Free Essay

Digital Forensic Investigation Bsc Submission

In:

Submitted By abdulgara
Words 1635
Pages 7
Assessment Criteria (Marks Breakdown)
Please note that during the preparation of your assignment documentation, you must include the following marking table. Ensure you fill in the details of your full name and student ID.

Name/ Student ID:
Preperation of the executive summary and legal warrants (10)
Documentation (10)
Conclusions/recommendations (10)
Referencing (10)
Evidence identification and preservation (15)
Critical analysis and evaluation of the case (15)
Q&A session during presentation (30)
Total (100)

The marking table must be placed on a single page, located as either the second or third page of your final assignment documentation.

Contents
EXECUTIVE SUMMARY 2
AUTHORIZATION 3
IDENTIFICATION 4
COLLECTION AND PRESERVATION 5
Mr. Mike’s Work-Station 5
TTBANK Server 5
CHAIN OF CUSTODY FORM 7
EXAMINATION AND ANALYSIS 8
EVIDENCES RECOVERED 8
RECONSTRUCTION 11
RELATIONAL ANALYSIS 12
CONCLUSION & RECOMMENDATION 13

EXECUTIVE SUMMARY

This is the case involving the staff of TTBANK that was suspected of misuse of company property due to that staff bragging about gaining access to privileged information to his colleagues that he should have otherwise not have gotten access to.
The issue first came to the attention of Mr. Ali, the Enterprise Systems Administrator of TT Bank who had investigated silently to discover the identity of the staff and that the person was a member of the Loans Department and his name was Mr. Mike. What became particularly disturbing was that Mike worked in the Loans Department and should not have any access whatsoever to any Human Resources (HR) department files.
The Enterprise System Administrator decided that the case should be investigated properly and hired a computer forensic expert from the APIIT FORENSIC LABOROTARY.
Upon arrival, the forensic investigator was issued full authority to conduct the search and began conducting the investigation on site at TTBANK’s own work-station that was used by Mr. Mike immediately.
The work-station was found to be in switched off state, so only the hard disk image was acquired. The image size for Mr. Mike’s work-station was 4GB while the HR server image size was 8GB.
An analysis of the system showed that Mr. Mike had actually installed some very sophisticated computer programs for system monitoring on his work-station. These tools seemed to be an attempt at gaining access and privilege escalation on the TTBANK network, which was later accessed from his work-station via Windows “Remote Access” tool. This discovery and other serious violations led to the investigation into the TTBANK’s HR Server in order to ascertain in detail what actually happened and discover possible damages that were done. It was found that Mr. Mike had only accessed the HR server to retrieve the employee salary information and nothing else, based on the evidences analyzed.
The full investigation and activity logs are provided in detail below.
AUTHORIZATION LETTER
Please find below the authorization letter:
20th August 2010
Mr. Abdullahi Gara
TPM,
Bukit Jalil, Kuala Lumpur, Malaysia
The Investigator, APIIT FORENSIC LABS,
Re: TTBANK.Co Internal Investigation
On the 18th of August, it has been brought to the attention of the Enterprise Systems Administrator of TT Bank, Mr Ali that a staff, Mike, had been bragging about knowing the salary of many different bank employees. The Systems Administrator found that Mike works in the loan department and should not have access to any Human Resources (HR) files.
TT Bank has a policy that relates to the proper use of bank computers.

Therefore on behalf of TTBANK.Co and the Authority vested in my job title here in the Bank, I request you conduct a thorough investigation into the incident and also act with the knowledge that you have been given full authority over any work-stations within the Bank premise so far as it is within the realm of your investigation.
Please note: Our policy states that no programmes may be installed on any computer without the written permission of the IT Director, and that any attempt to circumvent passwords or obtain unauthorized access to bank files will be grounds for termination or legal prosecution. Also IT staff are allowed to install any network monitoring devices, including sniffers or other packet capture devices, to maintain network security or to investigate possible abuses.
Any information or data retrieved is the sole property of TTBANK.Co
Sincerely,
Ali Medvedev
Enterprise Systems Administrator
IDENTIFICATION

The identification of the evidence was done upon arrival on the crime scene. All necessary forensic precautions were taken during this process, the precautions include; taking snapshots of all the devices and the ports that were connected to them, tagging all ports and devices before taking a snapshot and unplugging them, checking the state of the devices that were connected to the suspects computer and also noting if the suspects computer was in an off state or sleep mode.
The evidence details are identified and listed below.

