Amazon Fulfillment

Author: Darren Freestone Linked-In
Date: 2021-09-25

Available at Amazon

Exciting news!

The Computer Forensic Examiner Quick Reference Guide v2.3 is now available for purchase, direct from Amazon.
https://lnkd.in/gNnsAQ4C

Lock and Code Pty Ltd aspires to put a quick reference guide in the hands of every student and practitioner of digital forensics in the world and leveraging the Amazon worldwide distribution network aligns well with this ambition.

We are confident our customers will be pleased with faster delivery times and reduced shipping costs.

Grab your copy today, while stocks last.


What are the implications of the SHA1 collision on digital forensics?

Author: Darren Freestone  Linked-In
Date: 2017-03-01
 
On 23 February 2017, the first SHA1 collision was announced.  
 
 
There has been much discussion across many industries as to the impact of this discovery.  In digital forensics specifically, the big questions include:
  • Can a SHA1 hash still be used for forensic image verification?
  • Can a SHA1 hash still be used for hash-set comparisons eg. NSRL ?
  • If the answer is ‘yes’ to the above, can an expert witness successfully explain the implications of the collision on the evidence they are presenting, if any? 
Not a lot of information has been released so far regarding the exact nature of the weakness.  More information will be realised in May 2017.  The information we have to go on far can be found in the above article and the site below:
 
 
Specifically the paper located below:
 
 
The three questions above cannot be answered until we can understand exactly what has been achieved and how.  The most notable information in the paper is in Table 1 which contains the colliding message blocks which have been discovered and in Table 2 which contains the “prefix” used.

Table 1Table 2
Let’s walk through these table and explain what they mean, in layman’s terms. 

Looking firstly at Table 2, we have 192 (0xC0) bytes referred to as a “prefix”.  The researchers presumably knew that once a collision was found they would want to use a PDF with an embedded JPEG to encapsulate the differing bytes.  These bytes represent a PDF file’s header starting at offset 0 (0x00) with the familiar header of “%PDF-1.3…” followed by the start of an embedded JPEG, found at offset 149 (0x95) with the also familiar header of 0xFF 0xD8 0xFF 0xE0.  Something that isn’t typically common to a JPEG file is a comment in the header, but this JPEG has the comment as follows “SHA-1 is dead!!!!!?/?.#9u?9???<L??”.  It is likely the comment has been added to pad out the JPEG file and indeed the PDF file to the length of 192 (0xC0) bytes for reasons discussed below.
 
Next, looking at Table 1, we have the specifics of the collision which has been discovered.  Starting with the first line, identified by CV0 we have a value of “4e a9 62 69 7c 87 6e 26 74 d1 07 f0 fe c6 79 84 14 f5 bf 45”.  In layman’s terms, a SHA1 has an internal 20 byte (160 bit) “number” at all times which is altered every time a new byte (or bit) of data is passed into it.  SHA1 starts off with an initial number value of “67 45 23 01 ef cd ab 89 98 ba dc fe 10 32 54 76 c3 d2 e1 f0”.  After the 192 (0xC0) bytes of the “prefix” (Table 2) have been passed into the SHA1 algorithm it’s internal number is equal to “4e a9 62 69 7c 87 6e 26 74 d1 07 f0 fe c6 79 84 14 f5 bf 45”. 
 
So far so good.  Next section moving down, M1(1), shows a block of 64 (0x40) bytes.  After these bytes have been passed in the internal number has changed to “8d 64 d6 17 ff ed 53 52 eb c8 59 15 5e c7 eb 34 f3 8a 5a 7b”.  Next, M2(1), another block of 64 (0x40) bytes is passed in and the internal number changes to “1e ac b2 5e d5 97 0d 10 f1 73 69 63 57 71 bc 3a 17 b4 8a c5”.  This is the end of the first half of the Table 1 diagram.
 
In the second half of the diagram the same steps are happening.  The starting value is the same as it was in the previous example “4e a9 62 69 7c 87 6e 26 74 d1 07 f0 fe c6 79 84 14 f5 bf 45” (which represents the “prefix” bytes having been added to the SHA1) and this time two partially different M blocks are being passed in.  M1(2) and M2(2) differ from M1(1) and M2(1) as indicated by the red and blue coloured bytes.  The black bytes are unchanged.  After the M1(2) block is passed in the internal number value changes to one similar but different to before but after the M2(2) is passed in the internal number value changes to match precisely the value from the corresponding step in the previous example, as denoted by CV2.
 
What does this all mean?  
 
