Defcon 21 - Forensic Fails - Shift + Delete Won't Help You Here

Video Statistics and Information

Video
Captions Word Cloud
Captions
our talk is about forensics fails<font color="#E5E5E5"> um I'm</font> this guy over<font color="#E5E5E5"> here</font><font color="#CCCCCC"> I found it a</font> discovery company about<font color="#E5E5E5"> 11 years ago I'm</font> a forensic examiner<font color="#CCCCCC"> I have done</font> thousands<font color="#E5E5E5"> and thousands of exams</font><font color="#CCCCCC"> I'm</font> also an expert<font color="#CCCCCC"> witness</font><font color="#E5E5E5"> in state federal</font> court etc<font color="#E5E5E5"> and I like cats</font> <font color="#E5E5E5">and my name is</font><font color="#CCCCCC"> Eric Roby all</font><font color="#E5E5E5"> right about</font> <font color="#E5E5E5">this other guy</font><font color="#CCCCCC"> um hi I'm Michael</font> <font color="#E5E5E5">Parkland you may remember me from other</font> Def Con talks such as ACL steganography I'm a<font color="#E5E5E5"> forensic examiner a cybercrime</font> investigator security professional I've<font color="#E5E5E5"> Dallas have done thousands of exams</font> <font color="#CCCCCC">and I like to break things a lot</font> don't break my<font color="#E5E5E5"> cat all right so our</font> <font color="#CCCCCC">agenda today we have got</font><font color="#E5E5E5"> seven amazing</font> <font color="#E5E5E5">stories full of fail we're going to</font> learn<font color="#E5E5E5"> something about forensic</font> techniques because that's what we do<font color="#E5E5E5"> and</font> the fails<font color="#E5E5E5"> today are brought to you by</font> both the suspect and<font color="#CCCCCC"> the examiner and</font> we'll we'll<font color="#E5E5E5"> get into</font><font color="#CCCCCC"> that</font><font color="#E5E5E5"> in a little</font> <font color="#E5E5E5">bit the names have been</font><font color="#CCCCCC"> changed to</font> protect the it's on both sides<font color="#CCCCCC"> we've</font> actually<font color="#CCCCCC"> changed some of the facts</font><font color="#E5E5E5"> to to</font> <font color="#E5E5E5">protect the idiots and it seemed like a</font> <font color="#E5E5E5">good thing to</font><font color="#CCCCCC"> do basically</font> <font color="#E5E5E5">but because fail</font><font color="#CCCCCC"> was not just</font> one-dimensional we found<font color="#E5E5E5"> many dimensions</font> of fail in our research<font color="#E5E5E5"> we've decided we</font> need to create<font color="#CCCCCC"> a fail matrix</font> to explain<font color="#E5E5E5"> how the fellow so this is</font> just<font color="#E5E5E5"> I'm just going to explain</font><font color="#CCCCCC"> how the</font> fail matrix works<font color="#CCCCCC"> the first level</font><font color="#E5E5E5"> of</font> fail is<font color="#CCCCCC"> the user retard level oh my god</font> <font color="#E5E5E5">I</font><font color="#CCCCCC"> spelled that wrong Drake Drake</font><font color="#E5E5E5"> for the</font> record he was responsible for the <font color="#CCCCCC">keynote presentation so this is</font> <font color="#E5E5E5">definitely his</font><font color="#CCCCCC"> fail</font><font color="#E5E5E5"> this is my fail</font><font color="#CCCCCC"> I</font> get<font color="#CCCCCC"> ten points alright so the punishment</font> level<font color="#E5E5E5"> depends on you know</font><font color="#CCCCCC"> what happens</font> so that<font color="#E5E5E5"> particular guy lost the case</font> <font color="#CCCCCC">dollars distress calls let's give this</font> one<font color="#E5E5E5"> five points and bonus points</font><font color="#CCCCCC"> are</font> just<font color="#CCCCCC"> whatever the fuck I feel like</font><font color="#E5E5E5"> doing</font> this girlfriend<font color="#E5E5E5"> left him in this case so</font> he gets thirty five points <font color="#CCCCCC">alright so let's get into the first</font><font color="#E5E5E5"> one</font> this<font color="#E5E5E5"> is</font><font color="#CCCCCC"> the</font><font color="#E5E5E5"> it wasn't me defense you may</font> have heard<font color="#E5E5E5"> this one before</font><font color="#CCCCCC"> alright</font><font color="#E5E5E5"> so we</font> do a lot of commercial<font color="#E5E5E5"> litigation</font><font color="#CCCCCC"> and a</font> really<font color="#CCCCCC"> typical kind of case is a trade</font> secrets case<font color="#E5E5E5"> and this</font><font color="#CCCCCC"> is a</font><font color="#E5E5E5"> typical</font> example of that so<font color="#E5E5E5"> this guy Bob he</font><font color="#CCCCCC"> was</font> working in sales at<font color="#CCCCCC"> Acme</font><font color="#E5E5E5"> and he resigned</font> <font color="#CCCCCC">his</font><font color="#E5E5E5"> position and he decided to go work</font> <font color="#CCCCCC">for a competitor this happens all the</font> time<font color="#E5E5E5"> and some allegations were made by</font> his employer<font color="#CCCCCC"> that he took some trade</font> <font color="#CCCCCC">secrets he took the customer</font><font color="#E5E5E5"> list with</font> him to his<font color="#E5E5E5"> new company it happens so</font><font color="#CCCCCC"> Bob</font> says<font color="#CCCCCC"> I</font><font color="#E5E5E5"> got nothing to</font><font color="#CCCCCC"> hide</font> <font color="#CCCCCC">come at me bro I didn't exactly say that</font> <font color="#CCCCCC">but it sounded good</font><font color="#E5E5E5"> I'm paraphrasing</font><font color="#CCCCCC"> so</font> we started imaging the drive<font color="#E5E5E5"> and we</font> started planning<font color="#E5E5E5"> the examination one</font> thing we frequently do is we look<font color="#CCCCCC"> for</font> deleted files in unallocated space and <font color="#E5E5E5">unallocated space is the part of</font><font color="#CCCCCC"> the</font> drive<font color="#E5E5E5"> that can typically contain deleted</font> file so it's you know when you hit shift delete and it doesn't go<font color="#CCCCCC"> away</font><font color="#E5E5E5"> it ends up</font> an unallocated space<font color="#E5E5E5"> so we will look for</font> stuff<font color="#E5E5E5"> there it's something we also do is</font> <font color="#CCCCCC">we look for recently</font><font color="#E5E5E5"> used files by</font> common programs like Word Excel<font color="#E5E5E5"> Acrobat</font> and so forth<font color="#E5E5E5"> and we might look for USB</font> device insertion we're basically<font color="#E5E5E5"> looking</font> to<font color="#E5E5E5"> see how trade secrets got from you</font> know acne over to the new<font color="#E5E5E5"> company</font> the final final<font color="#CCCCCC"> the</font><font color="#E5E5E5"> dry finished imaging</font> and I'm actually going to<font color="#E5E5E5"> share</font> <font color="#E5E5E5">something really</font><font color="#CCCCCC"> cool today</font> <font color="#E5E5E5">it's a Def Con exclusive worldwide</font> <font color="#CCCCCC">premiere we found a new wiping pattern</font> this is actually real<font color="#E5E5E5"> I'm not making</font> this up<font color="#CCCCCC"> this</font><font color="#E5E5E5"> is real so you know Bob</font> apparently had used some<font color="#CCCCCC"> kind of data</font> <font color="#E5E5E5">destruction program that can overwrite</font> every bit of space and<font color="#CCCCCC"> Onalaska on</font> allocated space he used a pattern<font color="#CCCCCC"> that</font><font color="#E5E5E5"> however was not</font> really commonly<font color="#E5E5E5"> used by</font><font color="#CCCCCC"> windows or any</font> other<font color="#E5E5E5"> other utility live scene might</font> have<font color="#E5E5E5"> been something custom so you know</font> <font color="#CCCCCC">we thought hmm</font><font color="#E5E5E5"> this might suggest</font> <font color="#E5E5E5">something bad was happening here what's</font> uh<font color="#E5E5E5"> you know maybe it let's let's take</font> <font color="#CCCCCC">another closer look at this</font><font color="#E5E5E5"> so we're</font> <font color="#E5E5E5">going</font><font color="#CCCCCC"> to look</font><font color="#E5E5E5"> we're gonna zoom in we're</font> <font color="#CCCCCC">gonna</font><font color="#E5E5E5"> look at this on a molecular level</font> now I think we need to zoom in a little <font color="#E5E5E5">bit more so what have we learned</font> I admit the<font color="#E5E5E5"> first part was actually the</font> second part there was<font color="#E5E5E5"> no Sarah Palin in</font> this case but so data<font color="#E5E5E5"> destruction can</font> <font color="#E5E5E5">almost always be detected um if you even</font> <font color="#E5E5E5">if you don't use a repeating pattern</font> it's still<font color="#E5E5E5"> detectable we see it all</font><font color="#CCCCCC"> the</font> time there's artifacts left behind<font color="#CCCCCC"> that</font> could be part of<font color="#E5E5E5"> the pattern or there's</font> artifacts in the operating<font color="#E5E5E5"> system itself</font> so we might not know what you've destroyed but<font color="#E5E5E5"> we'll definitely know you</font> destroyed something this is the<font color="#CCCCCC"> mic here</font> you go and<font color="#E5E5E5"> also</font><font color="#CCCCCC"> it doesn't work very</font> well<font color="#E5E5E5"> and mean phrases make people</font> <font color="#CCCCCC">dislike use</font><font color="#E5E5E5"> what about your fail matrix</font> <font color="#E5E5E5">we got to do the fail matrix</font><font color="#CCCCCC"> all</font><font color="#E5E5E5"> right</font> <font color="#E5E5E5">but uh all right</font><font color="#CCCCCC"> twelve pretty retarded</font> <font color="#CCCCCC">I think you know the guy</font><font color="#E5E5E5"> lost the case</font> you got sued<font color="#E5E5E5"> under</font><font color="#CCCCCC"> $100,000</font><font color="#E5E5E5"> so not a</font> huge<font color="#E5E5E5"> amount of economic</font><font color="#CCCCCC"> distress</font><font color="#E5E5E5"> and I</font> didn't really give him<font color="#E5E5E5"> any bonus points</font> here<font color="#E5E5E5"> because it just</font><font color="#CCCCCC"> wasn't that good so</font> he gets<font color="#CCCCCC"> 27</font> <font color="#E5E5E5">it's already fail</font><font color="#CCCCCC"> I think we can blame</font> <font color="#E5E5E5">that guy who gave me the beer all right</font> <font