EVIDENCE IDENTIFICATION FORM

Name of the case: Internal TTBANK Investigation & Enquiry
Description: Investigation of an employee’s attainment of classified information.
EVIDENCE 1
Description: Hard disk image of Mike’s Work-station
Hard disk Brand/Size: Seagate/4GB

File System: NTFS format
Location of evidence: An employee’s (Mr. Mike’s) office space/cubicle.
EVIDENCE 2
Description: Hard disk image of TTBANK H-R Server.
Hard disk Brand/Size: Seagate/8GB
File System: NTFS format
Location of evidence: TT Bank Server room.

COLLECTION AND PRESERVATION

Mr. Mike’s Work-Station
Upon arrival at the investigation site, in this case was Mr. Mike’s office space, the work-station was found in a switched-off state. From this point on the investigator inserted the Ubuntu Live CD and acquired the image using .dd commands, the md5 and SHA1 hash values of the image were then calculated and compared against the hash values of the hard disk on Mr. Mike’s Work-Station for verification purposes. The chain of custody form was filled up and the details added to it in order to preserve the evidence authenticity.

Image showing the md5 and SHA-1 hash sums of Mr. Mike’s Work-station.

TTBANK Server
The investigation of the server was undertaken when the it was discovered that Mr. Mike had indeed gained access to the server via windows “Remote Access” mode and had potentially viewed or downloaded a file to his work-station that contained information related to the other employees of TTBANK.
The Server had already been in a state shut down for routine maintenance when the investigator arrived at the conclusion that the server should also be investigated. The hard drive of the server was removed and attached to a write protect device before the image was acquired again using Ubuntu Live CD’s .dd commands. The md5 and SHA1 values were both computed and compared both to the image acquired and that of the server hard disk itself.

Image showing the md5 and SHA-1 hash sums of TTBANK HR Server.

CHAIN OF CUSTODY FORM EXAMINATION AND ANALYSIS
EVIDENCES RECOVERED FROM MR. MIKE’S WORK-STATION
1. “TT BANK STAFF RECORDS” file found on the image of Mike’s work-station is identical to the file that is on the TTBANK HR Server.

2. Key logger “Refogger” was discovered on the Mr. Mike’s work-station. This revealed information as to how he was able to access the TTBANK’s HR server from his work station. The keyloggers records show that it had captured key strokes of the Administrator of the HR server as he tried to log onto the server remotely from Mike’s work-station.

3. “Remote Desktop” access from Mr. Mikes work-station to the Server was captured by the key logger “Refogger” that Mr. Mike had most likely installed himself.

4. Another program called “nmap” and “Winpcap” were also found installed on his machine, what it does is scan the IP address of a computer system and reveals various vulnerabilities that it has such as open ports etc… This is proven by the multiple scan logs left on his machine indicating failed attempts to scan the network which the HR server was located on.
RECONSTRUCTION
FUNCTIONAL ANALYSIS - TOOLS USED BY INVESTIGATOR AND FOR WHAT PURPOSE
Tools Purpose
Ubuntu Live CD Used to acquire the images using .dd commands
Ubuntu Live CD Used to compute the md5 and SHA1 hash values of the images and the hash values of the hard disk on Mr. Mike’s Work-Station and the TTBANKHRSERVER for verification purposes
Forensic Tool Kit Used to mount the images acquired by the investigator and conduct the examination and analysis
Microsoft Excel Used to open retrieved evidence in excel format

RELATIONAL ANALYSIS
TOOLS USED BY PERPERTRATOR TO COMMIT THE CRIME
The relational analysis section reveals the malicious tools that were discovered on the suspect’s computer during the investigation. The Forensic analyst believes these tools were used by the suspect to commit various offenses. The tools and offenses committed are listed below.
Crime Functionality Tools
Remotely accessing the HR Server Access the Server via windows “Remote Access” features, viewed and copied files. Windows Remote Access.
Key Stroke Logging Took the key strokes of the Administrator Username and Password Refogger/KGB Keylogger
Port scanning Used to scan for vulnerable ports Nmap & WinpCap

CONCLUSION & RECOMMENDATION

Finally, in light of such activities carried out by one simple staff member with having basic knowledge of vulnerabilities and off the shelf hacking tools, it is important for the administrator to act in hardening rules on when and where to access the server in order to prevent any future occurrences of this magnitude. In order to accomplish the investigator suggests the following.
• Format and re-install the HR Server.
• Frequently change user passwords
• Change all passwords used on the HR Server immediately.
• Update Windows to up-to-date version for all work-station and input restrictive measures that can enforce TTBANK’s security policy.
• Perform integrity check on HR server regulary.
• Harden work-station rules.

