Internet Evidence Finder Report

2y ago
4 Views
1 Downloads
1.59 MB
33 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Shaun Edmunds
Transcription

Patrick Leahy Center for Digital Investigation (LCDI)Internet Evidence Finder ReportWritten and Researched byNick Murray175 Lakeside Ave, Room 300APhone: 802/865-5744Fax: 802/865-6446http://www.lcdi.champlin.eduJuly 2013IEF Report 6/28/2013Page 1 of 33

Patrick Leahy Center for Digital Investigation (LCDI)Disclaimer:This document contains information based on research that has been gathered by employee(s) of The SenatorPatrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submittedvoluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of thedata contained in this report. However, LCDI nor any of our employees make no representation, warranty orguarantee in connection with this report and hereby expressly disclaims any liability or responsibility for lossor damage resulting from use of this data. Information in this report can be downloaded and redistributed byany person or persons. Any redistribution must maintain the LCDI logo and any references from this reportmust be properly annotated.ContentsIntroduction . 5Prior Work:. 7Purpose and Scope: . 7Research Questions: . 7Methodology and Methods . 7Reference Set: . 101Software . 102Equipment . 112.1Write Blocker . 11Results . 11IEF Report . 12Chat . 13AIM . 14Google Talk . 14ICQ . 14MIRC . 14ooVoo . 15Skype . 15Trillian . 17Yahoo Messenger . 17Cloud . 18Dropbox . 18IEF Report 6/28/2013Page 2 of 33

Patrick Leahy Center for Digital Investigation (LCDI)Flickr . 19Google Docs . 19Google Drive . 20Google Drive Desktop App . 20Skydrive . 21Email . 22Gmail Fragments . 22Gmail Webmail. 23Hotmail Webmail . 23Yahoo Webmail . 24Mobile Backups. 24iOS backup . 24Web History . 24Google Chrome. 24Firefox . 25Internet Explorer . 26Opera . 26Safari . 27Peer to Peer. 27torrent File Fragments . 27Ares search keywords . 27Emule Search Keywords . 28Limewire/Frostwire . 28Social Networking . 29Bebo . 29Facebook Chat . 30Facebook Pages . 30Google . 30LinkedIn. 30MySpace . 30Twitter . 30Conclusion . 31IEF Report 6/28/2013Page 3 of 33

Patrick Leahy Center for Digital Investigation (LCDI)Further Work . 32Reference . 33IEF Report 6/28/2013Page 4 of 33

Patrick Leahy Center for Digital Investigation (LCDI)IntroductionParsing internet data can be a difficult task. Internet Evidence Finder (IEF) can find and retrieve any and allsupported internet related artifacts, benefitting the investigation by speeding up the process of parsing the data.It provides artifact information for: web browsers (Google Chrome, Mozilla Firefox, Internet Explorer, etc.);chat programs (AIM, Google Talk, Yahoo Messenger); email (Gmail, Hotmail, Yahoo Mail); and torrentprograms (Ares, Frostwire, eMule) among others.Manually looking for this information often proves to be a difficult and time consuming task. Many of theartifact files are filled with what may seem like unimportant data and are not easy to read. These files, thoughthey might hold crucial data, contain a lot of seemingly random letters, symbols, and words that probably do notmean much, unless the person viewing them knows what he or she is viewing, such as a Digital ForensicExaminer. Because the data is challenging to interpret, a Digital Forensic Examiner should confirm any and allof the results from IEF with the actual artifacts located on the evidence.Figure 2 is a picture of a Chrome cache file that IEF found. IEF also has a rebuild webpages feature thatattempts to rebuild a webpage exactly as the user saw it at the time of access, allowing investigators a glimpseinto the user’s activity. Figure 3 is screenshot of part of a page that IEF has rebuilt. Again, a Forensic Examinershould conduct further research to verify that the information presented is accurate.Figure 1 is a screen shot of all of the artifacts IEF 5.6 supports, along with the programs we generated dataon, received results from, and did not receive results from.Figure 1FrostwireIEF Report 6/28/2013LimewirePage 5 of 33

Patrick Leahy Center for Digital Investigation (LCDI)Figure 2Figure 3IEF Report 6/28/2013Page 6 of 33

