Placeholder Image

Subtitles section Play video

  • >> ERIC ROBI: Talk is about forensic fails. I'm this guy. Over here. I founded an eDiscovery

  • company a few years ago. I'm a forensic examiner. I've done thousands and thousands of exams.

  • I'm an expert witness in state and federal court and I like cats and my name is Eric

  • Robi. >> AUDIENCE: Hi, Eric!

  • >> ERIC ROBI: Hi. About this other guy. >> MICHAEL PERKLIN: Hi, I'm Michael Perklin.

  • You may remember from past DEF CONs from ACL Steganography. I'm a forensic examiner, cyber

  • crime investigator, security professional. I've also done thousands of exams. And I like

  • to break things. A lot. (Chuckles.)

  • >> ERIC ROBI: Don't break my cat. All right. So our agenda today. We've got seven amazing

  • stories full of fail. We are going to learn something about forensic techniques. That's

  • what we do. The fails are brought to you by both the suspect and the examiner. We'll get

  • into that in a little bit. The names have been changed to protect the idiots on both

  • sides. We actually changed some of the facts to protect the idiots. It seemed like a good

  • thing to do, basically. Because fail was not just one-dimensional, we found many dimensions

  • of fail in our research. We decided we need to create a fail matrix.

  • (Laughter.) >> ERIC ROBI: To explain how the fail ... I'm

  • going to explain how the fail matrix works. The first level of fail is the user retard

  • level. Oh, my God, I spelled that wrong! (Laughter.)

  • >> MICHAEL PERKLIN: Drink! Drink! For the record, he was responsible for the keynote

  • presentation. So this is definitely his fail. >> ERIC ROBI: This is my fail. I get ten points.

  • So the punishment level depends on what happens. So this particular guy lost the case. Dollars,

  • distress caused, let's give this 15 points. And bonus points are whatever the fuck I feel

  • like doing. His girlfriend left him in this case. So he gets 35 points.

  • Let's get into the first one. This is the "it wasn't me" defense. You may have heard

  • this one before. All right. So we do a lot of commercial litigation. And a really typical

  • kind of case is a trade secrets case. This is a typical example of that. This guy Bob,

  • he was working in sales at ac me. He resigned his position and decided to go work for a

  • competitor. This happens all the time. And some allegations were made by his employer

  • that he took some trade secrets. He took the customer list with him to his new company.

  • It happens. So Bob says I got nothing to hide. Come at

  • me, bros. He didn't exactly say that, but I'm paraphrasing.

  • We started imaging the drive and planning the examination. One thing we frequently do

  • is we look for deleted file and unallocated space. That's the part of the drive that can

  • typically contain a deleted file. When you hit shift delete and it doesn't go away, it

  • ends up in unallocated space. We look for stuff there. Something we do, we look for

  • recently used files by common programs by Word, Excel, Acrobat and so forth and USB

  • device insertion. We look to see how trade secrets got from acme to the new company.

  • The drive finished imaging and I'll share something really cool today, DEF CON exclusive,

  • worldwide premiere, we found a new wiping pattern.

  • (Laughter.) (Cheers and applause.)

  • >> ERIC ROBI: This is actually real. I'm not making this up. This is real.

  • So Bob apparently had used some kind of data destruction program that can over write every

  • bit of space, unallocated space. He used a pattern that, however, was not really commonly

  • used by Windows or any other utilities I've seen. Might have been something custom. So

  • you know, I thought: Hmm, this might suggest something bad was happening here. Let's maybe

  • take another closer look at this. (Chuckles.)

  • >> ERIC ROBI: We are going to zoom in on this and look at this on a molecular level now.

  • (Applause.) (Laughter.)

  • >> ERIC ROBI: I think we need to zoom in a little bit more.

  • (Laughter.) >> ERIC ROBI: So what have we learned in I

  • admit the first part, there was no Sarah Palin in this case. Data destruction can almost

  • always be detected even if you don't use a repeating pattern, it's detectable. We see

  • it all the time. Artifacts can be left behind that are part of the pattern.

  • We might not know what you destroyed, but we'll know you destroyed something.

  • Oops. This is the mic. There you go. And all of a sudden it doesn't work very well. Mean

  • phrases make people dislike you. >> MICHAEL PERKLIN: What about the fail matrix?

  • >> ERIC ROBI: We have to do the fail matrix. Da da da.

  • 12. Pretty retarded, I think. The guy lost the case. He got sued. Under $100,000. So

  • not a huge amount of economic distress. I didn't give him any bonus points here. It

  • just wasn't that good. He gets 27. >> MICHAEL PERKLIN: I think I'll do --

  • >> ERIC ROBI: It's already a fail. (Laughter.)

  • >> MICHAEL PERKLIN: I think we can blame that guy who gave me the beer.

  • All right. So this case is a lot of fun. I didn't expect it to be fun when it started

  • out. It ended up being a lot of fun. I call it the Nickel Back guy. You'll see why in

  • a second. Another case of stolen confidential documents.

