Digital Forensics - Uio: About Me
Digital Forensics - Uio: About Me
I am:
Eivind Utnes, M.Sc.
I work for:
Watchcom Security Group AS
I work as:
Head of Security
Senior Information Security Consultant
Incident Response
Digital Forensics
Finding Evidence
Incident Response
Triage
Investigation
Containment
Analysis
Tracking
Recovery
Digital Forensics
Identification
Preservation
Collection
Examination
Analysis
Presentation
Digital Evidence
Finding Evidence
Many ways to hide evidence Setting the hidden flag on the file
Many ways to find evidence Placing illicit materials in folders named
Tax Stuff or Guest Lectures
We ignore the hidden flag by default When opening the file, the system returns
Forensic software can be set to show the an error message
whole drive as a flat drive, ignoring all Oh, I guess it is corrupted. Too bad.
folders
Hide files by giving them innocent We use hashing algorithms to quickly look
sounding names for known files, and either note or ignore
Blueprints_iPhone7.jpeg becomes them
Florida vacation 001.jpeg Hash lists recognize known illicit files
Other lists recognize known good files
We can create our own
Inside one of these files the text This is a test. This is only a test. is hidden.
symantec.com, 02.11.2010
01.03.2016 Watchcom Security Group AS 49 01.03.2016 Watchcom Security Group AS 50
Deleting the files from the computer before Deleting a file does not actually remove it
law enforcement claims it In Windows, the file is renamed
You cant prove anything, there is nothing CorporateSecrets.txt
there. ~orporateSecrets.txt
This tells the system that the space is
available
Questions?