domain name forensics: a systematic approach to investing an internet presence source : digital...

13
Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (200 4) 1, 247-255 Date : Mar. 7 th , 2006 Reporter : Sparker, Yao Professor : Shiuh-Jeng, Wang

Upload: johnathan-harrell

Post on 20-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Domain name forensics: a systematic approach to investing an internet presence

Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7th, 2006 Reporter : Sparker, Yao Professor : Shiuh-Jeng, Wang

Page 2: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Our scheme Introduction Advantages of complexity Identifying points of responsibility --- Domain name registrars --- Domain name registrants --- DNS server owners --- Regional Internet registries --- Network owners --- Web server owners --- Email server owners --- Upstream ISP --- Telecommunications carriers --- Routes and AS owners --- Other responsible parties --- The next generation, IPv6

Page 3: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Our scheme (cont.)

Collecting and preserving the evidence

--- Preparing for the investigation

--- Investigating the domain registry and registrant

--- Investigating the DNS owners

--- Investigating the IP network owners

--- Investigating the reverse DNS

--- Investigating the webserver owner

--- Investigating the upstream ISPs

--- Investigating the routing information

--- Investigating the physical location

--- Investigating the email owners

--- Finding additional information

Page 4: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Our scheme (cont.)

Packaging and preserving the evidence Presenting the evidence Conclusion and future work

Page 5: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Motivation

Finding the parties responsible for the different infrastructure areas has become time consuming and error prone.

Systematic approach to investigating a complex Internet presence

--- collecting

--- time-stamping

--- packaging

--- preserving

--- presenting

Page 6: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Advantages of complexity

Having critical infrastructure spread across multiple parties can help investigators overcome legal jurisdiction hurdles, as well as solve issues regarding anonymity.

Illegal activity done using Internet infrastructure residing outside a local jurisdiction has always been difficult to bring under control.

The more parties involved in the existence of an Internet presence, the more difficult it becomes for an entry to remain completely anonymous.

Page 7: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Identifying points of responsibility

Domain name registrars : --- TLD (top level domain)

--- ccTLD (country code TLDs)

--- gTLD (generic TLDs) Regional Internet registries : --- ARIN

--- LACNIC

--- APNIC

--- RIPE

Page 8: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Collecting and preserving the evidence

Use the Unix script command to keep a record of everything we see or type, for human errors from graphical interactions such as coping and pasting are eliminated.

For example :

$ mkdir evidence $ cd evidence $ script record.txt $ ntpq –p > timesync.txt $ date

Page 9: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Collecting and preserving the evidence (cont.)

--- Investigating the domain registry and registrant

--- Investigating the DNS owners

--- Investigating the IP network owners

--- Investigating the reverse DNS

--- Investigating the webserver owner

--- Investigating the upstream ISPs

--- Investigating the routing information

--- Investigating the physical location

--- Investigating the email owners

--- Finding additional information

Page 10: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Packaging and preserving the evidence

Package the collected evidence using the Unix tar command :

$ exit $ cd .. $ tar cvf evidence.tar evidence

Make a cryptographic hash of the tar file : $ md5 evidence.tar > evidence.md5

Page 11: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Presenting the evidence

Without going into too much technical detail, we have created a report during the course of the investigation that non-technical staff can use within the content of their roles.

The information in the report can be independently verified based on the data in the evidence.tar file.

The integrity of the evidence.tar file can be verified with the evidence.md5 file.

Page 12: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

Conclusion and future work

Defined the points of responsibility related to an Internet presence.

Systematically collected and time-stamped the evidence which identifies these parties.

Saved and packaged the evidence in an organized manner. Created a cryptographic hash of the evidence to ensure

integrity is preserved. Created a verifiable report presenting the contact information

found in the evidence.

Page 13: Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006

簡報完畢

敬請指教 !