Breaking Forensics Software: Weaknesses in Critical Evidence Collection presented at BlackHatDC 2007

by Alex Stamos, Chris Palmer, Chris Ridder, Tim Newsham,

URL : https://www.blackhat.com/presentations/bh-usa-07/Palmer_Newsham_and_Stamos/Whitepaper/bh-usa-07-palmer_newsham_and_stamos-WP.pdf

Summary : Across the world law enforcement, enterprises and national security apparatus utilize a small but important set of software tools to perform data recovery and investigations. These tools are expected to perform a large range of dangerous functions, such as parsing dozens of different file systems, email databases and dense binary file formats. Although the software we tested is considered a critical part of the investigatory cycle in the criminal and civil legal worlds, our testing demonstrated important security flaws within only minutes of fault injection.
In this talk, we will present our findings from applying several software exploitation techniques to leading commercial and open-source forensics packages. We will release several new file and file system fuzzing tools that were created in support of this research, as well as demonstrate how to use the tools to create your own malicious hard drives and files.
This talk will make the following arguments:
Forensic software vendors are not paranoid enough. Vendors must operate under the assumption that their software is under concerted attack.
Vendors do not take advantage of the protections for native code that platforms provide, such as stack overflow protection, memory page protection), safe exception handling, etc.
Forensic software customers use insufficient acceptance criteria when evaluating software packages. Criteria typically address only functional correctness during evidence acquisition when no attacker is present, yet forensic investigations are adversarial.
Methods for testing the quality of forensic software are not meaningful, public, or generally adopted. Our intention is to expose the security community to the techniques and importance of testing forensics software, and to push for a greater cooperation between the customers of forensics software to raise the security standard to which such software is held.