Cyfr Iu
Cyfr Iu
By Viral Parmar
Who Am I
@viralparmarhack
Viral Parmar
ComExpo Cyber Security Foundation
Cyber Security Researcher
Mozilla Reps, Mozilla Foundation
Given 700+ session all over the world
Solved 500+case of cyber crime and aware more then
10 lakh people about privacy and security
Motto: Know hAckiNG, but no HaCKing.
History
• 1970s-1980s: First Computer Crime
• In 1978 the first computer crime was recognized in Florida Computer Crime Act
• included legislation against unauthorized modification or deletion of data on a computer
system
• over the time, due to the advancement of technology, the range of computer crimes
being committed also increased
• To deal with crimes related to copyright, privacy and child pornography, various other
laws were passed
• 1980s-1990s: known as the Development Decade
• the first ever investigation (1986) in which Cliff Stoll tracked the hacker named Markus
Hess happened
• two kind of digital forensics disciplines:
• ad-hoc tools and techniques developed by practitioners as a hobby
• developed by scientific community
• 2000s-2010s: Decade of Standardization
• The need for making some specific standards that can be followed while performing
investigations arose
• Scientific agencies and bodies started publishing guidelines for digital forensics
• 2002: Scientific Working Group on Digital Evidence (SWGDE) published a paper named
“Best practices for Computer Forensics”
Digital Forensics
Computer Forensics is a scientif ic method of investigation and analysis in order to
gather evidence from the digital devices or computer networks and components
which is suitable for presentation in a court of law or legal body. It involves
performing a structured investigation while maintaining a documented chain of
evidence to f ind out exactly what happened on a computer and who was responsible
for it.
Def inition Application of computer science and investigative procedures for a legal
purpose involving the analysis of digital evidence (information of probative value that
is stored or transmitted in binary form) after proper search authority, chain of custody,
validation with mathematics (hash function), use of validated tools, repeatability,
reporting and possible expert presentation
Objectives of Digital Forensics
• It helps to recover, analyze, and preserve computer and related materials in such a
manner that it helps the investigation agency to present them as evidence in a court
of law.
• It helps to postulate the motive behind the crime and identity of the main culprit.
• Designing procedures at a suspected crime scene which helps you to ensure that the
digital evidence obtained is not corrupted.
• Data acquisition and duplication: Recovering deleted files and deleted partitions from
digital media to extract the evidence and validate them.
• Helps you to identify the evidence quickly, and also allows you to estimate the
potential impact of the malicious activity on the victim
• Producing a computer forensic report which offers a complete report on the
investigation process.
• Preserving the evidence by following the chain of custody.
Challenges for Digital Forensics
• The increase of PC's and extensive use of internet access
• Easy availability of hacking tools
• Lack of physical evidence makes prosecution difficult.
• The large amount of storage space into Terabytes that makes this
investigation job difficult.
• Any technological changes require an upgrade or changes to solutions.
Process of Digital Forensics
Locard’s Principle
Edmund Locard (1877–1966) was the director of the first (according to some) crime lab,
in Lyon, France
Locard’s Exchange Principle: in the physical world, when perpetrators enter or leave a
crime scene, they will leave something behind and take something with them.
Digital Evidence
Digital evidence act, The Bureau of Indian Standards Act, Digital devices are
everywhere in today’s world, helping people communicate locally and globally
with ease. Most people immediately think of computers, cell phones and the
Internet as the only sources for digital evidence, but any piece of technology that
processes information can be used in a criminal way. For example, hand-held
games can carry encoded messages between criminals and even newer
household appliances, such as a refrigerator with a built-in TV, could be used to
store, view and share illegal images. The important thing to know is that
responders need to be able to recognize and properly seize potential digital
evidence.
Forensics Organizations
Scientific Working Group on Digital Evidence (SWGDE)
http://www.swgde.org/
• Made up of federal government agency, state or local law enforcement agency involved in the
digital and multimedia forensic profession
Network forensics
• sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic
• for the purposes of information gathering, legal evidence or intrusion detection.
• Unlike other areas of digital forensics, network investigations deal with volatile and dynamic
information.
• Network traffic is transmitted and then lost, so network forensics is often a pro-active investigation.
Wireless forensics
• sub-discipline of network forensics.
• main goal is to provide the methodology and tools required to collect and analyze wireless
network traffic data.
• data collected can correspond to plain data or, with the broad usage of Voice-over-IP (VoIP)
technologies, especially over wireless, can include voice conversations.
Database Forensics
Branch of digital forensic science relating to the forensic study of databases and their related
metadata.
forensic examination of a database may relate to the timestamps that apply to the row (update time)
in a relational table being inspected and tested for validity in order to verify the actions of a database
user.
Malware Forensics
deals with Investigating and analyzing Malicious Code for identification of Malware like viruses,
Trojans, worms, keylogger’s etc and to study their payload.
E-mail Forensics
Deals with recovery and analysis of e-mails including deleted e-mails, calendars and contacts.
Memory Forensics
deals with collecting data from system memory (e.g., system registers, cache, RAM) in raw form and
carving the data from the raw dump.
Live Acquisition of Evidence
A live acquisition is where data is retrieved from a digital device directly via its
normal interface; for example, switching a computer on and running programs
from within the operating system. This has some level of risk, as data is likely to
be modif ie d. This process is rapidly becoming the more common approach as
disk drive capacities increase to the point where they are impractical to 'image'
and technology such as 'cloud computing' means that you cannot even access
the hardware in many cases
Order of volatility of digital evidence
1. CPU, cache and register content
2. Routing table, ARP cache, process table, kernel statistics
3. Memory
4. Temporary file system / swap space
5. Data on hard disk
6. Remotely logged data
7. Data contained on archival media
Hashing
Hash analysis. You have used the MD5 and/or SHA1 hash to verify acquisitions of
digital evidence, such as hard drives or removable media. You’ll use that same MD5
and/or SHA1 hash to derive hash values of individual files and compare them to
known databases of hash values. In this manner, you can identify known files by their
MD5 and/or SHA1 hash. If they are known safe files, such as program files, they can
be eliminated from further analysis. If they are known contraband files, they can be
quickly identified and bookmarked.
Tools: Hex Editor, Win Hex, Hash Check, Igorware, Garry kesler database of file
signatures, Hash File database, HashMyFiles
Imaging & Analysis of Logical & Physical
Drives
We never do a forensic investigation on a live system’s disk (can also be done in
some special cases to be discussed later). So, that the original disk can be prevented
from any alteration or modif ication which can occur during Forensic Analysis. Disk
Imaging, it is the process in which, we use tools that make an exact copy of the hard
disk that can be examined using some special forensic investigation tools covered in
the later sections.
