SlideShare a Scribd company logo
Digital Forensics & IR
You can run, but you can’t hide
Antonio Sanz
IT Systems & Security Manager
Expert witness
@antoniosanzalc
http://www.equipoazul.es
#SanPepeEINA
WTF DFIR bro?
Boring legal stuff
Forensic magic
Stand-up guy
Wanna more ?
There is a war out there
Cybercrime
Cyberespionage
Child pornography
Digital
Forensics
Incident
Response
IR : Respond to an incident
Digital forensics : Post-mortem
Locard’s exchange principle
This is not a pipe
This is not a pipe
It’s all about evidence, stupid !
No fancy 3D tools like CSI
Techniques, tools and procedures
People could go to prison
Identification
Adquisition
Preservation
Analysis
Dissemination
Digital forensics phases
Legal stuff here
and here
Tech yeah!
WTF DFIR bro?
Boring legal stuff
Forensic magic
Stand-up guy
Wanna more ?
Acquisition
Mobile devices
RAID, SAN, NAS, VM
Cloud storage
Game consoles,
ebooks, DVR …
Gotta catch ‘em all
Should I pull the plug ?
Use a cond …
A write blocker
Whole enchilada
Get the whole enchilada
Preservation
is king
31
Chain of custody
OBEY THE CHAIN
WTF DFIR bro?
Boring legal stuff
Forensic magic
Stand-up guy
Wanna more ?
Bad guys want to
hide … but they
need to run
Remember Locard: Artifacts
Live forensics
Order
of
Volatility
Cold boot attacks
Computer Forensics: You can run but you can't hide
Preservation
is king
Standard forensics
Recover deleted data
Recover deleted data
How
filesystems
work
Good times, MAC times
Making history
Space / Time Analysis
47
Don’t delete your history. Or
do it, it doesn’t matter
Prefetch
Dogs can’t prefetch
Your Instant
Messages
belong to us
Computer Forensics: You can run but you can't hide
Recycle bin are gold mines
52
Registry knows where your porn is
Every USB you plugged could be
used against you
Computer Forensics: You can run but you can't hide
Where did you say you
hide your crap?.
Event logs
Finding things in logs is like…
Too much … metadata
Computer Forensics: You can run but you can't hide
You’ve got an email
Share your
downloads with us !
Smartphone / Tablets
Acquisition is complicated
Preservation
is king
Yummy extra info …
Yummy data breakfast
Virtual Machines
Take snapshots like there’s no tomorrow
Preservation
is king
Network forensics
How I Xplico to you dude ?
Preservation
is king
Cloud computing
There’s still traces
There are always traces left
WTF DFIR bro?
Boring legal stuff
Forensic magic
Stand-up guy
Wanna more ?
Cut to the chase
Know your trade
Know your enemy
Know your enemy
Use more than one tool
Missing things tell us a lot
Put two and two together
Always learn new tricks
50% Knowledge
30% Technique
15% Instincts
5% Luck
Writing the report
> Introducción
> Resumen Ejecutivo
> Entorno del Informe (personas, lugares, fechas)
> Hechos probados iniciales (lo que sabemos)
> Hechos técnicos demostrables (lo que encontramos)
> Conclusiones
> Anexo: Evidencias
Write your report
Defending the report
> Contrainforme pericial
> Exposición del informe en el juicio
> Validez del técnico
> Validez de las herramientas
> Preguntas de la otra parte
> Mantener la calma, responder lo justo y bien pensado
Defend your report
Ethics
Ethics
WTF DFIR bro?
Boring legal stuff
Forensic magic
Stand-up guy
Wanna more ?
Books
Blogs
Tools / LiveCDs
Computer Forensics: You can run but you can't hide
Certifications
Conclussions
We need DFIR
Lots of it
Legal issues are critical
Many places to look
Have to know
where, how & why
You can run
You can’t hide
If you’re guilty …
we’ll catch you
@antoniosanzalc
http://www.equipoazul.es
http://bit.ly/1h47zfF