  • This guy, let's call him John. He left one company to go work for a direct competitor.

  • And his old company hired us to go in and take a look at his --

  • >> ERIC ROBI: Can we get audio for this? By the way, we need audio for this segment. Turn

  • it on? >> MICHAEL PERKLIN: So the company where he

  • left, they asked us to take a look at his work computer to look for signs of data exfiltration.

  • We, he worked on a lot of confidential projects and they wanted to make sure that he wasn't

  • taking these confidential projects to the competitor and letting them know what they

  • were doing. So, right. I totally said all that.

  • Why is this not working? There it is. We opened up the hard drive to start the analysis and

  • we started finding all the same stuff that you typically find on a work computer. Work

  • stuff, sure, some evidence of Facebooking. He's got an MP3 collection. He listened to

  • music while he was at work. Typical stuff. We found the confidential documents that we

  • were asked to make sure that he didn't take. So that was to be expected because he did

  • the work on this computer. And almost immediately something jumped out at me. And we will get

  • into why it jumped out at me in a second, but his music collection became very interesting

  • to me. Not because I love Nickel Back, but because -- well, again, we'll get into that.

  • >> ERIC ROBI: That would be fail. >> MICHAEL PERKLIN: Yeah. I'm Canadian, too,

  • so I ... yeah, Nickel Back is from Canada. >> AUDIENCE: (Speaker away from microphone.)

  • >> MICHAEL PERKLIN: Yeah, take a closer look at this photo, something may jump out at you

  • as well. These are MP3s, just songs, but the size of the files is a little bit off.

  • >> ERIC ROBI: What's wrong here? >> MICHAEL PERKLIN: Extended play Nickel Back.

  • This guy loved the Nickel Back. These are actually AVI files.

  • >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: These are AVI file that

  • is he just renamed. John assumed nobody would listen to his Nickel Back MP3s. That's a good

  • assumption because nobody would listen to his Nickel Back MP3s. He was hiding something.

  • But what was he hiding? (Music playing.)

  • >> MICHAEL PERKLIN: Pregger porn. This guy was looking at pregger porn. These were full-length

  • feature films of pregnant ladies banging. And they were like, there was a ton of them

  • all over this guy's hard drive. >> AUDIENCE: (Speaker away from microphone.)

  • >> MICHAEL PERKLIN: We did have top analyze them to see what they were.

  • (Laughter.) >> MICHAEL PERKLIN: But I will say that the

  • specific techniques that we used to analyze, they're trade secrets. I can't tell you how

  • much depth we went into when we were analyzing them. Yeah, seems that John did a lot more

  • than work on his confidential project on that computer. We had to tell the company that

  • over the last three years while he was working there on this confidential project, he was

  • also doing other stuff. They were pretty happy that he left anyway.

  • (Laughter.) >> MICHAEL PERKLIN: All right. What have we

  • learned? Examiners, when we take a look at files on a computer, we don't typically look

  • at it in the nested folder structure. Like we don't have to go into every single subfolder,

  • go back, go to other subfolders, back it out. We have a big long list. It makes it easier

  • to analyze stuff. One of the very first things we always run is Codifile Signature Analysis.

  • This is a special script that looks at the contents of every final and compares what

  • is inside the file with the extension. If there's any discrepancies, those files are

  • bumped up to the top of the list to be looked at because the system knows if these don't

  • match, something may not be right here and a human should take a look at this.

  • I just said those things and so at the end of the day John's attempt at hiding his pregger

  • porn bumped it up to the top of the list for me to look at. If you're going to hide something,

  • don't just change the file name. That makes me want to look at it even more.

  • So the fail matrix. (Laughter.)

  • >> MICHAEL PERKLIN: The retard level, I would say 12. Again renaming a file is not data

  • hiding. If up want to hide data, come to my Steg ACL course.

  • The new company where he landed, he lost his job there. Distress caused was zero. Didn't

  • really hurt anybody. What you choose to do on your own time is up to you. Although he

  • chose to do it. >> ERIC ROBI: You know what the bonus points

  • are going to be for, don't you? >> MICHAEL PERKLIN: There are some bonus points.

  • About a nickel's worth. (Laughter.)

  • (Loud buzzer.) >> MICHAEL PERKLIN: Grand total of 30 fail

  • points. >> ERIC ROBI: That is the fail sound. Thank

  • you. By the way, do you like the font that we're using? Comic Sans. Nobody uses Comic

  • Sans. It's the most under appreciated font in presentations.

  • >> MICHAEL PERKLIN: I don't know why we don't see Comic Sans in more presentation settings.

  • >> ERIC ROBI: We're bringing it back. Let's look at the "just bill me later" case.

  • Our client, the ABC firm, out-sourced a key part of their business. Have been doing it

  • many years. And the part of their business that they are out-sourcing is on a time and

  • materials basis. So there's a lot of invoices with ours and rates. And that's basically

  • it. It was several million dollars a year on average that was being billed. Our client

  • started a review project because they thought they were being over billed. They thought

  • there might be a little inflation and they wanted to figure out why things were looking

  • inflated. They looked at some of the individual bills and thought things were taking a little

  • bit too long. So we came in and we decided to help.