Similar Documents

Premium Essay

Damsel

...2014-2015 Undergraduate Academic Calendar and Course Catalogue Published June 2014 The information contained within this document was accurate at the time of publication indicated above and is subject to change. Please consult your faculty or the Registrar’s office if you require clarification regarding the contents of this document. Note: Program map information located in the faculty sections of this document are relevant to students beginning their studies in 2014-2015, students commencing their UOIT studies during a different academic year should consult their faculty to ensure they are following the correct program map. i Message from President Tim McTiernan I am delighted to welcome you to the University of Ontario Institute of Technology (UOIT), one of Canada’s most modern and dynamic university communities. We are a university that lives by three words: challenge, innovate and connect. You have chosen a university known for how it helps students meet the challenges of the future. We have created a leading-edge, technology-enriched learning environment. We have invested in state-of-the-art research and teaching facilities. We have developed industry-ready programs that align with the university’s visionary research portfolio. UOIT is known for its innovative approaches to learning. In many cases, our undergraduate and graduate students are working alongside their professors on research projects and gaining valuable hands-on learning, which we believe is integral...

Words: 195394 - Pages: 782

Premium Essay

Econ201

...MBA LEARN MORE, DO MORE, BECOME MORE 90 exceptional people who will shape the future of business The IMD MBA Class of 2011 Developing your future global leaders The IMD difference Why recruit at IMD? Find truly global experienced leaders able to address your company’s challenges in today’s complex environment 90 talented pre-screened participants Besides strong academic ability, we assess the leadership potential with a focus on real management capacity in a multi-cultural and complex environment. In total we spend at least 10 manhours per candidate to make sure each one is right for the program. The admission process consists of: - an online application with 12 essays - letters of recommendations - a full day assessment center Once accepted, each candidate goes through a full background check conducted by an independent agency. International and experienced In a class of 90, you will find 40+ different nationalities and 90% of the participants will have spent at least 6 months outside their home country. With a minimum of 3 years of work experience, our participants have on average 7 years of experience prior to IMD. Trained to become truly global hand-on leaders Besides strong academic business fundamentals, our intensive one-year program is designed to constantly push our MBAs beyond their comfort zone. A diversity of hands-on projects takes them through various settings: - a 6-week startup project - a 9-week international consulting project with medium to...

Words: 13582 - Pages: 55

Premium Essay

Student

...Foundation Diploma in Business Foundation Diploma in Computing Foundation Diploma in Art & Design Professional Diplomas in Business Professional Diplomas in Computing Higher National Diploma BA (Hons) International Business Management BA (Hons) International Business Management (Flexible Study Programme) BA (Hons) Business Finance & Accounting BA (Hons) Graphic Design BA (Hons) Fine Art Exp. Media BSc (Hons) Computing BA (Hons) Communications & Media Studies MSc International Management MSc Computing Accreditation & Validation UK/Pearson Credit system Transfer of credits Student support Accommodation Study Advising and Support Financial support Visas for foreign students Scholarships Benefits for students Study abroad Internships Assistance in employment Counselling Centre Student Resources Computer labs Online Learning Centre (Moodle) Prague College email Physical library Digital Library ISIFA Images Textbooks and class materials Graphic Design/Interactive Media/Fine Art materials and costs Personal computers Message boards and digital signs Newsletters Open lectures, seminars and events Student ID cards Centre for Research and Interdisciplinary Studies (CRIS) Prague College Student Handbook 4 6 8 9 11 12 13 14 16 18 20 22 24 26 28 29 30 31 32 33 33 34 35 36 Prague College Humanities Society Student Council Alumni Association International Student Association (ISA) Leadership Association Regulations...

