Subtitles section Play video Print subtitles >> ERIC ROBI: Talk is about forensic fails. I'm this guy. Over here. I founded an eDiscovery company a few years ago. I'm a forensic examiner. I've done thousands and thousands of exams. I'm an expert witness in state and federal court and I like cats and my name is Eric Robi. >> AUDIENCE: Hi, Eric! >> ERIC ROBI: Hi. About this other guy. >> MICHAEL PERKLIN: Hi, I'm Michael Perklin. You may remember from past DEF CONs from ACL Steganography. I'm a forensic examiner, cyber crime investigator, security professional. I've also done thousands of exams. And I like to break things. A lot. (Chuckles.) >> ERIC ROBI: Don't break my cat. All right. So our agenda today. We've got seven amazing stories full of fail. We are going to learn something about forensic techniques. That's what we do. The fails are brought to you by both the suspect and the examiner. We'll get into that in a little bit. The names have been changed to protect the idiots on both sides. We actually changed some of the facts to protect the idiots. It seemed like a good thing to do, basically. Because fail was not just one-dimensional, we found many dimensions of fail in our research. We decided we need to create a fail matrix. (Laughter.) >> ERIC ROBI: To explain how the fail ... I'm going to explain how the fail matrix works. The first level of fail is the user retard level. Oh, my God, I spelled that wrong! (Laughter.) >> MICHAEL PERKLIN: Drink! Drink! For the record, he was responsible for the keynote presentation. So this is definitely his fail. >> ERIC ROBI: This is my fail. I get ten points. So the punishment level depends on what happens. So this particular guy lost the case. Dollars, distress caused, let's give this 15 points. And bonus points are whatever the fuck I feel like doing. His girlfriend left him in this case. So he gets 35 points. Let's get into the first one. This is the "it wasn't me" defense. You may have heard this one before. All right. So we do a lot of commercial litigation. And a really typical kind of case is a trade secrets case. This is a typical example of that. This guy Bob, he was working in sales at ac me. He resigned his position and decided to go work for a competitor. This happens all the time. And some allegations were made by his employer that he took some trade secrets. He took the customer list with him to his new company. It happens. So Bob says I got nothing to hide. Come at me, bros. He didn't exactly say that, but I'm paraphrasing. We started imaging the drive and planning the examination. One thing we frequently do is we look for deleted file and unallocated space. That's the part of the drive that can typically contain a deleted file. When you hit shift delete and it doesn't go away, it ends up in unallocated space. We look for stuff there. Something we do, we look for recently used files by common programs by Word, Excel, Acrobat and so forth and USB device insertion. We look to see how trade secrets got from acme to the new company. The drive finished imaging and I'll share something really cool today, DEF CON exclusive, worldwide premiere, we found a new wiping pattern. (Laughter.) (Cheers and applause.) >> ERIC ROBI: This is actually real. I'm not making this up. This is real. So Bob apparently had used some kind of data destruction program that can over write every bit of space, unallocated space. He used a pattern that, however, was not really commonly used by Windows or any other utilities I've seen. Might have been something custom. So you know, I thought: Hmm, this might suggest something bad was happening here. Let's maybe take another closer look at this. (Chuckles.) >> ERIC ROBI: We are going to zoom in on this and look at this on a molecular level now. (Applause.) (Laughter.) >> ERIC ROBI: I think we need to zoom in a little bit more. (Laughter.) >> ERIC ROBI: So what have we learned in I admit the first part, there was no Sarah Palin in this case. Data destruction can almost always be detected even if you don't use a repeating pattern, it's detectable. We see it all the time. Artifacts can be left behind that are part of the pattern. We might not know what you destroyed, but we'll know you destroyed something. Oops. This is the mic. There you go. And all of a sudden it doesn't work very well. Mean phrases make people dislike you. >> MICHAEL PERKLIN: What about the fail matrix? >> ERIC ROBI: We have to do the fail matrix. Da da da. 12. Pretty retarded, I think. The guy lost the case. He got sued. Under $100,000. So not a huge amount of economic distress. I didn't give him any bonus points here. It just wasn't that good. He gets 27. >> MICHAEL PERKLIN: I think I'll do -- >> ERIC ROBI: It's already a fail. (Laughter.) >> MICHAEL PERKLIN: I think we can blame that guy