  • So they had thousands and thousands and thousands of PDF format invoices. That's not going to

  • do us a lot of good. Even if we applied optical character recognition to it, we have unstructured

  • data. I can search a few PDFs, but tens of thousands of them, it's you have to to do

  • anything with that. We didn't have a lot of clues with this one.

  • Through the magic of court order we were able to go to the customer's database, their network

  • and get an image of everything in the network including a billing database.

  • Which turned out to be very handy. We made a forensic copy of this database. It was not

  • a -- it was in a proprietary format. In order for us to do forensic analysis in a database

  • we need to get it into something like SQL where we can do standard queries. We migrated

  • over and did standard queries. Looking at it, there's no way to compare the PDFs to

  • the database. We decided to reverse engineer the tables in the database. Sometimes it's

  • easy, but sometimes there are thousands and thousands of tables and when you don't have

  • tech support of developers, you have to figure it out. It's a slow, laborious process. We

  • did figure it out. We noticed that the audit logs were turned on in this which happened

  • to be particularly useful. So we ran a lot of queries and versus the

  • time billed versus the audit logs. We found a pattern of inflation going on. Basically

  • when you are billing on time and materials, all you're doing is you've got either hours

  • or you've got a rate. And those are the two things and they inflated.

  • (Loud noise.) >> ERIC ROBI: So these are the two things

  • that you can change there. You can change time. Or you can change the rate. But we found

  • the audit logs were turned off by default and the IT folks, bless the IT folks, they

  • turned the audit logs on which was helpful because we do a lot of database forensic cases

  • and this is the only one where the audit logs were turned on. We were able to compare basically

  • the amount that was billed at the end of the day versus how many hours were put out up

  • to that point. We were able to see a chronology. Maybe at the end of the day the bill was for

  • $1,000. But we saw it was only $800 actually billed. So the billing person, the database

  • person who basically was working with it, this person would change the hours and the

  • rate sometimes and bump it up. Interest went from 800 to $1,000 on a typical invoice. They

  • did this thousands and thousands and thousands of times.

  • So let's look at the fail matrix. So I didn't give the user retard level too many points

  • here because it was a bill administrator. Most people don't know what is going on inside

  • a database, most average people. However, they had to refund the money. So

  • they get 18-point for that. >> MICHAEL PERKLIN: Over the last four or

  • five years worth of money. It was a lot of money.

  • >> ERIC ROBI: It was about $12 million actually. They get 15 points.

  • >> AUDIENCE: (Speaker away from microphone.) >> ERIC ROBI: I wish! And bonus points, hmm,

  • systematic culture of over billing. (Noise.)

  • >> MICHAEL PERKLIN: They get 45. >> ERIC ROBI: Okay. This next one, I call

  • it "smokinggun.txt." If you work in the forensic arena, you probably heard the term the smokinggun.txt.

  • It's the gag name of what you are always looking for in the case. It could be that record in

  • the database. It could be that Internet history record that shows that the guy really did

  • something bad. It comes from the cheesy western movies where the gun was smoking after he

  • shot someone, and it proves he fired the shot. We say did you find the smoking gun? Yeah,

  • we found the smokinggun.txt. Sometimes I wish it was as easy as finding smokinggun.txt.

  • Another intellectual property case. You have a guy league one company to go to work for

  • another company. The first company says can you make sure he didn't do stupid shit and

  • we are called in to make sure he didn't do stupid shit. We imaged the drive. Kicked off

  • the analysis script, like the script I told you guys about before. Opened up his desktop

  • folder. I like to open up the desktop folder of every suspect I'm examining. You can tell

  • a lot about what a guy, or a lot about the person when you're looking at the desktop.

  • Did they cram a lot of files in there in an unorganized fashion or everything is neatly

  • packed away into my documents folder. Things like that. Are they arranged nicely or all

  • spattered? It tells you a little bit about the person. So you can get a little bit into

  • the mind of who they are. Immediately I solved the case.

  • >> MICHAEL PERKLIN: How did you do that? >> ERIC ROBI: Well, the smokinggun.txt. It

  • was almost as easy as this. >> MICHAEL PERKLIN: A barbecue?

  • >> ERIC ROBI: I opened up the desktop folder and I saw this.

  • I'm hoping you can see that in the back. You have a folder on the desktop, the bottom left

  • there. The folder is called Competitive Intelligence. (Laughter.)

  • >> ERIC ROBI: Inside that folder we've got a Power Point presentation titled "Project

  • Blue Book." we've got some PDFs. We've got a whole bunch of stuff about this project

  • Blue Book that this guy was working on from his old company. He was getting ready to deliver

  • this presentation to the executive leadership team of the new company, telling them everything

  • about this confidential project from his old company.