Words: 27092 - Pages: 109

Premium Essay

Business Management

...Geography Education in the Google age: A Case Study of Nsukka Local Government Area of Nigeria 30 Helen Afang Andow Impact of Banking Reforms on Service Delivery in the Nigerian Banking Sector 45 Billy Batlegang Green IT Curriculum: A Mechanism For Sustainable Development 59 Rozeta Biçaku-Çekrezi Student Perception of Classroom Management and Productive Techniques in Teaching 74 Thomas J.P.Brady Developing Digital Literacy in Teachers and Students 91 Lorenzo Cherubini Ontario (Canada) Education Provincial Policy: Aboriginal Student Learning 101 Jennifer Dahmen Natascha Compes Just Google It?! But at What Price? Teaching Pro-Environmental Behaviour for Smart and Energy-Efficient Use of Information and Communication Technologies 119 Marion Engin Senem Donanci Using iPads in a dialogic classroom: Mutually exclusive or naturally compatible? 132 Nahed Ghazzoul Teaching and Learning in the Age of 'Just Google it' 149 Saba A. Gheni Falah H. Hussein Teaching Against Culture of Terrorism in the Middle East 162 Jessica Gordon Bonnie Boaz Integrating Digital Media into Multimodal Compositions: Five Trends in the Transfer of Rhetorical Skills 173 Jeehee Han Public Opinion on Health Care Policies in the 21st Century 181 Elijah C. Irozuru M. Ukpong Eno Home Environment,...

Words: 236613 - Pages: 947

Premium Essay

Information and Survey Analysis

...1. An IS auditor is reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of: A. variable sampling. B. substantive testing. C. compliance testing. D. stop-or-go sampling. The correct answer is: C. compliance testing. Explanation: Compliance testing determines whether controls are being applied in compliance with policy. This includes tests to determine whether new accounts were appropriately authorized. Variable sampling is used to estimate numerical values, such as dollar values. Substantive testing substantiates the integrity of actual processing, such as balances on financial statements. The development of substantive tests is often dependent on the outcome of compliance tests. If compliance tests indicate that there are adequate internal controls, then substantive tests can be minimized. Stop-or-go sampling allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed. 2. The decisions and actions of an IS auditor are MOST likely to affect which of the following risks? A. Inherent B. Detection C. Control D. Business The correct answer is: B. Detection Explanation: Detection risks are directly affected by the auditor's selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks are controlled by the actions of the company's management. Business...

Words: 97238 - Pages: 389

Premium Essay

Wns Hand Book123

...Student Handbook 2012 WELCOME TO WAIKATO Welcome to the University of Waikato. I hope you make the most of your time here and the opportunities that will present themselves during the course of your study. You have come to an excellent university that is ranked top in 10 subjects under the Government’s Performance Based Research Fund. We are also internationally connected; we have research connections and student exchanges with some of the world’s top universities. I urge you to consider taking part in these while you are with us. Here at the University of Waikato, you will be taught by lecturers who are leaders in their fields of research and who win national teaching awards. We are proud of our academic quality and the fact that we turn out sought-after graduates who go on to take up important roles in all parts of the world. You will already have noticed our beautiful campus which is set in 68 hectares of gardens, green space and lakes. At the heart of it all is the new Student Centre, which was completed in 2011. With its accessible areas, Library services and multitude of facilities, it is a place for students to study or just gather together and we are very proud of this building. In 2011 we celebrated 10 years of another important building, the Gallagher Academy of Performing Arts. This world-class facility was the vision of a group of driven Waikato people. It quickly became a focal point in the campus and continues to be an important venue for the performing...

Words: 126279 - Pages: 506

Premium Essay

Writing Papers

...authors hereby assert their moral rights to be identified as the authors of the PhraseBook. You may not remove or alter the authors’ names, publisher’s name, copyright notice, disclaimers or, from the digital version, the End User Licence Agreement. All rights reserved worldwide Copyright is reserved in English and all other languages and countries of the world. PhraseBook for Writing, EnglishforResearch.com, EnglishforStudents.com and EnglishforSchool.com are worldwide trademarks and/or service marks of The Whole World Company Limited. Microsoft and Microsoft Word are trademarks or registered trademarks of Microsoft Corporation. All other trademarks and registered trademarks are the property of their respective owners and are hereby acknowledged. Do not make illegal, unauthorized copies of the PhraseBook. The PhraseBook and digital version are protected by copyright law and international treaties. The publisher and authors have striven to ensure the accuracy and correctness of the PhraseBook; however, they can accept no responsibility for any loss or inconvenience as a consequence of use, information or advice contained in the PhraseBook. PhraseBook versions ISBN 978-1-903384-02-2 paperback ISBN 978-1-903384-01-5 digital version (download) ISBN 978-1-903384-00-8 digital multiple user version (CD-ROM) for research groups, departments and universities For PhraseBooks and English books for education, visit EnglishforResearch.com ▪ EnglishforStudents.com ▪ EnglishforSchool...