who gave me the beer. All right. So this case is a lot of fun. I didn't expect it to be fun when it started out. It ended up being a lot of fun. I call it the Nickel Back guy. You'll see why in a second. Another case of stolen confidential documents. This guy, let's call him John. He left one company to go work for a direct competitor. And his old company hired us to go in and take a look at his -- >> ERIC ROBI: Can we get audio for this? By the way, we need audio for this segment. Turn it on? >> MICHAEL PERKLIN: So the company where he left, they asked us to take a look at his work computer to look for signs of data exfiltration. We, he worked on a lot of confidential projects and they wanted to make sure that he wasn't taking these confidential projects to the competitor and letting them know what they were doing. So, right. I totally said all that. Why is this not working? There it is. We opened up the hard drive to start the analysis and we started finding all the same stuff that you typically find on a work computer. Work stuff, sure, some evidence of Facebooking. He's got an MP3 collection. He listened to music while he was at work. Typical stuff. We found the confidential documents that we were asked to make sure that he didn't take. So that was to be expected because he did the work on this computer. And almost immediately something jumped out at me. And we will get into why it jumped out at me in a second, but his music collection became very interesting to me. Not because I love Nickel Back, but because -- well, again, we'll get into that. >> ERIC ROBI: That would be fail. >> MICHAEL PERKLIN: Yeah. I'm Canadian, too, so I ... yeah, Nickel Back is from Canada. >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: Yeah, take a closer look at this photo, something may jump out at you as well. These are MP3s, just songs, but the size of the files is a little bit off. >> ERIC ROBI: What's wrong here? >> MICHAEL PERKLIN: Extended play Nickel Back. This guy loved the Nickel Back. These are actually AVI files. >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: These are AVI file that is he just renamed. John assumed nobody would listen to his Nickel Back MP3s. That's a good assumption because nobody would listen to his Nickel Back MP3s. He was hiding something. But what was he hiding? (Music playing.) >> MICHAEL PERKLIN: Pregger porn. This guy was looking at pregger porn. These were full-length feature films of pregnant ladies banging. And they were like, there was a ton of them all over this guy's hard drive. >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: We did have top analyze them to see what they were. (Laughter.) >> MICHAEL PERKLIN: But I will say that the specific techniques that we used to analyze, they're trade secrets. I can't tell you how much depth we went into when we were analyzing them. Yeah, seems that John did a lot more than work on his confidential project on that computer. We had to tell the company that over the last three years while he was working there on this confidential project, he was also doing other stuff. They were pretty happy that he left anyway. (Laughter.) >> MICHAEL PERKLIN: All right. What have we learned? Examiners, when we take a look at files on a computer, we don't typically look at it in the nested folder structure. Like we don't have to go into every single subfolder, go back, go to other subfolders, back it out. We have a big long list. It makes it easier to analyze stuff. One of the very first things we always run is Codifile Signature Analysis. This is a special script that looks at the contents of every final and compares what is inside the file with the extension. If there's any discrepancies, those files are bumped up to the top of the list to be looked at because the system knows if these don't match, something may not be right here and a human should take a look at this. I just said those things and so at the end of the day John's attempt at hiding his pregger porn bumped it up to the top of the list for me to look at. If you're going to hide something, don't just change the file name. That makes me want to look at it even more. So the fail matrix. (Laughter.) >> MICHAEL PERKLIN: The retard level, I would say 12. Again renaming a file is not data hiding. If up want to hide data, come to my Steg ACL course. The new company where he landed, he lost his job there. Distress caused was zero. Didn't really hurt anybody. What you choose to do on your own time is up to you. Although he chose to do it. >> ERIC ROBI: You know what the bonus points are going to be for, don't you? >> MICHAEL PERKLIN: There are some bonus points. About a nickel's worth. (Laughter.) (Loud buzzer.) >> MICHAEL PERKLIN: Grand total of 30 fail points. >> ERIC ROBI: That is the fail sound. Thank