color="#E5E5E5">so this case it was a lot of fun</font><font color="#CCCCCC"> I</font> didn't<font color="#E5E5E5"> expect it to be fun when</font><font color="#CCCCCC"> I</font> started out but it ended<font color="#CCCCCC"> up being a lot</font> <font color="#CCCCCC">of</font><font color="#E5E5E5"> fun</font><font color="#CCCCCC"> I call it the Nickelback guy</font> you'll you'll see why in a second<font color="#CCCCCC"> so it</font> was<font color="#E5E5E5"> another allegation of stolen</font> confidential documents<font color="#E5E5E5"> this guy let's</font> <font color="#CCCCCC">call him John</font> he left one company to go work for a direct competitor<font color="#CCCCCC"> and the his old</font> <font color="#CCCCCC">company hired us to</font><font color="#E5E5E5"> go in and take a</font> <font color="#CCCCCC">look take</font><font color="#E5E5E5"> a look at his can we go can</font><font color="#CCCCCC"> we</font> get an audio for this<font color="#E5E5E5"> by the way we're</font> going<font color="#E5E5E5"> to need audio for this segment so</font> <font color="#CCCCCC">if you could turn it on</font><font color="#E5E5E5"> um so so yeah uh</font> the<font color="#E5E5E5"> company where</font><font color="#CCCCCC"> he left</font><font color="#E5E5E5"> they asked us</font> to take a look<font color="#CCCCCC"> at his work computer to</font> see to look for science of data exfiltration<font color="#CCCCCC"> we he worked on a</font><font color="#E5E5E5"> lot of</font> confidential projects<font color="#E5E5E5"> and they just want</font> to<font color="#E5E5E5"> make</font><font color="#CCCCCC"> sure that he wasn't taking these</font> confidence<font color="#CCCCCC"> to projects to the competitor</font> <font color="#CCCCCC">and letting them know</font><font color="#E5E5E5"> what they were</font> doing<font color="#E5E5E5"> so right totally said all that</font> so we why is this not<font color="#CCCCCC"> working</font><font color="#E5E5E5"> there it</font> is<font color="#CCCCCC"> we open up the hard drive to start to</font> start<font color="#CCCCCC"> the</font><font color="#E5E5E5"> analysis and we started</font> <font color="#E5E5E5">finding all the same stuff that you</font> <font color="#E5E5E5">typically found on a work computer</font><font color="#CCCCCC"> yeah</font> there's some work stuff sure some evidence of you know facebooking he's got a an mp3 collection like<font color="#E5E5E5"> listen</font><font color="#CCCCCC"> to</font> music<font color="#E5E5E5"> while he's at work typical stuff</font> we<font color="#E5E5E5"> found the confidential documents that</font> we were asked<font color="#CCCCCC"> to</font><font color="#E5E5E5"> make sure he didn't</font> <font color="#CCCCCC">take so that was</font><font color="#E5E5E5"> to be expected because</font> he did the work<font color="#E5E5E5"> on this on</font><font color="#CCCCCC"> this computer</font> <font color="#CCCCCC">and almost</font><font color="#E5E5E5"> immediately something jumped</font> out<font color="#E5E5E5"> at me and we'll get into why it</font> jumped<font color="#E5E5E5"> out at me in a second but his</font> music<font color="#E5E5E5"> collection became very interesting</font> to<font color="#E5E5E5"> me not because I</font><font color="#CCCCCC"> love Nickelback</font> but because well again<font color="#CCCCCC"> we'll get</font><font color="#E5E5E5"> into</font> <font color="#CCCCCC">this that when we fail yeah</font> and I'm Canadian<font color="#E5E5E5"> too so I I yeah</font> Nickelback<font color="#E5E5E5"> from Canada</font><font color="#CCCCCC"> um yeah you take</font> a closer look<font color="#E5E5E5"> at this photo something</font> <font color="#E5E5E5">may jump out at you as well these</font><font color="#CCCCCC"> are</font> <font color="#CCCCCC">just mp3s</font> just songs<font color="#CCCCCC"> but the size of</font><font color="#E5E5E5"> these files</font> is a little bit off<font color="#E5E5E5"> um</font> what's wrong here yeah<font color="#CCCCCC"> the extended play Nickelback this</font> guy<font color="#E5E5E5"> really loved his Nickelback so these</font> were actually<font color="#CCCCCC"> a bunch of</font><font color="#E5E5E5"> avi files</font><font color="#CCCCCC"> ah</font> yeah yeah these<font color="#E5E5E5"> are just avi files that he</font> had renamed<font color="#E5E5E5"> so it seems</font><font color="#CCCCCC"> to John assume</font> that<font color="#CCCCCC"> nobody would listen</font><font color="#E5E5E5"> to his</font> Nickelback mp3s<font color="#E5E5E5"> which</font><font color="#CCCCCC"> is probably a good</font> <font color="#E5E5E5">assumption because I don't think anybody</font> <font color="#CCCCCC">would listen to his Nickelback mp3s and</font> <font color="#E5E5E5">he was hiding</font><font color="#CCCCCC"> something but what was he</font> <font color="#CCCCCC">hiding</font> <font color="#CCCCCC">Praeger porn</font><font color="#E5E5E5"> this guy had a quite big</font> fetish for preggers porn these were full-length feature films of pregnant ladies<font color="#E5E5E5"> banging and and they're just like</font> there's there<font color="#CCCCCC"> was a ton of them all over</font> <font color="#CCCCCC">this guy's</font><font color="#E5E5E5"> hard drive now</font><font color="#CCCCCC"> while we did</font> <font color="#E5E5E5">have to analyze them to see what they</font> were but<font color="#CCCCCC"> but I will say</font><font color="#E5E5E5"> that the</font> <font color="#CCCCCC">specific</font><font color="#E5E5E5"> techniques</font><font color="#CCCCCC"> that we used to</font> <font color="#E5E5E5">analyze their trade secret so I can't</font> tell you how much how much<font color="#E5E5E5"> depth we went</font> into when we're analyzing them<font color="#CCCCCC"> but yeah</font> it seems John did a lot of<font color="#E5E5E5"> more</font><font color="#CCCCCC"> than</font> <font color="#CCCCCC">just work on his confidential</font><font color="#E5E5E5"> project on</font> that computer<font color="#CCCCCC"> so we had to tell the</font> company that you<font color="#CCCCCC"> know over the last</font> three years<font color="#E5E5E5"> while he was working</font><font color="#CCCCCC"> there</font> on<font color="#E5E5E5"> this confidential</font><font color="#CCCCCC"> project he</font><font color="#E5E5E5"> was also</font> <font color="#CCCCCC">doing other stuff they were pretty</font><font color="#E5E5E5"> happy</font> <font color="#E5E5E5">that</font><font color="#CCCCCC"> he left anyways all right so what</font> have we<font color="#E5E5E5"> learned</font> <font color="#CCCCCC">examiner's when we take a look at</font><font color="#E5E5E5"> that</font> files on a computer<font color="#CCCCCC"> we don't typically</font> look at<font color="#E5E5E5"> it within the nested folder</font> structure<font color="#E5E5E5"> like we don't have to go into</font> <font color="#E5E5E5">every single subfolder go back out go</font> <font color="#CCCCCC">into other</font><font color="#E5E5E5"> subfolders back it out we see</font> it all in a big<font color="#E5E5E5"> long list</font><font color="#CCCCCC"> it makes it a</font> lot<font color="#E5E5E5"> easier</font><font color="#CCCCCC"> to to</font><font color="#E5E5E5"> analyze stuff also one</font> <font color="#CCCCCC">of the</font><font color="#E5E5E5"> very first things</font><font color="#CCCCCC"> that we always</font> run is what's<font color="#E5E5E5"> called a file signature</font> <font color="#E5E5E5">analysis this is a special script that</font> looks at the contents<font color="#E5E5E5"> of every file and</font> it compares<font color="#E5E5E5"> what's inside the file with</font> <font color="#CCCCCC">the extension</font><font color="#E5E5E5"> and if there's any</font> discrepancies those files are bumped up to<font color="#E5E5E5"> the top of the list to be looked at</font> <font color="#E5E5E5">because the system knows if these don't</font> <font color="#E5E5E5">match something</font><font color="#CCCCCC"> may not be</font><font color="#E5E5E5"> right here a</font> human should take a look<font color="#E5E5E5"> at this</font><font color="#CCCCCC"> I just</font> <font color="#CCCCCC">said those things</font><font color="#E5E5E5"> and so at the end of</font> <font color="#CCCCCC">the day john's attempt at</font><font color="#E5E5E5"> hiding his</font> preggers porn<font color="#E5E5E5"> actually made it bump up</font> to<font color="#CCCCCC"> the top of the list</font><font color="#E5E5E5"> for me to take a</font> look at so if you're going<font color="#E5E5E5"> to hide</font> something don't<font color="#E5E5E5"> just change the file</font> name<font color="#CCCCCC"> that</font><font color="#E5E5E5"> that doesn't hide something</font> that that makes<font color="#CCCCCC"> me want to</font><font color="#E5E5E5"> look at it</font> <font color="#CCCCCC">even more all right so the fail matrix</font> the reuse a retard level<font color="#E5E5E5"> I would</font><font color="#CCCCCC"> say</font><font color="#E5E5E5"> 12</font> <font color="#E5E5E5">because again renaming a file is not</font> <font color="#E5E5E5">data hiding</font><font color="#CCCCCC"> if you</font><font color="#E5E5E5"> want to do real data</font> hiding need you to come<font color="#E5E5E5"> to my ECL</font> steganography<font color="#CCCCCC"> talk punishment level 13</font> he lost<font color="#E5E5E5"> his job</font><font color="#CCCCCC"> not only the</font><font color="#E5E5E5"> previous</font> company<font color="#E5E5E5"> where he left but the new</font> company where he landed<font color="#CCCCCC"> he lost</font><font color="#E5E5E5"> his job</font> <font color="#CCCCCC">their distress caused was</font><font color="#E5E5E5"> zero</font><font color="#CCCCCC"> didn't</font> <font color="#E5E5E5">really hurt anybody I mean what you</font> choose<font color="#CCCCCC"> to do on your own</font><font color="#E5E5E5"> time is up to</font> you although he chose to do it on work time with work stuff<font color="#E5E5E5"> what the bonus</font> points<font color="#E5E5E5"> are going to be for don't you</font> <font color="#E5E5E5">yeah this there's going to be some bonus</font> <font color="#E5E5E5">points</font><font color="#CCCCCC"> I would</font><font color="#E5E5E5"> say about a nickels worth</font> a grand total of<font