It means that the researchers have taken a “prefix” (Table 2 – the PDF header with embedded JPEG) which they wanted to work with, 192 (0xC0) bytes long, and used it in their calculations to discover two differing groups of bytes, 128 (0x80) bytes in length (2 x 64 bytes) which when appended to the common “prefix” will result in the same internal number value in the SHA1 hash algorithm.
 
                           [set 1 of 128 bytes]
[Prefix]      +                 or                         +      [Suffix]     =     [SHA1 Value]
                           [set 2 of 128 bytes]
 
– The prefix is fixed to arrive at a known internal number value inside the SHA1 hash
– The suffix can be anything at all, long or short, any values, no restrictions
 
Whilst the researches could have started with something far less useful than a PDF with embedded JPEG file, they didn’t, because now this collision can be used to do something really cool.  Due to their good understanding of both the PDF and JPEG file formats they were able to ensure that the first differing byte in Table 1 occurs inside the JPEG at the exact location which governs the background colour of the top half of the image.  The two byte values I’m referring to are 0x7F and 0x73, respectively.  At that precise location in that embedded JPEG, the value of 0x7F gives the image a red background whereas a value of 0x73 gives the image a blue background.  All remaining bytes, 61 in total across both blocks, which differ, serve to “correct” the change made in the first byte so that the algorithm will still provide the same hash value.  Due to where these bytes are placed in the header of the JPEG, it does not result in corruption or other visible defects in the image.  Again, this is due to a very good understanding of the JPEG file format and how to position data within and manipulate offsets within.
 
Another point worth noting is the comment of “SHA-1 is dead!!!!!?/?.#9u?9???<L??”.  Clearly they wanted to let us know that SHA-1 is dead.  The characters that follow the exclamation points however appear random and were likely generated to contribute to a “prefix” block which would result in a collision.  Or put another way, a comment of “SHA-1 is dead!!!!!                ” likely did not result in a successful collision. 
 
For what it’s worth, all changes that occur between the two PDF files, occur within the first few hundred bytes of the embedded JPEG file.  The PDF files with the embedded JPEG files removed, are identical.  The two PDF files generate the same SHA1 hash.  The two JPEG files (when extracted out of the PDFs) do not generate the same SHA1 hash.  Copies of the PDF files and JPEG files are attached for reference.  The JPEG files are 1024×740 pixels in size.  There is no other visible content in the PDF files other than the embedded JPEG file.
 
Revisiting the questions raised above.
  1. Can SHA1 still be used for forensic image verification?  
    In my opinion, yes it can, with some caveats.  And I reserve the right to change my opinion when more information is released in May.  In digital forensics, we use a SHA1 hash and also an MD5 hash to validate that a bitstream captured on day 0 matches when validated on day 500 after being copied, backed up, restored and/or presented as evidence in court.  It protects against accidental corruption.  Can it protect against the malicious corruption of a forensic image?  Probably, but that’s another question.
  2. Can a SHA1 hash still be used for hash-set comparisons eg. NSRL ?
    In my opinion, yes it can, again with some caveats.  In digital forensics we use a SHA1 hash and also an MD5 hash to create hash-sets or hash-databases with the values of known good or known bad files, primarily image files but also executables and other files.  However, in digital forensics we are generally not depending on these hash values 100%.  We use them to narrow down the workload and sort the known from the unknown.  We would never run to court with a hash value alone, without first having a look at the file itself, whether that be an image or an executable or something else.
  3. Can an expert witness successfully explain the implications of the collision on the evidence they are presenting, if any?
    That depends entirely on the expert and their knowledge level.  Now that the SHA1 collision is in the news it will be seen as an easy way to cast some doubt on pending legal proceedings.  After reading the paper produced from this research and conducting my own testing I am confident I can explain the collision and it’s implications as an expert witness.  But many will not do their own testing, they simply don’t have the time, and they should be careful not to state anything they cannot backup with fact and/or testing. 
 With those questions answered, new questions are now raised, which could easily be asked of an expert witness:
  1. Is it possible to alter an existing forensic image with known SHA1 hash value in such a way it will still return the same SHA1 value?  
    Anything is possible, but based on this research, no.  Control over both copies would be required and in this scenario one copy is already fixed with a known SHA1.
  2. Is it possible to create/generate two differing forensic images with matching SHA1 hash values?
    Similar question but importantly different.  It would in my opinion, be possible, yes.  Using the technique in this research.  The prefix block would be the start of the MBR of a disk image.  It would be used (along with the required CPU/GPU power) to calculate a collision and the two differing blocks which could then be used to obtain a matching hash.  Those blocks could be laid down immediately following the prefix and falling within the largely unused “boot code” area of the MBR.  The rest of the disk image could follow and function as normal.  Why is this important?  Because if asked on the witness stand if two seemingly identical yet different forensic images could have the same SHA1 hash value, the answer is almost certainly yes.  I feel many of my colleagues might be quick to say no.  The opposing council could then produce a copy of two distinct forensic images with matching SHA1 values and ruin your day.
  3. For questions 1 and 2 above, replace “forensic image” with “executable file” and the same answers apply.  It would be near impossible based on this research to alter a known whitelisted (SHA1) executable to become malicious and have the hash value match.  It would be possible to create two new executables, #1 being benign and #2 being malicious with the same hash values and then obtain a SHA1 whitelisting for #1 and have #2 slide through undetected.  The differences between #1 and #2 would have to be very minor, the executable would have to be constructed in such a way to allow malicious code to run with the flip of a bit or two and constructed so that the “correction” bytes don’t result in corruption of the file itself.  There could be other reasons I cannot foresee why this isn’t possible (perhaps why the researches chose a PDF instead of an executable) but technically it should be possible.