  • (Groaning.) >> ERIC ROBI: He didn't even make it difficult

  • for me. Not only was all that stuff there, he made a Power Point presentation describing

  • it and to deliver all the knowledge for this to the LT.

  • Yeah. So I just said that. >> Did you over bill for that?

  • >> MICHAEL PERKLIN: We are not the last client. >> ERIC ROBI: All right.

  • >> AUDIENCE: (Speaker away from microphone.) >> ERIC ROBI: Pardon me?

  • >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: I don't even remember.

  • Probably, well, it took 20 minutes. We probably just billed one hour.

  • >> ERIC ROBI: Michael, what have we learned in this case?

  • >> MICHAEL PERKLIN: Well, we learned that sometimes people don't even try.

  • Fail matrix. User retard level has to be an 18.

  • >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: We are saving the higher

  • scores for some of the later stories. >> ERIC ROBI: Numbers are going up, you may

  • have noticed. >> MICHAEL PERKLIN: So far each one has been

  • going up. He got an 18 for user retard level. If you're going to be doing this, don't leave

  • tracks all over your computer. Sure if you're going to say they are going to be launching

  • this new thing in August next year, it's one thing to say it to a person. If you put together

  • a whole presentation to about the whole thing. That's a fail. Punishment is ten. He had to

  • settle. Obviously in breach of his NDA from the old company and it cost him 1.5 million

  • in damages. So the distress caused is a six-pointer. Bonus points of 12 for zero effort.

  • This all adds up to the fail matrix score of 46.

  • Next story. >> ERIC ROBI: I hope you appreciate these

  • amazing sound effects and video editing that I did.

  • >> MICHAEL PERKLIN: Hold on. We need to put the presentation on hold. I have a problem.

  • Which one is which? >> ERIC ROBI: That one is mine on the let

  • hand. >> MICHAEL PERKLIN: Really, because I want

  • the one with more. >> ERIC ROBI: The one with yours is more.

  • >> AUDIENCE: (Speaker away from microphone.) >> ERIC ROBI: We will be taking questions

  • later. All right. The next one I call hiding in the

  • Cloud. So once again a top sales guy leaves a company and the sales just take a nose dive

  • actually and they think he took the customer list but they can't prove it. They know that

  • there's new customers. They know that there's old customers over at the new company but

  • they can't prove he took the customer list. We image the computer and look for the usual

  • clues. For example, link files are a Windows artifact

  • that show what files have been recently opened. They are a simple text final and easily parsed

  • and have a lot of information about the location of the file, the date and the time, all that

  • kind of good stuff. We look at a registry key which I love the name of this. It makes

  • no sense to me at all, but somebody in Microsoft maybe had a couple of these one day when we

  • were working. Bag MRU for some reason -- most recently used, but why bag?

  • >> AUDIENCE: (Speaker away from microphone.) >> ERIC ROBI: You guys are full of great answers.

  • >> MICHAEL PERKLIN: You want to explain why it is named that? It's still a fucked up name.

  • >> ERIC ROBI: It can show what files are inside a folder. That's what we typically look at

  • in a file exfiltration case. This is from Vista forward you have jump lists.

  • >> MICHAEL PERKLIN: That is a fail. It should say Vista.

  • >> ERIC ROBI: I have to take a drink. I don't love Vista in there to do it Wright. If you

  • have five Word documents open and you click on it, you have the five, those are jump lists

  • basically. IE history. Internet Explorer. Internet Explorer is so much morning exploring

  • the Internet. It records things that you do without your knowledge, like opening files.

  • But we are getting no love. I'm not finding anything. Show me the love, baby. He's having

  • a beer. So we search the IE history and we found a

  • .JVM file pointing to files anywhere. Who is familiar with that site? It's very much

  • like Dropbox. The same kind of concept but more for business users. It has a lot of really

  • great auditing, logging, stuff like that. If you're uploading and downloading files,

  • you can monitor and track them. That turned out to be a nice thing. Typically that's only

  • in the user control file best of your recollection we found an HTM file and we solved the case.

  • >> Bingo! >> ERIC ROBI: Timing fail, I'm sorry.

  • >> Drink! >> Drink!

  • >> ERIC ROBI: Bingo, we solved the case. All right. So what we got was the account ID,

  • the upload times, the file names, everything. We got some sweet loving. We got stolen files.

  • Let's look at JavaScript here. I changed the names of the file. We have recipe for Coke,

  • minor trade secrets. The user is the user account name. So we were able to subpoena

  • that from files anywhere and figure out who actually registered the account.

  • There is the folder that it was in. And this is really handy here, the date that it was

  • uploaded. And we got a whole bunch of these. In fact this is the first page of an 80-page

  • Excel report I prepared. These are all the file names that this guy uploaded.

  • So yeah. The second part of the story is -- go back. Another fail.

  • >> Fail! >> Drink!

  • >> ERIC ROBI: Which one do I drink from? >> MICHAEL PERKLIN: Good answer.

