Mata Kuliah: Digital Forensic for Military Purposes | 3 SKS
Setelah pertemuan ini, mahasiswa mampu:
Mengubah paradigma penyimpanan data secara fundamental — bukti digital tidak lagi tersimpan di lokasi fisik yang dapat dikontrol langsung.
| Aspek | Tradisional | Cloud |
|---|---|---|
| Lokasi Data | Server lokal, on-premise | Data center tersebar global |
| Kontrol Fisik | Penuh oleh organisasi | Bergantung pada provider |
| Skalabilitas | Terbatas kapasitas fisik | Elastis dan on-demand |
| Forensik | Akses langsung ke hardware | Perlu kerjasama provider |
| Model | Kontrol User | Artefak Forensik | Tantangan |
|---|---|---|---|
| IaaS | OS, aplikasi, data | VM image, memory, OS logs | Akses hypervisor |
| PaaS | Aplikasi, data | App logs, database | Akses terbatas ke OS |
| SaaS | Data saja | Activity logs, export data | Bergantung provider |
⚠️ Semakin tinggi abstraksi → semakin terbatas kemampuan forensik
🎖️ Konteks militer: Private/Community Cloud → menjaga kedaulatan data pertahanan
Teknis, Hukum, dan Operasional
🔑 Strategi: Verifikasi tenant ID pada setiap artefak, cross-reference timestamps
Dropbox, Google Drive, OneDrive
| Artefak | Lokasi |
|---|---|
| Database konfigurasi | %APPDATA%\Dropbox\instance1\config.dbx |
| Sync history | %APPDATA%\Dropbox\instance1\sync_history.db |
| File cache DB | %APPDATA%\Dropbox\instance1\filecache.db |
| Deleted file cache | %USERPROFILE%\Dropbox\.dropbox.cache\ |
| Cache files | %LOCALAPPDATA%\Dropbox\ |
Database Dropbox mengandung:
💡 .dropbox.cache menyimpan file terhapus beberapa hari sebelum purge otomatis
| Artefak | Lokasi |
|---|---|
| Metadata database | %LOCALAPPDATA%\Google\DriveFS\<hash>\metadata_sqlite_db |
| Content cache | %LOCALAPPDATA%\Google\DriveFS\<hash>\content_cache\ |
| Log files | %LOCALAPPDATA%\Google\DriveFS\Logs\ |
| Mirror folder | %USERPROFILE%\My Drive\ |
| Aspek | Stream | Mirror |
|---|---|---|
| Penyimpanan | File di cloud, download on-demand | File penuh di lokal + cloud |
| Disk Usage | Minimal (hanya cache) | Sesuai ukuran semua file |
| Forensik | Hanya file yang pernah dibuka | Semua file tersedia lokal |
| Kelengkapan Bukti | ⚠️ Tidak lengkap | ✅ Lengkap |
| Artefak | Lokasi |
|---|---|
| Database utama | %LOCALAPPDATA%\Microsoft\OneDrive\settings\ |
| Sync logs | %LOCALAPPDATA%\Microsoft\OneDrive\logs\ |
| Sync folder | %USERPROFILE%\OneDrive\ |
| Files On-Demand | NTFS reparse points (placeholder) |
⚠️ Files On-Demand: file "online-only" tidak memiliki konten lokal saat forensic imaging!
