+ All Categories
Home > Documents > Document Life Cycle Management John Mallery Managing Consultant BKD, LLP [email protected].

Document Life Cycle Management John Mallery Managing Consultant BKD, LLP [email protected].

Date post: 19-Dec-2015
Category:
Upload: alban-fox
View: 217 times
Download: 1 times
Share this document with a friend
Popular Tags:
70
Document Life Cycle Management John Mallery Managing Consultant BKD, LLP [email protected]
Transcript
Page 1: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Document Life Cycle Management

John MalleryManaging Consultant

BKD, [email protected]

Page 2: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Agenda

• Discuss how widely disseminated data can be

• It is now to the point where it is difficult to control

IMPOSSIBLE

• Address mechanisms that exist to control document “behavior”• Not finding copies of documents when you need them

Page 3: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

PDA’s

HomeUsers

Cell Phones

Business Partnerships

Road Warriors

Page 4: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Online storage sites

• Files Anywhere - http://www.filesanywhere.com/• BestSharing - http://www.bestsharing.com• BigUpload – http://www.bigupload.com• bigVault – http://www.bigvault.com• biscu.com – http://www.biscu.com• DropSend – http://www.dropsend.com• ecPocket.com – http://www.ecpocket.com• Elephant Drive – http://www.elephantdrive.com• MyFileHut – http://www.myfilehut.com• Putfwd.com – http://www.putfwd.com• Savefile – http://www.savefile.com• Xdrive – http://www.xdrive.com• Global Data Vault – http://www.globaldatavault.com• Online Storage Solutions – http://www.onlinestoragesolution.com• Box.net – http://www.box.net

Page 5: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

GSpace

Firefox Plugin

Page 6: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

GSpace

Page 7: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

USB Mass Storage Devices

Page 8: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

What will they think of next?

USB Mass Storage Devices

Page 9: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

USB Mass Storage Devices

Page 10: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Amazing!

What about human fingernail?

Page 11: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Too Cool!

Page 12: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Privacy software for USB Devices

• PI Protector Mobility Suite http://www.imaginelan.com/winboot/Internet Explorer, Outlook and File Sync – all files stored on USB drive

• Migo USB Deviceshttp://www.4migo.com

Page 13: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

U3 USB

• Allows any application to run on a USB device.

• USB devices now “parasites” on host computers

Page 14: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

USB SyncBox

Can transfer data between USB devices without a computer.

Page 15: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Preventing USB Data Transfers

• Fill USB Ports with Epoxy• Modify BIOS• Create Group Policy Object removing

permissions to usbstor.dll for all except System and possibly Admins. Still allows use of non-storage related USB devices

• Modify registry to make USB devices read only (see next slide)

Page 16: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Thanks to Mark Minasi

• “It's a simple Registry change.  First, create a whole new key: HKLM\System\CurrentControlSet\Control \ StorageDevicePolicies.  Then create a REG_DWORD entry in it called WriteProtect.  Set it to 1 and you'll be able to read from USB drives but not write to them.”

• XP – SP2• www.minasi.com

Page 17: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

USB Hacksaw

“The USB Hacksaw is an evolution of the popular USB Switchblade that uses a modified version of USBDumper, Blat, Stunnel, and Gmail to automatically infect Windows PCs with a payload that will retrieve documents from USB drives plugged into the target machine and securely transmit them to an email account.”

From http://www.hak5.org/wiki/USB_Hacksaw

Page 18: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Don’t forget paper…

3 Accused In Theft Of Coke SecretsInformation Offered To Pepsi, FBI Says

“A company surveillance camera caught Coca-Cola employee Joya Williams at her desk looking through files and "stuffing documents into bags," Nahmias and FBI officials said. Then in June, an undercover FBI agent met at the Atlanta airport with another of the defendants, handing him $30,000 in a yellow Girl Scout Cookie box in exchange for an Armani bag containing confidential Coca-Cola documents and a sample of a product the company was developing, officials said.”

