purpose of the book. The complete source code for these and other programs is made available online at these Web sites:http://www.fish.com/forensics/
http://www.porcupine.org/forensics/

On the same Web sites, you will also find bonus material, such as case studies that were not included in the book and pointers to other resources.

Table of Contents

Prefacexiii
About the Authorsxix
Part IBasic Concepts1
Chapter 1The Spirit of Forensic Discovery3
1.1Introduction3
1.2Unusual Activity Stands Out4
1.3The Order of Volatility (OOV)5
1.4Layers and Illusions8
1.5The Trustworthiness of Information10
1.6The Fossilization of Deleted Information12
1.7Archaeology vs. Geology13
Chapter 2Time Machines17
2.1Introduction17
2.2The First Signs of Trouble17
2.3What's Up, MAC? An Introduction to MACtimes18
2.4Limitations of MACtimes20
2.5Argus: Shedding Additional Light on the Situation21
2.6Panning for Gold: Looking for Time in Unusual Places25
2.7DNS and Time28
2.8Journaling File Systems and MACtimes31
2.9The Foibles of Time34
2.10Conclusion35
Part IIExploring System Abstractions37
Chapter 3File System Basics39
3.1Introduction39
3.2An Alphabet Soup of File Systems40
3.3UNIX File Organization40
3.4UNIX File Names44
3.5UNIX Pathnames44
3.6UNIX File Types45
Regular Files45
Directories45
Symbolic Links46
IPC Endpoints46
Device Files47
3.7A First Look Under the Hood: File System Internals48
3.8UNIX File System Layout54
3.9I've Got You Under My Skin: Delving into the File System55
3.10The Twilight Zone, or Dangers Below the File System Interface56
3.11Conclusion57
Chapter 4File System Analysis59
4.1Introduction59
4.2First Contact59
4.3Preparing the Victim's File System for Analysis60
4.4Capturing the Victim's File System Information61
4.5Sending a Disk Image Across the Network63
4.6Mounting Disk Images on an Analysis Machine65
4.7Existing File MACtimes68
4.8Detailed Analysis of Existing Files70
4.9Wrapping Up the Existing File Analysis72
4.10Intermezzo: What Happens When a File Is Deleted?73
Parent Directory Entry75
Parent Directory Attributes75
Inode Blocks75
Data Blocks76
4.11Deleted File MACtimes76
4.12Detailed Analysis of Deleted Files77
4.13Exposing Out-of-Place Files by Their Inode Number78
4.14Tracing a Deleted File Back to Its Original Location80
4.15Tracing a Deleted File Back by Its Inode Number81
4.16Another Lost Son Comes Back Home82
4.17Loss of Innocence82
4.18Conclusion85
Chapter 5Systems and Subversion87
5.1Introduction87
5.2The Standard Computer System Architecture88
5.3The UNIX System Life Cycle, from Start-up to Shutdown89
5.4Case Study: System Start-up Complexity90
5.5Kernel Configuration Mechanisms92
5.6Protecting Forensic Information with Kernel Security Levels95
5.7Typical Process and System Status Tools96
5.8How Process and System Status Tools Work99
5.9Limitations of Process and System Status Tools100
5.10Subversion with Rootkit Software101
5.11Command-Level Subversion102
5.12Command-Level Evasion and Detection102
5.13Library-Level Subversion106
5.14Kernel-Level Subversion107
5.15Kernel Rootkit Installation107
5.16Kernel Rootkit Operation108
5.17Kernel Rootkit Detection and Evasion111
5.18Conclusion115
Chapter 6Malware Analysis Basics117
6.1Introduction117
6.2The Dangers of Dynamic Program Analysis118
6.3Program Confinement with Hard Virtual Machines119
6.4Program Confinement with Soft Virtual Machines119
6.5The Dangers of Confinement with Soft Virtual Machines121
6.6Program Confinement with Jails and chroot ()122
6.7Dynamic Analysis with System-Call Monitors123
6.8Program Confinement with System-Call Censors126
6.9Program Confinement with System-Call Spoofing129
6.10The Dangers of Confinement with System Calls131
6.11Dynamic Analysis with Library-Call Monitors132
6.12Program Confinement with Library Calls133
6.13The Dangers of Confinement with Library Calls135
6.14Dynamic Analysis at the Machine-Instruction Level136
6.15Static Analysis and Reverse Engineering136
6.16Small Programs Can Have Many Problems140
6.17Malware Analysis Countermeasures141
6.18Conclusion141
Part IIIBeyond the Abstractions143
Chapter 7The Persistence of Deleted File Information145
7.1Introduction145
7.2Examples of Deleted Information Persistence146
7.3Measuring the Persistence of Deleted File Contents147
7.4Measuring the Persistence of Deleted File MACtimes149
7.5The Brute-Force Persistence of Deleted File MACtimes149
7.6The Long-Term Persistence of Deleted File MACtimes153
7.7The Impact of User Activity on Deleted File MACtimes154
7.8The Trustworthiness of Deleted File Information156
7.9Why Deleted File Information Can Survive Intact157
7.10Conclusion159
Chapter 8Beyond Processes161
8.1Introduction161
8.2The Basics of Virtual Memory162
8.3The Basics of Memory Pages164
8.4Files and Memory Pages164
8.5Anonymous Memory Pages165
8.6Capturing Memory165
8.7The savecore Command167
Memory Device Files: /dev/mem and/dev/kmem168
Swap Space169
Other Memory Locations169
8.8Static Analysis: Recognizing Memory from Files171
8.9Recovering Encrypted File Contents Without Keys172
Creating an Encrypted File172
Recovering the Encrypted File from Main Memory172
8.10File System Blocks vs. Memory Page Technique173
8.11Recognizing Files in Memory175
8.12Dynamic Analysis: The Persistence of Data in Memory177
8.13File Persistence in Memory179
8.14The Persistence of Nonfile, or Anonymous, Data180
8.15Swap Persistence182
8.16The Persistence of Memory Through the Boot Process182
8.17The Trustworthiness and Tenacity of Memory Data182
8.18Conclusion185
Appendix AThe Coroner's Toolkit and Related Software187
A.1Introduction187
A.2Data Gathering with grave-robber187
A.3Time Analysis with mactime188
A.4File Reconstruction with lazarus189
A.5Low-Level File System Utilities191
A.6Low-Level Memory Utilities192
Appendix BData Gathering and the Order of Volatility193
B.1Introduction193
B.2The Basics of Volatility193
B.3The State of the Art194
B.4How to Freeze a Computer195
Before You Start196
Actually Collecting Data197
B.5Conclusion198
References199
Index207
From the B&N Reads Blog

Customer Reviews