Patrick Leahy Center for Digital Investigation (LCDI)Prior Work:There have been a small number of blogs published on various forensics sites that have reviewed orevaluated IEF. The first blog 1we researched talked primarily about IEF’s aesthetics and ease of use; nothingwas mentioned of how accurate the program was or how the program results compared to the investigator’snotes. The second blog2 we viewed was the only one we researched to review IEF and discuss how accurate theresults were. They make mention of how the reported times were accurate to their notes in their review. Thethird review,3 like the first, is more of a tutorial of how to use IEF and makes no reference to the accuracy of theprogram. Whoever was conducting the evaluation also ran IEF on a failing drive that “experienced many readerrors [sic].” We could not find any other reviews or evaluations of IEF.Purpose and Scope:The purpose of this project is to evaluate Internet Evidence Finder as well as determine what information isrelayed to the investigator and how accurate this information is. Two supported evidence items will be used forIEF to parse: a drive that will be used to generate data and an image of that drive. The IEF results from both willbe compared for inconsistencies. Secondary to this, we will be creating a tutorial outlining how local lawenforcement can make use of IEF.Research Questions:1. Does Internet Evidence Finder accurately report user generated information from the supportedapplications?2. How accurate is the information given in relation to timestamp information, content, location, URL, andusers as compared to our notes?Methodology and MethodsFor this project, our team used a Window 7 computer with a premade image that is a used as a standardinstallation on all of our computers at the LCDI. We researched all of the artifacts that IEF supports, giving us abetter understanding of which artifacts we would be able to generate data for. We made the decision todownload and install all of the programs, create the necessary accounts where needed or applicable, generate thedata, and document any and all of the steps we took during this process. I used two computers for thisexperiment. The computer used to generate data on is called the Data Computer. The second computer, calledthe Com Computer, was used to communicate with the Data computer when the chat programs were used. Onthe Com computer, we downloaded and installed all of the necessary chat programs and created accounts whenneeded. After the programs were installed and the accounts were created, we began sending messages back andforth between the Com Computer and Data Computer. After we finished with the chat programs, weconcentrated on the Cloud programs. We downloaded the programs needed and installed them; Flickr did nothave an application to download, so we generated information on their website using Opera. We then generateddata for Email (Gmail, Hotmail, and Yahoo Mail). We created an account for Hotmail and used the accounts wehad created for the chat programs to log into Gmail and Yahoo. We sent out emails in a circular fashion, so that1Forensic Focus. (n.d.). Internet Evidence Finder (IEF). Retrieved July 14, 2013, from http://www.forensicfocus.com/c/aid e, J. (2013, March 15). Review: Internet Evidence Finder (IEF) v6.0.Forensiccom RSS. Retrieved July 14, 2013, eview-internet-evidence-finder-v6-0/3O'Leary, R. J. (2012, November 7). Internet Evidence Finder Version 5.6.0. Justnet. Retrieved July 14, 2013, from EF Report 6/28/2013Page 7 of 33

Patrick Leahy Center for Digital Investigation (LCDI)each account would have sent an email and received an email. We then began downloading, installing, andgenerating data with the peer to peer programs individually. After we generated data with the P2P programs, wegenerated data on the social networking sites. During the process of generating data on the social networkingsites, we connected two different iPhones to the Data Computer; we backed up one phone. During the course ofgenerating data for the chat programs, Cloud programs, Email, Mobile IOS backups, P2P programs, and SocialNetworking sites, we used all of the supported Web browsers to generate data. Once all of the data wasgenerated on the Data computer, we shut down all of the programs that were still running and then shut downthe computer. We then removed the hard drive, connected it to a write blocker, and took an image of the harddrive using FTK Imager. To analyze the hard drive, we plugged it into a write blocker hooked up to the ComComputer and ran IEF on the hard drive. Additionally, the image was loaded onto the Com Computer and IEFwas run against it. After both the reports were generated, we compared the results; both sets of results wereidentical. We took the report for the image and compared it to our notes. Figure 4 is a table of our results.Figure 4ProgramAIMData GeneratedXIEF resultsN/AGoogle TalkXN/AMail.ru ChatXN/AMessenger PlusXN/AICQXN/AMIRC ooVoo Second LifeXN/ASkype Trillian Windows Live MessengerXN/AWorld of WarcraftXN/AYahoo Messenger IEF Report 6/28/2013AIM was used but no data was generated due to alog setting in the program that was not enabled.Therefor no logs were saved locally to thecomputerGoogle Talk was used but no data was generateddue to a log setting in the program that was notenabled. Therefor no logs were saved locally tothe computerThis program was not used because it was inRussianThis program was not used because this add-on isno longer supported.ICQ was used but no data was generated due to alog setting in the program that was not enabled.Therefor no logs were saved locally to thecomputerResults were mostly accurate, in one case atimestamp was off by one minuteThe Results from this were accurate and reflectedour notesThis Program was not used because we decidednot to use this programResults show three categories of artifacts, onecontaining complete information.The results were accurate but contained a lot ofrepeated resultsThis Program was not used because it is no longersupported by MicrosoftThis Program was not used because we decidednot to use this programThe results were encrypted and the timestampsPage 8 of 33