Tools: The Sleuth Kit Autopsy, Helix, Access Data FTK Imager, EnCase Tool, Magnet
forensics tool, X-Ways Forensics, Shadow explorer, USB Write Blocker, Guymager
Retrieving & Reviewing Logs
Logging consists of recording information about what a system—for instance, an
application—does when executing. We write these recordings to some persistent
medium, such as a database table or a file in the disk. That way, we can access such
information afterward and review it, but why would that be a desirable thing? The
primary use for logging of any kind is troubleshooting. Reading through log entries
gives you this sort of time-travel power. By reading application logs, for instance, you
can retrace the actions a user performed in an application, so you can understand
and fix a problem
3
Network Drives Imaging and Logical File
Collection
There are scenarios in which it is not possible to take the evidence machine offline,
• like the machine may be a file server or a database server
• services business-critical applications
• In the course of the interview, we need to determine if the machine has any relevant data and if so,
where it is stored.
Hashing program
• produces a fixed length large value (ranging from 80 – 240 bits)
• Represents the digital data on the seized media
• Any changes made to the original evidence will result in the change of the hash value
• Hashing is applying a mathematical algorithm
• A file/disk/storage media
• Produce a value that is unique like fingerprint to that file/disk/dataset
• Any changes that will be made in the file/dataset will in turn change/alter the hash value
• Hash value is usually alphanumeric
Forensic Collection of Digital Media
Identifying/Seizing of the devices needs to be forensically imaged for analysis
• Pre-investigation assessment must be complete and accurate before commencing the Crime
Scene Investigation
• Be ready to identify all the relevant parties and equipment at the scene
• If the person at the scene of crime is not able to tell if the device is relevant for investigation, seize
it
• Documentation tools
• Pen and paper for notes
• Stick-on labels etc.
• Disassembly and removal tools in a variety of nonmagnetic sizes and types
• Screwdrivers
• Wire cutters etc.
• Packaging and transporting supplies
• Bubble wraps
• Sturdy boxes etc.
• Other miscellaneous items
• Gloves
• Magnifying glass
• Small flashlight
Evidence Handling
Collecting and handling digital evidence is a crucial part in performing digital
forensics. Not collecting the right evidence or mishandling evidence can lead
to a perpetrator not getting convicted for their crime. Everything from the way
digital evidence is collected to the way it is worked with and even stored
plays a vital role in court proceedings. For example, once an incident is made
apparent, it is advised that evidence gathering procedures be initiated. In this
way, you will be more likely to gather all pertinent evidence before they
become lost or deleted.
Chain of custody
Chain of custody refers to the documentation that shows the people who have been
entrusted with the evidence
• People who have seized the equipment
• People in charge of transferring the evidence from the crime scene to the forensic labs
• People in charge of analysing the evidence etc.
Packaging and labelling of the evidence
Package and labeling refers to collection of the evidence
• Numbering them in a way that it would be easy to go back and retrieve the data at a later date/time
• Every piece of evidence needs to get a tag number
• Contains all the visible details on the evidence
• This information goes into evidence Database
• The IO has to choose packaging that is of proper size and material, to fit into the evidence
Two things to ensure while sending the evidences to the Forensic Science Laboratories
• The suspected computer storage media is carried by a special messenger and not by Registered /
Insured post
• A fresh hard disk of approximately same capacity should also be submitted for forensic imaging
along with the suspected storage media.
PF - PreFetch
PF number:
• In windows, there are prefetch artifacts
• In order to improve customer experience, Microsoft introduced a memory management technology
called Prefetch
This mechanism
• analyses the applications that are most frequently used
• preloads them in advance
• done in order speed the operating system booting and application launching
• The Prefetch files are stored in %SYSTEMROOT%\Prefetch directory and have a .pf extension
Why is prefetch important in forensic analysis?
• Prefetch files keep track of programs that have been executed in the system even if the original file
is no longer present
• Prefetch files can tell us
• when the program was executed,
• how many times and from which path
Legal procedure post-seizure of evidence
Once the digital evidence is seized during the course of investigation, it has to be brought to the notice
of the jurisdictional court
• Obtain orders of the competent court to retain the seized properties in the custody of the
investigating officer for the purpose of investigations
• Obtain necessary orders from the competent court to image the data
• Send the digital evidence for forensic analysis and expert opinion
In cases where the accused persons or the owners of the property seized approaches the court for
release of the impounded properties
• IO should carefully prepare objections for such applications
• Ensure that no original evidences are returned which have a bearing on the prosecution of the case
• Unless the court specifically orders, releasing seized properties means releasing a forensically
imaged copy
Four principles for dealing with digital
evidence
1. No actions performed by investigators should change data
2. Individuals accessing original data must be competent to do so
3. An audit trail must be created and preserved documenting each investigative
step
4. The person in charge of the investigation has overall responsibility for ensuring
the laws and guidelines of the government
Expert Opinion from the Forensic
Examiner
The forwarding letter to the FSL for scientific analysis and opinion should mention
information like:
• Brief history of the case
• The details of the exhibits seized and their place of seizure
• The model, make and description of the hard disk or any storage media
• The date and time of the visit to the scene of crime
• The condition of the computer system (on or off) at the scene of crime
• Is the photograph of the scene of crime taken?
• Is it a stand-alone computer or a network?
• Does the computer have any Internet connection or any means to communicate with
external computers?
• Were the BIOS date and time stamps taken, or not? If taken the date and time should be
mentioned
Performing Digital Forensics
• Acquisition
• Validation & Verification
• Extraction
• Reconstruction
• Reporting
Acquisition
• Physical data copy
• Logical data copy
• Data acquisition format
• Command-line acquisition
• GUI acquisition
• Remote, live, and memory acquisitions
Validation & Verification
Validation: a way to confirm that a tool is functioning as intended
Verification: proves that two sets of data are identical by calculating hash values
or using another similar method
Filtering
• Related process
• Involves sorting and searching through investigation findings
• Separate good data and suspicious data
Extraction
• Data viewing
• Keyword searching
• Decompressing
• Carving: technique of reassembling files from raw data fragments when no
filesystem metadata is available
• Decrypting
• Bookmarking or tagging
Reconstruction
Purpose
Re-create a suspect drive to show what happened during a crime or an
incident
Create a copy for other digital investigators if a
Methods of reconstruction
• Disk-to-disk copy
• Partition-to-partition copy
• Image-to-disk copy
• Image-to-partition copy
• Disk-to-image copy
• Rebuilding files from carving
Reporting
To perform a forensics disk analysis and examination, we need to
create a report
• Bookmarking or tagging
• Log reports
• Timelines
• Report generator
Quality of Computer Forensics
• Legal Authority
• Integrity of Evidence
• Forensic Documentation
• Administrative Review
• Technical Review
• Validation Testing
Digital Evidence Assessment
The type of crime that we want to prove or disprove determines
• What evidence we need to analyse
• How the recovered information is to be used
• Related to inculpatory and exculpatory evidences
1. Evidence acquisition
2. Evidence examination
3. Documenting and reporting digital evidence
Evidence acquisition
• The physical removal of storage devices
• Using controlled boot discs to retrieve sensitive data without
affecting existing stored data
• Ensuring functionality
• Taking appropriate steps to copy and transfer evidence to the
investigator’s evidence repository
• Document and authenticate the chain of evidence
Evidence examination
Digital forensics investigators typically examine data from designated archives
• use a variety of methods and approaches to analyse information
• include utilising analysis software to search massive archives of data for
specific keywords or file types
• retrieve files that have been recently deleted
• analyse data tagged with times and dates
• suspicious files or programs that have been encrypted or intentionally hidden
Documenting and reporting digital
evidence
• Accurate record of all activity related to the investigation
• all methods used for testing system functionality and retrieving,
• copying, and storing data,
• all actions taken to acquire, examine and assess evidence
Purpose:
• Demonstrate how the integrity of user data has been preserved
• Ensures that proper policies and procedures have been adhered to by all parties
involved
• The purpose of the entire process is to acquire data that can be presented as
evidence in a court of law
• An investigator’s failure to accurately document his or her process could seriously
compromise the validity of that evidence and ultimately, the case itself
Time zone conversion
A time zone is a region of the earth that has uniform standard time, usually referred to as the local
time
By convention, time zones compute their local time as an offset from UTC (Greenwich Mean Time)
For each computer system/server, time zone is set to its current location/local time.