Conclusion

This research is clearly amazing work by those involved.  If anything, it shows just how secure SHA1 has been and is today by how difficult it has been to generate a practical collision.  Will SHA1 now be depreciated across the security industry?  Absolutely.  Is that justified?  Absolutely.  Does SHA1 need to be depreciated from the digital forensics industry for forensic image verification and for hash-set creation/matching?  No.  Does it make sense to transition to alternative more secure hash algorithms in digital forensics?  Of course.  But not overnight in a knee-jerk reaction.  Rather, in due course when the opportunity presents. 
 
My advice to digital forensic examiners is to read the research, read the opinions of your peers and do some testing for yourself before forming a strong opinion on the implications of this research.  Personally, I sit somewhere in the middle between “The sky is falling” and “Hold my drink, I’ve got this”.
 

shattered-1.pdf (412.5 KiB)

shattered-2.pdf (412.5 KiB)

shattered-1.jpg (411.5 KiB)

shattered-2.jpg (411.5 KiB)

 

Attention Parents – MILES the Talking Timer

MILES the Talking TimerIntroducing MILES the Talking Timer!

MILES the Talking Timer is an iOS App designed to assist parents and carers to motivate their children. To use MILES, the parent (or child) sets a timer for a task eg. 15 minutes. MILES will slowly, audibly, count down from 10 over the course of 15 minutes. Set different timer durations for different tasks.  MILES has different voices and speaks different languages.   The children are gently reminded by MILES throughout the timer duration to stay on task by his steady counting.  The app utilises the well established “Beat the Buzzer” method to motivate the children. Read more about the science of Beat the Buzzer on the Raising Children website.Something a little different from Lock and Code.

Use MILES with one child or with 20.   Create profiles for each child and add their photograph.  Create a different preset timer for each activity your children struggle with.  Rewards (stars) are issued to the children who finish before time runs out.  Treat your children with real life rewards after reaching reward milestones with MILES.  eg. 20 stars equals 20 minutes extra play time.

If your children does everything they are told in a timely manner then we take our hats off to you!  For everyone else, there’s MILES.

Available on the App Store

 

 

 

 

 

 

Software Update – Registry Browser v3.11a

Windows Registry Forensics - Registry Browser v3Registry Browser has been used throughout the law enforcement (LE) community to forensically examine the Windows Registry for over a decade.  Until now, Registry Browser has been licensed exclusively for use by LE.

Lock and Code is proud to announce that coinciding with the release of Registry Browser v3.11a, the usage license for Registry Browser has now been expanded beyond the LE community and is now available to all.  It is our hope that the broader digital evidence community will benefit from the addition of Registry Browser to their software toolbox.  Lock and Code will now also be supporting and hosting Registry Browser.

Apart from the license, there are other changes to note.

  1. AppCompatCache viewer module.  Useful in Malware examinations, the AppCompatCache registry key stores a list of exe files and how they should be executed eg. as administrator, emulating Windows XP, etc.
  2. Improved Windows 7 support and Windows 8 support.
  3. Bookmarking MRU feature.  Quickly jump to keys you visit frequently.
  4. Reporting of keys from multiple control sets.
  5. Automatic reporting of Wow3264 keys.

Visit the Registry Browser Home Page for further information, installers, screenshots and additional resources.  Be sure to join the mailing list if you wish to be notified of updates.