color="#CCCCCC"> 30 fail points all</font> yours that is the fail sound thank you by the way do you like<font color="#CCCCCC"> the font that</font><font color="#E5E5E5"> we're</font> using Comic Sans going to get our hand for<font color="#E5E5E5"> Comic Sans nobody uses Comic Sans</font> <font color="#CCCCCC">the most underappreciated font in</font> presentations<font color="#CCCCCC"> I don't know why we see we</font> <font color="#E5E5E5">don't see Comic Sans</font><font color="#CCCCCC"> in more business</font> <font color="#E5E5E5">settings I mean we really we're bringing</font> it back<font color="#E5E5E5"> we're bringing it back it's a</font> new movement<font color="#CCCCCC"> alright so let's look at</font> the just Bill Me Later case<font color="#E5E5E5"> so our</font> client<font color="#E5E5E5"> the ABC firm they outsource take</font> <font color="#CCCCCC">e part of their business they've</font><font color="#E5E5E5"> been</font> doing it for<font color="#CCCCCC"> many years</font><font color="#E5E5E5"> and the part of</font> their<font color="#E5E5E5"> business</font><font color="#CCCCCC"> that they're outsourcing</font> <font color="#E5E5E5">is on a time of materials basis so</font> there's a lot<font color="#E5E5E5"> of</font><font color="#CCCCCC"> invoices with ours</font><font color="#E5E5E5"> and</font> rates<font color="#CCCCCC"> and that's basically</font><font color="#E5E5E5"> it it was</font> several million<font color="#CCCCCC"> dollars a year</font><font color="#E5E5E5"> on</font> <font color="#CCCCCC">average that</font><font color="#E5E5E5"> was being</font><font color="#CCCCCC"> billed</font><font color="#E5E5E5"> and our</font> client started a review project because they thought they were<font color="#CCCCCC"> being</font><font color="#E5E5E5"> over</font><font color="#CCCCCC"> a bill</font> they thought there might be<font color="#E5E5E5"> a little</font> inflation<font color="#E5E5E5"> and they wanted to figure</font><font color="#CCCCCC"> out</font> why things<font color="#CCCCCC"> were looking</font><font color="#E5E5E5"> inflated</font><font color="#CCCCCC"> they</font> looked at some<font color="#CCCCCC"> of the individual bills</font> and they<font color="#E5E5E5"> saw they thought things are</font> taking a little<font color="#E5E5E5"> bit too long so we came</font> <font color="#CCCCCC">in and we decided to</font><font color="#E5E5E5"> help so they had</font> thousands<font color="#E5E5E5"> and thousands</font><font color="#CCCCCC"> and thousands of</font> PDF format invoices now that's not going <font color="#E5E5E5">to do us a lot of good even if we OCR if</font> <font color="#E5E5E5">we even if we apply optical character</font> <font color="#CCCCCC">depression recognition to it we've still</font> <font color="#E5E5E5">got a lot of unstructured data so I</font> can't really you know I can search one or two PDFs but<font color="#E5E5E5"> when I've got tens of</font> thousands of<font color="#E5E5E5"> them it's really difficult</font> <font color="#E5E5E5">to do anything with</font><font color="#CCCCCC"> that</font><font color="#E5E5E5"> on so where did</font> <font color="#E5E5E5">we start we didn't have a lot</font><font color="#CCCCCC"> of clues</font> <font color="#CCCCCC">in this one</font><font color="#E5E5E5"> so through the magic</font><font color="#CCCCCC"> of</font> court order we were able<font color="#CCCCCC"> to go</font><font color="#E5E5E5"> to this</font> <font color="#CCCCCC">customer's database their network and</font> <font color="#CCCCCC">get an image of</font><font color="#E5E5E5"> everything in their</font> network including a billing database which turned<font color="#E5E5E5"> out to be</font><font color="#CCCCCC"> very handy so we</font> made a forensic copy of this database <font color="#E5E5E5">and it was in a proprietary format and</font> so in<font color="#CCCCCC"> order for us to do forensic</font> analysis in a<font color="#E5E5E5"> database we need to be</font> able<font color="#E5E5E5"> to get it into something like SQL</font> <font color="#E5E5E5">where we can do</font><font color="#CCCCCC"> kind</font><font color="#E5E5E5"> of standard queries</font> so we migrated over<font color="#E5E5E5"> we do standard</font> queries<font color="#E5E5E5"> and we're looking at it there's</font> still<font color="#E5E5E5"> no easy way to compare the PDF to</font> <font color="#CCCCCC">the database so we decided to</font> <font color="#E5E5E5">reverse-engineer</font><font color="#CCCCCC"> the tables in the</font> <font color="#E5E5E5">database</font><font color="#CCCCCC"> sometimes it's easy</font><font color="#E5E5E5"> but</font> <font color="#E5E5E5">sometimes there are thousands and</font> thousands<font color="#CCCCCC"> of tables and</font><font color="#E5E5E5"> when you don't</font> <font color="#E5E5E5">have tech support</font><font color="#CCCCCC"> of the developers you</font> just have to figure<font color="#E5E5E5"> it out so</font><font color="#CCCCCC"> it's a</font> really<font color="#CCCCCC"> slow laborious process but we did</font> figure<font color="#CCCCCC"> it out</font><font color="#E5E5E5"> we</font><font color="#CCCCCC"> noticed</font><font color="#E5E5E5"> that the audit</font> logs were turned<font color="#E5E5E5"> on in this which</font> happened<font color="#E5E5E5"> to be particularly useful so we</font> ran a lot of queries<font color="#E5E5E5"> in versus time</font> build versus the audit logs and<font color="#E5E5E5"> we found</font> there was<font color="#E5E5E5"> sort of a pattern of inflation</font> <font color="#E5E5E5">going on because</font><font color="#CCCCCC"> basically when you're</font> <font color="#CCCCCC">billing on time of materials</font><font color="#E5E5E5"> all you're</font> <font color="#CCCCCC">doing is you've got either hours or</font> you've got a rate and those are the two <font color="#E5E5E5">things in the</font><font color="#CCCCCC"> got</font><font color="#E5E5E5"> overly inflated</font> so these are<font color="#CCCCCC"> this two</font><font color="#E5E5E5"> things that you</font> <font color="#E5E5E5">can change there you can change time or</font> you can change<font color="#E5E5E5"> the rate but we found the</font> audit logs were turned<font color="#E5E5E5"> off by</font><font color="#CCCCCC"> default</font> <font color="#E5E5E5">and the IT folks bless the IT folks they</font> turned the audit logs on which was really really really helpful<font color="#CCCCCC"> because we</font> do a<font color="#E5E5E5"> lot of database forensics cases and</font> <font color="#E5E5E5">this is the only one we've seen with it</font> the audit logs were turned on so we were able<font color="#CCCCCC"> to</font><font color="#E5E5E5"> compare basically</font><font color="#CCCCCC"> um</font><font color="#E5E5E5"> the amount</font> <font color="#CCCCCC">that</font><font color="#E5E5E5"> was billed at the end of the day</font> versus how<font color="#E5E5E5"> many hours were put on up to</font> that<font color="#E5E5E5"> point we're able to see a</font> chronology so maybe at the<font color="#CCCCCC"> end of the</font> day the bill was for<font color="#CCCCCC"> a</font><font color="#E5E5E5"> thousand dollars</font> <font color="#CCCCCC">but we saw that was</font><font color="#E5E5E5"> only</font><font color="#CCCCCC"> 800</font><font color="#E5E5E5"> dollars</font> <font color="#E5E5E5">that was actually billed</font> so the the billing person<font color="#E5E5E5"> the database</font> person who basically<font color="#E5E5E5"> was working with it</font> this person<font color="#CCCCCC"> would change the hours and</font> <font color="#E5E5E5">the rate sometimes and bump it up so I</font> <font color="#E5E5E5">went up from like</font><font color="#CCCCCC"> 800 to a thousand</font> dollars on<font color="#E5E5E5"> a typical invoice they did</font> this thousands and thousands<font color="#CCCCCC"> and</font> thousands<font color="#CCCCCC"> of times so let's look at the</font> fail matrix so I didn't give the user retard level the<font color="#E5E5E5"> you know too many</font> <font color="#CCCCCC">points here because it was a billing</font> administrator most people don't really <font color="#E5E5E5">know what's going</font><font color="#CCCCCC"> on</font><font color="#E5E5E5"> inside</font><font color="#CCCCCC"> a database</font> <font color="#E5E5E5">most average</font><font color="#CCCCCC"> people</font><font color="#E5E5E5"> so however they have</font> to refund the money<font color="#E5E5E5"> so if they get 18</font> points for<font color="#CCCCCC"> that over the last like four</font> <font color="#E5E5E5">or</font><font color="#CCCCCC"> five</font><font color="#E5E5E5"> years worth of money now it was</font> a lot of<font color="#CCCCCC"> money</font><font color="#E5E5E5"> it was</font><font color="#CCCCCC"> about</font><font color="#E5E5E5"> twelve</font> million dollars actually so they got <font color="#CCCCCC">fifteen points I wish and bonus points</font> <font color="#E5E5E5">yeah</font><font color="#CCCCCC"> systematic culture of over billing</font> <font color="#CCCCCC">they</font><font color="#E5E5E5"> got</font><font color="#CCCCCC"> forty five okay this next one I</font> call it smoking<font color="#E5E5E5"> gun txt now if you if</font> you work in the in the forensic arena <font color="#CCCCCC">you've</font><font color="#E5E5E5"> probably heard the term the</font> <font color="#E5E5E5">smoking gun txt it's it's the it's the</font> <font color="#E5E5E5">gag name of what you're always looking</font> for<font color="#CCCCCC"> in a case it could</font><font color="#E5E5E5"> be that record in</font> a<font color="#CCCCCC"> database it could be that internet</font> history<font color="#E5E5E5"> record that shows that</font><font color="#CCCCCC"> the guy</font> really did<font color="#E5E5E5"> something bad</font> it comes<font color="#E5E5E5"> from the</font><font color="#CCCCCC"> cheesy</font><font color="#E5E5E5"> western movies</font> where<font color="#E5E5E5"> you know the the murderous gun is</font> still smoking after<font color="#E5E5E5"> he shot it proves</font> <font color="#E5E5E5">that he was the one who fired the shot</font> so in forensics you're always saying that<font color="#CCCCCC"> you know</font><font color="#E5E5E5"> your did you find