Forensic Blogs

An aggregator for digital forensics blogs

September 17, 2019 by LCDI

Magnet User Summit 2019

Introduction

During the first week of April, I had the chance to go to the Magnet User Summit in Tennessee. During the trip I met many Champlain students that I wouldn’t have known if I hadn’t gone. I also had the chance to talk with upperclassmen within my major who told me about their experience at Champlain. They gave me pointers on opportunities that I should take advantage of while at Champlain.

During this conference, I learned about many topics within the digital forensics field. Specifically, I had the chance to learn more about how to leverage Python within PowerShell and how I could further my knowledge about PowerShell and Python. I was also able to learn about IoT and the artifacts that someone could find within devices that people use every day.

One of the sessions that stood out the most to me was the session called “IOC Easy as 1-2-3”. During this session, the presenters talked about the term IOC referring to the Indicator of Compromise. Attackers easily breached a leading company’s software because nobody looked in the file where it was located. There ended up being multiple files with funny names like “totallynotavirus” within a folder containing software from the company FireEye. The files clearly contained malware from attackers who had access to the system. The presenters also mentioned that the IT team at the business was compromised and was quite embarrassed about this happening. It goes to show that even a company like FireEye software may have vulnerabilities even though it’s meant to protect a computer system.

Conclusion

Overall, I believe that going to the Magnet User Summit was a great learning experience. I was able to learn about many new things in the field of digital forensics. I also was able to meet new people, both from Champlain and industry professionals. It was a great experience for me and I hope to be able to attend more in the future. I highly recommend MSU to anyone interested in going to a conference. Learn as much as you can and have fun!

Blog written by Champlain College’s Liam Barry.

Be sure to check us out on Twitter @ChampForensics, Instagram @ChampForensics, and Facebook @Champlainforensics to see other important information pertaining to our project!

The post Magnet User Summit 2019 appeared first on The Leahy Center for Digital Forensics & Cybersecurity.

Read the original at: The Leahy Center for Digital Forensics & CybersecurityFiled Under: Digital Forensics, Uncategorized Tagged With: Champlain College, conference, Digital forensics, Events, LCDI, Magnet, Magnet Forensics

April 25, 2019 by LCDI

Elcomsoft Tool Evaluation Blog 3

More Evaluations & Final Report! Recently we’ve focused on evaluating more Elcomsoft applications as well as putting together our final report. We continued to use the same scoring criteria from our previous blog to test these tools. The applications we tested include Advanced PDF Password Recovery, Proactive System Password Recovery, Advanced Archive Password Recovery, Elcomsoft System Recovery, Elcomsoft Cloud eXplorer, Elcomsoft Internet Password Breaker, and Distributed Password Recovery. Advanced PDF Password Recovery: Advanced PDF Password Recovery is another helpful program by Elcomsoft and can decrypt any password protected PDF files. This program is nearly identical to Advanced Archive Password Recovery in the way it looks and operates. The only notable difference about the two tools is that Advanced PDF Password Recovery has a few more attack options. These are: brute force, mask, dictionary, plain-text, winzip recovery, and password from keys. Similar to Advanced Archive Password Recovery, the user will have to read through the available manual to understand all the functions and attacks.

(interface of Advanced PDF Password Recovery)

Once the user has input the encrypted PDF into the program, it will get to work. Depending on the type of attack and the set specifications, it can take a fair amount of time to finish. The program will get the password and decrypt the document as long as the password fits within the set parameters.   We have tested this program with multiple passwords ranging in length character types, and we have come to a conclusion about the program. We give this tool a score of 5. The program is completely functional and will get the task done; however, in order to be certain of which attack to use, as well as the capabilities of the program, the user will want to reference the help manual and a few online tutorials to fully understand the tool. Because this application is almost identical to Advanced Archive Password Recovery, it seems appropriate they should receive the same score. They are both well-made tools, but could use improvement in the same areas. Proactive System Password Recovery:

Using the same scale, we would rate Proactive System Password Recovery a 3. This tool is simple to use and its tasks can be performed with the touch of a button. There are five different sections of information to find and use on the program. The sections include main menu, advanced features, revelation, misc, and Recover PWL. Each section has a unique purpose and finds different information.

We accessed this information easily. The tool does everything on its own since it just takes the information from the system. With administrator access, the use can do more  with the tool. They can decrypt some of the information found from the system like hashes, passwords, and more. The information will all save to a file to reference later which shows all the information captured from each tool.

