13.09.2016 Views

BATTLEFIELD DIGITAL FORENSICS

BDF_Battlefield_Digital_Forensics_final

BDF_Battlefield_Digital_Forensics_final

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Another technique is to create a huge amount of wireless networks that are not actually used for anything<br />

important. Handheld devices (even smartphones) can be used to detect wireless networks using Wi-Fi and<br />

Bluetooth; however some specific wireless networks will require more sophisticated tools. The same<br />

obfuscation could be accomplished by connecting a large amount of network cables between unused devices<br />

that are just powered on (and thus their LEDs are blinking). Manually analysing such a setup to discover the real<br />

machines would take too much time.<br />

Figure 10. Examples of messy cable management setups from server rooms 22 .<br />

<br />

Recommendation: Be aware that not all discovered wireless networks and not all blinking and wired<br />

devices are necessarily used for anything real (scan and identify).<br />

It may not be wise to collect all switches and routers from the target site, but concentrate on more important<br />

evidence. However, it is possible to insert small computers inside empty cases, or develop specific cases for<br />

them. This could be implemented, for example, with PiZero Cluster with Raspberry Pi Zeros. PiZero Cluster and<br />

an example design of switch case for it are presented in Figure 11.<br />

Figure 11. a) PiZero Cluster and b) an example design of the case for it 23 .<br />

Comparing a real switch rack case to a switch case that actually contains something else is challenging without<br />

opening it. There might not be enough time to open every rack case, especially if the target site includes any<br />

server rooms. Even if such anti-forensics techniques were discovered during the special operation, removing<br />

devices from server racks and carrying them might not always be possible. As also mentioned in paragraph 6.3<br />

‘Assessing Gatherable Intelligence’, preservation techniques presented in Chapter 9 – ‘Sustaining the Data’<br />

might be handy when servers are present.<br />

22 Figures from http://www.itrw.net/michigan_it_provider/server_room_spaghetti, Imgur https://i.imgur.com/fF4d9xB.jpg and from<br />

http://www.fs.com/blog/cable-spaghetti-server-room-cabling-nightmare.html.<br />

23 Figures from Twitter: https://twitter.com/9_ties/status/689707306494271488.<br />

35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!