the</font> <font color="#E5E5E5">smoking gun</font> <font color="#E5E5E5">yeah found the smoking gun dot txt</font> sometimes I wish it's as<font color="#E5E5E5"> easy as finding</font> <font color="#E5E5E5">a file</font><font color="#CCCCCC"> named smoking gun txt but you can</font> only<font color="#E5E5E5"> wish this is another intellectual</font> property case again<font color="#CCCCCC"> you</font><font color="#E5E5E5"> got a guy</font> leaving<font color="#E5E5E5"> one company to go work for</font> <font color="#E5E5E5">another company and the first company</font> says can you<font color="#E5E5E5"> make</font><font color="#CCCCCC"> sure</font><font color="#E5E5E5"> he didn't do</font> stupid<font color="#E5E5E5"> shit</font><font color="#CCCCCC"> and we called in</font><font color="#E5E5E5"> to make</font> <font color="#CCCCCC">sure that he didn't do stupid shit so we</font> imaged the drive we kicked<font color="#E5E5E5"> off</font><font color="#CCCCCC"> for</font> standard analysis scripts<font color="#E5E5E5"> like the file</font> <font color="#CCCCCC">signature</font><font color="#E5E5E5"> analysis script that I told</font> you<font color="#CCCCCC"> guys about before and open up</font><font color="#E5E5E5"> his</font> <font color="#E5E5E5">desktop folder I always like to</font><font color="#CCCCCC"> open up</font> <font color="#E5E5E5">the</font><font color="#CCCCCC"> desktop folder of every suspect that</font> I'm examining<font color="#E5E5E5"> because you can tell a lot</font> <font color="#E5E5E5">about what a guy or but a lot about the</font> <font color="#E5E5E5">person when you're looking at the</font> desktop<font color="#CCCCCC"> did they cram a lot of files in</font> there in an unorganized fashion or maybe everything is neatly packed away in<font color="#E5E5E5"> the</font> My Documents<font color="#E5E5E5"> folder</font><font color="#CCCCCC"> things</font><font color="#E5E5E5"> like that or</font> are<font color="#CCCCCC"> they arranged nicely or is it just</font> all smattered<font color="#E5E5E5"> it tells you a little bit</font> <font color="#CCCCCC">about the person so you can get a live</font> <font color="#E5E5E5">into the mind of who they are and</font> immediately<font color="#E5E5E5"> I solved the case how did</font> you do<font color="#CCCCCC"> that so well</font><font color="#E5E5E5"> this is the smoking</font> <font color="#E5E5E5">gun txt it oh yeah it's almost as easy</font> <font color="#E5E5E5">as this um</font><font color="#CCCCCC"> with us arbic you so I open</font> up the<font color="#CCCCCC"> Desktop folder</font><font color="#E5E5E5"> and I saw this I'm</font> hoping you<font color="#CCCCCC"> can see that in the back but</font> I'll read it<font color="#E5E5E5"> out for you you've got a</font> <font color="#E5E5E5">folder</font><font color="#CCCCCC"> on the desktop</font><font color="#E5E5E5"> you</font><font color="#CCCCCC"> can see at the</font> <font color="#CCCCCC">bottom left there the</font><font color="#E5E5E5"> folder is called</font> competitive<font color="#CCCCCC"> intelligence</font><font color="#E5E5E5"> and in inside</font> that folder<font color="#E5E5E5"> we've got a PowerPoint</font> presentation titled blue<font color="#CCCCCC"> Bluebird</font> <font color="#E5E5E5">Project Blue Book we've got we've</font><font color="#CCCCCC"> got</font> some PDFs we've got a whole<font color="#CCCCCC"> bunch of</font> stuff<font color="#CCCCCC"> about this Project</font><font color="#E5E5E5"> Blue Book that</font> this guy was working<font color="#E5E5E5"> on from from his</font> old company<font color="#E5E5E5"> he was getting ready</font><font color="#CCCCCC"> to</font> deliver this<font color="#E5E5E5"> presentation to the the</font> <font color="#E5E5E5">executive leadership</font><font color="#CCCCCC"> team of the new</font> company telling them<font color="#CCCCCC"> everything about</font> this confidential project<font color="#E5E5E5"> from his old</font> company so yeah he didn't make it<font color="#E5E5E5"> difficult</font><font color="#CCCCCC"> for</font> <font color="#CCCCCC">me like it</font><font color="#E5E5E5"> was not only all this stuff</font> was there<font color="#E5E5E5"> but he made a PowerPoint</font> presentation describing it and<font color="#E5E5E5"> like to</font> deliver all<font color="#E5E5E5"> all the all</font><font color="#CCCCCC"> the knowledge</font> <font color="#E5E5E5">for this to the ELT um yeah I just said</font> that do we over bill for this<font color="#E5E5E5"> maybe we're not</font> <font color="#E5E5E5">sure that</font><font color="#CCCCCC"> last client all right</font> part<font color="#E5E5E5"> of</font><font color="#CCCCCC"> me uh I don't</font><font color="#E5E5E5"> even remember</font> <font color="#CCCCCC">probably</font><font color="#E5E5E5"> well it took</font><font color="#CCCCCC"> twenty twenty</font> minutes we probably just<font color="#E5E5E5"> build one hour</font> Michael what<font color="#CCCCCC"> are we look what have we</font> learned in this<font color="#E5E5E5"> case well we learned</font> that sometimes people<font color="#E5E5E5"> don't even try</font> fail<font color="#E5E5E5"> matrix</font><font color="#CCCCCC"> all</font><font color="#E5E5E5"> right</font> use a retard levels gotta<font color="#E5E5E5"> be an eighteen</font> <font color="#E5E5E5">that</font><font color="#CCCCCC"> I mean ah we could but I'm sorry</font> we're saving the the higher scores for some of the later stories yeah so the summers<font color="#E5E5E5"> are going off you may have</font> noticed yeah so far<font color="#E5E5E5"> each one's been</font> <font color="#CCCCCC">going up um yeah you got an 18-4 user</font> <font color="#CCCCCC">retard level because if you're</font><font color="#E5E5E5"> going to</font> be<font color="#CCCCCC"> doing this don't leave tracks all</font> over<font color="#CCCCCC"> your computer I mean sure if you're</font> <font color="#E5E5E5">going to say</font><font color="#CCCCCC"> all</font><font color="#E5E5E5"> the they're going to be</font> launching this<font color="#CCCCCC"> new thing in August</font><font color="#E5E5E5"> next</font> year that's<font color="#E5E5E5"> one thing to say it to a</font> person but<font color="#E5E5E5"> if you put together a whole</font> <font color="#CCCCCC">presentation about</font><font color="#E5E5E5"> the thing</font><font color="#CCCCCC"> you're</font> <font color="#CCCCCC">that's</font><font color="#E5E5E5"> fail its fail</font><font color="#CCCCCC"> punishment</font><font color="#E5E5E5"> levels</font> <font color="#CCCCCC">ten</font><font color="#E5E5E5"> because he had to settle he was</font> obviously in breach of<font color="#E5E5E5"> his NDA from the</font> old company<font color="#CCCCCC"> and it</font><font color="#E5E5E5"> cost him</font><font color="#CCCCCC"> one point</font> <font color="#CCCCCC">five million</font><font color="#E5E5E5"> in damages</font> so the distress caused is a<font color="#E5E5E5"> six pointer</font> and bonus points<font color="#CCCCCC"> of</font><font color="#E5E5E5"> twelve four zero</font> effort this all adds<font color="#CCCCCC"> up</font><font color="#E5E5E5"> to the fail matrix</font> <font color="#CCCCCC">score of 46</font> all right<font color="#E5E5E5"> next door</font><font color="#CCCCCC"> Eden I hope you</font> appreciate these amazing sound effects and video editing that<font color="#E5E5E5"> I did</font><font color="#CCCCCC"> hold on we</font> need<font color="#E5E5E5"> to put the presentation on hold</font><font color="#CCCCCC"> I</font> have a problem<font color="#CCCCCC"> which ones which</font> that one is mine on the left in<font color="#E5E5E5"> your</font> left hand<font color="#E5E5E5"> are you sure because I want</font> the one<font color="#CCCCCC"> that it's more then the one</font><font color="#E5E5E5"> with</font> more<font color="#E5E5E5"> is yours</font><font color="#CCCCCC"> nice when we'll be taking</font> <font color="#CCCCCC">questions later</font><font color="#E5E5E5"> all right</font><font color="#CCCCCC"> so the next</font> one I call hiding in the cloud<font color="#E5E5E5"> so once</font> again<font color="#E5E5E5"> a top sales guy leaves the company</font> <font color="#E5E5E5">and the sales just take a nosedive</font> actually and<font color="#CCCCCC"> they</font><font color="#E5E5E5"> think he took</font><font color="#CCCCCC"> the</font> customer<font color="#E5E5E5"> list but they can't prove it</font> <font color="#CCCCCC">they know that there's new customers</font> that they know<font color="#CCCCCC"> that there's old</font> customers over at the new company<font color="#E5E5E5"> but</font> they can't<font color="#E5E5E5"> prove that he's taking the</font> customer<font color="#E5E5E5"> list so we images a computer</font> and we start<font color="#E5E5E5"> looking</font><font color="#CCCCCC"> for</font><font color="#E5E5E5"> the usual</font><font color="#CCCCCC"> kind</font> of clues<font color="#E5E5E5"> so for example</font><font color="#CCCCCC"> link files</font><font color="#E5E5E5"> are a</font> <font color="#E5E5E5">windows artifact that show</font><font color="#CCCCCC"> what files</font> <font color="#CCCCCC">have been recently opened</font><font color="#E5E5E5"> they're a</font> <font color="#E5E5E5">simple text file and they're pretty</font> easily<font color="#E5E5E5"> parsed and they've got a lot of</font> information<font color="#CCCCCC"> about the</font><font color="#E5E5E5"> location of the</font> file the date and the time<font color="#CCCCCC"> all that kind</font> of good<font color="#CCCCCC"> stuff</font><font color="#E5E5E5"> we look at a registry key</font> which I just love the name<font color="#CCCCCC"> of</font><font color="#E5E5E5"> this it</font> makes<font color="#E5E5E5"> absolutely no sense to</font><font color="#CCCCCC"> me</font><font color="#E5E5E5"> at all</font> <font color="#E5E5E5">but you know somebody</font><font color="#CCCCCC"> in Microsoft maybe</font> had a<font color="#E5E5E5"> couple of these one</font><font color="#CCCCCC"> day when</font> they're working called<font color="#E5E5E5"> bag</font><font color="#CCCCCC"> mru for some</font> unknown reason<font color="#E5E5E5"> it most recently</font><font color="#CCCCCC"> used but</font> why bag you guys are just full of great<font