It is very important to know the time zone of that system to establish the exact time of offence
subsequent actions of the crime as supportive evidence
Since the time zone/difference may vary more than 12 hours for few locations for example United
States of America vs India, date of the occurrence of the crime may also change
This is very critical and important especially in crimes involved in sending e-mails from servers out
of India.
Used for converting all the acts and incidents to one common time (usually the local time), so that
the offences and the offender can be clearly linked
A useful link is http://www.timeanddate.com/worldclock/meeting.html
E-mail Headers
Each e-mail whether it is a company e-mail or Web-based e-mail like hotmail, yahoo, etc., carries lot of
information about that e-mail.
Information like sender IP address, e-mail address, time and date when the e-mail sent, through which
server it passed, etc.
E-mail message headers are digital histories that are attached to every e-mail message that are sent
and received.
Headers include servers that the e-mail has travelled through, and the date and time that the message
was received or forwarded
Mail
• IP address of computer used to send email
• Contents of the email
• Can not search for or produce deleted emails
Groups
• Member list, email addresses of members, and date when members joined the Group.
• Information about Group moderators.
• Contents of the Files, Photos, and Messages sections.
• Group activity log describing when members subscribe and unsubscribe, post or delete files, and
similar events.
Information from ISPs:
• All the service providers enable queries by e-mail from pre-registered e-mail ids of the IOs and, such
e-mail have to be from their official e-mail id
• ISP will typically provide the following information
• User name
• Telephone number
• Personal details like name, e-mail ID, address, etc., mentioned in the CAF
• Day-wise activity i.e., when and how long used, etc.
• Physical address of the IP address
• Sample letter to third party, companies, and service providers
There is a critical need in the law enforcement community to ensure the reliability of computer forensic
tools
The goal of the Computer Forensic Tool Testing (CFTT) project at the National Institute of Standards
and Technology (NIST) is to establish a methodology for testing computer forensic software tools by
• development of general tool specifications,
• test procedures,
• test criteria,
• test sets,
• test hardware
Requirement: forensic software tools consistently produce accurate and objective test results
Sub-functions:
• Physical data copy
• Logical data copy
• Data acquisition format
• Command-line acquisition
• GUI acquisition
• Remote, live, and memory acquisitions
ISO standard 27037 states the most important factors in data acquisition are
• the DEFR’s (Digital Evidence First Responders) competency
• use of validated tools
• includes guidelines on how to approach acquisition in different situations
• document what was done and why
Examples:
• if you’re acquiring data at a scene with hazardous materials, speed is critical
• might decide to forgo acquiring RAM
• focus on collecting devices
• acquiring volatile memory
• encrypted devices or mission-critical systems that can’t be turned off
Filtering
• Related process
• Involves sorting and searching through investigation findings
• Separate good data and suspicious data
Sub-functions of extraction:
• Data viewing
• Keyword searching
• Decompressing
• Carving: technique of reassembling files from raw data fragments when no filesystem metadata
is available
• Decrypting
• Bookmarking or tagging
Many digital forensics tools include a data-viewing mechanism for digital evidence
• Offer several ways to view data
• logical drive structures, such as folders and files
• display allocated file data and unallocated disk areas
• Forensics tools have functions for searching for keywords of interest to the investigation
• With some tools, you can set filters to select file types to search, such as searching only PDF files
Analyzing, recovering, and decrypting data from encrypted files
• Encryption can be used on a drive, disk partition, or file
• Many e-mail services, such as Microsoft Outlook, provide encryption protection for .pst folders and
messages
• Encryption can be platform specific
Password decryption
• Passwords are typically stored as hash values, not in plaintext
• One-way hashes: we cannot apply an algorithm to break them
• Many password recovery tools have a feature for generating potential password lists for a password
dictionary attack
• OSForensics is a forensics tool, and has a built-in password cracker
Reconstruction
Purpose:
• Re-create a suspect drive to show what happened during a crime or an incident
• Create a copy for other digital investigators if a drive has been compromised by malware or a
suspect’s actions
Methods of reconstruction:
• Disk-to-disk copy
• Partition-to-partition copy
• Image-to-disk copy
• Image-to-partition copy
• Disk-to-image copy
• Rebuilding files from carving
• One free tool is the Linux dd command
Disadvantage: it produces a flat, uncompressed file that is the same size as the source drive
Reporting
To perform a forensics disk analysis and examination, we need to create a report
Investigator’s report:
• Written by the investigator in detail
• Report shall contain the sequence of steps, and decisions taken
• Reports generated by tools are not sufficient
Forensic Workstations
Forensic workstations can be tailored to meet the investigation needs
Forensic workstations can be divided into the following categories:
Stationary workstation—A tower with several bays and many peripheral devices
Portable workstation—Alaptop computer with almost as many bays and peripherals as a stationary
workstation
Lightweight workstation—Usually a laptop computer built into a carrying case with a small selection of
peripheral options
FRED Workstation
Using a Write-Blocker
• Write-blockers protect evidence disks by preventing data from being written to them
• Forensic investigators need to absolutely assure of the fact that the data they obtain as digital
evidence is not altered during the capture, analysis, and control
• Attorneys, judges, jurors need to feel confident that digital evidence has not been tampered and is
legitimate
According to theNIST:
• Use an operating system and other software that is trusted to not to write anything to the disk
without any explicit instruction
• Use hard disk write block tools to prevent any hard disk writes
• Software and hardware write-blockers perform the same function but in a different fashion
• Both guarantee the protection of the chain of custody (if used correctly)
Software write-blockers
• A software write blocker tool operates by monitoring and filtering drive I/O commands sent from an
application or OS through a given access interface
• They provide the ability to
• simultaneously write-block as many disk devices as are connected to a computer
• no need for multiple expensive hardware write blocking devices
Example:
• Software write-blockers, such as PDBlockfrom Digital Intelligence, typically run in a shell mode
• PDBlockchanges interrupt-13 of a workstation’s BIOS to prevent writing to the specified drive.