Words: 48522 - Pages: 195

Free Essay

Customer Satisfaction

...Transforming Lives Communities The Nation …One Student at a Time Disclaimer Academic programmes, requirements, courses, tuition, and fee schedules listed in this catalogue are subject to change at any time at the discretion of the Management and Board of Trustees of the College of Science, Technology and Applied Arts of Trinidad and Tobago (COSTAATT). The COSTAATT Catalogue is the authoritative source for information on the College’s policies, programmes and services. Programme information in this catalogue is effective from September 2010. Students who commenced studies at the College prior to this date, are to be guided by programme requirements as stipulated by the relevant department. Updates on the schedule of classes and changes in academic policies, degree requirements, fees, new course offerings, and other information will be issued by the Office of the Registrar. Students are advised to consult with their departmental academic advisors at least once per semester, regarding their course of study. The policies, rules and regulations of the College are informed by the laws of the Republic of Trinidad and Tobago. iii Table of Contents PG 9 PG 9 PG 10 PG 11 PG 11 PG 12 PG 12 PG 13 PG 14 PG 14 PG 14 PG 14 PG 15 PG 17 PG 18 PG 20 PG 20 PG 20 PG 21 PG 22 PG 22 PG 22 PG 23 PG 23 PG 23 PG 23 PG 24 PG 24 PG 24 PG 24 PG 25 PG 25 PG 25 PG 26 PG 26 PG 26 PG 26 PG 26 PG 26 PG 27 PG 27 PG 27 PG 27 PG 27 PG 27 PG 28 PG 28 PG 28 PG 28 PG 28 PG 33 PG 37 Vision Mission President’s...

Words: 108220 - Pages: 433

Free Essay

Prospectus

...COMMON PROSPECTUS Master’s Degree Bachelor’s Degree Diplomas Certificates Indira Gandhi National Open University Maidan Garhi, New Delhi-110068, INDIA | www.ignou.ac.in Price: Rs. 100/- by cash at the counter | Rs. 150/- by Registered Post Electronic version of the prospectus is available for download at: http://www.ignou.ac.in Online Admission & Payment Gateway RECOGNITION IGNOU is a CENTRAL UNIVERSITY established by an Act of Parliament in 1985 (Act No. 50 of 1985). IGNOU Degrees/Diplomas/Certificates are recognised by all the member institutions of the Association of Indian Universities (AIU) and are at par with Degrees/Diplomas/Certificates of all Indian Universities/Deemed Universities/Institutions. Prepared & vetted at: Student Registration Division © Indira Gandhi National Open University March 2012 Print Production Mr B. Natarajan, DR(P) Mr Arvind Kumar, AR(P) Mr Ajit Kumar, So(P) IGNOU Offers “Round the Year Admission” to its Programmes under the ‘Walk-in-Admission’ Scheme. Candidates can obtain admission application forms from Regional Centre, Student Registration Divisions (SRD), IGNOU Headquarters and also can download the Prospectus and application form from the university website at ww.ignou.ac.in. Candidates can submit the same only at the Regional Centres concerned either by post or in person. Application forms can be submitted online and programme fee can be paid online through the internet payment gateway. CUT OFF DATES FOR WALK-IN-ADMISSION: Please...

Words: 77378 - Pages: 310

Free Essay

Gd-Pi

...Hundreds(of(real(personal(accounts(of Group'Discussions'&'Personal'Interviews during(MBA(admissions(to(India’s(best(B9schools Written'by Compiled'by Loads'of'MBA'Aspirants The'PaGaLGuY'MadCapz'Group PaGaLGuY.com Antholo gy Hundreds of real personal accounts of Group Discussions and Personal Interviews during MBA admissions to India’s best business schools. In this edition: The IIMs at Ahmedabad, Bangalore, Calcutta, Lucknow, Indore & Kozhikode. Written by Loads of MBA aspirants Compiled by The PaGaLGuY MadCapz Team PaGaLGuY GD-PI Anthology Copyright © 2011, PaGaLGuY.com All text and content in this document is solely owned by PaGaLGuY.com. Reproduction without permission in any form or means is illegal. Special copy prepared exclusively for mustafa rokerya Get your own Free personalized copy (with your name on it) of this book from http://www.pagalguy.com/books/ What this book is about What is a real IIM interview like? What kind of questions do they ask and what judgments do applicants have to make while answering them? Since 2003, those with real Group Discussion and Personal Interview calls from India’s top bschools have been posting entire and detailed transcripts of their admission interviews immediately after they happen, so that others slotted for later interviews can learn what GDPI is going to be like this year. This book is a collection of dozens of handpicked GDPI experiences from the country’s top bschools during the admission...

Words: 178933 - Pages: 716