you. By the way, do you like the font that we're using? Comic Sans. Nobody uses Comic Sans. It's the most under appreciated font in presentations. >> MICHAEL PERKLIN: I don't know why we don't see Comic Sans in more presentation settings. >> ERIC ROBI: We're bringing it back. Let's look at the "just bill me later" case. Our client, the ABC firm, out-sourced a key part of their business. Have been doing it many years. And the part of their business that they are out-sourcing is on a time and materials basis. So there's a lot of invoices with ours and rates. And that's basically it. It was several million dollars a year on average that was being billed. Our client started a review project because they thought they were being over billed. They thought there might be a little inflation and they wanted to figure out why things were looking inflated. They looked at some of the individual bills and thought things were taking a little bit too long. So we came in and we decided to help. So they had thousands and thousands and thousands of PDF format invoices. That's not going to do us a lot of good. Even if we applied optical character recognition to it, we have unstructured data. I can search a few PDFs, but tens of thousands of them, it's you have to to do anything with that. We didn't have a lot of clues with this one. Through the magic of court order we were able to go to the customer's database, their network and get an image of everything in the network including a billing database. Which turned out to be very handy. We made a forensic copy of this database. It was not a -- it was in a proprietary format. In order for us to do forensic analysis in a database we need to get it into something like SQL where we can do standard queries. We migrated over and did standard queries. Looking at it, there's no way to compare the PDFs to the database. We decided to reverse engineer the tables in the database. Sometimes it's easy, but sometimes there are thousands and thousands of tables and when you don't have tech support of developers, you have to figure it out. It's a slow, laborious process. We did figure it out. We noticed that the audit logs were turned on in this which happened to be particularly useful. So we ran a lot of queries and versus the time billed versus the audit logs. We found a pattern of inflation going on. Basically when you are billing on time and materials, all you're doing is you've got either hours or you've got a rate. And those are the two things and they inflated. (Loud noise.) >> ERIC ROBI: So these are the two things that you can change there. You can change time. Or you can change the rate. But we found the audit logs were turned off by default and the IT folks, bless the IT folks, they turned the audit logs on which was helpful because we do a lot of database forensic cases and this is the only one where the audit logs were turned on. We were able to compare basically the amount that was billed at the end of the day versus how many hours were put out up to that point. We were able to see a chronology. Maybe at the end of the day the bill was for $1,000. But we saw it was only $800 actually billed. So the billing person, the database person who basically was working with it, this person would change the hours and the rate sometimes and bump it up. Interest went from 800 to $1,000 on a typical invoice. They did this thousands and thousands and thousands of times. So let's look at the fail matrix. So I didn't give the user retard level too many points here because it was a bill administrator. Most people don't know what is going on inside a database, most average people. However, they had to refund the money. So they get 18-point for that. >> MICHAEL PERKLIN: Over the last four or five years worth of money. It was a lot of money. >> ERIC ROBI: It was about $12 million actually. They get 15 points. >> AUDIENCE: (Speaker away from microphone.) >> ERIC ROBI: I wish! And bonus points, hmm, systematic culture of over billing. (Noise.) >> MICHAEL PERKLIN: They get 45. >> ERIC ROBI: Okay. This next one, I call it "smokinggun.txt." If you work in the forensic arena, you probably heard the term the smokinggun.txt. It's the gag name of what you are always looking for in the case. It could be that record in the database. It could be that Internet history record that shows that the guy really did something bad. It comes from the cheesy western movies where the gun was smoking after he shot someone, and it proves he fired the shot. We say did you find the smoking gun? Yeah, we found the smokinggun.txt. Sometimes I wish it was as easy as finding smokinggun.txt. Another intellectual property case. You have a guy league one company to go to work for another company. The first company says can you make sure he didn't do stupid