Washingtonpost.comKathleen DayJuly 6, 2006 http://tinyurl.com/ppwh6

Page 19: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Regaining Control

End User and Enterprise Tools

Page 20: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Enterprise P.D.S.D. Control

• Device Wall - www.devicewall.com• DeviceLock: http://www.protect-me.com/dl/

• Sanctuary Device Control: http://www.securewave.com/sanctuary_DC.jsp

Page 21: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Old Ways

• File Rights Management• Essentially controlling who has access to

which documents• Helpful if properly implemented• Still not implemented properly• Easier to allow everyone access to

everything• Still Exists!

Page 22: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Document Life Cycle Management – End User Tools

• Tools like Net-It Now and Adobe Acrobat provide the ability to add some control

• These tools require users to determine what rights to apply

Page 23: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Net-It Now

“Net-It® Now is a free print driver that renders your files to CSF (content secure format), a compressed encrypted format thatallows you to add Visual Rights™, including password protection, an expiration date, and feature restrictions, to your files(settings). Files are viewable with the free Brava! Reader (views TIFF, PDF and CSF files)”.

http://www.net-it.com/nin.htm

Page 24: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Example

View file in Hex Editor

Page 25: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Adobe Acrobat

Page 26: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Document Lifecycle Management – Enterprise Tools

• Microsoft Office IRM – Information Rights Management

• Liquid Machines• Authentica• Adobe Life Cycle Policy Server

Page 27: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Microsoft IRM

• Information Rights Management• Available for Microsoft Office 2003• Requires the following

– Microsoft Windows Rights Management Services for Windows Server 2003 (http://www.microsoft.com/rms)

– Active Directory– IIS– Database such as MS SQL– Office 2003 Professional

Page 28: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Office IRM

Allow users with earlier versions of Office to read with browsers supporting Information Rights Management. (Increases file size)

Page 29: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Liquid Machines

“Liquid Machines Document Control™ uses its patented Policy Droplet™ control to provide an intuitive, consistent user interface across more than 65 applications and file formats, including Microsoft Office, Visio, Sharepoint® and Adobe Acrobat, to persistently control access to and usage of electronic information throughout its lifecycle.”

Page 30: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Authentica

• Provides complete after-delivery protection and control; prevents sensitive documents from being forwarded

• Lets content owners define access privileges (copy/paste, print) and expire access to documents at any time

• Lets content owners insert a custom watermark into a document to deter authorized viewers from printing and distributing the document

From http://www.authentica.com/products/securedocs.aspx

Page 31: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Authentica

• Provides a detailed audit trail so that organizations can actively track document activity (what pages were viewed, by whom, when, from where, for how long, and whether they were printed)

• Leverages a company's existing authentication systems and LDAP user directories for creating document policies, thereby reducing administrator involvement

Page 32: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Investigating Theft of Documents

Privacy vs. Investigations

(Anti-forensics)

Page 33: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Privacy Concerns

• Plastic Surgeon story• “Deleted Files” being used in litigation• Increased awareness of computer

forensics capabilities

Page 34: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Agenda

• Configuration settings – methods used to cover tracks using “supplied” tools and configuration settings

• Third party tools – wiping, properties changers, registry cleaners, steganography/encryption, etc.

• Tools and methods designed specifically to fool computer forensics programs.

Page 35: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Simple

• “Shift+Delete” to bypass Recycle Bin

• Recycle Bin – configured to delete immediately

• defrag

Page 36: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

OS/Application Supplied

Empty Temporary Internet Files folder when browser

is closed.

Page 37: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

OS/Application Supplied

Shutdown: Clear virtual memory pagefile Enabled

XP- Control Panel | Administrative Tools | Local Security Policy | Local Policies | Security Options | Shutdown: Clear virtual memory Page File | Select Enabled

Page 38: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Clear Page File

Configured? Check following registry key:

Hive: HKEY_LOCAL_MACHINE\SYSTEM

Key: CurrentControlSet\Control\Session Manager\Memory Management

Name: ClearPageFileAtShutdown

Type: REG_DWORD

Value: 1

Slows down shutdown process

Page 39: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

OS/Application Supplied

CIPHER - “Displays or alters the encryption of directories[files] on NTFS partitions”

CIPHER /W:directory

(XP)

Page 40: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

OS/Application Supplied

Disk Cleanup

Page 41: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

OS/Application Supplied

• Word (Excel)– Hidden font– White on White– Small font

• Plug ins– Remove hidden data tool– Redaction tool– Payne scrambling tool

Page 42: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Hidden Font

Hidden font

Page 43: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Redaction tool

http://tinyurl.com/dgokp(Word 2003)

“OverviewRedaction is the careful editing of a document to remove confidential information.