Patrick Leahy Center for Digital Investigation (LCDI)Dropbox Flickr Google DocsGoogle Drive Sky Drive Gmail Hotmail XYahoo Mail XiOS backupXN/ATorrent file artifacts Ares search Keywords EmuleGigatribe X N/ALimewireXN/AFrostWireShareaza XN/ABeboXN/AFacebook Google XN/ALinkedInXN/AIEF Report 6/28/2013were offThe results that were recovered were accurate butthere were a couple of pictures missing from theresultsThis service was used but data was not generatedduring its useReturned results for 2 picturesReturned several results for one category butthere was not identifying information. The othercategory returned accurate results and hadidentifying informationReturned multiple results, some with the sameinformation repeated. There was one file on in theresults that was not generated by the userThese results showed both email fragments andwhat IEF interpreted as whole emails. Both ofthese categories returned accurate resultsThis Service was used but IEF did not return anyresultsThis Service was used but IEF did not return anyresultsA phone was synced to the computer but thephone never saved a backup to the computer.Returned repeated results for the same file.Timestamp information for file was incorrectReturned repeated results for the same keywordsearchReturned results for keyword searchThis program was used but the user did notgenerate chat data during its use.This Program was not used because it has beendiscontinued and we had no way to get access toit.Returned results for configuration filesThis program was used but the user did notgenerate chat data during its use.This service was used but data was not generatedduring its use.Return results but the results were not usergeneratedThis service was used but data was not generatedduring its use. IEF only finds chat related artifactson this service only if the log chat option isselected.This service was used but data was not generatedduring its use. IEF only finds chat related artifactson this service only if the log chat option isselected.Page 9 of 33

Patrick Leahy Center for Digital Investigation (LCDI)MySpaceXN/ATwitter Chrome Firefox Internet Explorer Opera Safari This service was used but data was not generatedduring its use. IEF only finds chat related artifactson this service only if the log chat option isselected.Returned results but had no identifyinginformationReturn thousands of results over severalcategories. The information looked at appears tobe accurateReturn thousands of results over severalcategories. The information looked at appears tobe accurateReturned results from before the project wasstarted. No results return from the time from ofthis projectReturned accurate results but some of the sameresults were repeated multiple timesReturned accurate results but some of the sameresults were repeated multiple timesReference Set:1 SoftwareProgram NameAIMGoogle TalkMail.ru ChatMessenger PlusICQMIRCooVooSecond LifeSkypeTrillianWindows Live MessengerWorld of WarcraftYahoo MessengerDropboxFlickrGoogle DocsGoogle DriveSky DriveGmailHotmailYahoo MailIEF Report 6/28/2013Version8.0.1.51.0.0.105N/AN/ABuild 60177.323.5.8.22N/A6.3.0.1075.3 build 011.0627N/AN/AN/APage 10 of 33

Patrick Leahy Center for Digital Investigation (LCDI)iOS backupTorrent file artifactsAres search oFacebookGoogle LinkedInMySpaceTwitterChromeFirefoxInternet 1661812.15.17485.34.57.2EquipmentData ComputerMemoryProcessorsHDD4GBIntel Core2 Quad Q9450 @ 2.66GhzOSWindows 71TB, Western Digital SATACom ComputerMemoryProcessorsHDD16GBIntel Core i7-3770K CPU 3.50GHzOSWindows 7500GB, Western Digital SATA2.1 Write BlockerWiebetech Forensic Ultradockv42.2 FTK ImagerVersion 3.1.1.8ResultsIEF Report 6/28/2013Page 11 of 33

