Forensic Blogs

An aggregator for digital forensics blogs

September 28, 2018 by LCDI

Digital Forensics and Macintosh

Introduction

This past May, I had the honor of representing Champlain College at Enfuse 2018 in Las Vegas, Nevada. Enfuse is an annual conference that presents a variety of seminars and labs to showcase concepts and information in categories such as eDiscovery, IoT forensics, incident response, and data governance, to name a few.

 

Macintosh Examinations Review

The session I most enjoyed was Macintosh Examinations. This session was orchestrated by OpenText Training Instructor and Curriculum Developer, Simon Key. Key’s session focused on document artifacts and examination techniques, especially those not typically used by examiners.  He provided us with EnScripts to view Plist files and SQLite database files, which allowed us to apply the concepts learned in the session to a sample investigation using EnCase. Forensic tools traditionally have a focus on Windows environments, therefore additional work is necessary in a Mac examination. Simon conducted one of those classes that appealed to a broad audience across all skill levels. He reminded us that forensics is not always turn key; there may be additional work required, specifically when tasked with investigating a Mac environment. Simon also reminded us not to be afraid to investigate in untraditional places in addition to more common ones. I found Key’s material to be very informative and applicable to future investigations.

 

Conclusion

EnFuse is such an amazing conference, I was able to attend multiple classes all in different areas of focus! Not to mention extensive networking with new and familiar faces. EnFuse is more than a “tech” conference; it’s truly an experience all professionals should take part in at some point in their careers. I thank OpenText  and Champlain College for providing me with the opportunity to attend once again.I hope I can have more experiences like this in the coming year!

 

To learn more about the LCDI, take a look at our Facebook and Twitter pages or send an email to lcdi@champlain.edu!

The post Digital Forensics and Macintosh appeared first on The Leahy Center for Digital Investigation.

Read the original at: The Leahy Center for Digital InvestigationFiled Under: Digital Forensics, Uncategorized Tagged With: Blog Post, Champlain College, EnFuse, Mac, Mac OS, macintosh, Opentext

April 5, 2017 by Sara Martin

Application Analysis: A Closer Look At Business Apps

Application Analysis Introduction 

The Application Analysis team has continued examining the desktop-based web applications for both Mac and PC. We are currently finalizing our tests with Slack and DropBox. They were searching for files that could hold company, user, and file information. While these are only tests in the context of a real world scenario, this info represents important organization information from things like employee info to upcoming projects and intellectual property.

Application Analysis: Slack Artifacts

Prior to starting our tests on Slack, our goals were to recover user data and messages. Using Guidance Software’s EnCase 8, we were able to meet our goals and research our findings.
We found several useful artifacts from our macOS Sierra data generation with Encase.  The relevant data we found was located at:\Users\test\Library\Application Support\Slack\Cache. In the file slack-teams, we managed to find the username the person logged in used, their userID, and the ID of the team they were a part of. There are also urls to different sizes of the team’s logo on slack. The urls (example: https://s3-us-west-2.amazonaws.com/slack-files2/avatars/2016-08-23/72112878551_1f33a19b4d74ef683b3e_original.png) contain the date of when the avatar was uploaded.

application analysis

In the file slack-settings we found data about the client itself such as the version number, version name, and platform. This entry also has a field for isWin10 and isBeforeWin10, which raises questions about the differences between the Windows 10 version of Slack and other versions.

application analysis

Application Analysis: Dropbox Artifacts

In our investigation of Dropbox we focused on what document data Dropbox stores and what it leaves on a client computer through its Web App. One of the most lofty statements made by Dropbox is it encrypts data at rest with AES 256-bit encryption, but what we found was a little bit more interesting. To investigate the team used the default Dropbox settings, and to our surprise the desktop folder for Dropbox is not encrypted.

application analysis

The issue here is that the AES 256-bit encryption applies to the data on their servers at rest; while leaving the user’s folder unencrypted. Another interesting bit of data was .drop.cache containing a deleted file that was not on the user machine before deletion, but still showed up even though it was deleted on the web browser the file in question is: Get Started with Dropbox (deleted 44ddbfbbf1afaa31a4c4909fe4a9690b).pdf