The latest version v3.11a is available below.

Registry Browser v3.11a
Registry Browser v3.11a

RegistryBrowser_x86_v3-11a.exe
Version: 3.11a

2.7 MiB
15981 Downloads
Details

 

 

 

 

Surface RT Acquisition – Instructions & Software

Surface-RT-with-cyan-coverAs of one month ago and to the best of our knowledge, there was no documented process for acquiring a forensic image of a Microsoft Surface RT device. The reason for this is there are two major challenges inhibiting standard acquisition techniques. #1 is the fact that in order for binaries to execute on the Surface RT they need to be signed by Microsoft and #2 is the Surface RT contains an ARM processor and therefore all binaries must be compiled specifically for the ARM.

Fortunately a “Jail Break” has been release for Surface RT devices which can enable unsigned code to execute on the Surface RT.

And now, Lock and Code have released a basic set of binaries and batch files to assist with acquiring the Surface RT. The “acquisition_tools” zip file along with a paper titled “Acquisition of Microsoft Surface RT” are available for download below. These resources along with the Jail Break and a suitably sized USB device are all you need to create a forensic image (E01) of the Surface RT.

 

 

Acquisition Tools v1.00
Acquisition Tools v1.00

acquisition_tools.zip
Version: 1.00

1.4 MiB
2426 Downloads
Details
Acquisition of Windows RT
Acquisition of Windows RT

LockCode_Acquisition_of_Microsoft_Surface_RT.pdf
Version: 1.01

974.4 KiB
7693 Downloads
Details

 

Quick Reference Guide – iOS App 2.0

The Computer Forensic Examiner Quick Reference Guide iOS App was first released in mid 2011.  Lock and Code have been overwhelmed by the popularity of the iOS app and we thank the community for it’s support of this project.  So far, the app has been downloaded from the App Store in 85 countries.

The app has undergone several changes of late to improve it’s page rendering, user interface and to maintain compatibility with the latest and greatest iOS devices such as the iPhone4S and the third generation iPad.

Perhaps the biggest change however, is the ability to upgrade the app’s reference content to match the latest CF Quick Reference Guide Revision 2.0 booklet.  Read all about the CF Quick Reference Guide Revision 2.0 updated content.  The upgrade is available as an In-App Purchase and costs only US$1.99.  All proceeds go towards building better digital forensics resources.

In response to customer feedback, the app now has an option to temporarily disable the auto-lock feature on iPhone and iPad devices.  Users can now dock or rest the device and easily reference it’s contents without the constant need to swipe-to-unlock.  Lock and Code welcomes any suggestions for improvement or additional content via the In-App contact feature.  We’ll endeavour to incorporate suggestions from the community into the next update.

Visit the iTunes App store today and download your free copy.  Existing users, please take the time to leave a review via the app’s review feature or share a link to this page via Facebook, Twitter or Google Plus.

Quick Reference Guide – Revision 2.0

Lock and Code is proud to announce the release of the Computer Forensic Examiner Quick Reference Guide Revision 2.0.

Special thanks goes to contributing author Terry Olson of Nebraska State Patrol.  Terry has contributed many, many hours of research, testing and development over the past 12 months to take this product to the next level.  Thank you Terry.

The CF Quick Reference Guide is a high quality, pocket sized (C6), ring bound booklet with laminated pages.  The content consists primarily of charts showing the breakdown of various data structures which are commonly referenced by Computer Forensics specialists.

The CF Quick Reference Guide Revision 1.0 was first released in April 2011 and was distributed to staff and students at IACIS training events during 2011 and has been available for sale at lockandcode.com since July 2011.  The CF Quick Reference Guide Revision 2.0 made it’s debut at the IACIS Orlando training event in April 2012 and will also be distributed to IACIS staff and students in 2012.   Lock and Code would like to thank IACIS for it’s continued support of the CF Quick Reference Guide.