  • >> ERIC ROBI: The second part of the case, the opposing attorney, the guy representing

  • the thief handed us ab an Outlook CD, Outlook PST on it. This is part of the discovery process.

  • Discovery is a legal term in litigation where both sides are able to exchange evidence.

  • In fact, they have, they are compelled to exchange evidence through the rules of the

  • court. He gives us a CD. It has Outlook and Outlook PST on it.

  • First thing we do, there's not a lot of files in there and the first thing we do, we want

  • to recover the deleted e-mails in a PST. We're forensic analysts and that's what we like

  • doing, looking at people's e-mails. I'll show you the old school way of recovering

  • deleted e-mails. You use a hex editor, crack open the PST and exchange bytes seven through

  • 13, change them to zeros. Save the file. Then you use the Outlook repair tool built in with

  • Microsoft. And you basically repair the tool -- sorry, repair the PST and what happens?

  • You get a lot of e-mails back. These are not the actual e-mails, but you get tons and tons

  • of e-mails back. In this case, we got tens of thousands of

  • deleted e-mails. What was in these e-mails? Everything that completely turned the case

  • around. Not only did we have this guy with all the uploads on the spreadsheets. We also

  • had all the e-mails about who was involved. What lists he took. Who are the, you know,

  • all the people that were involved. We were winning. We went to Charlie Sheen mode all

  • of a sudden. And the funny thing is, we were able to take

  • all this information and at a deposition. If you don't know what a deposition is, we

  • get to ask questions of the opposing party. We are asking them, what happened? Did you

  • guys steal anything? Did you take anything? No, no, no.

  • We part pulling out these e-mails one by one by one. The guy turns white as a sheet.

  • And he spills the beans. And basically, you know, we do pretty well. Who deleted the mails,

  • do you think in this case? Hmm? >> MICHAEL PERKLIN: Call it out if you think

  • you know. >> AUDIENCE: (Speaker away from microphone.)

  • >> MICHAEL PERKLIN: Wow, people got it almost immediately.

  • >> ERIC ROBI: They hired Saul Goodman, unfortunately. And yeah, he deleted the mails. Not a good

  • thing. Not a good thing. What have we learned?

  • >> AUDIENCE: (Speaker away from microphone.) >> MICHAEL PERKLIN: The question is, did he

  • claim privilege on the e-mails? >> ERIC ROBI: He claimed privilege on some

  • of them, but not all of the 10,000 that he deleted. IE history is difficult to wipe.

  • It seems to leave stuff behind. We learned a new file type, the Java file type, JavaScript

  • files can give us love, too. We like them. And uploading files still leaves traces.

  • So attorneys shouldn't mess with evidence. It's against the ethical rules in every state

  • and probably every Canadian province and can get you disbarred.

  • >> AUDIENCE: Did they in this case? >> Let's look at the fail matrix.

  • >> ERIC ROBI: User retard level is damn high on this one. Fails on the attorney's part

  • and also on the ex-sales guy. Huge lawsuit. Three and a half million dollars in fees and

  • damages. (Whistling.)

  • >> ERIC ROBI: Which our client all got back basically and 15 bonus points. The attorney

  • might lose his license on this one. He hasn't yet. We don't track that kind of stuff.

  • (Buzzer.) >> ERIC ROBI: Fifty-one, we're moving up.

  • You ready? >> MICHAEL PERKLIN: Oh, right.

  • >> Fail! >> Drink!

  • >> MICHAEL PERKLIN: All right. Let's do this shit.

  • >> ERIC ROBI: That's winning. >> MICHAEL PERKLIN: This next case is probably

  • one of the most fun cases I've worked on. From the start I could tell that something

  • -- it was going to be a fun one. The RBT bounce. You'll see why. I was called in to investigate

  • a network breach. The company shared information with us that was evidence that at least one

  • computer had been breached. They didn't know why. They didn't know what. Asked us to investigate

  • and to tell them why and what. It was a large company. They had a lot of

  • computers, all of them were Windows based. Thousands upon thousands of computers in offices

  • all across the world and in one of their offices they noticed this computer had been breached.

  • So let's figure out what happened. So we move in. And actually I think I'm going

  • to pause here for two seconds. Eric, is this your first time presenting at

  • DEF CON? >> ERIC ROBI: Yes, it is.

  • (Laughter.) >> MICHAEL PERKLIN: Okay.

  • (Applause.) >> MICHAEL PERKLIN: We don't even have to

  • say anything anymore. You guys know exactly what is going on.

  • >> ERIC ROBI: Uh-oh. >> MICHAEL PERKLIN: I want to know, is Sarah

  • in the room? >> Show yourself!

  • >> Which Sarah? Narrow it down? (Overlapping speakers.)

  • >> MICHAEL PERKLIN: Is your name Sarah? >> Bend over.

  • (Laughter.) >> We are just going to leave now.

  • >> You are the ugliest Sarah ever. >> Fail! Another soldier bites the dust.

  • Winning! (Laughter.)