While it is a simple Dropbox default file if important documents are deleted and still accessible that would pose a security issue, as it could providing people attempting to steal information with the info they need. The usage of SQL databases was found in Dropbox’s app data with the file C\Users\User\AppData\Local\Dropbox\instance1\aggregation.dbx being a example of this.

application analysis

It stored info of all files currently on Dropbox with timestamp server paths and even had a spot for editor names. As this information was easily accessible it would leak what documents the organization stores, the timestamps could help build a timeline and editor name reveal who is working on what document. In the real world, an organization’s information could be leaked and intellectual property could be copied, tracked, and pinpointed to who works on what.  
After deletion the program data (86x), program data, along with the User’s app data was deleted. However the C:\Users\User\Dropbox folder stayed along with the shared folder allowing the user keep all the Dropbox files. If a company tries to issue a deletion of Dropbox from a user’s computer, they would need to take extra precautions, as a terminated employee could still have the files stored on their computer even through the app itself was deleted.

application analysis

Process: Through Windows and Mac

The artifacts we were able to acquire in Windows 7 and Windows 10 on Slack and Dropbox were almost all but the same. Slack on Windows 10 had all the data we found on Windows 7 but because of reasons unknown, we could not view image files pulled from Windows 10. Windows 10 and 7 yielded the same artifact results for Dropbox. We were able to find different cache files and images. However, similar to Slack, while some files could be viewed in Windows 7, larger files could not be viewed in Windows 10.

Windows 7 was interesting as Encase identified the Data_2 and Data_3, which consisted of images, after it was parsed as information from Google Chrome Browsers. The same case occurred on Mac with the Windows 10, which did not have the Data_2 and Data_3 images. The usage of SQL Databases was, in the same way, was present for both Mac and Windows for both Dropbox and Slack. The parsing of these Databases was able to provide info on what apps it is ready to use and what files were stored by the App as in Dropbox’s case.

Conclusion

The usage of SQLite databases by Web Apps is interesting as it ended up being one of the primary sources of evidence of file activity as well as storage information. The caches were unsurprisingly vital to the investigation as cached files gave up a lot of data such as Slack revealing user portraits and Dropbox showing deleted files. Despite the OS differences, the Web Applications all followed the similar file layout across all three OS systems; however, differences were still present. Windows 10s differed in its method of storing cache causing Encase not to parse the data. Oddly enough, all three systems featured the Web Apps using SQLite databases for parts of local storage. Overall, while they did reveal user information, the data could only be used primarily for phishing attacks and Intellectual Property theft. Stay tuned for our final results.

Questions or comments? Please share with us in the comment section below! You can also reach out to our Twitter and Facebook or email us at lcdi@champlain.edu.

The post Application Analysis: A Closer Look At Business Apps appeared first on The Leahy Center for Digital Investigation.

Read the original at: The Leahy Center for Digital InvestigationFiled Under: Digital Forensics, Uncategorized Tagged With: application, Application Analysis, Apps, Blog Post, Champlain College, computer forensics, desktop app, desktop application, desktop applications, desktop apps, Digital forensics, Digital Investigation, Dropbox, forensics, LCDI, Mac, Projects, Slack, Student Work, Update, windows, Windows 10, Windows 7

April 5, 2016 by LCDI

Mac RAM Analysis Update 1

INTRODUCTION TO MAC RAM ANALYSIS UPDATE In our previous blog post, we talked about the initial obstacle of software being outdated or nonexistent. We still needed to conduct research and determine which tools we were going to use to capture RAM on a Mac, then analyze the contents of the RAM dump to see what […]

The post Mac RAM Analysis Update 1 appeared first on Computer & Digital Forensics Blog.

Read the original at: Computer & Digital Forensics BlogFiled Under: Digital Forensics, Uncategorized Tagged With: Blog Post, Champlain College, computer forensics, Digital forensics, LCDI, Mac, mac ram, Mac Ram Analysis, Projects, RAM, Update

  • 1
  • 2
  • 3
  • Next Page »

About

This site aggregates posts from various digital forensics blogs. Feel free to take a look around, and make sure to visit the original sites.

  • Contact
  • Aggregated Sites

Suggest a Site

Know of a site we should add? Enter it below

Sending

Jump to Category

All content is copyright the respective author(s)