• If anyone attempts to write data to the blocked drive, an alarm sounds, advising that no writes have
occurred
Features:
• The user can control automatic write blocking policies for fixed and/or removable disks.
• The user can have write blocking tool remember each fixed device’s blocked or un-blocked status for
ease of use on media repeatedly used on a workstation/laptop.
• Some of the write blocking tools provide a GUI interface that allows the user the ability to block and
unblock any disk or flash storage device.
Hardware write-blockers
• Hardware write-blockers are used to intercept and block any modifying command from ever
reaching the storage device
• With hardware write-blockers, we can connect the evidence drive to the workstation and start
the OS as usual
• They prevent the OS from writing data to the blocked drive
Features:
• They offer monitoring and filtering any activity that is transmitted or received between its
interface connections to the computer and the storage device
• Hardware write blockers can connect to different types of storage with adapters
• Hardware devices that write-block also provide a visual indication of function through LEDs and
switches. easy to use, clear functionality to users.
Disadvantages:
• Hardware write blocking devices are very expensive
• Awkward to use since they require a physical connection
• different connector for each type of interface
Write Block Device Tubule
A forensic disk controller or hardware
write-block device is a specialized type
of computer hard disk controller made
for the purpose of gaining read-only
access to computer hard drives without
the risk of damaging the drive's contents.
The device is named forensic because
its most common application is for use
in investigations where a computer hard
drive may contain evidence.
Hard Disk Cloner ( Imaging )
A lab must meet the following criteria and keep accurate records:
• Establish categories for digital forensics tools—Group digital forensics software according to
categories, such as forensics tools designed to retrieve and trace e-mail
• Identify forensics category requirements—For each category, describe the technicalfeatures or
functions a forensics tool must have
Develop test assertions—Based on the requirements, create tests that prove or disprove the tool’s
capability to meet the requirements
• Identify test cases—
• Find or create types of cases to investigate with the forensics tool
• Identify information to retrieve from a sample drive or other media.
For example, use the image of a closed case file created with a trusted forensics tool to test a new tool
in the same category and see whether it produces the same results.
• Establish a test method—Considering the tool’s purpose and design, specify how to test it
• Report test results—Describe the test results in a report that complies with ISO17025, which
requires accurate, clear, unambiguous, and objective test reports
• Repeatable results: if you work in the same lab on the same machine, you generate the same
results
• Reproducible results: if you’re in a different lab working on a different machine, the tool still retrieves
the same information
Using Validation Protocols
• After retrieving and examining evidence data with one tool, we should verify our results by
performing the same tasks with other similar forensics tools
Example: after we use one forensics tool to retrieve disk data, we use another to see whether we
retrieve the same information
• Question in court: How did you verify your results?
• need at least two tools to validate
• tool we use to validate the results should be well tested and documented
• First, conduct your investigation of the digital evidence with one GUI tool
• Then perform the same investigation with a disk editor to verify that the GUI tool is seeing the same
digital evidence in the same places on the test or suspect drive’s image.
• If a file is recovered, obtain the hash value with the GUI tool and the disk editor, and then compare
the results to verify whether the file has the same value in both tools
• Many investigators in both the public and private sectors use FTK and EnCaseas their choice of
forensics software suites
• They do not rely on them solely: investigators’ software libraries often include other forensics
utilities to supplement these tools’ capabilities
Digital Forensics Tool Upgrade Protocol
• After verification with two different tools, should test all new releases and OS patches and upgrades
• Make sure the upgrades are reliable and do not corrupt evidence data
• If you determine that a patch or upgrade isn’t reliable, do not use it on your forensic workstation until
the problem has been fixed
• Can file an error report with the vendor
• not being able to read old image files with the new release
• disk editor generating errors after you apply the latest service pack etc.
• In most cases, the vendor addresses the problem and provides a new patch
Digital Device Forensics
Desktops:
• Specially built for personal use at home or work
• Equipped with two primary hardware solutions —the monitor and a casing
• In the casing, CPU is housed, the motherboard, the graphic card, storage devices, buses, power
supply etc.
Laptop:
• Also known as notebook computer, is a smaller computer
• It has all the components like monitor, keyboard, mouse, and speakers, etc., in a single unit.
• It is powered through an AC adapter and can store the energy in a rechargeable battery.
Server:
• A computer which can provide services to a group of computers either inside an organization
or to public users across Internet.
• Many servers have dedicated functionality, such as Web servers, file servers, print servers,
database servers, mail servers, etc.
• Sometimes, they have different kinds of hardware and operating systems that makes them
efficient in providing services
Digital Storage Device
Hard drives:
• Hard drives or hard disks are the main storage devices that are used in the computer to store
the data
• The data stored in hard drive is non-volatile
• Come in different varieties based on their speed, size, and connecting types
• The common types of hard drives that are usually encountered are 1) IDE, 2) SATA, 3) SCSI,
and 4) ZIF/SSD
CDS ,DvDS:
• CDs and DVDs are optical storage devices that are used to store data like audio, video, and several
other types of files
• CDs can be written once (CD-R-Recordable) or data can be erased and re-written (CD-RW-Rewritable)
• The maximum size of a CD is 800 Megabytes and that of a DVD is 9.0 Gigabytes
Blu-ray:
• Name of a new optical disc format developed to enable recording, rewriting and playback of high-
definition video (HD)
• Can store large amounts of data
• Can hold up to 25GB on a single-layer disc and 50GB on a dual-layer disc
Floppy disks:
• Floppy disks are magnetic storage media that are encased in a rectangular plastic case.
• They usually come in three different sizes 8 inches, 5 1/2 inches, and 3 1/2 inches. 8 and 5 1/2
inches have become obsolete now.
• Floppy disks have a write-protection option or read-only option
• Floppy disks are read from and written to by a floppy disk drive (FDD)
Flash drives:
• Flash drives are generally flash memory data storage devices that are integrated with a USB
interface
• Flash memory:
• non-volatile memory chip used for storage and for transferring data
• electronically reprogrammed and erased
• Removable and portable media
• Rewritable and are much smaller in size than the typical floppy disk drive
NAS:
• Network attached storage (NAS)
• storage system that allows computers on network to share large amounts of data across high-speed
Local Area Network (LAN) networks
• can store data in the files such as e-mail boxes, Web content, and remote system backups
• usually composed of an array of hard drives that are connected to a computer system
Ipads/tablets:
• Ipadsare tablet computers manufactured by apple computers.
• It has same operating system as iphoneand ipod(iOS).