  • >> Stop that. >> The path to recovery is --

  • >> Paul, there's some issue about the sound person?

  • >> No. Sarah is supposed to be the sound person. >> Sarah is right here. You are talking about

  • me, right? >> I appreciate that, Sarah, but we're looking

  • for a different person. >> Since she is not here, Sarah, would you

  • come up? >> Come up. You're the next contestant on:

  • Will you fail? >> Thank you.

  • >> The other Sarah is going to be pissed. You want to go around that way?

  • >> You already got one. Someone counted wrong! >> Pass one to Sarah.

  • >> All right. >> A double.

  • (Laughter.) >> Find Sarah --

  • >> I'm sure all of you want to be Sarah right now.

  • >> To our new speakers and new attendees! (Applause.)

  • >> Whew! >> Uh-oh. How many more talks?

  • >> Thank you. >> Two more this hour.

  • >> MICHAEL PERKLIN: All right. We have 15 minutes left.

  • >> Is Sarah in the next -- >> MICHAEL PERKLIN: Thank you very much, goons,

  • for doing that. It's Eric's first time at DEF CON.

  • So I was talking with the RDP bounce case that I was investigating. As I mentioned,

  • thousands of computers, various offices all around the world. So we analyze the one computer

  • that they knew was breached. And it showed that RDP or remote desktop property call.

  • This is the tool in Windows that allows you to remotely control another computer. Some

  • logs showed us that RDP was used to connect using the local administrator password to

  • another machine. It also showed that -- actually I said it

  • backwards. RDP was used to connect in and also showed that RDP was used to connect out.

  • In this diagram I was looking at the middle computer. I didn't know at the time there

  • were other computers. I was looking at the middle one.

  • It seemed like there were a bunched used in here. It was probably the tip of the iceberg.

  • >> ERIC ROBI: Where do you find these logs, Michael?

  • >> MICHAEL PERKLIN: Specifically I was looking at the Windows event viewer. Go into the control

  • panel and the administrator tools. It logs by default a lot of stuff in there including

  • when RDP is used to connect in and when you're connecting out.

  • So I analyzed that machine that came before it. And same thing. There were logs that showed

  • that somebody was connecting into that. It was basically an entire bounce. Now, these

  • computers were located in different offices all around the world. This guy was bouncing

  • all around the world to do something. So obviously this is a pattern.

  • I still didn't know what he was doing. I just knew that he was clearly going through a lot

  • of trouble to obfuscate his trail, bouncing all around. Probably so that when he does

  • hit his final target there's no direct evidence to where he was coming from.

  • >> AUDIENCE: Were they sessions within sessions? >> MICHAEL PERKLIN: Yes, within the remote

  • desktop, he did this over and over. Remote desktop is not the fastest protocol at all.

  • I don't want to speculate how long it took him to do this.

  • >> ERIC ROBI: Can you imagine how long the screen redraw was by the time you get to machine

  • ten? >> MICHAEL PERKLIN: Jesus Christ, you have

  • to click a minute between clicks or something. What was the target? So I think you can all

  • figure out what I do next. Rather than following the trail back, I followed the trail forward.

  • What was he getting? Step after step, computer after computer. Site after site after site

  • all around the world. I finally reached a high profile machine. I wish I could tell

  • you which specific machine it was. I can't because it would give away too much about

  • this company. >> Prism?

  • >> ERIC ROBI: Did it have Nickel Back on it? >> MICHAEL PERKLIN: Chalkiest video ever.

  • I knew what he was going after when I reached that machine. He wanted confidential documents

  • that were only on this one machine in the entire company. He obviously knew that and

  • he wanted to get into the machine to get these documents.

  • I focused the analysis on this target machine, on this special confidential machine and I

  • wanted to see what did they do? Specifically which files did they take? And it took me

  • only about two minutes. As I was analyzing this machine. I identified the attacker immediately.

  • He went through all around the world. Finally when I was taking a look at his target, within

  • two minutes I found out who he was. >> AUDIENCE: (Speaker away from microphone.)

  • >> MICHAEL PERKLIN: He used his own credentials on the machine? No, he didn't use his own

  • credentials on the machine. >> E-mails to himself?

  • >> MICHAEL PERKLIN: No. >> He stole his own file?

  • >> MICHAEL PERKLIN: No, and he did not check Facebook and no share drives. Why don't I

  • tell you what he did? >> ERIC ROBI: Michael, what did he do?

  • >> MICHAEL PERKLIN: Printers. One thing a lot of people don't know about

  • remote desktop, by default it maps the printer connected to your machine to the machine that

  • you are connecting out to. It does this so that when you hit print inside your remote

  • desktop window your printer next to you is available so you can print a document besides

  • you. This guy didn't print any documents but just by connecting the machine automatically

  • mapped his local printer to the target machine, which identified his machine name.

  • He forgot to turn this off. There is a check box in remote desktop protocol when you open

  • up the RDP window, unmap printers to unmap printers. And it's a check box and he did

  • not map it. >> ERIC ROBI: What have re logged Michael?