Patrick Leahy Center for Digital Investigation (LCDI)During the process of generating data on the Data Computer, we took careful notes of what actions weperformed and when so we could compare them to the results we retrieved from IEF. IEF claims to support avariety of internet-based programs, but each one should be tested with IEF to see how accurate the informationgiven is. Figure 1 shows all of the programs supported by IEF 5.6.8.Figure 5 is an artifact report from IEF that shows the number of results IEF was able to recover. Both the Image and the Drive showedidentical results toFigure 5, the IEF results from the drive. Beyond this, we will discuss each artifact, if applicable, and how thereport compares to our notes.Note: IEF reports time stamps in UTC while we recorded our notes using EST. The time conversion from UTCto EST is a difference of four hours. We will not be explaining the time conversions for each artifact. The timeswill, and should be, a difference of about four hours: i.e. if we say that IEF reported that we googled“something” at 1300 and our notes say we googled “something” at 0900, then this is correct.IEF ReportOf the 24 programs that were used to generate data, IEF returned results for 22 of them (see Figure 1).IEF Report 6/28/2013Page 12 of 33

Patrick Leahy Center for Digital Investigation (LCDI)Figure 5ChatChat programs are used to easily and quickly communicate. Chat artifacts can be generated from a numberof different locations, such as from a downloaded chat program or a website. We used several programssupported by IEF to attempt to generate data.IEF Report 6/28/2013Page 13 of 33

Patrick Leahy Center for Digital Investigation (LCDI)AIMWe used AIM to generated data, including adding a contact, sending messages, receiving messages, andsending files, but IEF did not report any information. AIM was not set up to log chat information.Google TalkWe used Google Talk to generated data, including adding a contact, making a call, sending and receivingmessages, and sending and receiving files. IEF did not report any information. Like AIM, Google talk was notset up to log any chat information.ICQWe used ICQ to generated data, including sending and receiving messages and adding a contact. ICQ wasnot set up to log any chat information either and did not report any information.MIRCWe used MIRC to generate data, but we were unfamiliar with the program. IEF does not display anytimestamp information in the report (Figure 6), but does display the contents of the logs from MIRC containingtime stamp information. The IEF report contained one abnormal result; the Mirc log (Figure 7) shown in IEFdisplays us joining a MIRC channel at 14:56:56 on 6/5/13 while our notes show that we joined the MIRCchannel at 14:55. This log also shows that we closed the channel at 14:58:21 on the same day, which matchesour notes (14:58). We are not sure why the join times were recorded differently and the close times are thesame, but one theory is that it may have taken some time to join the channel.Figure 6IEF Report 6/28/2013Page 14 of 33

Patrick Leahy Center for Digital Investigation (LCDI)Figure 7Note: MIRC displays its timestamp data in local time, in this case EST, so no time conversion is necessary whenlooking at MIRC results.ooVooIEF reports that there are two contacts for ooVoo: “n perry” and “john smith.” These results as well as theemail addresses listed for each user match our notes. These chat artifacts (Figure 8) recovered from ooVoo areconsistent with the messages sent and times sent in our notes. .Figure 8SkypeIEF reported one account for Skype, “john smith,” which is the account we created for the Data Computer.IEF reports two contacts for Skype, “n perry” and “Echo / Sound Test Service.” The “n perry” contact is theaccount created on the Test Computer, and the “Echo / Sound ” account is a default contact. IEF reports thaton 6/5/13 an outbound call was made to nperry at 20:12:44, and our notes confirm that this call was made at16:12 on the same day. IEF displays a number of results for Skype chat artifacts (Figure 9.1, Figure 9.2, Figure 9.3), but each result is comparable to the others and contains specific information such as the timestamp andmessage The Skype Chat Messages (Figure 9.1) have the most accurate information; every entry matched ournotes. Articles five and six in Figure 9.1 correspond with calls placed. Figure 9.1 also displays messages sentwithin the Skype Chat. Figure 9.2displays the incomplete results from certain applications such as the Skype chatsync, as well as an incorrecttime stamp for the third item (our notes say the messages were sent at 16:14). Skype chatsync MessagesCarved (Figure 9.3) does not show that the message “ih” was sent.IEF Report 6/28/2013Page 15 of 33

Patrick Leahy Center for Digital Investigation (LCDI)Skype Chat MessagesFigure 9.1Skype chatsync MessagesFigure 9.2Skype chatsync Messages CarvedFigure 9.3IEF Report 6/28/2013Page 16 of 33