More Related Content

PDF
Sued or Suing: Introduction to Digital Forensics
PPTX
Digital investigation
PPTX
Cyber forensics 02 mit-2014
PPT
Codebits 2010
PDF
Computer Forensic
PPTX
Computer forensics powerpoint presentation
PPTX
computer forensics
PPT
Computer Forensics
Sued or Suing: Introduction to Digital Forensics
Digital investigation
Cyber forensics 02 mit-2014
Codebits 2010
Computer Forensic
Computer forensics powerpoint presentation
computer forensics
Computer Forensics

What's hot (20)

PDF
Computer forensic
PDF
Cyber Forensics Module 2
PDF
Cyber Forensics Module 1
PPTX
cyber Forensics
PPT
Computer Forensic
PPTX
Digital Forensics Workshop
PPTX
Cyber forensic 1
PPTX
Computer forensics
PDF
Ce hv6 module 57 computer forensics and incident handling
PPTX
Computer forensic 101 - OWASP Khartoum
PPTX
computer forensics
PPTX
Computer forensics
PPTX
Computer forensics ppt
PPTX
Computer forensic ppt
PPTX
Cyber Incident Response & Digital Forensics Lecture
PPT
Computer forensics
PPT
Computer forensics
PDF
01 Computer Forensics Fundamentals - Notes
PDF
Digital Evidence in Computer Forensic Investigations
PPTX
Computer forensic ppt
Computer forensic
Cyber Forensics Module 2
Cyber Forensics Module 1
cyber Forensics
Computer Forensic
Digital Forensics Workshop
Cyber forensic 1
Computer forensics
Ce hv6 module 57 computer forensics and incident handling
Computer forensic 101 - OWASP Khartoum
computer forensics
Computer forensics
Computer forensics ppt
Computer forensic ppt
Cyber Incident Response & Digital Forensics Lecture
Computer forensics
Computer forensics
01 Computer Forensics Fundamentals - Notes
Digital Evidence in Computer Forensic Investigations
Computer forensic ppt
Ad

Viewers also liked (20)

PDF
No Easy Breach DerbyCon 2016
PDF
Final Project Report-SIEM
PPTX
The Six Stages of Incident Response
PPTX
penetest VS. APT
PDF
The top 10 windows logs event id's used v1.0
PPT
Role of a Forensic Investigator
PPT
Ca world 2007 SOC integration
PDF
What Happens Before the Kill Chain
PDF
BriMor Labs Live Response Collection
PPT
Latihan7 comp-forensic-bab6
PPT
Kasus cybercrime
PPT
Latihan8 comp-forensic-bab5
PPT
Latihan2 comp-forensic
PDF
Uu kup-001-13-uu kup 2013-00 mobile
PDF
Gummer BruCON0x07
PDF
IEF for Military and Government
PDF
P Hundamental Security Coding Secure With Php Lamp
PPT
Latihan4 comp-forensic-bab3
PPTX
Outlook and Exchange for the bad guys
PPT
Logs for Information Assurance and Forensics @ USMA
No Easy Breach DerbyCon 2016
Final Project Report-SIEM
The Six Stages of Incident Response
penetest VS. APT
The top 10 windows logs event id's used v1.0
Role of a Forensic Investigator
Ca world 2007 SOC integration
What Happens Before the Kill Chain
BriMor Labs Live Response Collection
Latihan7 comp-forensic-bab6
Kasus cybercrime
Latihan8 comp-forensic-bab5
Latihan2 comp-forensic
Uu kup-001-13-uu kup 2013-00 mobile
Gummer BruCON0x07
IEF for Military and Government
P Hundamental Security Coding Secure With Php Lamp
Latihan4 comp-forensic-bab3
Outlook and Exchange for the bad guys
Logs for Information Assurance and Forensics @ USMA
Ad

Similar to Computer Forensics: You can run but you can't hide (20)