• This can be used as a typical computer to store data, browse Internet, make phone calls, play
games, read e-books, etc.
Electronic readers/e-readers:
• Electronic readers are devices that are used to store, download, and read e-books and play
games.
• These devices are wireless Internet enabled and come in different storage capacities.
Network Device
Hub:
• In computer networking, a Hub is a small device that joins multiple computers together.
• Ethernet hubs vary in the speed they support
Switch:
• A network switch is a hardware device that joins multiple computers within one LAN.
• Network switches allows network packets from them
• Also examines or inspects them to determine their source and destination
Router:
• In Network environment, a Router is a physical device that joins multiple wired or wireless
networks together.
• Routers are usually located at gateways.
• It intercepts the data packets and decides where the signals have to go
• A Router can have different interface connections for different types of physical networks.
RAID(Redundant Array of Inexpensive Disks) is method of storing the same data in different
places (thus, redundantly) on several hard disks
Firewall:
• Found in a computer system or network
• device that allows only authorized traffic (data) into or out of a computer or a computer network.
• continuously inspects the data packets that are going in and out of a computer network
• blocks any unauthorized and malicious traffic and serves as a security mechanism
• can be hardware, software, or a combination of both
Answering machines:
• Devices that are used with desk telephones.
• These devices will play a message to the caller when the call cannot be answered
• The caller can leave a message which will be recorded in the answering machine.
• All the messages recorded in such a way can be played later directly from the machine itself.
Fax Machines:
• Fax is any document sent over a telephone line.
• It is received by the recipient’s fax machine and gets printed.
• In many corporate environments, fax servers are installed, which can store the incoming fax
messages electronically and sends them through e-mail to the users or prints them on the
paper.
Mobile phones:
• Mobile phones are used to make phone calls, send text messages, voice and picture/video
messages (Multimedia messages —MMS),
• Take pictures and videos, etc.
• Usually has a SIM card specific to the service provider.
Smart phones:
• Smart phones are advanced type of mobile phones
• Offers services like high-speed Internet, advanced computing, and connectivity
• They run on complete operating system software like typical computers and can be considered as
a pocket computer.
• Provide services like Internet, e-mail, Wi-Fi etc.
MISC. Device
Digital cameras:
• cameras that can take pictures and videos and records them digitally on to the memory present
in them.
• they also support expandable memory by using multimedia cards
• more advance cameras have hard drives that can store pictures and videos
Camcorders:
• Camcorders are the digital video recorders used to capture video footages and record them
digitally on to CDs, Cassettes, Multimedia cards, hard drives, etc.
Photocopiers:
• A Photocopier is a machine that can reproduce a document and make multiple copies of it
quickly.
• Advanced photocopiers have features like sending the photocopy electronically to the e-mail
• stores documents in the hard drives when large numbers of documents are to be copied.
Global positioning devices:
• Satellite-based navigation system
• Provides the exact location and time information anywhere on the earth
• GPS devices have receivers for GPS satellite and provide information, such as location, directions,
traffic conditions,
• Also nearby facilities like restaurants, fuel stations, etc.,
• Receives though maps and text and voice.
Digital watches:
• Digital watches are instruments that show time in digital format
• also have other facilities like compass, temperature sensors, music players, and in some embedded
cameras also.
• Some advanced digital watches also have USB data connectivity to storeand transfer data.
Digital Evidence Assessment
Assessment of potential evidence in cyber crime.
Details of the case at hand is required to effective processing of evidence
Main components:
• Evidence acquisition
• Evidence examination
• Documenting and reporting digital evidence
Evidence Acquisition
Rigorous, detailed plan for acquiring evidence
Extensive documentation is needed prior to, during, and after the acquisition process
General methods:
• The physical removal of storage devices
• Using controlled boot discs to retrieve sensitive data without affecting existing stored data
• Ensuring functionality
• Taking appropriate steps to copy and transfer evidence to the investigator’s evidence repository
• Document and authenticate the chain of evidence
Evidence Examination
Procedures must be in place for retrieving, copying, and storing evidence within appropriate databases
Purpose:
• demonstrate how the integrity of user data has been preserved
• ensures that proper policies and procedures have been adhered to by all parties involved
The purpose of the entire process is to acquire data that can be presented as evidence in a court of law
An investigator’s failure to accurately document his or her process could seriously compromise the
validity of that evidence and ultimately, the case itself
Mobile Forensics
The following information might be stored on a mobile phone depending upon the model used:
Incoming, outgoing, and missed calls
• Multimedia Message Service (MMS; text messages)
• Short Message Service (SMS) messages
• E-mail accounts
• Instant messaging (IM) logs
• Web pages
• Photos, videos, and music files
• Calendars and address books
• Social media account information
• GPS data
• Voice recordings and voicemail
• Bank account logins
• Access to the home
• Many people store more information on smartphones and tablets than on computers
• Mobile devices used to be seized at the time of arrest
• Police used to look through them as a routine matter
• Prohibited now
BIOS
• BIOS is the program a computer's microprocessor uses to start the computer system after it is
powered on.
• Also manages data flow between the computer's operating system (OS) and attached devices, such
as the hard disk, video adapter, keyboard, mouse and printer.
Disk Drives
Understand how data is organized on a disk so that you can find data effectively
• Disk drives are made up of one or more platters coated with magnetic material
• Data is stored on platters in a particular way
Geometry
• Geometry refers to a disk’s logical structure of platters, tracks, and sectors.
Head
• The head is the device that reads and writes data to a drive.
• There are two heads per platter that read and write the top and bottom sides.
Tracks
• Tracks are concentric circles on a disk platter where data is located.
Cylinders
• A cylinder is a column of tracks on two or more disk platters.
• Typically, each platter has two surfaces: top and bottom.
Sectors
• A sector is a section on a track, usually made up of 512 bytes.
Solid-State Storage Devices
• Flash memory storage devices used in USB drives, laptops, tablets, and cell phones can be a
challenge for digital forensics examiners
• If deleted data isn’t recovered immediately, it might be lost forever.
• The reason is a feature all flash memory devices have: wear-leveling.
• When data is deleted on a hard drive, only the references to it are removed, which leaves the original
data in unallocated disk space.
• With forensics recovery tools, recovering data from magnetic media is fairly easy; you just copy the
unallocated space.
• USB drives and other solid-state drive systems are different
• Memory cells shift data at the physical level to other cells that have had fewer reads and writes
continuously.
• The purpose of shifting (or rotating) data from one memory cell to another is to make sure all
memory cells on the flash drive wear evenly
• Memory cells are designed to perform only 10,000 to 100,000 reads/writes, depending on the
manufacturer’s design.
• When they reach their defined limits, they can no longer retain data.
• When you attempt to connect to the device, you get an access failure message.
Microsoft File Structures
Two structures: File Allocation Table (FAT), and NT File System (NTFS)
• The method an OS uses to store files determines where data can be hidden.