Advanced Archive Password Recovery:

Advanced Archive Password Recovery is a useful program that can obtain the password of encrypted ZIP and RAR files. After spending some time evaluating, we’ve become familiar with the ins and outs of this tool. The interface of the program reminded us of the Advanced Office Password Recovery program, also distributed by Elcomsoft, but with fewer options for types of attacks. These attack choices include brute force, dictionary, mask, and key search. Since each of these attacks usually takes a significant amount of time, the user will have options to narrow down the specifications a bit in ways such as password length, range options (i.e. lower-case, upper-case, numbers, symbols, etc.), and dictionary types.

(interface of Advanced Archive Password Recovery)

To break the encryption, the user will need to choose the specific ZIP or RAR file and then specify how the attack should approach the file. Once the process has started, the tool will notify the user how long it will take until all the password possibilities have been exhausted. 

After testing this program with multiple password protected files, we have decided to give the program a 5. The tool will definitely retrieve the password as long as the user inputs the correct specifications and uses it on either a ZIP or RAR files. The program interface and tool options are clustered and someone with no experience in the field would most likely not know how to run the program. They would need to browse the manual to understand the process and it would take a significant amount of time studying the program to understand all the available features in the tool. Overall, however, the tool works well and isn’t too complex to the point where it is not usable with a bit of extra spare time to understand it.

Elcomsoft System Recovery:

Following the same evaluation process, we would rate Elcomsoft System Recovery a 5. This tool requires some work that will take experience. However, the interface is easy to read and understand. In order to download the system files, the user has to create a partition of a drive for a USB to download the files to. After, the user can open the tool, navigate throughout the wizard, and create the ESR bootable disk on the USB. The tool will download a copy image of the files.

Once everything is copied onto the USB, it’s safe to remove and power down the computer completely. The USB needs to be plugged back into the computer which then needs to be powered on again. The user needs to quickly gain access to the BIOS screen which will pop-up the Elcomsoft version of the BIOS screen from the USB. From there, the user will have multiple options of what to do with the system files. Under the CMD.EXE, they can change the local user account, dump password hashes, dump domain cached credentials, backup SAM (where you can change computer passwords to get access to computer systems as though they are yours), and restore SAM (in case something goes wrong) and SAM editor.

Elcomsoft Cloud eXplorer:

After testing Elcomsoft Cloud eXplorer, we believe this program is everything anyone could ask for in a tool like this. Upon opening, the user will be greeted with a clean looking program with hardly any options and zero clutter. The user’s only options (besides changing the settings and checking the help manual) are to add a Google snapshot or to download a Google Drive file. Upon selecting either of these choices, the user will be asked to enter the Google account information or a Google Token to gain access to the info. If that’s successful, the program will allow them to choose what they want to download from the account, including the drive, computer, and deleted and shared files.

(interface of Elcomsoft Cloud eXplorer)

The important thing to note about this program is that its job is not to figure out the password to the Google Account. It assumes the user has the password already and simply wants to download the files from the account.

After all of that is done and the download location has been selected, all the files can be viewed. Everything is presented in an organized file format so the user can find exactly what they are looking for. We’ve used this program for multiple Google accounts and it completes the task at a relatively fast pace every time. Seeing as the program is extremely simple and how well it functions, we give this tool a score of 1. We feel most anyone would be able to use it on their first attempt without any assistance and that there isn’t a better program out there to download Google Drive files and Google Snapshots. This is one of Elcomsoft’s best products we’ve tested so far and is worthy of earning a coveted score of 1.

Elcomsoft Internet Password Breaker:

Using the above scale, we would rate Elcomsoft Internet Password Breaker a 3. This tool does everything really simply. The user can open a PST file, Web Browsers or Mail. The web Browsers work for Internet Explorer, Microsoft Edge, Google Chrome, Apple Safari, Mozilla Firefox, Opera, and Yandex Browser. For mail accounts, the tool uses OE News Accounts, OE Mail Accounts, OE Identities, Outlook accounts, Thunderbird, W[L]M Mail Accounts and W[L]M News Accounts.

We accessed this information by using different account information on Microsoft Edge and Google Chrome. While using one of the accounts, we found that one can lead to more than one username and password. It is possible that any username or passwords saved to an account in Google can access any saved passwords . The passwords are easy to extract. We pressed ‘Web Passwords’ and choose which web browser we used and got all the information for the accounts, as long as the passwords were saved to the browser.

It is easy to access individual passwords and export the passwords into a file with a click of a button as well. Recovery of usernames and passwords are easy if the tool has access from the web browser. It is most useful when downloaded onto a computer to access or recover passwords. This tool is user-friendly and effective with some prior knowledge of its purpose and capabilities.