shit and we are called in to make sure he didn't do stupid shit. We imaged the drive. Kicked off the analysis script, like the script I told you guys about before. Opened up his desktop folder. I like to open up the desktop folder of every suspect I'm examining. You can tell a lot about what a guy, or a lot about the person when you're looking at the desktop. Did they cram a lot of files in there in an unorganized fashion or everything is neatly packed away into my documents folder. Things like that. Are they arranged nicely or all spattered? It tells you a little bit about the person. So you can get a little bit into the mind of who they are. Immediately I solved the case. >> MICHAEL PERKLIN: How did you do that? >> ERIC ROBI: Well, the smokinggun.txt. It was almost as easy as this. >> MICHAEL PERKLIN: A barbecue? >> ERIC ROBI: I opened up the desktop folder and I saw this. I'm hoping you can see that in the back. You have a folder on the desktop, the bottom left there. The folder is called Competitive Intelligence. (Laughter.) >> ERIC ROBI: Inside that folder we've got a Power Point presentation titled "Project Blue Book." we've got some PDFs. We've got a whole bunch of stuff about this project Blue Book that this guy was working on from his old company. He was getting ready to deliver this presentation to the executive leadership team of the new company, telling them everything about this confidential project from his old company. (Groaning.) >> ERIC ROBI: He didn't even make it difficult for me. Not only was all that stuff there, he made a Power Point presentation describing it and to deliver all the knowledge for this to the LT. Yeah. So I just said that. >> Did you over bill for that? >> MICHAEL PERKLIN: We are not the last client. >> ERIC ROBI: All right. >> AUDIENCE: (Speaker away from microphone.) >> ERIC ROBI: Pardon me? >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: I don't even remember. Probably, well, it took 20 minutes. We probably just billed one hour. >> ERIC ROBI: Michael, what have we learned in this case? >> MICHAEL PERKLIN: Well, we learned that sometimes people don't even try. Fail matrix. User retard level has to be an 18. >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: We are saving the higher scores for some of the later stories. >> ERIC ROBI: Numbers are going up, you may have noticed. >> MICHAEL PERKLIN: So far each one has been going up. He got an 18 for user retard level. If you're going to be doing this, don't leave tracks all over your computer. Sure if you're going to say they are going to be launching this new thing in August next year, it's one thing to say it to a person. If you put together a whole presentation to about the whole thing. That's a fail. Punishment is ten. He had to settle. Obviously in breach of his NDA from the old company and it cost him 1.5 million in damages. So the distress caused is a six-pointer. Bonus points of 12 for zero effort. This all adds up to the fail matrix score of 46. Next story. >> ERIC ROBI: I hope you appreciate these amazing sound effects and video editing that I did. >> MICHAEL PERKLIN: Hold on. We need to put the presentation on hold. I have a problem. Which one is which? >> ERIC ROBI: That one is mine on the let hand. >> MICHAEL PERKLIN: Really, because I want the one with more. >> ERIC ROBI: The one with yours is more. >> AUDIENCE: (Speaker away from microphone.) >> ERIC ROBI: We will be taking questions later. All right. The next one I call hiding in the Cloud. So once again a top sales guy leaves a company and the sales just take a nose dive actually and they think he took the customer list but they can't prove it. They know that there's new customers. They know that there's old customers over at the new company but they can't prove he took the customer list. We image the computer and look for the usual clues. For example, link files are a Windows artifact that show what files have been recently opened. They are a simple text final and easily parsed and have a lot of information about the location of the file, the date and the time, all that kind of good stuff. We look at a registry key which I love the name of this. It makes no sense to me at all, but somebody in Microsoft maybe had a couple of these one day when we were working. Bag MRU for some reason -- most recently used, but why bag? >> AUDIENCE: (Speaker away from microphone.) >> ERIC ROBI: You guys are full of great answers. >> MICHAEL PERKLIN: You want to explain why it is named that? It's still a fucked up name. >> ERIC ROBI: It can show what files are inside a folder. That's what we typically look at in a file exfiltration case. This is from Vista forward you have jump lists. >> MICHAEL PERKLIN: That is a fail. It should say Vista. >> ERIC ROBI: I have to take a drink. I