• When you examine a computer for forensic evidence, you need to explore these hiding places to
determine whether they contain files or parts of files that might be evidence of a crime or policy
violation.
• In Microsoft file structures, sectors are grouped to form clusters, which are storage allocation units
of one or more sectors.
• The OS groups one or more sectors into a cluster.
• Clusters are numbered sequentially, starting at 0 in NTFS and 2 in FAT.
• The OS assigns numbers to these cluster, referred to as logical addresses.
• Sector numbers, however, are referred to as physical addresses because they reside at the
hardware level and go from address 0 (the first sector on the disk) to the last sector on the disk.
• The first sector of all disks contains a system area, the boot record, and a file structure database.
• Clusters and their addresses are specific to a logical disk drive, which is a disk partition.
Disk Partition
• Many hard disks are partitioned, or divided, into two or more sections.
• A partition is a logical drive.
• Windows OSs can have three primary partitions followed by an extended partition that can contain
one or more logical drives.
• Someone who wants to hide data on a hard disk can create hidden partitions or voids: large unused
gaps between partitions on a disk drive.
• For example, partitions containing unused space can be created between the primary partitions or
logical partitions.
• This unused space between partitions is called the partition gap
• It’s possible to create a partition, add data to it, and then remove references to the partition so that it
can be hidden in Windows.
• Another technique is to hide incriminating digital evidence at the end of a disk by declaring a smaller
number of bytes than the actual drive size.
• With disk-editing tools, however, we can access these hidden or empty areas of the disk.
• Both tasks involve analyzing the key hexadecimal codes the OS uses to identify and maintain the file
system.
• The partition table is in the Master Boot Record (MBR), located at sector 0 of the disk drive.
• In a hexadecimal editor, such as WinHex, you can find the first partition starting at offset 0x1BE (446
in decimal, 676 in Octal).
Examining FAT Disks
• File Allocation Table (FAT) is the file structure database that Microsoft designed for floppy disks.
• It is used to organize files on a disk so that the OS can find the files it needs.
• Since its development, other OSs, such as Linux and Macintosh, can format, read, and write to FAT
storage devices such as USB drives and SD cards.
• The FAT database is typically written to a disk’s outermost track and contains filenames, directory
names, date and time stamps, the starting cluster number, and file attributes (archive, hidden,
system, and read-only).
• There are three current versions of FAT—FAT16, FAT32, and exFAT (used for mobile personal storage
devices)
• Three older FAT formats, which are FATX, Virtual FAT (VFAT), and FAT12
FAT12: This version is used specifically for floppy disks, so it has a limited amount of storage space.
FAT16: To handle larger disks, Microsoft developed FAT16, which is still used on older Microsoft Oss
FAT32: When disk technology improved and disks larger than 2 GB were developed, Microsoft released
FAT32, which can access larger drives.
exFAT:
• Developed for mobile personal storage devices, such as flash memory devices, and memory sticks.
• The exFAT file system can store very large files, such as digital images, video, and audio files.
VFAT:
• Developed to handle files with more than eight-character filenames and three-character extensions;
introduced with Windows 95.
• VFAT is an extension of other FAT file systems.
FATX:
• Modified version of the FAT32 file system format.
• The FATX file system format is used on the Xbox video game console hard disk.
• Unrecognizable by the Windows operating system.
Cluster Sizes
Cluster sizes vary according to the hard disk size and file system.
Minimum size allocated for any file
• Microsoft OSs allocate disk space for files by clusters.
• This practice results in drive slack
• unused space in a cluster between the end of an active file’s content and the end of the cluster.
• leads to file slack space
• When the OS stores data in a FAT file system, it assigns a starting cluster position to a file.
• Data for the file is written to the first sector of the first assigned cluster.
• When this first assigned cluster is filled and runs out of room, FAT assigns the next available cluster
to the file.
• If the next available cluster isn’t contiguous to the current cluster, the file becomes fragmented.
• In the FAT for each cluster on the volume, the OS writes the address of the next assigned cluster:
linked list of (occupied, next)
Deleting FAT Files
• When a file is deleted in Windows Explorer or with the MS-DOS delete command, the OS inserts a
HEX E5 (0xE5) in the filename’s first letter position in the associated directory entry.
• This value tells the OS that the file is no longer available and a new file can be written to the same
cluster location
• The data in the file remains on the disk drive.
• The area of the disk where the deleted file resides becomes unallocated/free disk space
• Forensics tools can recover data still residing in this area.
• Security: FAT32 only offers shared permissions, while NTFS allows you to set specific
permissions to local files/folders.
•
• Compression: FAT32 does not offer any compression option. NTFS does allow for individual
compression of files and folders so you don’t slow down the system.
• Compatibility: NTFS is compatible with operating systems back to Windows XP. For Mac OS
users, however, NTFS systems can only be read by Mac, while FAT32 drives can be both read
and written to by the Mac OS.
Windows Artifacts
Deleted Data
• Hitting the delete key doesn't do anything to the data itself
• “Deleting” a file only tells the computer that the space occupied by that file is available if the computer
needs it.
• Data can be extracted from these unallocated spaces
Hibernation File(Hiberfile.Sys)
• Hibernation save data to the hard drive as opposed to just holding it in RAM (like “sleep”)
• Data written to the hard-drive itself are more persistent and can be recovered.
• It is possible that files deleted by a suspect could still be found here.
Registry
• registry is a database for configuration files.
• keeps track of user and system configuration and preferences
• Items of interest include:
• search terms,
• programs that were run or installed,
• Web addresses,
• files that have been recently opened, etc.
Recycle Bin
• Normally, users count on the trash can to erase their evidence.
• Deleted files can be recovered from the recycle bin
Metadata
• Defined as data about data.
• There are two kinds of metadata: application and file system.
• The file system keeps track of our files and folders as well as some information about them.
• File system metadata include the date and time a file or folder was created, accessed, or modified.
Thumbnail Cache
• Windows creates smaller versions of the photos called thumbnails for ease of browsing
• Most users are completely unaware that these files even exist.
• These files remain even after the original images have been deleted.
• Even if we don't recover the original image, thumbnails can serve as the next best evidence.
• Their mere existence tells us that those pictures existed at one point on the system.
Prefetch
Prefetch files can show that an application was indeed installed and run on the system at one time.
Example:
• a wiping application such as “Evidence Eliminator.”
• programs like this are designed to completely destroy selected data on a hard drive.
• we may not be able to recover the original evidence as it has been wiped
• the mere presence of “Evidence Eliminator” can prove to be almost as crucial as the original files
themselves
Link Files
• Link files are shortcuts in microsoft
• They point to other files
• The computer itself creates them in several different places
• Recent option in the file menu tab
• Link files have their own date and time stamps showing when they were created and last used.
• Link means that someone actually opened the file in question.
Attribution
• A windows PC will set up two accounts by default, the administrator and a guest account.
• The administrator has all rights and privileges on the machine.
• The guest generally has less authority.
• Each account on the machine is assigned a unique number called a security identifier or SID.
• Many actions on the computer are associated with, and tracked by, a specific SID.
• It's through the SID that we can tie an account to some particular action or event.
• Run the command 'whoami /user' from command line to get the SID for the logged in user.
External Drives
• Theft of intellectual property is a huge concern
• One way that would-be thieves could easily smuggle data out of an organization is by way of one of
these external storage devices, such as a pen-drive.
• Additionally, these devices can also be used to inject a virus or store child pornography.
• Examiners are often asked to determine whether any such device has been attached to a computer
• Whether or not such a device was attached can be determined by data contained in the registry.
Print Spooling
• In some investigations a suspect's printing activities may be relevant.
• The delay observed after clicking the ‘print’ button is an indication of a process called spooling.
• Spooling temporarily stores the print job
• Windows creates a pair of complementary files
• Enhanced Meta File (EMF) which is an image of document to be printed
• Spool file which contains information about the print job itself.
• Spool file (.spl): printer name, computer name as well as the user account
• Normally deleted automatically after the print job is finished
Exception:
• some kind of problem and the document didn't print.
• computer that is initiating the print job may be set up to retain a copy
• Copies of extortion letters, forged contracts, stolen client lists, and maps to body dump sites are few
pieces of evidences
Examining Linux File Structures
• The most widely used distributions include Ubuntu, CentOS, Mint, Fedora, and Gentoo.
• UNIX was created in the early 1970s to be a multiuser, multithreaded, secure OS.
• The Linux kernel is usually packaged with other software components, such as a GUI and
applications, so that users don’t have to combine several open-source elements to create a working
environment.
• The term “kernel” is often used when discussing Linux because technically, Linux is only the core of
the OS.
• Linus Torvalds, the inventor of Linux, maintains the official kernel.
• All other tools, graphical interfaces, and so forth are maintained and developed by others
File Structures in Ext4
Linux supports a wide range of file systems.
• The early standard was Second Extended File System (Ext2)
• Then Third Extended File System (Ext3) replaced Ext2 in most Linux distributions.
• Its major difference from Ext2 was being a journaling file system, which has a built-in file recovery
mechanism used after a crash.
• Fourth Extended File System (Ext4)
• added support for partitions larger than 16 TB,
• improved management of large files,
• offered a more flexible approach to adding file system features
• In UNIX and Linux, everything is considered a file, including disk drives, monitors, tape drives, network
interface cards, system memory, and directories.
• Linux has four components defining the file system: boot block, superblock, inodeblock, and data block.
• A block is the smallest disk allocation unit in the UNIX/Linux file system and can be 512 bytes and up
• Block size depends on how the disk volume is initiated.
Boot block:
• contains the bootstrap code—instructions for startup
• A UNIX/Linux computer has only one boot block, on the main hard disk
Superblock
• contains vital information about the system and is considered part of the metadata
• specifies the disk geometry and available space
• keeps track of all inodes
• also manages the file system
• configuration information, such as block size
• file system names,
• blocks reserved for inodes,
• volume name
• Multiple copies of the superblock are kept in different locations on the disk to prevent losing such
important information
Inode blocks
• contain the first data after the superblock
• an inode is assigned to every file allocation unit.
• as files or directories are created or deleted, inodes are also created or deleted.
• the link between inodes associated with files and directories controls access to those files or
directories.
Data block
• directories and files are stored on a disk drive in this block
• this location is linked directly to inodes.
• the Linux file system on a PC has 512-byte sectors.
• a data block is equivalent to a cluster of disk sectors on a FAT or NTFS volume.
• blocks range from 1024 to 4096 bytes each on a Linux volume.
Linux file system
Inodes
• Inodes contain file and directory metadata
• When a file or directory is created on a Linux file system, an inode is assigned
• Contains the following information:
• The mode and type of the file or directory
• The number of links to a file or directory
• The number of bytes in the file or directory
• The file’s or directory’s last access time and last modified time
• The inode’s last file status change time
• The block address for the file data
• The indirect, double-indirect, and triple-indirect block addresses for the file data
• Current usage status of the inode
• The number of actual blocks assigned to a file
• The only pieces of metadata not in an inode are the filename and path.
• Inodes contain modification, access, and creation times, not filenames.
• An assigned inode has 13 pointers that link to data blocks and other pointers where files are stored.
• Pointers 1 through 10 link directly to data storage blocks in the disk’s data block and contain block
addresses indicating where data is stored on the disk.
• These pointers are direct pointers because each one is associated with one block of data storage.
• As a file grows, the OS provides up to three layers of additional inode pointers.
• In a file’s inode, the first layer of pointers are called indirect pointers.
• The pointers in the second layer are called double-indirect pointers, and the pointers in the last or
third layer are called triple-indirect pointers.
Indirect Pointers
• To expand storage allocation, the OS initiates the original inode’s 11th pointer, which links to 128
pointer inodes.
• Each pointer links directly to 128 blocks located in the drive’s data block.
• If all 10 pointers in the original inode are consumed with file data, the 11th pointer links to another
128 pointers.
• The first pointer in this indirect group of inodes points to the 11th block.
• The last block of these 128 inodes is block 138.
Double-indirect Pointer
• If more storage is needed, the 12th pointer of the original inode is used to link to another 128 inode
pointers.
• From each of these pointers, another 128 pointers are created.
• This second layer of inode pointers is then linked directly to blocks in the drive’s data block.
• The first block these double-indirect pointers point to is block 139.
Triple-indirect pointer
• If more storage is needed, the 13th pointer links to 128 pointer inodes
• each pointing to another 128 pointers
• and each pointer in this second layer points to a third layer of 128 pointers
• then we encounter data blocks
Bad block inode
• All disks have more storage capacity than the manufacturer states.
• For example, a 240 GB disk might actually have 240.5 GB free space because disks always have bad
sectors.
• Windows does not keep track of bad sectors, but Linux does in an inode called the bad block inode.
• The root inode is inode 2, and the bad block inode is inode 1.
• Some forensics tools ignore inode 1 and fail to recover valuable data for cases.
• Someone trying to mislead an investigator can access the bad block inode, list good sectors in it, and
then hide information in these supposedly “bad” sectors.
Understanding Macintosh File Structures
• The current Macintosh OS is macOS, version 10.13, code-named High Sierra.
• Other versions still in use include 10.12.5 (Sierra), 10.11 (El Capitan), 10.9 (Yosemite), 10.6 (Snow
Leopard), 10.7 (Lion), and 10.8 (Mountain Lion).
• macOS is built with the new Apple File System (APFS).
• Apple’s OSs have been developing since 1984 with the introduction of Apple System 1.
• In 1997, Apple introduced Mac OS 8, followed by Mac OS 9 and then OS X.
• With OS X, Macintosh moved to the Intel processor and became UNIX based.