  • >> MICHAEL PERKLIN: What have we learned? Documents logged by inside -- can give insight

  • into user actions. The system did this automatically. By looking at the system is doing can tell

  • what you the user is doing. For the fail matrix, user retard level would be about a 20 because

  • he went through a lot of trouble to cover his tracks and he did not cover his tracks.

  • Punishment level would be 15. He loss his job. He also lost his references. He can't

  • use that company as a reference anymore. So distress caused would be 8. Bonus points

  • would be 20. Do some research. If you are going to use RDP to pull off a scam, know

  • how RDP works. Adding it all up, we have a fail score of

  • 63. Last story, Eric.

  • >> ERIC ROBI: All right. So the last story is a little bit different than the others.

  • (Laughter.) >> ERIC ROBI: This is the epic porno fail.

  • The difference in this one, all together the cases we have talked about have been commercial

  • litigation, civil litigation, something on this side. This one happens to be a criminal

  • case. From time to time we do criminal defense work. And we work either with Public Defenders

  • or private attorneys. This is about this kind of situation.

  • So our client, Edgar, has been charged with possession of contra band, aka child porn

  • in his computer. He claims innocence and I roll my eyes because everybody always claims

  • innocence. 98 percent of these people did it.

  • We examine the computer. We looked at the examiners report. We looked at the allegations.

  • Let's take a look at them. So they claim Edgar downloaded porn. All right?

  • They claim that Edgar's user account had passwords. This is all documented in the record. They

  • claim that Edgar utilized news groups to download porn, like for real?

  • >> Who uses news groups to download porn? I think they have the --

  • (Overlapping speakers.) >> ERIC ROBI: Yeah, news groups, right?

  • >> AUDIENCE: Pregger porn. >> ERIC ROBI: That guy I would believe. They

  • allege that he downloaded illegal porn. There is one thing to note. Keep this in mind. He

  • left his house on April 2012. His wife kicked him out because of this stuff happening. April

  • 2012. Keep that in mind. So let's look when we examine the computer.

  • Let's see what we came up with. First we looked at IE history. As I mentioned before, IE history

  • is able to show you when a file has been opened. This is an actual example, I changed the file

  • name a little bit here. What was the date I just mentioned?

  • >> AUDIENCE: April 2012. >> ERIC ROBI: April 2012. I see some dates

  • here. Are these before or after April 2012? Put up your hand if it's after? Ahh!

  • Yes. So all right. One fail here. Let's look at his peer to peer software download folder.

  • In the top there I've got the path where these naughty files were downloaded and it's a pretty

  • typical path. These P to P programs change the name to something long. It's like T-something

  • something something naughty file. I'm looking at the dates here again. Michael,

  • do you have a calendar? >> MICHAEL PERKLIN: Give me a second here.

  • >> ERIC ROBI: When is December? >> MICHAEL PERKLIN: It is after April. Definitely

  • after April. >> ERIC ROBI: Okay, just wanted to check.

  • We need to verify our forensic findings before we publish them. We're verifying. Oops.

  • I think -- >> MICHAEL PERKLIN: Fail!

  • >> ERIC ROBI: Fail. Give me that beer. All right. They also claim that he used Outlook

  • express. Really, to download porn. Outlook express. This is 2012, remember, folks.

  • >> MICHAEL PERKLIN: Makes you wonder, did they even analyze this guy's machine? We saw

  • records of P to P, not Outlook express. >> ERIC ROBI: Outlook express, all right.

  • In reality, yes, Outlook express was on the machine set up with an account called porno

  • lover. Okay? It was set up after Edgar moved out of the house. And only headers were downloaded.

  • No content. >> MICHAEL PERKLIN: What do you mean by headers?

  • >> ERIC ROBI: A header, if you're using Outlook express, it is just the first part of the

  • file. The e-mail is going to have the date, the send to, the receiver, the subject line,

  • make the first couple words. There was no content. There was no photos in there, just

  • headers with, you know, admittedly porno names. Also, let's look at accusation three. They

  • said his user account had a password. The inference is only Edgar was able to access

  • it because there was a password. Let's look at the password, shall we? Maybe

  • we can zoom in a little bit on this. (Laughter.)

  • >> ERIC ROBI: This is actually a cool utility the it's free. It's LCP. I'll go back to it

  • here. It's a free utility, great for looking and seeing if there are passwords. You can

  • also use it to perform an attack, although it's not very good.

  • All right. So more facts undiscovered by the examiner. The P to P client was used to download

  • porn. The examiner didn't find that. Into a new user account called porno lover. Guess

  • when? After he moved out of the house. So we submitted our report to the prosecutor.

  • Looks like a five, ten-page report, something like that. The government dropped the charges,

  • years after they charged this guy, they dropped the charges. This does not ever happen really.

  • This is the first time. I've done thousands of cases -- well, hundreds of cases, thousands

  • of exams. I don't know how many, it's never happened before.