don't love Vista in there to do it Wright. If you have five Word documents open and you click on it, you have the five, those are jump lists basically. IE history. Internet Explorer. Internet Explorer is so much morning exploring the Internet. It records things that you do without your knowledge, like opening files. But we are getting no love. I'm not finding anything. Show me the love, baby. He's having a beer. So we search the IE history and we found a .JVM file pointing to files anywhere. Who is familiar with that site? It's very much like Dropbox. The same kind of concept but more for business users. It has a lot of really great auditing, logging, stuff like that. If you're uploading and downloading files, you can monitor and track them. That turned out to be a nice thing. Typically that's only in the user control file best of your recollection we found an HTM file and we solved the case. >> Bingo! >> ERIC ROBI: Timing fail, I'm sorry. >> Drink! >> Drink! >> ERIC ROBI: Bingo, we solved the case. All right. So what we got was the account ID, the upload times, the file names, everything. We got some sweet loving. We got stolen files. Let's look at JavaScript here. I changed the names of the file. We have recipe for Coke, minor trade secrets. The user is the user account name. So we were able to subpoena that from files anywhere and figure out who actually registered the account. There is the folder that it was in. And this is really handy here, the date that it was uploaded. And we got a whole bunch of these. In fact this is the first page of an 80-page Excel report I prepared. These are all the file names that this guy uploaded. So yeah. The second part of the story is -- go back. Another fail. >> Fail! >> Drink! >> ERIC ROBI: Which one do I drink from? >> MICHAEL PERKLIN: Good answer. >> ERIC ROBI: The second part of the case, the opposing attorney, the guy representing the thief handed us ab an Outlook CD, Outlook PST on it. This is part of the discovery process. Discovery is a legal term in litigation where both sides are able to exchange evidence. In fact, they have, they are compelled to exchange evidence through the rules of the court. He gives us a CD. It has Outlook and Outlook PST on it. First thing we do, there's not a lot of files in there and the first thing we do, we want to recover the deleted e-mails in a PST. We're forensic analysts and that's what we like doing, looking at people's e-mails. I'll show you the old school way of recovering deleted e-mails. You use a hex editor, crack open the PST and exchange bytes seven through 13, change them to zeros. Save the file. Then you use the Outlook repair tool built in with Microsoft. And you basically repair the tool -- sorry, repair the PST and what happens? You get a lot of e-mails back. These are not the actual e-mails, but you get tons and tons of e-mails back. In this case, we got tens of thousands of deleted e-mails. What was in these e-mails? Everything that completely turned the case around. Not only did we have this guy with all the uploads on the spreadsheets. We also had all the e-mails about who was involved. What lists he took. Who are the, you know, all the people that were involved. We were winning. We went to Charlie Sheen mode all of a sudden. And the funny thing is, we were able to take all this information and at a deposition. If you don't know what a deposition is, we get to ask questions of the opposing party. We are asking them, what happened? Did you guys steal anything? Did you take anything? No, no, no. We part pulling out these e-mails one by one by one. The guy turns white as a sheet. And he spills the beans. And basically, you know, we do pretty well. Who deleted the mails, do you think in this case? Hmm? >> MICHAEL PERKLIN: Call it out if you think you know. >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: Wow, people got it almost immediately. >> ERIC ROBI: They hired Saul Goodman, unfortunately. And yeah, he deleted the mails. Not a good thing. Not a good thing. What have we learned? >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: The question is, did he claim privilege on the e-mails? >> ERIC ROBI: He claimed privilege on some of them, but not all of the 10,000 that he deleted. IE history is difficult to wipe. It seems to leave stuff behind. We learned a new file type, the Java file type, JavaScript files can give us love, too. We like them. And uploading files still leaves traces. So attorneys shouldn't mess with evidence. It's against the ethical rules in every state and probably every Canadian province and can get you disbarred. >> AUDIENCE: Did they in this case? >> Let's look at the fail matrix. >> ERIC ROBI: User retard level is damn high on this one. Fails on the attorney's part and also on the ex-sales