The Microsoft Office Word 2003 Redaction Add-in makes it easy for you to mark sections of a document for redaction. You can then redact the document so that the sections you specified are blacked out. You can either print the redacted document or use it electronically. In the redacted version of the document, the redacted text is replaced with a black bar and cannot be converted back to text or retrieved.”

Page 44: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Remove Hidden Data(metadata)

http://tinyurl.com/5bams

Page 45: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Scramble Assistant

http://www.payneconsulting.com/products/scramword_free/

For Word&

Excel

Page 46: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Advantages of OS Supplied Tools

• Appear less “nefarious” than commercial tools (Evidence Eliminator).

• Free

Page 47: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Third Party Tools

Fun for the Whole Family

Page 48: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Registry Cleaner

Page 49: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Merge Streams/Glue

• Hides Excel file within a Word Document (vice versa)• .doc – see Word file• .xls – see Excel file• Won’t fool forensics examiner – may confuse them• Word – “Recover Text from any file”

Page 50: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Merge Streams/Glue

Page 51: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Merge Streams/Glue

• Demo• http://www.ntkernel.com/w&p.php?id=23

Page 52: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

File Properties Changer

www.segobit.com

Page 53: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Wiping Tools

• Gazillions of them• Eraser (comes with DBAN)• Sdelete – www.sysinternals.com• Evidence Eliminator • BC Wipe• Cyberscrub• Etc.• Do they perform as promised? PGP does it

really wipe slack space?• Are they used frequently?

Page 54: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Removing Residual Data

• Tools exist to remove residual data

• But do not use them in response to litigation

• See - Kucala Enterprises, Ltd. v. Auto Wax Co., Inc., 2003 WL 21230605 (N.D.Ill.), May 27, 2003 - "Any reasonable person can deduce, if not from the name of the product itself, then by reading the website, that Evidence Eliminator is a product used to circumvent discovery.”

• Anderson v. Crossroads Capital Partners

Page 55: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

SoftwareHKEY_CURRENT_USER\Software\

[Manufacturer Name]\[Tool]

Page 56: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Encryption

• Cryptext – free and easy to use, a shell extension (http://tinyurl.com/do2qs )

• EFS• OTFE – Encrypted partitions

www.truecrypt.org• USB Thumb Drives – new ones include

encrypted partitions • Encrypted file stored on an encrypted partition…

• Locknote - http://locknote.steganos.com/

Page 57: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Steganography

• Includes encryption• Free tools• Complex method of hiding data• But easy to do…• Can you detect it?• “Duplicate Colors?”• Wetstone Technologies• stegdetect

Page 58: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

stools

DEMO

Page 59: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Metasploit Project

• Timestomp – modifies MAC times so EnCase can’t read them.

http://www.metasploit.com/projects/antiforensics/

Page 60: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Timestomp

Page 61: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Timestomp

Page 62: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Timestomp

Page 63: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Good News/Bad News

• First the Bad News• Using a combination of these tools on a

regular basis can defeat a computer forensics examination

• Now the Good News• Very few users know about “all” of these

tools and methods• Not all tools perform as promised

Page 64: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Last thoughts

• Determining whether these tools have been used can be just as important as finding evidence.

• Finding these tools can counter the “I’m not sophisticated enough” argument.

• Found in illegal movie and music distribution cases.

Page 65: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

MAC OS X – the shape of things to come

FileVault – Encrypted Home Folder

Secure Virtual Memory

Page 66: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

MAC OSX – the shape of things to come

Page 67: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Mac OS X - Safari

Page 68: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

IE7

Page 69: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

Questions/Comments

John MalleryManaging Consultant

BKD, LLP816 221-6300

[email protected]

Page 70: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com.

http://www.eweek.com/article2/0,1895,1830962,00.asp


Recommended