Computer Forensics Notes
Computer Forensics Notes
So far. you have used several different features of FTK; this section goes into more detail on its
search and report functions. FTK can perform forensics analysis on the following file systems:
MRCET DEPARTMENT OF IT
Microsoft NTFS (for Windows NT. 2000, XP, and Vista)
FTK can analyze data from several sources, including image files from other vendors. It can also
read entire evidence drives or subsets of data, allowing you to consolidate large volumes of data
from many sources when conducting a computer forensics analysis. With FTK, you can store
everything from image files to recovered server folders on one investigation drive.
FTK also produces a case log file, where you can maintain a detailed record of all activities during
your examination, such as keyword searches and data extractions. This log is also handy for
reporting errors to Access Data. At times, however, you might not want the log feature turned on. If
you're following a hunch, for example, but aren't sure the evidence you recover is applicable to the
investigation, you might not want opposing counsel to see a record of this information because he or
she could use it to question your methods and perhaps discredit your testimony. (Chapter 15 covers
testimony issues in more detail.) Look through the evidence first before enabling the log feature to
record searches. This approach isn't meant to conceal evidence; it's a precaution to ensure that your
testimony can be used in court.
FTK has two options for searching for keywords. One option is an indexed search, which catalogs
all words on the evidence drive so that FTK can find them quickly. This option returns search
results quickly, although it does have some shortcomings. For example, you can't search for
hexadecimal string values, and depending on how data is stored on the eve- dense drive, indexing
might not catalog every word. If you do use this feature, keep in mind that indexing an image file
can take several hours, so it's best to run this process ovemight.
The other option is a live search, which can locate items such as text hidden in unallocated space
that might not turn up in an indexed search. You can also search for alphanumeric and
hexadecimal values on the evidence drive and search for specific items, such as phone numbers,
credit card numbers, and Social Security numbers. Figure 9-1 shows the hits found during a live
search of an image of a suspected arsonist's laptop. You can right-click a search hit to add it to
your bookmarks, which includes the result in your final report.
2.Generic Hash
original
Original
code
1.Inspect
certificate
One-Way Hash
Certiticate Hash Algorithm
4.Comparee
certificate **^i, Pub
Signed Code
One-Way Hash
Creates a package containing the code, the encrypted hash, and the publisher's
certificate
4. The end user encounters the package
s. The end user's browser examines the publisher's Digital ID. Using the Verisign root
Public Key, which is already embedded in Authenticode enabled applications, the end
user browser verifies the authenticity of Software Developer Digital ID (which is itself
6. Using the publisher's public key contained within the publisher's Digital ID, the end
user browser decrypts the signed hash.
7. The end browser runs the code through the same hashing algorithm as the publisher,
creating a new hash.
8. The end user browser compares the two hashes. If they are identical, the browser
messages that the content has been verified by VeriSign, and the end user has the
confidence that the code was signed by the publisher identified in the Digital ID, and the
code hasn't been altered since it was signed.
Time Stamping: Because key pairs are based on mathematical relationships that can
roretically be "cracked" with a great deal of time and effort, it is a well-established
rity principle that digital certificates should expire.
CU
3.7 Developing Standard Procedures for Network Forensics
Network forensics is a long, tedious process, and unfortunately, the trail can go cold
quickly. A standard procedure often used in network forensics is as follows:
files.
MRCET DEPARTMENT OF IT
programs on the drive. In network forensics, you have to restore the drive to see how mal- ware
attackers have installed on the system works. For example, intruders might have trans- mitted a
Trojan program that gives them access to the system and then installed a root kit, which is a
collection of tools that can perform network reconnaissance tasks (using the ls or net stat
command to collect information, for instance), key logging, and other actions.
5
rlam urudiw iwdimu oumg Aupy -
Jeqal rdy o aalumd amd
wwn
umpua wmw wdumu
Pauw oudnw mulwdoirgu shad
mdr dunal umutn mama
stardands rnuna
) Pwwatuw duns
-Canui dum aqu wpuail
alnatinw a naw
am www .
Scanned with CamSca
CF
u w mwwt mdnstand hnw mruian
hand dankn & appyanrkui a mcunnd
&hw
mptw mdumw aw nmdw ak van
i) Da mowphuo
CF
mnus Mnrwd u m
h w amuluan wnd
turmmu s anace
mnuly amouakd
wh
dnnt fule shiainnty.
v) Matdhimg o Divkaa
mpulw a
) Data mpumaw.
CC mud
en g u amuan
hw wi
amd hmw immmma
your location or when you don't want a suspect to be aware of an ongoing investiga- tion. This
method can save time and money. too. Many tools are available for remote acquisi- tions; in the
following sections, you use Runtime Software to learn how remote acquisitions are made.
ve
s
Tabe F e
hamrats2 d
M14
o
c
Expot Fles
Fldn) to oat
A dheced fies Al curently hted tes A
OAhgigled fMe
cade enal tachnes wh enal messages
HDHOST
Chapter 4 introduced these tools; remember that they're designed to be file system specific, so
there are DiskExplorer versions for both FAT and NTFS that you can use to create raw for
mat image files or segmented image files for archiving purposes.
HDHOST is a remote access program for communication between Iwo computers. The
disks, diskettes, tapes, etc.) for evidence. In other words, computer forensics is the
employment proceedings.
resides.
those tidbits of data left behind by the operating system. Our experts
Tracing artifacts,
importantly, they know how to evaluate the
know how to find these artifacts and, more
Page 1
COMPUTER FORENSIcS
1.11 Data Back-up and Recovery
Back-up Obstacles
1. The ability of the system being backed up to push data to the backup
server
2. The ability of the backup server to accept data from multiple systems
simultaneously
3. The available throughput of the tape device(s) onto which the data is
moved
MRCET DEPARTMENT OF IT
Lack-of Resources: Many companies fail to make appropriate
investments in data protection until it is too late.
The role of Back-up has changed: The role of backup now includes
the responsibility for recovering user errors and ensuring that good data has
been saved and can quickly be restored.