guy. Huge lawsuit. Three and a half million dollars in fees and damages. (Whistling.) >> ERIC ROBI: Which our client all got back basically and 15 bonus points. The attorney might lose his license on this one. He hasn't yet. We don't track that kind of stuff. (Buzzer.) >> ERIC ROBI: Fifty-one, we're moving up. You ready? >> MICHAEL PERKLIN: Oh, right. >> Fail! >> Drink! >> MICHAEL PERKLIN: All right. Let's do this shit. >> ERIC ROBI: That's winning. >> MICHAEL PERKLIN: This next case is probably one of the most fun cases I've worked on. From the start I could tell that something -- it was going to be a fun one. The RBT bounce. You'll see why. I was called in to investigate a network breach. The company shared information with us that was evidence that at least one computer had been breached. They didn't know why. They didn't know what. Asked us to investigate and to tell them why and what. It was a large company. They had a lot of computers, all of them were Windows based. Thousands upon thousands of computers in offices all across the world and in one of their offices they noticed this computer had been breached. So let's figure out what happened. So we move in. And actually I think I'm going to pause here for two seconds. Eric, is this your first time presenting at DEF CON? >> ERIC ROBI: Yes, it is. (Laughter.) >> MICHAEL PERKLIN: Okay. (Applause.) >> MICHAEL PERKLIN: We don't even have to say anything anymore. You guys know exactly what is going on. >> ERIC ROBI: Uh-oh. >> MICHAEL PERKLIN: I want to know, is Sarah in the room? >> Show yourself! >> Which Sarah? Narrow it down? (Overlapping speakers.) >> MICHAEL PERKLIN: Is your name Sarah? >> Bend over. (Laughter.) >> We are just going to leave now. >> You are the ugliest Sarah ever. >> Fail! Another soldier bites the dust. Winning! (Laughter.) >> Stop that. >> The path to recovery is -- >> Paul, there's some issue about the sound person? >> No. Sarah is supposed to be the sound person. >> Sarah is right here. You are talking about me, right? >> I appreciate that, Sarah, but we're looking for a different person. >> Since she is not here, Sarah, would you come up? >> Come up. You're the next contestant on: Will you fail? >> Thank you. >> The other Sarah is going to be pissed. You want to go around that way? >> You already got one. Someone counted wrong! >> Pass one to Sarah. >> All right. >> A double. (Laughter.) >> Find Sarah -- >> I'm sure all of you want to be Sarah right now. >> To our new speakers and new attendees! (Applause.) >> Whew! >> Uh-oh. How many more talks? >> Thank you. >> Two more this hour. >> MICHAEL PERKLIN: All right. We have 15 minutes left. >> Is Sarah in the next -- >> MICHAEL PERKLIN: Thank you very much, goons, for doing that. It's Eric's first time at DEF CON. So I was talking with the RDP bounce case that I was investigating. As I mentioned, thousands of computers, various offices all around the world. So we analyze the one computer that they knew was breached. And it showed that RDP or remote desktop property call. This is the tool in Windows that allows you to remotely control another computer. Some logs showed us that RDP was used to connect using the local administrator password to another machine. It also showed that -- actually I said it backwards. RDP was used to connect in and also showed that RDP was used to connect out. In this diagram I was looking at the middle computer. I didn't know at the time there were other computers. I was looking at the middle one. It seemed like there were a bunched used in here. It was probably the tip of the iceberg. >> ERIC ROBI: Where do you find these logs, Michael? >> MICHAEL PERKLIN: Specifically I was looking at the Windows event viewer. Go into the control panel and the administrator tools. It logs by default a lot of stuff in there including when RDP is used to connect in and when you're connecting out. So I analyzed that machine that came before it. And same thing. There were logs that showed that somebody was connecting into that. It was basically an entire bounce. Now, these computers were located in different offices all around the world. This guy was bouncing all around the world to do something. So obviously this is a pattern. I still didn't know what he was doing. I just knew that he was clearly going through a lot of trouble to obfuscate his trail, bouncing all around. Probably so that when he does hit his final target there's no direct evidence to where he was coming from. >> AUDIENCE: Were they sessions within sessions? >> MICHAEL PERKLIN: Yes, within the remote desktop, he did this over and over. Remote desktop is not the fastest protocol at all. I don't want to speculate how long it took him to do this. >> ERIC ROBI: Can you imagine how long the screen redraw was by the time you get to machine