DFOR510 Week06 Validation Graphics
DFOR510 Week06 Validation Graphics
▪ Week 06 Lecture
▪ File Analysis
▪ Graphic Analysis
▪ Validating Forensic Images
▪ How?
https://blogs.sans.org/computer-forensics/files/2009/06/hash-verify.png 6
▪ Critical aspect of digital
forensics
▪ Why?
▪ Must prove that data was
unaltered from
acquisition to trial
▪ How?
▪ Hash entire forensic image
or applications/files
https://blogs.sans.org/computer-forensics/files/2009/06/hash-verify.png 7
Files Entire partitions
▪ Changing file extension ▪ Windows: diskpart
▪ File Signature Analysis remove/assign
▪ Linux: mnt/hidden;
MacOS: <COMMAND>+<SHIFT>+<.> disk management tool
*nix: ls -a
8
1. http://www.forensicfocus.com/hidden-data-analysis-ntfs
Files in bad clusters/blocks Bit shifting
▪ Marking good blocks1 ▪ Altering binary data making
▪ NTFS – $BadClus file unreadable
Issues?
▪ FAT – 0xFF7/FFF7/?FFFFFF7
▪ HFS+ – included in extents
overflow
1. http://www.forensicfocus.com/hidden-data-analysis-ntfs 9
Steganography Steganalysis
▪ Hiding data within a ▪ Stego detection techniques:
cover medium ▪ Stego-only
11
QUICK CHECK 1
1. What tools can be used to hash individual
files/applications/sectors?
12
13
▪ Important part of investigations
▪ Yields important metadata facts; visible when using a metadata
viewer/exif tool
▪ Owner/creator of file
▪ File size
▪ Timestamps (modified, accessed, created - MAC)
▪ File type
▪ And more…
▪ MAC timestamps may help piece together timeline
▪ Timestamps that are accessible to users can be modified – so
be cautious! 14
▪ Within NTFS, timestamps are found in the $STANDARD_INFO
and $FILE_NAME attributes
▪ $STANDARD_INFO can be modified by a user
▪ $FILE_NAME is updated by the kernel
18
QUICK CHECK 2
1. What type of information does file metadata yield?
2. Describe the difference between Modified, Access, and Creation
times.
3. In what case would you have a Create time more recent than a
Modify time?
4. What is the process of verifying a file’s identity? How is it done?
5. Describe what a magic number is.
19
20
VECTOR
21
Bitmap (or Raster) Vector Metafile
File types .jpg, .bmp, .tiff, . png, .gif, .ai, .eps, .pdf, .svg .eps, .pdf, .svg, .rtf
heic/heif
24
▪ EXIF = metadata that also
includes camera information
▪ What do we expect to find?
▪ Should we just trust Exif
timestamps?
https://digital-photography-school.com/wp-content/uploads/old/exif.gif
25
▪ JPEG JFIF – no embedded
camera metadata
▪ header = 0xFF D8 FF E0
▪ footer = 0xFFD9
27
File Type Extension Magic Number/ Footer
Joint Photographic Experts Group .jpg, .jpeg, .jfif, .jfe 0xFF D8/0xFFD9
29
QUICK CHECK 3
1. Raster vs. Vector vs. MetaFile images
2. What information does EXIF data include?
3. 0xFF D8 FF E0 vs 0xFF D8 FF E1
4. The process of manually recovering a file is known as what?
5. T or F. Some files may have multiple footers without corrupting the
file.
30
▪ Images can be used to conceal information suspects want
to keep hidden using steganography
▪ Two methods:
▪ Insertion – place data from secret file into the host file; host file
looks normal to the human eye, so need to analyze the file structure
carefully
▪ Substitution – replaces bits of the host file with information that is
too be hidden
31
Which image contains steg?
32
Which image contains steg?
33
Header Information
Footer Information
34
▪ Least Significant Bit (LSB)
algorithm – most common
▪ Insert messages with
minimal color change
https://www.rapidtables.com/web/color/RGB_Color.html
35
▪ Want to embed the message ‘hi’ into an image using the LSB
method
▪ ‘hi’ → 0x6869 = 0110 1000 0110 1001
▪ Group bits 2 x 2 → 01 10 10 00 01 10 10 01
▪ Select 8 bytes from cover image to perform the substation
▪ Perform substitution by replacing the last 2 bits of each byte
37
Tesla2.jpg original
image with no hidden
content
38
Other forms of data hiding that come to mind?
39
DATA HIDING IN IMAGES
1. In your groups, download Steghide (or any steganography tool)
2. Using any of the files from the previous exercises, create a
steganographic file with a hidden message or hide an image within an
image
3. Examine the graphic file
a. Are you able to tell the difference between the original and the steg
image? (e.g. appearance, file size, functionality – can you open it in a
viewer with no issues)
b. How easy is it to recover your hidden content?
40
QUICK CHECK 3
1. Describe the two methods used to conceal information in
image files?
2. Describe the simplest Substitution method used for data
hiding.
3. Are all data hiding methods used for malicious purposes?
41
▪ 10–March: Midterm
▪ Covers lectures to date (to include slides, class
discussions, presentations and assignments)
▪ 1-page (8 ½ x11”) handwritten notes permitted
TimeStamps
https://cyberforensicator.com/2018/03/25/windows-10-time-rules/
File signatures
https://www.garykessler.net/library/file_sigs.html
44