  • This is after the guy spent a huge amount of money on legal costs. So to do all this,

  • I just want to give a thank you to Rob Lee and SANs -- you know Rob Lee? We used super

  • timeline for this analysis. That's a super piece of --

  • (Lost audio.) >> MICHAEL PERKLIN: Definitely one of the

  • best pieces of software used. >> ERIC ROBI: So the government interviews

  • Edgar's friend. The friend confesses. The friend did it. The friend was trying to get

  • jiggy with Edgar's wife. (Groans.)

  • >> ERIC ROBI: And he put the porn on the computer. The court clears Edgar's name. They give him

  • an finding of innocence. Rarely happens. I have been to court a couple times where there

  • have been acquittals and we didn't go to court on this one, fortunately, but we would have.

  • So what did we learn? Base your conclusions upon actual evidence. Find multiple artifacts

  • backing up your allegations. I don't know where the password thing came from. Tie it

  • to a person, not just a machine if possible. Try to use at user activity that would tie

  • expect events to a person. Remember, the maximum you can get is 20 in

  • any category. However, I have decided to break the rules

  • a little bit for this one. Examiner ineptness, he gets five bonus points built in right there.

  • Oh, yeah, the guy sued the city for millions of dollars. And you know, there might be a

  • job security issue for somebody in this case. >> MICHAEL PERKLIN: I don't think that examiner

  • is really going to have a job much longer. >> ERIC ROBI: One hundred bonus points because

  • the court finds the suspect innocent. Factually innocent.

  • (Buzzer.) (Music playing.)

  • >> ERIC ROBI: Thank you very much! >> MICHAEL PERKLIN: Thank you, everybody!

  • If you want to do Q&A, we're going over to the Chill-Out Lounge.

  • (The session concluded at 2:45 p.m.)

>> ERIC ROBI: Talk is about forensic fails. I'm this guy. Over here. I founded an eDiscovery

Subtitles and vocabulary

Click the word to look it up Click the word to find further inforamtion about it

B1 US eric michael fail file machine forensic

DEF CON 21 - Eric Robi and Michael Perklin - Forensic Fails Shift + Delete Won't Help You Here

  • 33 2
    John Thunder{{1+1}} posted on 2016/04/14
Video vocabulary

Keywords

audience

US /ˈɔdiəns/

UK /ˈɔ:diəns/

  • noun
  • Group of people attending a play, movie etc.
guy

US /ɡaɪ/

UK /ɡaɪ/

  • noun
  • Man; boy; any person
company

US /ˈkʌmpəni/

UK /'kʌmpənɪ/

  • noun
  • Good feeling from being with someone else
  • A business that sells things or provides services
  • A group of people gathered together.
  • A group of people gathered together.
  • Guests, especially in your home
  • A military unit, typically consisting of around 100 soldiers.
  • A unit of soldiers.
  • A group of actors who perform together.
  • Being with another person rather than alone
fail

US /fel/

UK /feɪl/

  • noun
  • A mark on a test showing you did not pass
  • verb
  • To be unsuccessful in passing a class or exam
  • To not do or provide something that is needed
  • To stop working or functioning; to break down
  • To not achieve a goal, or to go wrong
  • other
  • To not pass a test or exam.
  • To disappoint or let someone down.
  • other
  • To become weaker or less effective.
  • To stop working correctly.
  • To be unsuccessful in achieving a goal.
case

US /kes/

UK /keɪs/

  • noun
  • Container used to carry things, e.g. clothes
  • Set of facts about a crime
  • Set of facts about an event
  • Example or instance of something
  • verb
  • To find out about a place, as in planning to steal
laughter

US /ˈlæftɚ, ˈlɑf-/

UK /ˈlɑ:ftə(r)/

  • noun
  • Action or sound of laughing
  • Something that causes laughter.
  • A response to something funny.
  • other
  • The expression on someone's face when they are laughing.
  • The feeling of amusement that makes you laugh.
  • The action or sound of laughing.
machine

US /məˈʃin/

UK /mə'ʃi:n/

  • noun
  • Piece of equipment used to do work
  • A computer or other electronic device.
  • A device that performs a task, often involving mechanical or electrical components.
  • Powerful group who control and organize things
  • Someone who acts or works in a mechanical or automatic way.
  • Someone who performs a particular action very efficiently or repeatedly.
  • An organized or complex system or structure.
  • A highly organized political group or organization, often with a reputation for corruption.
  • A piece of equipment with moving parts that uses power to do a particular job.
  • verb
  • To shape, work on something, using a device
  • other
  • Machinery in general.
porn

US /pɔrn/

UK /pɔ:n/

  • noun
  • Short for pornography
outlook

US /ˈaʊtˌlʊk/

UK /ˈaʊtlʊk/

  • noun
  • General feeling or attitude about something
  • Place from which there is a clear view of an area
  • Idea of what the future will look like
computer

US /kəmˈpjutɚ/

UK /kəmˈpju:tə(r)/

  • noun
  • Machine for storing data, accessing the internet