ten? >> MICHAEL PERKLIN: Jesus Christ, you have to click a minute between clicks or something. What was the target? So I think you can all figure out what I do next. Rather than following the trail back, I followed the trail forward. What was he getting? Step after step, computer after computer. Site after site after site all around the world. I finally reached a high profile machine. I wish I could tell you which specific machine it was. I can't because it would give away too much about this company. >> Prism? >> ERIC ROBI: Did it have Nickel Back on it? >> MICHAEL PERKLIN: Chalkiest video ever. I knew what he was going after when I reached that machine. He wanted confidential documents that were only on this one machine in the entire company. He obviously knew that and he wanted to get into the machine to get these documents. I focused the analysis on this target machine, on this special confidential machine and I wanted to see what did they do? Specifically which files did they take? And it took me only about two minutes. As I was analyzing this machine. I identified the attacker immediately. He went through all around the world. Finally when I was taking a look at his target, within two minutes I found out who he was. >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: He used his own credentials on the machine? No, he didn't use his own credentials on the machine. >> E-mails to himself? >> MICHAEL PERKLIN: No. >> He stole his own file? >> MICHAEL PERKLIN: No, and he did not check Facebook and no share drives. Why don't I tell you what he did? >> ERIC ROBI: Michael, what did he do? >> MICHAEL PERKLIN: Printers. One thing a lot of people don't know about remote desktop, by default it maps the printer connected to your machine to the machine that you are connecting out to. It does this so that when you hit print inside your remote desktop window your printer next to you is available so you can print a document besides you. This guy didn't print any documents but just by connecting the machine automatically mapped his local printer to the target machine, which identified his machine name. He forgot to turn this off. There is a check box in remote desktop protocol when you open up the RDP window, unmap printers to unmap printers. And it's a check box and he did not map it. >> ERIC ROBI: What have re logged Michael? >> MICHAEL PERKLIN: What have we learned? Documents logged by inside -- can give insight into user actions. The system did this automatically. By looking at the system is doing can tell what you the user is doing. For the fail matrix, user retard level would be about a 20 because he went through a lot of trouble to cover his tracks and he did not cover his tracks. Punishment level would be 15. He loss his job. He also lost his references. He can't use that company as a reference anymore. So distress caused would be 8. Bonus points would be 20. Do some research. If you are going to use RDP to pull off a scam, know how RDP works. Adding it all up, we have a fail score of 63. Last story, Eric. >> ERIC ROBI: All right. So the last story is a little bit different than the others. (Laughter.) >> ERIC ROBI: This is the epic porno fail. The difference in this one, all together the cases we have talked about have been commercial litigation, civil litigation, something on this side. This one happens to be a criminal case. From time to time we do criminal defense work. And we work either with Public Defenders or private attorneys. This is about this kind of situation. So our client, Edgar, has been charged with possession of contra band, aka child porn in his computer. He claims innocence and I roll my eyes because everybody always claims innocence. 98 percent of these people did it. We examine the computer. We looked at the examiners report. We looked at the allegations. Let's take a look at them. So they claim Edgar downloaded porn. All right? They claim that Edgar's user account had passwords. This is all documented in the record. They claim that Edgar utilized news groups to download porn, like for real? >> Who uses news groups to download porn? I think they have the -- (Overlapping speakers.) >> ERIC ROBI: Yeah, news groups, right? >> AUDIENCE: Pregger porn. >> ERIC ROBI: That guy I would believe. They allege that he downloaded illegal porn. There is one thing to note. Keep this in mind. He left his house on April 2012. His wife kicked him out because of this stuff happening. April 2012. Keep that in mind. So let's look when we examine the computer. Let's see what we came up with. First we looked at IE history. As I mentioned before, IE history is able to show you when a file has been opened. This is an actual example, I changed the file name a little bit here. What was the date I just mentioned? >> AUDIENCE: April 