Distributed Password Recovery:

Distributed Password Recovery is a very unique password cracking tool in that it supports many different types of file formats instead of just a single program. Due to its elaborate looking setup, the user might be intimidated by the program. There are many options available including tasks, agents, connection, messages, and dictionaries. Most of these tabs won’t be necessary in the password restoration process. If the user wishes to learn all of the functions, they can refer to a manual installed on the program.

(interface of Distributed Password Recovery)

To start the process, the user will import the file they want cracked and have a list of attacks they may want to use: dictionary, mask, or brute force. Once they’ve chosen an attack, the process begins, and it will inform the user how long the tests will take. Then it will let the user know whether it was able to recover the password or not. This is where we faced an issue with the program. From what we can see, there is no way to view the recovered password. We have read through the manual, watched tutorials, read online materials; however, despite all of our best efforts, we can’t figure out how to access the cracked document.

We couldn’t get the program to function properly and many of its unnecessary features require reading through the manual. As a result, we are giving this tool a score of 13. On the surface, it may not look too bad, but we haven’t found any other program from Elcomsoft as complex and difficult as this one. We will continue to try to figure out more about how to use this program. At this point, however, we’ll stick with this score, given the password seems unattainable. Conclusion Elcomsoft has produced an array of quality tools that all impress us as we continue to individually test them. They all prove to be useful in some capacity and luckily none of them are too complex. With a little bit of reading and research, we have been able to figure out just about every component. In the upcoming weeks, we will see if there are any other tools we think would be crucial to evaluate. We will also focus on getting our final report to near completion. Be sure to check us out on Twitter @ChampForensics, Instagram @ChampForensics, and Facebook @ChamplainLCDI to see other important information pertaining to our project!

 

The post Elcomsoft Tool Evaluation Blog 3 appeared first on The Leahy Center for Digital Investigation.

Read the original at: The Leahy Center for Digital InvestigationFiled Under: Digital Forensics, Uncategorized Tagged With: Blog Post, Champforensics, Champlain College, Digital forensics, Elcomsoft, LCDI, password recovery, Tool Evaluation, tools

April 17, 2019 by LCDI

Wearable Forensics Blog 4

Forensic Analysis of Wearable Technology

Previously, the Leahy Center for Digital Investigations Wearables Team posted a third blog about their research, specifically pertaining to the Samsung Galaxy Watch and the Fitbit Versa. For the remainder of the semester, the team will be investigating the Garmin Fenix 5 and the Apple Watch Series 4. This week, the team began the first half of data generation for the two devices. We specifically tested fitness tracking, GPS and location tracking, and heart rate monitoring. While the data generation timeline is similar to the Fitbit and Samsung timeline, due to their higher sophistication and varied functionality, the Apple Watch and Garmin Fenix 5 needed more extensive testing.

Apple Watch

The Apple Watch is probably the most robust in functionalities and largest in international market share, according to IDC. The Apple Watch Series 4 includes every single functionality we looked into testing for the other devices, including NFC Payment, which wasn’t available for some others. From the first use, the Apple Watch seems to hold very accurate and detailed information; the team is excited to try to see how this data is stored on the phone.

The team also hopes to test the fall detection feature of the device. This functionality displays an alert on the watch using the accelerator and gryoscope to detect a hard fall. The user has a minute to respond to the screen prompt to call emergency services or confirm they are okay. If more than a minute passes, the watch will automatically send the user’s information and location to EMS. The team hopes to use this to illustrate the timeline that can be built from Apple Watch information in investigations.

Garmin

While Garmin only has a quarter of the market share that Apple does, the company is known for its impressively accurate fitness tracking devices. The team performed the first set of tests on the Garmin Fenix 5 this past week. The watch differs from the other three watches in that it doesn’t have a touch screen; however, the fitness tracking seems to be the most accurate of them all. The Garmin is one of the most interesting devices to investigate because the charging port is also a data transfer port. This means the team is able to directly see the data on the watch by plugging it into the computer.

Final Weeks

The team has a month left to research, run tests, and finalize their report on the four devices. Make sure to check back in to see their final report. This update will include all tests, notable results, and how to compile data from the devices and paired phones!

The post Wearable Forensics Blog 4 appeared first on The Leahy Center for Digital Investigation.

Read the original at: The Leahy Center for Digital InvestigationFiled Under: Digital Forensics, Uncategorized Tagged With: Apple, Blog Post, Champforensics, Champlain College, Fitbit, Garmin, LCDI, Samsung, Wearable devices, Wearable Technology

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 42
  • Next Page »

About

This site aggregates posts from various digital forensics blogs. Feel free to take a look around, and make sure to visit the original sites.

  • Contact
  • Aggregated Sites

Suggest a Site

Know of a site we should add? Enter it below

Sending

Jump to Category

All content is copyright the respective author(s)