Patrick Leahy Center for Digital Investigation (LCDI)TrillianThe results from Trillian (Figure 10) matched our notes, but contained a number of repeated artifacts. Thismessage corresponds with the same message (“big ups” sent: 16:30 6/5/13) that we sent and then recorded inour notes.Figure 10Yahoo MessengerWe were unable to match the results from Yahoo Messenger (Figure 11) to our notes because the messageswere encrypted and the timestamp information is not accurate. The username in Figure 11 matches theusername for the account that we created.Figure 11IEF Report 6/28/2013Page 17 of 33

Patrick Leahy Center for Digital Investigation (LCDI)CloudCloud storage is a new technology that allows users to quickly and easily store any and all data onto one ofthe many cloud services, allowing access from almost anywhere. When cloud services are accessed, they leavebehind a large number of artifacts. . We used several cloud services to generate data for IEF.DropboxWe used both the application and web versions of Dropbox to generate data. The Dropbox results fromIEF closely match our notes as well as the original files located on Dropbox, with the exception of one image,“Boston City Flow.jpg” (Figure 12), and one wallpaper, arina-of-time-33855205-1920-1080.png” (Figure 13), which appear to be missing from the IEF report butappear on Dropbox. Figure 14 is a picture of what IEF interprets to be the directory structure of Dropbox. Thereis a cached reference to the files located on Dropbox, but there is no reference to the files in the Dropboxdirectory structure. The IEF references do not contain any content found within the files, only their names,directory structure, and location on the disk. Figure 15 is the local Dropbox folder on the Data Computer.Figure 12Figure 13IEF Report 6/28/2013Page 18 of 33

Patrick Leahy Center for Digital Investigation (LCDI)Figure 14Figure 15Other pictures used during this project are located in another section of the folder structure.FlickrOn 6/6/13 at 08:43, we went to Flickr on the Opera browser and created an account. At 08:56. our notes saythat four pictures were uploaded to Flickr. However, there was an issue uploading the pictures to Flickr, whichmay explain why IEF did not return any result

data for Email (Gmail, Hotmail, and Yahoo Mail). We created an account for Hotmail and used the accounts we had created for the chat programs to log into Gmail and Yahoo. We sent out emails in a circular fashion, so that 1 Forensic Focus. (n.d.). Internet Evidence Finder (IEF).

Related Documents:

Running a Scan in Identity Finder Identify Finder is supported on both Windows PC and Mac. Windows PC 1. In the Windows search bar, type Identity Finder. 2. The Identity Finder App should appear. 3. Click the Identify Finder icon. Mac 1. Click the Application Folder. 2. Click the Identity Finder icon.

2. Run the Identity Finder program: Applications Identity Finder.app. 3. If this is the first time using Identity Finder, you will be asked to create a New Identity Finder Profile, and be prompted to enter and confirm a password. It is advised that you create a unique password solely for Identity Finder.

2. Run the Identity Finder program: Start Menu Programs Identity Finder Identity Finder. 3. If this is your first time using Identity Finder, you will be asked to create a New Identity Finder Profile, and be prompted to enter and confirm a password. It is advised that you create a unique password solely for Identity Finder. 4.

Using Identity Finder Open Identity Finder Start All Programs Identity Finder Identity Finder Create a password Protects sensitive information you may enter while searching (such as passwords for other computers) No way to recover or reset password later, so choose wisely Use secure method to note your password (such as "secure

Comes with instructions. #7 Helio Pod Solar Finder Model HP-2 and HP-2-B Helio Pod Solar Finder Model 2 and Model 2 Big from Dynapod. Model 2 mounts easily on telescopes up to 10” diameter, model 2 B mounts on telescopes up to 16” diameter. It is also a a simple but accurate finder for solar viewing. Saddle mount won't mar telescope tubes,

9. If you plan to use Identity Finder to store passwords for work files, store a written copy of the password in a locked location in your office and make your supervisor aware of the location for business continuity. 10. Click OK and then quit Identity Finder. 11. Launch Identity Finder again and you will be prompted for the PIF password. 12.

Secure Identity Finder Results File The secure Identity Finder results file is the preferred method for saving results and can be used to save the results for later review and remediation. This is the only results file that can be reopened in Identity Finder. To save the results in a password protected file, click Save from the File menu. Choose a

Secure Identity Finder Results File The secure Identity Finder results file is the preferred method for saving results and can be used to save the results for later review and remediation. This is the only results file that can be reopened in Identity Finder. To save the results in a password protected file, click Save from the File menu. Choose a