2012. >> ERIC ROBI: April 2012. I see some dates here. Are these before or after April 2012? Put up your hand if it's after? Ahh! Yes. So all right. One fail here. Let's look at his peer to peer software download folder. In the top there I've got the path where these naughty files were downloaded and it's a pretty typical path. These P to P programs change the name to something long. It's like T-something something something naughty file. I'm looking at the dates here again. Michael, do you have a calendar? >> MICHAEL PERKLIN: Give me a second here. >> ERIC ROBI: When is December? >> MICHAEL PERKLIN: It is after April. Definitely after April. >> ERIC ROBI: Okay, just wanted to check. We need to verify our forensic findings before we publish them. We're verifying. Oops. I think -- >> MICHAEL PERKLIN: Fail! >> ERIC ROBI: Fail. Give me that beer. All right. They also claim that he used Outlook express. Really, to download porn. Outlook express. This is 2012, remember, folks. >> MICHAEL PERKLIN: Makes you wonder, did they even analyze this guy's machine? We saw records of P to P, not Outlook express. >> ERIC ROBI: Outlook express, all right. In reality, yes, Outlook express was on the machine set up with an account called porno lover. Okay? It was set up after Edgar moved out of the house. And only headers were downloaded. No content. >> MICHAEL PERKLIN: What do you mean by headers? >> ERIC ROBI: A header, if you're using Outlook express, it is just the first part of the file. The e-mail is going to have the date, the send to, the receiver, the subject line, make the first couple words. There was no content. There was no photos in there, just headers with, you know, admittedly porno names. Also, let's look at accusation three. They said his user account had a password. The inference is only Edgar was able to access it because there was a password. Let's look at the password, shall we? Maybe we can zoom in a little bit on this. (Laughter.) >> ERIC ROBI: This is actually a cool utility the it's free. It's LCP. I'll go back to it here. It's a free utility, great for looking and seeing if there are passwords. You can also use it to perform an attack, although it's not very good. All right. So more facts undiscovered by the examiner. The P to P client was used to download porn. The examiner didn't find that. Into a new user account called porno lover. Guess when? After he moved out of the house. So we submitted our report to the prosecutor. Looks like a five, ten-page report, something like that. The government dropped the charges, years after they charged this guy, they dropped the charges. This does not ever happen really. This is the first time. I've done thousands of cases -- well, hundreds of cases, thousands of exams. I don't know how many, it's never happened before. This is after the guy spent a huge amount of money on legal costs. So to do all this, I just want to give a thank you to Rob Lee and SANs -- you know Rob Lee? We used super timeline for this analysis. That's a super piece of -- (Lost audio.) >> MICHAEL PERKLIN: Definitely one of the best pieces of software used. >> ERIC ROBI: So the government interviews Edgar's friend. The friend confesses. The friend did it. The friend was trying to get jiggy with Edgar's wife. (Groans.) >> ERIC ROBI: And he put the porn on the computer. The court clears Edgar's name. They give him an finding of innocence. Rarely happens. I have been to court a couple times where there have been acquittals and we didn't go to court on this one, fortunately, but we would have. So what did we learn? Base your conclusions upon actual evidence. Find multiple artifacts backing up your allegations. I don't know where the password thing came from. Tie it to a person, not just a machine if possible. Try to use at user activity that would tie expect events to a person. Remember, the maximum you can get is 20 in any category. However, I have decided to break the rules a little bit for this one. Examiner ineptness, he gets five bonus points built in right there. Oh, yeah, the guy sued the city for millions of dollars. And you know, there might be a job security issue for somebody in this case. >> MICHAEL PERKLIN: I don't think that examiner is really going to have a job much longer. >> ERIC ROBI: One hundred bonus points because the court finds the suspect innocent. Factually innocent. (Buzzer.) (Music playing.) >> ERIC ROBI: Thank you very much! >> MICHAEL PERKLIN: Thank you, everybody! If you want to do Q&A, we're going over to the Chill-Out Lounge. (The session concluded at 2:45 p.m.)
B1 US eric michael fail file machine forensic DEF CON 21 - Eric Robi and Michael Perklin - Forensic Fails Shift + Delete Won't Help You Here 81 4 John Thunder{{1+1}} posted on 2016/04/14 More Share Save Report Video vocabulary