color="#E5E5E5"> answer</font> so anyways explain why it's named<font color="#CCCCCC"> that</font> but it's still<font color="#E5E5E5"> a</font><font color="#CCCCCC"> fucked up name</font> <font color="#CCCCCC">bag mr</font><font color="#E5E5E5"> you come on anyway so it's a</font> register key that can<font color="#E5E5E5"> show user activity</font> and it can show what files<font color="#E5E5E5"> are inside a</font> <font color="#E5E5E5">folder so that's one of</font><font color="#CCCCCC"> the things that</font> we look at<font color="#E5E5E5"> typically in a data</font> exfiltration case<font color="#CCCCCC"> jump lists which are</font> that's actually<font color="#E5E5E5"> wrong from vista forward</font> we've got jump lists and if you<font color="#E5E5E5"> look</font> looking at<font color="#E5E5E5"> your that's a fail</font><font color="#CCCCCC"> that is a</font> fail that<font color="#E5E5E5"> should say I got it I</font><font color="#CCCCCC"> gotta</font> <font color="#CCCCCC">take a</font><font color="#E5E5E5"> drink</font><font color="#CCCCCC"> I just don't love</font><font color="#E5E5E5"> vista</font> <font color="#E5E5E5">enough to put it in there so anyway so</font> jump lists are<font color="#CCCCCC"> the thing on your taskbar</font> if you've got<font color="#E5E5E5"> like five</font><font color="#CCCCCC"> Word documents</font> open<font color="#E5E5E5"> and you see you know you click on</font> it<font color="#CCCCCC"> you've got</font><font color="#E5E5E5"> the five those are jump</font> lists basically an<font color="#E5E5E5"> IE history</font><font color="#CCCCCC"> internet</font> <font color="#CCCCCC">explorer internet explorer</font><font color="#E5E5E5"> is so much</font> more than just exploring<font color="#E5E5E5"> the</font><font color="#CCCCCC"> internet</font><font color="#E5E5E5"> it</font> <font color="#E5E5E5">actually records things</font><font color="#CCCCCC"> that you do</font> without<font color="#E5E5E5"> your knowledge like opening</font> files but we're getting no love<font color="#CCCCCC"> I'm not</font> finding anything show me the love<font color="#E5E5E5"> baby</font> <font color="#E5E5E5">he's having a beer</font><font color="#CCCCCC"> alright</font><font color="#E5E5E5"> so we</font><font color="#CCCCCC"> search</font> the IE history<font color="#E5E5E5"> and we found a dot HTM</font> file that had some<font color="#E5E5E5"> JavaScript in it</font> pointing<font color="#CCCCCC"> to files anywhere</font><font color="#E5E5E5"> who's</font> familiar<font color="#E5E5E5"> with that site it's very much</font> like Dropbox<font color="#E5E5E5"> the same kind of</font><font color="#CCCCCC"> concept</font> but it's more<font color="#E5E5E5"> for</font><font color="#CCCCCC"> business users</font><font color="#E5E5E5"> so it's</font> got a really<font color="#CCCCCC"> a</font><font color="#E5E5E5"> lot</font><font color="#CCCCCC"> of really</font><font color="#E5E5E5"> great</font> auditing<font color="#E5E5E5"> and logging and stuff like that</font> <font color="#E5E5E5">so</font><font color="#CCCCCC"> you're uploading and downloading</font> files you can<font color="#E5E5E5"> basically monitor and</font> track them and<font color="#E5E5E5"> so forth</font><font color="#CCCCCC"> that turned out</font> <font color="#CCCCCC">to</font><font color="#E5E5E5"> be a very nice</font><font color="#CCCCCC"> thing because</font> <font color="#E5E5E5">typically that's only in the user</font> control panel<font color="#E5E5E5"> but we found is little dot</font> HTM file<font color="#E5E5E5"> with</font><font color="#CCCCCC"> Engle</font><font color="#E5E5E5"> oh and we solved the</font> <font color="#CCCCCC">case timing fail I'm sorry</font> <font color="#CCCCCC">three bingo</font> we solved the<font color="#CCCCCC"> case</font><font color="#E5E5E5"> all right so what we</font> got was the account ID<font color="#E5E5E5"> the upload times</font> the file names<font color="#E5E5E5"> everything we got some</font> sweet<font color="#E5E5E5"> lovin we</font><font color="#CCCCCC"> had ourselves some stolen</font> <font color="#E5E5E5">files let's look at this little actual</font> bit of JavaScript here<font color="#CCCCCC"> I have changed</font> the names of the file in this case<font color="#E5E5E5"> but</font> you<font color="#CCCCCC"> know we've got stolen file a recipe</font> for<font color="#CCCCCC"> coke for example you notice</font><font color="#E5E5E5"> minor</font> trade secrets<font color="#E5E5E5"> the user is the user</font> account name<font color="#E5E5E5"> so we were</font><font color="#CCCCCC"> able to</font><font color="#E5E5E5"> subpoena</font> that<font color="#E5E5E5"> from files anywhere and figure out</font> <font color="#E5E5E5">who</font><font color="#CCCCCC"> actually registered the account</font> <font color="#E5E5E5">there is</font><font color="#CCCCCC"> the folder that it was in and</font> this<font color="#E5E5E5"> is really handy here the date that</font> <font color="#E5E5E5">it was</font><font color="#CCCCCC"> uploaded</font><font color="#E5E5E5"> and we got a whole bunch</font> of these in<font color="#E5E5E5"> fact this is the</font><font color="#CCCCCC"> first page</font> of a like a<font color="#E5E5E5"> 80 page</font><font color="#CCCCCC"> Excel</font><font color="#E5E5E5"> report that I</font> prepared and these are all<font color="#E5E5E5"> the file</font> names<font color="#CCCCCC"> that</font><font color="#E5E5E5"> this guy uploaded so yeah so</font> the second part<font color="#E5E5E5"> of the story is going to</font> go back another<font color="#E5E5E5"> fail fail which one do I</font> drink<font color="#E5E5E5"> from good good answer</font><font color="#CCCCCC"> all</font><font color="#E5E5E5"> right so</font> the second<font color="#E5E5E5"> part of the case the opposing</font> attorney<font color="#E5E5E5"> the guy representing the thief</font> handed us an Outlook CD and CD without <font color="#CCCCCC">with PST on it and this</font><font color="#E5E5E5"> is part of the</font> discovery<font color="#E5E5E5"> process</font><font color="#CCCCCC"> discovery is a legal</font> <font color="#CCCCCC">term in litigation where both sides are</font> able<font color="#CCCCCC"> to exchange</font><font color="#E5E5E5"> evidence and in fact</font> they have a<font color="#E5E5E5"> they're compelled to</font> exchange evidence through the rules of the court so he gives us<font color="#E5E5E5"> a CD and it's</font> got<font color="#CCCCCC"> outlook now what PST on it the first</font> thing we do is we<font color="#E5E5E5"> look at is not a lot</font> of files in there<font color="#E5E5E5"> and the first thing we</font> do is we want<font color="#E5E5E5"> to recover</font><font color="#CCCCCC"> the deleted</font> emails in a PST because we're forensic analysts and that's what we like<font color="#CCCCCC"> doing</font> <font color="#E5E5E5">we like looking to people's emails so</font> I'm going<font color="#E5E5E5"> to show you the old-school way</font> <font color="#CCCCCC">of recovering deleted emails you use a</font> hex editor<font color="#E5E5E5"> you crack</font><font color="#CCCCCC"> open the PST and</font> you change bytes<font color="#E5E5E5"> 7 through 12 or 7</font> through 13<font color="#CCCCCC"> change them to</font><font color="#E5E5E5"> zeros save the</font> file then you<font color="#CCCCCC"> use the outlook repair</font> tool which is<font color="#E5E5E5"> built in with Microsoft</font> <font color="#E5E5E5">and you basically repair the tool</font> restore<font color="#E5E5E5"> a repair the</font><font color="#CCCCCC"> PST</font> happens is you get a lot<font color="#CCCCCC"> of emails back</font> now these are not<font color="#E5E5E5"> the actual emails but</font> you get tons<font color="#E5E5E5"> and tons of emails back and</font> in<font color="#E5E5E5"> fact in this</font><font color="#CCCCCC"> case we</font><font color="#E5E5E5"> got tens of</font> thousands<font color="#E5E5E5"> of deleted emails and what was</font> in these mails everything<font color="#E5E5E5"> that</font> completely turned the case<font color="#CCCCCC"> around so not</font> only<font color="#E5E5E5"> did</font><font color="#CCCCCC"> we have this guy with all</font><font color="#E5E5E5"> the</font> <font color="#CCCCCC">uploads on those spreadsheets we also</font> had all the emails about<font color="#E5E5E5"> who was</font> involved what lists he took who were the you know all the<font color="#CCCCCC"> people</font><font color="#E5E5E5"> that were involved we</font> were winning<font color="#E5E5E5"> we went we went</font><font color="#CCCCCC"> to Charlie</font> Sheen mode all of<font color="#CCCCCC"> a sudden and the funny</font> thing<font color="#CCCCCC"> is we were able to take all this</font> information<font color="#E5E5E5"> and</font><font color="#CCCCCC"> at a</font><font color="#E5E5E5"> deposition and</font><font color="#CCCCCC"> if</font> you don't know what a<font color="#CCCCCC"> deposition is we</font> get<font color="#E5E5E5"> to ask</font><font color="#CCCCCC"> questions of</font><font color="#E5E5E5"> the opposing</font> party<font color="#E5E5E5"> so we're asking</font><font color="#CCCCCC"> them</font><font color="#E5E5E5"> you know what</font> happened<font color="#CCCCCC"> did you guys steal anything</font><font color="#E5E5E5"> did</font> you<font color="#E5E5E5"> take anything no now now we start</font> pulling<font color="#E5E5E5"> out these emails</font><font color="#CCCCCC"> one by</font><font color="#E5E5E5"> one by</font> <font color="#CCCCCC">one and the guy turns white as a sheet</font> <font color="#CCCCCC">and he</font><font color="#E5E5E5"> spills the beans</font><font color="#CCCCCC"> and basically</font> you know we do pretty<font color="#CCCCCC"> well so who</font> deleted<font color="#E5E5E5"> the</font><font color="#CCCCCC"> Mail's do you think in this</font> case<font color="#E5E5E5"> hmm</font><font color="#CCCCCC"> all doubt I think you know who</font> <font color="#E5E5E5">well people got</font><font color="#CCCCCC"> out almost immediately</font> they hired Saul Goodman unfortunately and<font color="#E5E5E5"> yeah</font><font color="#CCCCCC"> he deleted</font><font color="#E5E5E5"> the mails not</font><font color="#CCCCCC"> good</font> thing not<font color="#E5E5E5"> a good thing so