Status file ditandai dengan ikon:
Forensic imaging standar hanya mengambil placeholder untuk file cloud-only
VMDK, VHD, Snapshots, Hypervisor
| Format | Platform | Ekstensi |
|---|---|---|
| VMDK | VMware | .vmdk |
| VHD/VHDX | Microsoft Hyper-V | .vhd, .vhdx |
| QCOW2 | KVM/QEMU | .qcow2 |
| VDI | VirtualBox | .vdi |
| OVA/OVF | Multi-platform | .ova, .ovf |
✅ FTK Imager mendukung VMDK, VHD, VHDX, dan E01
Snapshot menyimpan state lengkap VM:
.vmem atau .vsv# Analisis memory snapshot VMware dengan Volatility 3
python3 vol.py -f snapshot.vmem windows.pslist
python3 vol.py -f snapshot.vmem windows.netscan
python3 vol.py -f snapshot.vmem windows.filescan
| File | Fungsi | Info Forensik |
|---|---|---|
.vmx |
Konfigurasi VM | Hardware, network, nama VM |
.vmdk |
Base disk image | File system guest OS |
-s00x.vmdk |
Delta / split disk | Perubahan sejak snapshot |
.vmsn |
Snapshot metadata | Timestamp, description |
.vmem |
Memory snapshot | RAM: proses, koneksi, credentials |
Hypervisor menyediakan informasi forensik tambahan:
📍 VMware ESXi: /var/log/vmkernel.log, /var/log/hostd.log
📍 Hyper-V: Windows Event Log → source "Hyper-V-*"
Docker dan Kubernetes
| Artefak | Lokasi |
|---|---|
| Container metadata & logs | /var/lib/docker/containers/ |
| Image layers (filesystem) | /var/lib/docker/overlay2/ |
| Persistent volumes | /var/lib/docker/volumes/ |
| Network config | /var/lib/docker/network/ |
| Container logs | /var/lib/docker/containers/<id>/<id>-json.log |
# List semua container (termasuk stopped)
docker ps -a
# Inspect detail container
docker inspect <container_id>
# Export container filesystem
docker export <container_id> > evidence.tar
# Lihat perubahan dari base image
docker diff <container_id>
# Lihat logs container
docker logs <container_id>
# Copy file spesifik dari container
docker cp <container_id>:/path /local
| Status | Artefak Tersedia |
|---|---|
| Running | Filesystem, logs, memory, network, proses aktif |
| Stopped | Filesystem, logs, metadata (tanpa memory/network) |
| Deleted | Residual di overlay2, volumes yang masih ada |
⚡ Prioritas: Akuisisi SEGERA sebelum container dihapus!
Artefak forensik pada Kubernetes cluster:
AWS CloudTrail, Azure Activity Log, GCP Audit Logs
Mencatat semua API calls dalam akun AWS:
{
"eventTime": "2025-01-15T08:30:00Z",
"eventName": "RunInstances",
"sourceIPAddress": "203.0.113.50",
"userIdentity": {
"type": "IAMUser",
"userName": "admin-user"
},
"requestParameters": {
"instanceType": "t2.micro"
}
}
Info forensik: siapa (userIdentity), apa (eventName), kapan (eventTime), dari mana (sourceIPAddress)
# Filter event berdasarkan nama
cat cloudtrail.json | jq '.Records[] | \
select(.eventName == "CreateAccessKey")'
# Cari aktivitas dari IP tertentu
cat cloudtrail.json | jq '.Records[] | \
select(.sourceIPAddress == "185.220.101.45")'
# List semua user dan event unik
cat cloudtrail.json | jq \
'[.Records[] | {user: .userIdentity.userName, \
event: .eventName}] | unique'
jq = command-line JSON processor → tool wajib untuk cloud log analysis
| Waktu | Event CloudTrail | Fase Serangan |
|---|---|---|
| 08:00 | ConsoleLogin (IP Indonesia) | Initial Access |
| 08:15 | CreateUser "temp-admin" | Persistence |
| 08:16 | AttachUserPolicy (AdminAccess) | Privilege Escalation |
| 23:45 | ConsoleLogin (Tor exit node) | Lateral Movement |
| 23:55 | GetObject (S3: classified-docs) | Data Exfiltration |
| 02:35 | DeleteUser "temp-admin" | Covering Tracks |
Metode dan Chain of Custody
| Metode | Deskripsi | Kelengkapan |
|---|---|---|
| Snapshot-based | Snapshot VM/disk | ✅ Paling lengkap |
| API-based | Ekstrak via API provider | ⚠️ Terbatas pada API |
| Client-based | Artefak pada client lokal | ⚠️ Mungkin tidak lengkap |
| Provider-assisted | Request data dari provider | ⏳ Proses hukum panjang |
Elemen tambahan dokumentasi:
Pertimbangan khusus pertahanan Indonesia:
Kegiatan hands-on hari ini (150 menit):
| Topik | Poin Kunci |
|---|---|
| Cloud Models | IaaS → forensik terluas; SaaS → paling terbatas |
| Tantangan | Multi-tenancy, volatilitas, jurisdiksi |
| Cloud Storage | Dropbox, GDrive, OneDrive → artefak lokal bernilai |
| VM Forensics | VMDK/VHD + FTK Imager; .vmem + Volatility |
| Container | docker export, inspect, logs, diff |
| Cloud Logs | CloudTrail, Activity Log, Audit Logs → sumber utama |
Pertemuan 14: Forensik Cloud Computing
Ada pertanyaan?