Advertisment

Forensic Analysis with Helix

author-image
PCQ Bureau
New Update

Computer forensics is the investigation of computer media
for discovering and analyzing available, deleted, or 'hidden' information.
It seeks to find out exactly what happened on a digital system and who was
responsible for it. This is very critical in legal matters given the fact a
hacker, rather a cracker in this case, always leaves some tracks behind. Once
digital evidence has been found it can be used by law in depositions and
litigations to determine the extent and nature of the crime. There are
essentially three phases for recovering evidence from a computer system or
storage medium. In this article we peek into the role software plays in this
field by using Helix, a Live CD based distro that focuses on Incident Response
and Forensic tools. It's a modified version of Knoppix, with terrific tools
for forensics.

Advertisment
Direct
Hit!
Applies to:
Computer forensics professionals
USP:
An easy to use collection of forensic data acquisition and analysis tools
Links:
www.e-fense.com/helix 
Google keywords:
Digital Forensics

The best part about the Helix Live CD is its additional
functionality for Windows, where it runs as a standard application and collects
information from a 'live' (still turned on and logged in) Windows session.

When a system is 'live,' its state is constantly
changing but collecting information from such systems is handy  when they
cannot be turned off. Because on shutting down a hacked or compromised machine,
all the evidence available in the volatile memory, cache and sometimes in the
disks, are lost. While working with Helix, the system is not affected, which is
important because if it would install itself to the system, the original state
of the system would be altered. Therefore, some tracks of the criminal might be
lost.

Advertisment

From acquiring images to analyzing, Helix creates an md5
checksum file of every file created or imported to ensure the

integrity of the files, ie, the files are not modified by anyone. This is
crucial, as even if one bit of a file is tampered with, its md5 checksum will
change.

Helix can acquire images from live Windows as well as Linux systems, but to analyze this image, you need to boot into Helix

The Helix toolset for Windows doesn't install itself on
the system; instead, it runs directly from the CD. The distro has

applications such as FTK Imager (a physical disk image acquiring tool), Windows
Forensic Toolchest (an automated Incident Response tool) and Incident Response
Collection Report (a system report generation tool). Helix can be used as a
portable forensic environment since it provides access to many Windows-based
utilities such as Putty, File Recovery tools, VNC Server, Registry Viewer and
Asterisk Logger.

Advertisment

Using Helix 

Using Helix in Linux is easy. When Helix boots, it runs entirely off CD and
mounts the hard drives in read only mode to prevent modification. This is very
useful for an in-depth analysis of 'dead' (power off) systems. Helix has
some very good forensic tools in Linux mode. It has Adepto, AIR and Linen, which
are GUI tools to

acquire image of a system.

For Incident Response it has tools such as Ethereal and
anti-viruses like ClamAV and F-Prot.

It also comes with popular tools such as Autopsy and PyFlag
for analysis of acquired images, drives. To start Helix in Windows, you need to
first download the Helix ISO image from the its URL and burn it as a regular
bootable CD.

Advertisment

Analyzing acquired image

To start forensic analysis of a Windows based system, we first need to
acquire its image. To do so, select the Live Acquisition button. The Live
Acquisition application will appear in a new window, which is a Windows
graphical front end of 'dd'. Now, choose the source drive, ie the drive or
physical memory to be analyzed forensically.

Once the acquired image is imported into Autopsy, copies of the file can be moved to the locker folder with MD5 checksums

Next, you need to give the destination for the image file
you are about to acquire. If you want this image to be stored locally, check
Attached/Share option and in the destination field

define the path for saving the image. If you want to save the

image over the network, check the Netcat option and define destination IP as
well as the port number. Next, click on Acquire button to acquire the image.
After the image has been acquired, you need something like Autopsy or PyFlag for
analyzing. Unfortunately, for Windows, Helix doesn't have any application to
analyze the image. To do so, you need to boot a system with Helix (i.e. Linux
mode). 

Advertisment

Once the system is booted with Helix, launch Autopsy from
Helix's forensic menu in the main menu and create a New Case. Then, you will
be asked to add hosts. Click on Add Host button and a new page will appear. It
will ask you to add an image to  investigate. Here, give the location of
the image you just acquired.

Below the image-location field, you will find three radio
boxes to select between copy, move or create a link to the actual image file to
your locker directory.

This directory contains the files that Autopsy reads and
writes. It contains all the investigation details including a file called 'Autopsy.log.'

Advertisment

The best option is to copy the entire image file to the
locker directory. Finally, click on the Add Image button. Now, its time to run
tests on the case you just created. From the Case Gallery, first select the
case, host and the image on which you want to run the tests. For example, if you
want to know all the deleted files in the image, click on the File Analysis
button and then hit 'All Deleted Files' button. This will show you the names
and dates of all the deleted files. Autopsy by default generates md5 values for
all the files imported or created, which ensures integrity of the files.

Bottom line

That was a small window on Helix's functionality. Its muliplatform
functionality makes it a handy tool for security professionals to carry along.

Swapnil Arora

Advertisment

Stay connected with us through our social media channels for the latest updates and news!

Follow us: