Syngress Publishing Cloud Storage Forensics (2014) by 未知

Syngress Publishing Cloud Storage Forensics (2014) by 未知

Author:未知
Format: epub
Published: 0101-01-01T00:00:00+00:00


100

CHAPTER 5 Forensic Analysis of Cloud Storage Data Remnants

Table 5.1 Example of Snapshot.db SQLite File Contents for enron.jpg File

Resource id:

“file:XXwUTD1c9KXiMXXJCVXFsZElqRkE”

Filename:

“Enron3111.jpg”

Modified:

“1328766794” (DCode Unix Numeric Value 5 Thu, 09 February 2012

15:23:14. 10930)

Created:

“1339309046” (DCode Unix Numeric Value 5 Sun, 10 June 2012

15:47:26. 10930)

Acl role:

“0”

Doc type:

“1”

Removed:

“0”

URL:

“https://docs.google.com/file/d/XXwUTD1c9KXiMXXJCVXFsZElqRkE/

edit”

Size:

“315868”

Checksum:

“77638319ea64cc1b70d4d4f20a56295d”

Shared:

“0”

Also of note is that the password for the Google Drive user account was

located

in cleartext

within

the

file

“C\Users\[username]\AppData\Local

\Microsoft\Internet Explorer\Recovery\Last Active\ {F9C06D05 B2C2 11E1

B53F 000C29985EDE}.dat” near the text “&Passwd

,” such as:

&ktl

&ktf

&Email

username@mail.

com&Passwd

XXXXXXXX&PasswdAgain

XXXXXXX

This information was located within the IE Upload-VM and also in System

Volume Information Restore Points. The password in the file was not observed

when the other browsers were used. While this may be beneficial to a forensic

investigation, this also presents a security risk to users. Subashini and Kavitha

(Subashini et al., 2011) explained that “[m]alicious users can exploit weaknesses in the data security model to gain unauthorized access to data.” A password and

username stored within files on a hard drive could easily be discerned by a crimi-

nal user who has gained remote access to a victim’s computer using a common

exploit, and could be used to extract data from an account or to store illicit data

in the victim’s account.

When installed, the Google Drive client software ran automatically when the

Windows operating system started and logged in to the user account without

prompting for a password. This can be of assistance in an investigation, as a

forensic copy of a seized computer hard drive can be used with software which

will allow the forensic copy of a hard drive to be run within a virtual environ-

ment. Software such as Virtual Forensic Computing or LiveView will scan the

forensic image of a hard drive and prepare the requisite files to run an operating

system on a hard drive within VMware Player. In tests conducted, when the

forensic copy of a hard drive contains the Google Drive client software with a

Google drive forensics: Windows 7 PC

101

user account and password already stored, the PC when started in a VM automati-

cally signed in to the Google Drive account. This process will provide a practi-

tioner access to the files stored within the Google Drive user account (once

synchronized). In addition, there was an option with the Google Drive client soft-

ware from the Google Drive icon at the bottom right of the Desktop on Windows

7 labeled “visit Google Drive on the web” which when selected resulted in the

opening of the default browser and provided full access to the Google Drive

account, including the ability to view user activity, all items, and view the modi-

fied, edited, and last opened dates for files. In a forensic environment, care would

need to be taken when connecting a forensic image to the Internet. Legal author-

ity would be required to ensure a practitioner has the appropriate authority within

their jurisdiction to examine the data stored within the cloud storage account,

which could potentially be stored overseas or in another jurisdiction. For example

in Australia, Section 3L of the Crimes Act 1914 (Cth) has a provision for the exe-

cuting officer of a warrant to access data which includes data not held at the pre-

mises, i.e., accessible from a computer or data storage device.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(73909)
What's Done in Darkness by Kayla Perrin(26957)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(20853)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(20606)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(20535)
The Fifty Shades Trilogy & Grey by E L James(19454)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19376)
Shot Through the Heart by Mercy Celeste(19236)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17384)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17351)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(17179)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(17094)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16709)
The Subtle Art of Not Giving a F*ck by Mark Manson(14823)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14439)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(14211)
Cozy crochet hats: 7 Stylish and Beginner-Friendly Patterns from Baby Beanies to Trendy Bucket Hats by Vanilla Lazy(13491)
Scorched Earth by Nick Kyme(13092)
Reichel W. Numerical methods for Electrical Engineering, Meteorology,...2022 by Unknown(12975)
Drei Generationen auf dem Jakobsweg by Stein Pia(11254)