what have we</font> learned<font color="#E5E5E5"> the question was did</font><font color="#CCCCCC"> he claim</font> privilege on<font color="#E5E5E5"> the privilege</font><font color="#CCCCCC"> on the emails</font> he claimed privilege on some of them<font color="#E5E5E5"> but</font> <font color="#E5E5E5">not on you know all</font><font color="#CCCCCC"> of the 10,000 that</font> <font color="#E5E5E5">he deleted so</font><font color="#CCCCCC"> ie history is actually</font> <font color="#CCCCCC">really difficult</font><font color="#E5E5E5"> to wipe it was what</font> we've learned it seems to leave stuff behind<font color="#CCCCCC"> we found a new artifact which is</font> actually pretty<font color="#CCCCCC"> cool files</font><font color="#E5E5E5"> anywhere this</font> <font color="#CCCCCC">JavaScript</font><font color="#E5E5E5"> artifact I haven't heard this</font> discussed<font color="#CCCCCC"> anywhere before</font><font color="#E5E5E5"> so I think</font> it's kind<font color="#CCCCCC"> of cool javascript files can</font> give us<font color="#E5E5E5"> love</font><font color="#CCCCCC"> - we</font><font color="#E5E5E5"> like them and</font> <font color="#E5E5E5">uploading files still leaves</font><font color="#CCCCCC"> traces so</font> an<font color="#CCCCCC"> attorney's shouldn't mess with</font> evidence it's against the ethical<font color="#E5E5E5"> rules</font> in every<font color="#E5E5E5"> state</font><font color="#CCCCCC"> and</font><font color="#E5E5E5"> probably every</font> <font color="#CCCCCC">Canadian province and it can get</font><font color="#E5E5E5"> you</font> disbarred actually so let's look at the fail matrix so the<font color="#E5E5E5"> user retard level is</font> pretty damn high in this one we got fails on the<font color="#E5E5E5"> attorneys pardon also on</font> the the<font color="#E5E5E5"> ex sales guy a huge lawsuit</font> <font color="#E5E5E5">three and a half million dollars on fees</font> and damages which our client<font color="#E5E5E5"> all got</font> back basically<font color="#E5E5E5"> and 15 bonus points the</font> attorney might lose his license on this one he<font color="#CCCCCC"> hasn't yet we don't</font><font color="#E5E5E5"> know we don't</font> <font color="#E5E5E5">track that kind of stuff</font> <font color="#E5E5E5">51 removing up</font><font color="#CCCCCC"> you're ready oh right all</font> <font color="#CCCCCC">right let's do</font><font color="#E5E5E5"> this shit</font> that's<font color="#E5E5E5"> the this next case was probably</font> one of the<font color="#E5E5E5"> most fun cases that I've</font> <font color="#CCCCCC">worked</font><font color="#E5E5E5"> on</font><font color="#CCCCCC"> right from the</font><font color="#E5E5E5"> start I could</font> tell<font color="#CCCCCC"> that something was what was going</font> <font color="#CCCCCC">to be a fun</font><font color="#E5E5E5"> one</font><font color="#CCCCCC"> I call it the RDP</font><font color="#E5E5E5"> bounce</font> <font color="#CCCCCC">you'll see why I was</font><font color="#E5E5E5"> called in</font><font color="#CCCCCC"> to</font> <font color="#E5E5E5">investigate</font><font color="#CCCCCC"> a network</font><font color="#E5E5E5"> breach</font><font color="#CCCCCC"> the company</font> <font color="#E5E5E5">told us and they shared some information</font> <font color="#CCCCCC">with us</font><font color="#E5E5E5"> that was evidence</font><font color="#CCCCCC"> that at least</font> <font color="#E5E5E5">one computer had been breached</font><font color="#CCCCCC"> they</font> didn't know why they didn't know what and they asked us<font color="#CCCCCC"> to investigate and</font> well to tell them why<font color="#CCCCCC"> and to tell them</font> what it<font color="#CCCCCC"> was is a large company</font><font color="#E5E5E5"> they've</font> they had a lot<font color="#E5E5E5"> of computers all</font><font color="#CCCCCC"> the more</font> <font color="#E5E5E5">were windows-based thousands upon</font> thousands<font color="#E5E5E5"> of computers in offices all</font> across the<font color="#E5E5E5"> world and in one of their</font> offices<font color="#E5E5E5"> they they noticed</font><font color="#CCCCCC"> that this</font> <font color="#E5E5E5">computer had</font><font color="#CCCCCC"> been breached</font><font color="#E5E5E5"> so let's</font> figure out what happened<font color="#CCCCCC"> so we move in</font> <font color="#E5E5E5">and actually</font><font color="#CCCCCC"> think I'm</font><font color="#E5E5E5"> just going to</font> pause here<font color="#CCCCCC"> for two seconds hey Eric is</font> this<font color="#E5E5E5"> your first time presenting</font><font color="#CCCCCC"> at</font> <font color="#CCCCCC">DEFCON yes it is</font><font color="#E5E5E5"> okay</font> hi we don't even<font color="#CCCCCC"> have to say anything</font> <font color="#E5E5E5">anymore you guys know</font><font color="#CCCCCC"> exactly what's</font> going on<font color="#E5E5E5"> Sarah yeah</font><font color="#CCCCCC"> joy yourself</font> oh yeah<font color="#CCCCCC"> mix Tara you dare</font><font color="#E5E5E5"> let yeah you</font> sir is your<font color="#CCCCCC"> name soon</font><font color="#E5E5E5"> sir bend over</font> you're the<font color="#E5E5E5"> ugliest Sarah ever finish</font> that<font color="#CCCCCC"> bale</font> another<font color="#E5E5E5"> soldier bites it does winning</font> <font color="#E5E5E5">fall yeah there's some issue about the</font> sound person<font color="#CCCCCC"> ah know whatever</font><font color="#E5E5E5"> is</font> <font color="#CCCCCC">supposed to be the sound</font><font color="#E5E5E5"> information you</font> know I appreciate<font color="#E5E5E5"> that Sarah but she's</font> not here come on up you're<font color="#E5E5E5"> the next</font> contestant on <font color="#E5E5E5">fail others</font> oh you ready got one<font color="#E5E5E5"> someone counted</font> wrong<font color="#CCCCCC"> you're</font><font color="#E5E5E5"> past one for Sarah all</font> <font color="#E5E5E5">right I'm sure</font><font color="#CCCCCC"> all of you want</font><font color="#E5E5E5"> to be</font> <font color="#E5E5E5">Sarah right now</font> <font color="#CCCCCC">alrighty Sarah Palin in the talks to our</font> new speakers and to our new attendees oh thank you<font color="#CCCCCC"> thank you shoot</font><font color="#E5E5E5"> two more</font><font color="#CCCCCC"> to</font> <font color="#E5E5E5">this hour all right we got 15</font><font color="#CCCCCC"> minutes</font> <font color="#CCCCCC">left so thank you</font><font color="#E5E5E5"> very much goons for</font> for doing<font color="#CCCCCC"> that it's Eric's first</font><font color="#E5E5E5"> time at</font> Def<font color="#CCCCCC"> Con so</font><font color="#E5E5E5"> all right so I was talking</font> <font color="#CCCCCC">about</font><font color="#E5E5E5"> the RDP bounce case that I was</font> <font color="#E5E5E5">those investigating now as I mentioned</font> <font color="#E5E5E5">thousands of computers very various</font> offices all<font color="#CCCCCC"> around the world</font><font color="#E5E5E5"> so we</font> <font color="#E5E5E5">analyzed the one computer that</font><font color="#CCCCCC"> they knew</font> it was breached<font color="#E5E5E5"> and it showed</font><font color="#CCCCCC"> that</font><font color="#E5E5E5"> there</font> were that RDP or<font color="#E5E5E5"> remote desktop protocol</font> this<font color="#E5E5E5"> is the the tool that's built into</font> <font color="#E5E5E5">Windows that allows you to remotely</font> control another computer<font color="#CCCCCC"> some logs</font> showed us that RDP was used to connect <font color="#CCCCCC">using the local administrator password</font> <font color="#E5E5E5">to to another machine</font><font color="#CCCCCC"> it also showed</font> that<font color="#CCCCCC"> after I said</font><font color="#E5E5E5"> that backwards it show</font> that<font color="#E5E5E5"> RDP was used to connect in and also</font> showed that RDP was used to connect out <font color="#E5E5E5">so in this little diagram here</font><font color="#CCCCCC"> we're I</font> was looking at the<font color="#E5E5E5"> middle computer I</font> didn't know at<font color="#CCCCCC"> the time that</font><font color="#E5E5E5"> there were</font> other computers<font color="#E5E5E5"> I was just looking</font><font color="#CCCCCC"> at</font> <font color="#E5E5E5">this middle one and it seemed</font><font color="#CCCCCC"> that there</font> were a<font color="#E5E5E5"> bunch</font><font color="#CCCCCC"> use</font><font color="#E5E5E5"> in here</font><font color="#CCCCCC"> so it was</font> probably<font color="#CCCCCC"> the tip of the iceberg where do</font> you find these logs Michael specifically <font color="#E5E5E5">I was looking at the Windows Event log</font> the the Event Viewer<font color="#CCCCCC"> if you go into</font><font color="#E5E5E5"> the</font> control<font color="#CCCCCC"> panel</font><font color="#E5E5E5"> and then</font><font color="#CCCCCC"> the administrator</font> tools there's the Event Viewer tool<font color="#E5E5E5"> by</font> default<font color="#CCCCCC"> it logs a lot of stuff in there</font> <font color="#E5E5E5">including when RDP is used to connect in</font> and when you're connecting out so I analyzed that the machine that<font color="#CCCCCC"> came</font> before it and same the same<font color="#E5E5E5"> thing</font><font color="#CCCCCC"> there</font> were there logs that showed<font color="#E5E5E5"> that</font> something was connecting<font color="#E5E5E5"> into that it</font> was basically an entire bounce<font color="#E5E5E5"> now these</font> computers were located in<font color="#CCCCCC"> different</font> offices<font color="#E5E5E5"> in all around the world</font> this guy was bouncing all around<font color="#E5E5E5"> the</font> world to do something so obviously this is<font color="#E5E5E5"> a pattern</font><font color="#CCCCCC"> I still didn't know what he</font> was doing I<font color="#E5E5E5"> just knew that he was</font> clearly<font color="#E5E5E5"> going through a lot of trouble</font> to up<font color="#CCCCCC"> the skate his trail bouncing all</font> around<font color="#E5E5E5"> so</font><font color="#CCCCCC"> that probably so that when he</font> <font color="#E5E5E5">does</font> his final target there's no direct <font color="#CCCCCC">evidence to to where