 

CF Quick Reference Guide Revision 2.0 includes:

  • Partition Schemes
    • Master Boot Record (MBR)
    • GUID Partition Tables (GPT)
  • NTFS
    • Volume Boot Sector
    • Metafiles
    • FILE record
    • Attribute Types
      • Standard Information Attribute
      • File Name Attribute
      • Data Attribute
      • Index Root
      • Index Allocation
    • INDX Record
    • Index Node
  • FAT
    • FAT12/16 Volume Boot Record
    • FAT32 Volume Boot Record
    • FAT Directory Entries
    • exFAT Volume Boot Record
    • exFAT Records
  • HFS+
    • Volume Header
    • Catalog File/Folder Record
  • EXT2/3/4
    • Super Block
    • Inode
  • Windows Registry
    • Hive Locations
    • Hive Structures
    • Key Record
    • Value Record
  • Internet Explorer (INDEX.DAT)
    • File Locations
    • Header
    • URL Record
  • Recycle Bins
    • INFO2 Format
    • $I/$R Format
  • Event Logs (.evt)
    • Header Record
    • EOF Record
    • Event Record
  • Prefetch
    • Header and layout
  • File Signatures
  • ASCII Chart
  • IACIS Evidence Seizure Triage Flowchart

Availability:

A sample of the booklet content is available for preview: CF Quick Reference Guide 2.0 Sample

The retail price per CF Quick Reference Guide booklet is AUD$24 excluding GST + shipping (Goods and Services Tax does not apply to customers outside of Australia).

CF Quick Reference Guide purchases can be made from the products page: Lock and Code – Products.

Bulk order pricing and custom branding of the CF Quick Reference Guide is available for conferences and training events.  Please direct inquiries to quickref@lockandcode.com.

 

Quick Reference Guide – Available Online

Lock and Code is proud to announce that printed copies of the CF Quick Reference Guide, Revision 1.1, are now available from this page.  A sample of the booklet content is available for viewing here: CF Quick Reference Guide Booklet Sample (pdf format)

The price per booklet is US$15.00 (inc. taxes) plus a shipping and handling fee of $5.00.

There are two buttons below to facilitate purchasing.  The first is for Australian based customers and the second is for the rest of the world.  Australian based orders will be processed in Australian dollars and the subsequent invoice will include the Australian Goods and Services Tax (GST) component of 10%.  Please note that customers with an Australian shipping address must select the Australian based customer option.  All other customers must select the Non-Australian customer option.

The payment options include Paypal and Credit Card.

 

CF Quick Reference Guide – Revision 1.1 – Printed bookletPlease select the appropriate option below:
Australian Based Orders

  • Orders will be processed in AUD
  • Orders will include GST
  • Orders will only be shipped to an Australian postal address
Non-Australian Based Orders

  • Orders will be processed in US dollars
  • Orders will be shipped to an address outside of Australia

 

After selecting one of the above buttons, customers will be redirected to the PayPal web site to facilitate payment.

Bulk orders of quantities exceeding 25 books should be made by completing the Bulk Order form and NOT by using the buttons above as bulk pricing and/or bulk shipping may apply.

The response to both the booklet and the iOS application has far exceeded expectation.  Lock and Code thanks the community for it’s support.

 

Quick Reference Guide – iOS App

After the success of the Computer Forensic Examiner Quick Reference Guide in booklet format, Lock and Code has now made the same content available in an electronic format as a FREE iOS App in the iTunes App store.  So for those out there with an iPad, iPhone or even iTouch, you can now quickly reference your favourite file system charts, file locations and more, anytime, anywhere.

Of course if you still prefer the tactile sensation of flipping through the pages the old fashion way or sliding the booklet into the back pocket of your jeans – copies of the printed booklets are available for purchase right here: Booklet Purchase.

Visit the iTunes App store today and download your FREE copy.

Quick Reference Guide – Booklet

Students attending IACIS Training Events this year will all receive a printed copy of the “Lock and Code” Forensic Computer Examiner Quick Reference Guide (Revision 1.0).  This guide has been developed by Lock and Code in consultation with IACIS and will provide the students with a compact, handy and easy to use reference guide which will prove invaluable during classroom training exercises and outside the classroom when completing the CFCE process.

The guide (as above pictured) is C6 paper size, portrait and spiral bound on the short edge.  The individual pages are laminated for durability.  Content wise, It contains 12 pages of NTFS content including a breakdown of commonly encountered  $MFT attributes.  There are four pages dedicated to FAT including short and long filename breakdowns.  An ASCII table complete with conversions to Decimal, Hexadecimal, Octal and Binary has been included.  There are also file location guides for the Windows Registry and Internet Explorer which visually represent exactly where the many, many hive files and index.dat files reside on a Windows system.  Finally, the back page has the IACIS first responder guide for handling electronic evidence.

Revision 2.0 is already in the planning stage so please forward any suggestions for additional content to quickref@lockandcode.com.

Printed copies are available for purchase through this web site right now: Booklet Purchase.

Computer Forensic Examiner
Quick Reference Guide Version 1.1
Sample

Software Packages

Registry Browser v3

 

Training Packages

Coming soon…