Acquisition and Tools: Planning Your Investigation
Acquisition and Tools: Planning Your Investigation
! Bit-stream copy ! Copy image file to a target disk that matches the original
! Bit-by-bit copy of the original storage medium disk’s manufacturer, size and model
! Exact copy of the original disk
! Different from a simple backup copy
! Backup software only copy known files
! Backup software cannot copy deleted files, e-mail messages or
recover file fragments
! Bit-stream image
Original disk Disk with image Target disk
! File containing the bit-stream copy of all data on a disk or
partition
! Also known as forensic copy
L2: Aquisition and Tools
! First rule of computer forensics ! Maintain the integrity of digital evidence in the lab
! Preserve the original evidence ! As you do when collecting it in the field
! Most recent version is CRC-32 XOR 1011 random string of 4 bits, with highest order bit = 1
lives HASH FUNCTION 0x223 ! In both MD5 and SHA-1, collisions have occurred
! Two different inputs producing the same hash value
! But they are still used since the collisions are rare
! Collisions make a hash function weak
! Cannot always avoid but can make their occurrences
infrequent
! When making a copy, consider: ! Create a duplicate copy of your evidence image file
! Size of the source disk ! Make at least two images of digital evidence
! Lossless compression might be useful ! Use different tools or techniques
! Use digital signatures for verification
! Copy host protected area (HPA) of a disk drive as
! When working with large drives, an alternative is using tape
well
backup systems
! HPA is a part of the drive that is not visible to an operating
! Whether you can retain the disk
system
! Consider using a hardware acquisition tool that can access
the drive at the BIOS level
! Be prepared to deal with encrypted drives
L2: Aquisition and Tools
30 Acquiring with a Linux Boot CD (contd.) 31 Acquiring with a Linux Boot CD (contd.)
! Acquiring data with dd in Linux (contd.) ! Acquiring data with dcfldd in Linux (contd.)
! Shortcomings of dd command ! dcfldd additional functions
! Requires more advanced skills than average user ! Specify hex patterns or text for clearing disk space
! Does not compress data ! Log errors to an output file for analysis and review
! Use several hashing options
! dd command combined with the split command ! Refer to a status display indicating the progress of the acquisition in
! Segments output into separate volumes bytes
! Acquiring data with dcfldd in Linux ! Split data acquisitions into segmented volumes with numeric
extensions
! dd command is intended as a data management tool ! Verify acquired data with original disk or media data
! Not designed for forensics acquisitions
! Sample: man page available at http://linux.die.net/man/1/
dcfldd
! dcfldd if=/dev/hd0 hash=md5,sha256 hashwindow=100M
md5log=md5.txt sha256log=sha256.txt hashconv=after
L2: Aquisition and Tools
! Windows has no built-in hashing algorithm tools for ! Hardware forensic tools
computer forensics ! Range from single-purpose components to complete
! Third-party utilities can be used computer systems and servers
! Commercial computer forensics programs also have ! Software forensic tools
built-in validation features ! Types
! Each program has its own validation technique ! Command-line applications
! GUI applications
! Raw format image files don’t contain metadata
! Commonly used to
! Separate manual validation is recommended for all raw
! copy data from a suspect’s disk drive to an image file
acquisitions
! aid in evidence collection
L2: Aquisition and Tools
46 Reconstruction
47 Reporting
! Reconstruction ! Reporting
! Re-create a suspect drive to show what happened during a ! To complete a forensics disk analysis and examination, you
crime or an incident need to create a report
! Subfunctions
! Subfunctions
! Disk-to-disk copy
! Log reports
! Image-to-disk copy
! Report generator
! Partition-to-partition copy
! Image-to-partition copy ! Use this information when producing a final report for
! Some tools that perform an image-to-disk copy: your investigation
! SafeBack, SnapBack, EnCase, FTK Imager, ProDiscover
L2: Aquisition and Tools
! Always verify your results ! Ch 4,7: B. Nelson, A. Phillips and C. Steuart, Guide to
! Use at least two tools Computer Forensics and Investigations. ISBN:
! Retrieving and examination 978-1-435-49883-9
! Verification ! Useful links:
! Understand how tools work (the reason why we are in this class) ! http://www.forensicswiki.org/wiki/Category:Live_CD
! What is it that the tools do? ! http://www.deftlinux.net
! Very helpful: http://www.deftlinux.net/deft-manual/
! One way to compare results and verify a new tool is by ! http://linux.die.net/man/1/dcfldd
using a disk editor
! Lets you do a little more than hex editors such as Hex
Workshop or WinHex