he</font><font color="#E5E5E5"> was coming from</font> yes there were all sessions with incessant so he opens up a remote desktop<font color="#E5E5E5"> and then within that remote</font> desktop window he opens up another <font color="#E5E5E5">remote desktop to another machine and he</font> just did this<font color="#E5E5E5"> over and</font><font color="#CCCCCC"> over</font><font color="#E5E5E5"> it must have</font> taken him hours<font color="#CCCCCC"> because Remote Desktop</font> <font color="#CCCCCC">is not the fastest protocol</font><font color="#E5E5E5"> at all and</font> so he must do like<font color="#CCCCCC"> I don't</font><font color="#E5E5E5"> know I</font><font color="#CCCCCC"> don't</font> <font color="#E5E5E5">want to speculate how long it took him</font> to to do this um <font color="#CCCCCC">you imagine how long</font><font color="#E5E5E5"> the screen redraw</font> was<font color="#CCCCCC"> by</font><font color="#E5E5E5"> the time</font><font color="#CCCCCC"> you get</font><font color="#E5E5E5"> to like machine</font> <font color="#CCCCCC">tan Jesus Christ you probably have</font><font color="#E5E5E5"> to</font> <font color="#CCCCCC">double-click</font><font color="#E5E5E5"> with like a minute in</font> between clicks or something<font color="#E5E5E5"> all</font><font color="#CCCCCC"> right so</font> what was the<font color="#CCCCCC"> target so um I think</font><font color="#E5E5E5"> you</font> could not figure whatever<font color="#E5E5E5"> did</font><font color="#CCCCCC"> next</font> <font color="#E5E5E5">rather than following the trail back</font><font color="#CCCCCC"> I</font> <font color="#E5E5E5">start following the trail forward what</font> was he getting<font color="#E5E5E5"> so</font><font color="#CCCCCC"> a step</font><font color="#E5E5E5"> after step</font> computer<font color="#CCCCCC"> after computer site after site</font> after site<font color="#E5E5E5"> all around the world I</font> finally reached a high profile machine<font color="#E5E5E5"> I</font> I wish I could tell<font color="#E5E5E5"> you why which</font> specific machine it was<font color="#E5E5E5"> I can't because</font> it would give<font color="#CCCCCC"> away too much about</font><font color="#E5E5E5"> this</font> <font color="#E5E5E5">company did it have</font><font color="#CCCCCC"> Nickelback on it</font> I did not have Nickelback on it um yeah <font color="#E5E5E5">chopping his video ever for</font><font color="#CCCCCC"> sure so once</font> I reach this machine I knew exactly what he was<font color="#E5E5E5"> going after he wanted highly</font> confidential documents that were only<font color="#CCCCCC"> on</font> this one<font color="#CCCCCC"> machine in the entire company</font> <font color="#E5E5E5">and he obviously knew this and he</font><font color="#CCCCCC"> wanted</font> to<font color="#E5E5E5"> get into this machine to get these</font> <font color="#CCCCCC">documents so I focused my analysis on</font> this target<font color="#E5E5E5"> machine on this special</font> confidential machine<font color="#E5E5E5"> and I want to see</font> what did they do specifically<font color="#E5E5E5"> which</font> files did they take one<font color="#E5E5E5"> and it took me</font> only about<font color="#E5E5E5"> two minutes</font><font color="#CCCCCC"> as I was</font> analyzing<font color="#E5E5E5"> this machine</font><font color="#CCCCCC"> and I identified</font> <font color="#CCCCCC">the attacker</font><font color="#E5E5E5"> immediately now he went</font> through<font color="#CCCCCC"> all around the world</font><font color="#E5E5E5"> and I</font> finally<font color="#E5E5E5"> when I was taking a look at his</font> <font color="#E5E5E5">target</font><font color="#CCCCCC"> within two minutes</font><font color="#E5E5E5"> I found out</font> who<font color="#CCCCCC"> he was he used</font><font color="#E5E5E5"> his</font><font color="#CCCCCC"> own credential</font><font color="#E5E5E5"> on</font> machine<font color="#CCCCCC"> no he did</font><font color="#E5E5E5"> not use</font><font color="#CCCCCC"> his own</font> credentials<font color="#E5E5E5"> on the machine</font><font color="#CCCCCC"> any other</font> <font color="#E5E5E5">guesses</font> emails himself nope<font color="#E5E5E5"> he stole his own</font> file nope he did<font color="#E5E5E5"> not check</font><font color="#CCCCCC"> Facebook</font> no no shared drives<font color="#CCCCCC"> why did I tell</font><font color="#E5E5E5"> you</font> what<font color="#E5E5E5"> he did Michael what did he do</font> <font color="#E5E5E5">printers so one thing that a</font><font color="#CCCCCC"> lot of</font> people<font color="#CCCCCC"> don't know about remote desktop</font> <font color="#E5E5E5">is by default it Maps the printer</font> <font color="#CCCCCC">connected to your machine to the machine</font> that<font color="#CCCCCC"> you're connecting out to it does</font> this so that when you hit<font color="#E5E5E5"> print inside</font> <font color="#E5E5E5">your remote desktop window</font><font color="#CCCCCC"> your printer</font> next<font color="#E5E5E5"> to you is</font><font color="#CCCCCC"> available so you can</font> print a document beside you<font color="#E5E5E5"> now this guy</font> didn't print any documents but just by connecting<font color="#E5E5E5"> the machine automatically</font> mapped<font color="#E5E5E5"> his local printer to the target</font> machine<font color="#E5E5E5"> which identified his machine a</font> machine<font color="#CCCCCC"> name</font><font color="#E5E5E5"> he forgot to turn this off</font> there<font color="#CCCCCC"> was a</font><font color="#E5E5E5"> checkbox in remote desktop</font> protocol<font color="#E5E5E5"> when you open up the</font><font color="#CCCCCC"> the RDP</font> window you can it options and then uncheck<font color="#E5E5E5"> map printers to target machine</font> is just a<font color="#E5E5E5"> checkbox</font> he did not uncheck it yeah<font color="#E5E5E5"> what have we</font> <font color="#E5E5E5">learned Michael well what have we</font> learned log entries that<font color="#CCCCCC"> are created by</font> innocuous system events can give insight into user actions<font color="#E5E5E5"> now he didn't map his</font> printer<font color="#CCCCCC"> the system did it</font><font color="#E5E5E5"> automatically</font> so sometimes<font color="#E5E5E5"> just looking at what the</font> system is doing<font color="#E5E5E5"> can tell you what the</font> user was doing<font color="#E5E5E5"> for the fail matrix</font><font color="#CCCCCC"> use a</font> <font color="#E5E5E5">retard level would</font><font color="#CCCCCC"> be about a</font><font color="#E5E5E5"> 20 because</font> <font color="#E5E5E5">he went through a lot</font><font color="#CCCCCC"> of trouble to</font> <font color="#E5E5E5">cover his tracks</font><font color="#CCCCCC"> and he did not cover</font> his tracks punishment level would<font color="#E5E5E5"> be</font><font color="#CCCCCC"> 15 he lost his</font> job<font color="#CCCCCC"> he also lost</font><font color="#E5E5E5"> his recommend his</font> references he can't use use that company as a reference anymore so distress calls would<font color="#E5E5E5"> be 8 bonus points would be 20 do</font> some research if you're going to use RDP to pull off some<font color="#E5E5E5"> kind of a scam know how</font> RDP works<font color="#E5E5E5"> adding it</font><font color="#CCCCCC"> all up we get</font><font color="#E5E5E5"> a fail</font> <font color="#E5E5E5">star 63</font> now the last story<font color="#E5E5E5"> here Eric</font><font color="#CCCCCC"> alright so</font> the<font color="#CCCCCC"> last the</font><font color="#E5E5E5"> last story is</font><font color="#CCCCCC"> a little bit</font> <font color="#E5E5E5">different than the others um this is the</font> epic porno fail so the difference in this one is all<font color="#E5E5E5"> the other cases we've</font> talked<font color="#E5E5E5"> about have either been commercial</font> litigation civil litigation something on that side this one happens to be a <font color="#CCCCCC">criminal</font><font color="#E5E5E5"> case and from time to time we</font> do<font color="#E5E5E5"> criminal defense work and we work</font> either with public defenders or with private attorneys and<font color="#E5E5E5"> so this is about</font> this<font color="#E5E5E5"> kind of situation</font><font color="#CCCCCC"> so our client</font> <font color="#E5E5E5">Edgar has been charged</font><font color="#CCCCCC"> with possession</font> of contraband<font color="#E5E5E5"> aka child porn on his</font> computer<font color="#E5E5E5"> pretty unsavory stuff he claims</font> innocence<font color="#E5E5E5"> as usual and I kind of roll my</font> eyes<font color="#E5E5E5"> because everybody always claims</font> innocence<font color="#E5E5E5"> and you know 98% of these</font> people did it<font color="#E5E5E5"> we examine the computer we</font> looked at the<font color="#E5E5E5"> examiner's report we</font> looked at their allegations and let's <font color="#E5E5E5">take a look at them so they claim</font><font color="#CCCCCC"> Edgar</font> downloaded porn<font color="#E5E5E5"> all right</font> they claim that Edgar's user account had passwords<font color="#E5E5E5"> this is all documented in the</font> report<font color="#CCCCCC"> and they</font><font color="#E5E5E5"> claim</font><font color="#CCCCCC"> that Edgar</font> utilized<font color="#E5E5E5"> newsgroups to download porn</font> <font color="#E5E5E5">like for</font><font color="#CCCCCC"> real who uses these</font><font color="#E5E5E5"> groups to</font> download porn<font color="#E5E5E5"> anybody anybody hand they</font> had the web now<font color="#CCCCCC"> I mean yeah</font><font color="#E5E5E5"> news groups</font> right<font color="#E5E5E5"> so that guy I would believe</font> <font color="#E5E5E5">all right so they they allege that he</font> <font color="#E5E5E5">downloaded illegal porn and there is one</font> thing<font color="#CCCCCC"> to know just keep this</font><font color="#E5E5E5"> in mind as</font> we<font color="#CCCCCC"> go through the</font><font color="#E5E5E5"> talk he left his house</font> <font color="#CCCCCC">in April 2012 his wife kicked</font><font color="#E5E5E5"> him out</font> <font color="#CCCCCC">because of</font><font color="#E5E5E5"> all this you know stuff</font> happening<font