PDF
Digital Crime & Forensics - Presentation
PPTX
N.sai kiran IIITA AP
PPT
Cyber Crime Evidence Collection Ifsa 2009
PPT
Scene Of The Cybercrime
PPT
Scene Of The Cybercrime
PPT
Forensic Science Informatics P3 M3 D3
PPTX
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
PPTX
Salander v bond b sides detroit final v3
PPT
Digital Evidence - the defence, prosecution, & the court
PDF
Security crashcourse openwest_2019
PPT
CyberCrime
PPT
Law Enforcement Role In Computing
PPTX
Computer Forensics & Cyber Crimes
PDF
Congratulations! You're The New Security Person! (or, I've Made a Huge Mistake)
PDF
Corporate Espionage: Technical Surveillance Threats
PDF
A brief Intro to Digital Forensics
PPT
Cybercrime
PPTX
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
PDF
Forensic Expert Cross Examination
Digital Crime & Forensics - Presentation
N.sai kiran IIITA AP
Cyber Crime Evidence Collection Ifsa 2009
Scene Of The Cybercrime
Scene Of The Cybercrime
Forensic Science Informatics P3 M3 D3
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Salander v bond b sides detroit final v3
Digital Evidence - the defence, prosecution, & the court
Security crashcourse openwest_2019
CyberCrime
Law Enforcement Role In Computing
Computer Forensics & Cyber Crimes
Congratulations! You're The New Security Person! (or, I've Made a Huge Mistake)
Corporate Espionage: Technical Surveillance Threats
A brief Intro to Digital Forensics
Cybercrime
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
Forensic Expert Cross Examination

More from Antonio Sanz Alcober (20)

PDF
Ciberamenazas - ¿A qué nos enfrentamos?
PDF
Zen y el arte de pescar APT
PDF
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
PDF
Cyberthreats: Are we screwed ?
DOCX
SEA - Syrian Electronic Army - Cyberterrorism
PDF
Sex lies and queues: Confessions of an HPC sysadmin
PDF
Cómo comprar seguro en internet
PDF
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
PDF
Harry el Sucio te enseña Seguridad en Wordpress
PDF
Sex, lies and magnetic tapes: Confessions of a sysadmin
PDF
Cibercrimen qué hace tu dinero cuando no lo miras
PDF
Administracion electronica: Tecnologías al servicio del ciudadano
PDF
Solving Big problems with Condor - II HPC Sysadmins Meeting
PDF
Supercomputación: Haciendo HOY la ciencia del mañana
PDF
Historia de la inteligencia china
PDF
Análisis de la capacidad científica, tecnológica e innovadora de la república...
PDF
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)
PDF
Seguridad en redes sociales
PDF
Capacidades de China para la ciberguerra
PDF
Cloud computing security
Ciberamenazas - ¿A qué nos enfrentamos?
Zen y el arte de pescar APT
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
Cyberthreats: Are we screwed ?
SEA - Syrian Electronic Army - Cyberterrorism
Sex lies and queues: Confessions of an HPC sysadmin
Cómo comprar seguro en internet
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Harry el Sucio te enseña Seguridad en Wordpress
Sex, lies and magnetic tapes: Confessions of a sysadmin
Cibercrimen qué hace tu dinero cuando no lo miras
Administracion electronica: Tecnologías al servicio del ciudadano
Solving Big problems with Condor - II HPC Sysadmins Meeting
Supercomputación: Haciendo HOY la ciencia del mañana
Historia de la inteligencia china
Análisis de la capacidad científica, tecnológica e innovadora de la república...
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)
Seguridad en redes sociales
Capacidades de China para la ciberguerra
Cloud computing security

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Empathic Computing: Creating Shared Understanding
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Cloud computing and distributed systems.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
The AUB Centre for AI in Media Proposal.docx
sap open course for s4hana steps from ECC to s4
Empathic Computing: Creating Shared Understanding
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectroscopy.pptx food analysis technology
Programs and apps: productivity, graphics, security and other tools
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Cloud computing and distributed systems.
Per capita expenditure prediction using model stacking based on satellite ima...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx
Advanced methodologies resolving dimensionality complications for autism neur...

Computer Forensics: You can run but you can't hide