color="#E5E5E5"> basically</font><font color="#CCCCCC"> so April 2012 keep</font> that in mind so let's look<font color="#CCCCCC"> when we examine</font><font color="#E5E5E5"> the</font> computer let's see what we came<font color="#E5E5E5"> up</font><font color="#CCCCCC"> with</font> <font color="#E5E5E5">so first we looked at ie history and as</font> I mentioned before<font color="#E5E5E5"> ie history is able to</font> show you when a file has been opened<font color="#E5E5E5"> so</font> this is an actual example I've changed the file name a<font color="#E5E5E5"> little bit here</font><font color="#CCCCCC"> and what</font> was the date<font color="#CCCCCC"> that I just mentioned</font><font color="#E5E5E5"> April</font> 2012<font color="#CCCCCC"> ok I see</font><font color="#E5E5E5"> some dates here are these</font> before or after April<font color="#E5E5E5"> 2012 put up your</font> hand<font color="#E5E5E5"> if it's</font><font color="#CCCCCC"> after yes so all right one</font> fail here let's look<font color="#E5E5E5"> at it as a</font> peer-to-peer software download folder so in the top there I've<font color="#CCCCCC"> got the the path</font> where these<font color="#CCCCCC"> knotty files were downloaded</font> <font color="#E5E5E5">and it's a pretty typical path these PDP</font> programs change the the file name to <font color="#E5E5E5">something long so it's like</font><font color="#CCCCCC"> T -</font> something something something naughty file anyways I'm looking at the dates here again and<font color="#CCCCCC"> Michael diva calendar is</font> is give me a second<font color="#E5E5E5"> here when is</font> December it is<font color="#E5E5E5"> after April after April</font> <font color="#CCCCCC">ok it's after April okay just just</font> <font color="#E5E5E5">wanted to check we need to verify</font><font color="#CCCCCC"> our</font> forensic findings<font color="#E5E5E5"> before we can publish</font> <font color="#E5E5E5">them so you know we're</font><font color="#CCCCCC"> verifying oops I</font> <font color="#E5E5E5">think</font><font color="#CCCCCC"> he'll fail</font><font color="#E5E5E5"> give me that beer</font><font color="#CCCCCC"> all</font> <font color="#CCCCCC">right so they also</font><font color="#E5E5E5"> claimed</font><font color="#CCCCCC"> that</font><font color="#E5E5E5"> he used</font> Outlook Express really<font color="#E5E5E5"> to download porn</font> Outlook Express<font color="#CCCCCC"> this is 2012</font><font color="#E5E5E5"> remember</font> folks makes<font color="#E5E5E5"> you wonder did they</font><font color="#CCCCCC"> even analyze</font> <font color="#E5E5E5">this guy's machine where they</font><font color="#CCCCCC"> coming up</font> with this stuff we saw records of p2p<font color="#CCCCCC"> not Outlook</font> Express<font color="#E5E5E5"> Outlook Express</font><font color="#CCCCCC"> all right</font><font color="#E5E5E5"> in</font> <font color="#E5E5E5">reality</font> yes Outlook Express was on the<font color="#CCCCCC"> machine</font> set up<font color="#E5E5E5"> with an account called porno</font> lover<font color="#E5E5E5"> okay it was set</font><font color="#CCCCCC"> up after Edgar</font> moved out of<font color="#E5E5E5"> the house and only headers</font> were downloaded no content so you mean by headers so a header<font color="#E5E5E5"> is if you're</font> using Outlook Express<font color="#E5E5E5"> it is just the</font> first<font color="#E5E5E5"> part of the file</font><font color="#CCCCCC"> the email it's</font> <font color="#CCCCCC">going to have the date the send</font><font color="#E5E5E5"> of the</font> receiver<font color="#CCCCCC"> maybe</font><font color="#E5E5E5"> the subject line maybe</font> the first couple words<font color="#E5E5E5"> but there was no</font> content there was no no<font color="#E5E5E5"> photos</font><font color="#CCCCCC"> in there</font> just<font color="#E5E5E5"> headers with you know</font><font color="#CCCCCC"> admittedly</font> <font color="#E5E5E5">some porno names so they also let's look</font> <font color="#CCCCCC">at</font><font color="#E5E5E5"> accusation number three they say his</font> user account had a password in the inference is the<font color="#CCCCCC"> only Edgar was able to</font> <font color="#E5E5E5">access it</font><font color="#CCCCCC"> because there</font><font color="#E5E5E5"> was a password</font> <font color="#E5E5E5">let's look at the passwords shall we</font> maybe we can zoom in a little<font color="#E5E5E5"> bit</font><font color="#CCCCCC"> on</font> this this<font color="#E5E5E5"> is actually a really cool</font> <font color="#E5E5E5">utility it's free it's</font><font color="#CCCCCC"> called LCpl let's</font> go back to<font color="#CCCCCC"> for</font><font color="#E5E5E5"> one second here</font><font color="#CCCCCC"> it's a</font> free utility<font color="#E5E5E5"> it's really great</font><font color="#CCCCCC"> for</font> looking<font color="#E5E5E5"> and seeing if there are</font> passwords you can<font color="#E5E5E5"> also use it to perform</font> an attack although<font color="#E5E5E5"> it's not very</font><font color="#CCCCCC"> good</font> <font color="#E5E5E5">all right so more facts undiscovered</font><font color="#CCCCCC"> by</font> <font color="#CCCCCC">the examiner the p2p client was used to</font> <font color="#CCCCCC">download porn that's the examiner didn't</font> find<font color="#CCCCCC"> that into a new user account called</font> porno lover<font color="#CCCCCC"> s when after he moved out of</font> the house so we<font color="#E5E5E5"> submitted our report to</font> the prosecutor<font color="#CCCCCC"> it was like a five ten</font> page report something<font color="#E5E5E5"> like that and the</font> <font color="#E5E5E5">government dropped the charges years</font> after they<font color="#CCCCCC"> charged this</font><font color="#E5E5E5"> guy they drop</font> the<font color="#E5E5E5"> charges this does not ever have</font> <font color="#CCCCCC">early this is the</font><font color="#E5E5E5"> first time I've done</font> thousands<font color="#E5E5E5"> of cases and</font><font color="#CCCCCC"> while hundreds of</font> hundreds of<font color="#CCCCCC"> cases thousands of exams I</font> don't know how many<font color="#E5E5E5"> it's never happened</font> before<font color="#CCCCCC"> and this is after the guys</font><font color="#E5E5E5"> spent</font> a huge amount<font color="#CCCCCC"> of money in legal costs so</font> to do all this<font color="#CCCCCC"> I just want to give a</font> thank you Rob Lee and<font color="#E5E5E5"> the sands anyone a</font> <font color="#CCCCCC">doe rub Lee we use super</font><font color="#E5E5E5"> timeline</font> <font color="#E5E5E5">analysis to do a lot</font><font color="#CCCCCC"> of</font><font color="#E5E5E5"> this work super</font> timeline is a really<font color="#E5E5E5"> amazing piece of</font> <font color="#CCCCCC">software that</font><font color="#E5E5E5"> will basically go through</font> <font color="#E5E5E5">the computer</font><font color="#CCCCCC"> and look at all the</font> <font color="#E5E5E5">computer-generated artifacts and put</font> everything into a nice<font color="#CCCCCC"> connell</font> chronological sequence for you so really <font color="#E5E5E5">awesome piece of software definitely</font><font color="#CCCCCC"> one</font> of<font color="#CCCCCC"> the</font><font color="#E5E5E5"> best pieces of software yeah yeah</font> so um the government interviews<font color="#E5E5E5"> Edgar's</font> friend the friend<font color="#E5E5E5"> confess us the friend</font> did<font color="#CCCCCC"> it</font><font color="#E5E5E5"> the friend was trying to get</font> jiggy<font color="#E5E5E5"> with Edgar's wife</font> and he put<font color="#E5E5E5"> the porn on the</font><font color="#CCCCCC"> computer and</font> the court clears edgers name<font color="#E5E5E5"> they give</font> them a finding of<font color="#E5E5E5"> actual innocence never</font> happens yeah well I've had<font color="#E5E5E5"> many people claim</font> innocence<font color="#E5E5E5"> and this guy</font><font color="#CCCCCC"> actually claimed</font> innocence and he really was yeah rarely happens I've been to court<font color="#E5E5E5"> a</font> <font color="#CCCCCC">couple times where there's been</font> acquittals<font color="#E5E5E5"> and we didn't go</font><font color="#CCCCCC"> to court on</font> this one fortunately<font color="#E5E5E5"> but we would have</font> so what do<font color="#E5E5E5"> we learn</font><font color="#CCCCCC"> base your</font> conclusions upon<font color="#E5E5E5"> actual evidence find</font> multiple artifacts backing up your allegations<font color="#E5E5E5"> not and I don't know where</font> the password thing came from<font color="#CCCCCC"> tie it to a</font> person not<font color="#CCCCCC"> just a machine</font><font color="#E5E5E5"> if possible</font> try to look at user activity that would <font color="#E5E5E5">tie specific events to a person so</font> remember the maximum<font color="#CCCCCC"> you can get is</font><font color="#E5E5E5"> 20</font> in any category<font color="#E5E5E5"> however I've decided to</font> <font color="#E5E5E5">break</font><font color="#CCCCCC"> the</font><font color="#E5E5E5"> rules a little bit for this</font> one so examiner ineptness he gets five bonus points<font color="#CCCCCC"> built-in right there oh</font> yeah the guy sue the city for millions <font color="#E5E5E5">of dollars and you know there might be a</font> job security<font color="#E5E5E5"> issue for somebody in this</font> case<font color="#E5E5E5"> yeah I don't think</font><font color="#CCCCCC"> that</font><font color="#E5E5E5"> examiner is</font> <font color="#CCCCCC">gonna really have a job</font><font color="#E5E5E5"> footing and 100</font> <font color="#E5E5E5">bonus points because the for the court</font> <font color="#CCCCCC">finds a suspect</font><font color="#E5E5E5"> innocent so factually</font> innocent with <font color="#CCCCCC">eyes get soon</font>
Info
Channel: HackersOnBoard
Views: 526,631
Rating: 4.4145341 out of 5
Keywords: 2013, defcon, 21, defcon21, t429, defcon 21 videos, def con 21, Forensic Fails, Forensic Science (Field Of Study)
Id: NG9Cg_vBKOg
Channel Id: undefined
Length: 47min 10sec (2830 seconds)
Published: Sat Nov 16 2013
Reddit Comments
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.