• Before OS X, the Hierarchical File System (HFS) was used, in which files are stored in directories (folders)
that can be nested in other directories.
• With Mac OS 8.1, Apple introduced Extended Format File System (HFS+).
• The main difference between HFS and HFS+ is that HFS was limited to 65,536 blocks (512 bytes per
block) per volume, and HFS+ raised the number of blocks to more than 4 billion.
• Consequently, HFS+ supports smaller file sizes on larger volumes, resulting in more efficient disk use.
An Overview of Mac File Structures
In older versions of macOS, a file consists of two parts:
• a data fork, where data is stored,
• a resource fork, where file metadata and application information are stored
• Both forks contain the following essential information for each file:
• Resource map
• Resource header information for each file
• Window locations
• Icons
• The data fork typically contains data the user creates, such as text or spreadsheets.
• Applications, such as Microsoft Word or Excel, also read and write to the data fork.
• When you’re working with an application file, the resource fork contains additional information, such
as menus, dialog boxes, icons, executable code, and controls.
• In macOS, the resource or data fork can be empty.
Volume
• A volume is any storage medium used to store files.
• It can be allor partof the storage media for hard disks
• In Mac OS 9 and earlier, a volume on a floppy disk was always
the entire floppy.
• With larger disks, the user or administrator now defines a
volume.
• Volumes have allocation blocks and logical blocks.
• A logical block is a collection of data that cannot exceed 512
bytes.
• When you save a file, it is assigned to an allocation block,
which is a group of consecutive logical blocks.
Static acquisitions:
• capture data that is not accessed by other processes that can change it
• if you have preserved the original media, making a second static acquisition should produce the same
results.
• the data on the original disk is not altered, no matter how many times an acquisition is done
Live acquisitions:
• file metadata, such as date and time values, changes when read by an acquisition tool
• making a second live acquisition while a computer is running collects new data because of dynamic
changes in the OS.
Understanding Storage Formats for
Digital Evidence
• The data a forensics acquisition tool collects is stored as an image file, typically in an open-source or
proprietary format
• Each vendor has unique features, so several different proprietary formats are available
• Depending on the proprietary format, many forensics analysis tools can read other vendors’
formatted acquisitions.
• Many acquisition tools create a disk-to-image file in an older open-source format, known as raw, as
well as their own proprietary formats.
• The new open-source format, Advanced Forensic Format (AFF), is gaining recognition from some
forensics examiners.
Raw Format
In the past, examiners performed a bit-by-bit copy from one disk to another disk the same size or larger
• As a practical way to preserve digital evidence, vendors made it possible to write bit-stream data to
files
• This copy technique creates simple sequential flat files of a suspect drive or data set.
Disadvantage
• requires as much storage space as the original disk or data set
• some raw format tools, typically freeware versions, might not collect marginal (bad) sectors on the
source drive
• Several commercial acquisition tools can produce raw format acquisitions
• Typically perform a validation check by using Cyclic Redundancy Check (CRC32), Message Digest 5
(MD5), and Secure Hash Algorithm (SHA-1 or later) hashing functions
Proprietary Formats
Most commercial forensics tools have their own formats for collecting digital evidence.
Proprietary formats typically offer several features that complement the vendor’s analysis tool
Disadvantage
• Inability to share an image between different vendors’ computer forensics analysis tools.
Advanced Forensic Format
Dr. Simson L. Garfinkel developed an open-source acquisition format called Advanced Forensic
Format (AFF).
This format has the following design goals:
• Capable of producing compressed or uncompressed image files
• No size restriction for disk-to-image files
• Space in the image file or segmented files for metadata
• Simple design with extensibility
• Open source for multiple computing platforms and OSs
• Internal consistency checks for self-authentication
• File extensions include .afdfor segmented image files and .afmfor AFF metadata.
• Because AFF is open source, digital forensics vendors have no implementation restrictions on
this format.
Determining the Best Acquisition Method
There are two types of acquisitions: static acquisitions and live acquisitions.
• Typically, a static acquisition is done on a computer seized during a police raid, for example.
• If the computer has an encrypted drive, a live acquisition is done if the password or passphrase is
available
• the computer is powered on and has been logged on to by the suspect.
• Static acquisitions are always the preferred way to collect digital evidence.
• Limitations in some situations
• encrypted drive that is readable only when the computer is powered on
• computer that is accessible only over a network
Types:
Hiding data
Password Attacks
Steganography
Data Destruction
Data Hiding
• Some techniques applied for data hiding are:
• Changing file names and extensions,
• burying files deep within seemingly unrelated directories,
• hiding files within files,
• encryption
Encryption
• The legitimate use of encryption has enabled us to enjoy many of the Internet
services that we now take for granted
• For example, encryption used in ecommerce permits us to do online shopping
• It can also have serious consequences when used by criminals, terrorists,
unfriendly nations, etc.
What Is Encryption?
• Encryption is the conversion of data into a form, called cipher text, which cannot be easily understood
by unauthorized people
• Encryption starts with plain text
• the original, unencrypted message
• is in the clear and can be read by anyone
• A cryptographic algorithm is then applied to the plain text, producing cipher text.
• Cipher text is basically a scrambled version of plain text that is unintelligible
• The algorithmis the method used to encrypt the message
• The keyis data used to encrypt and decrypt the information.
• A passwordor passphraseis commonly used as the key.
• Fundamentally, there are two types of encryption algorithms: symmetrical and asymmetrical.
• Symmetrical encryption uses the same key to encrypt and decrypt the data.
• In contrast, asymmetrical encryption uses two separate and distinct keys
• The encryption algorithms themselves are open and well published
• Best practice in cryptography states that the security of algorithms should be “independent of their
secrecy”
• the key should be the only secret
Key Space
• Key space is a metric that is often discussed when talking about the strength
of a particular encryption scheme
• The key space or key length has a direct impact on our ability to break the
encryption, particularly with a brute force attack.
• Longer the key, more time it takes to find the correct combination
• Longer the keyspace, longer can be our key
• A brute force attack tries to break the password by attempting every possible
key combination until the right one is found.
Types of Encryption
• Encryption tools are now included with some versions of the newer operating systems
• BitLocker is for Windows 7, FileVaultis for Apple OS X
• These encryption schemes can be applied selectively, only encrypting certain files or folders
• They can also be used to encrypt an entire drive.
• This is known as full or whole disk encryption.
• Operating systems in their course of normal operation will leave artifacts scattered across the
drive
• Even though we encrypt an entire folder containing our sensitive files, remnants (or the entire
file) could be located in other places
• Full disk encryption takes care of these data “leaks.”
Drawback:
Performance will likely suffer as the data are being encrypted and decrypted
Password Attacks
• Breaking passwords, or cryptanalysis, can be encountered during an investigation
• Avoiding encryption is always preferable to having to attack passwords.
• There are tools and techniques we can use to increase our chances of success
• One thing working in our favor is the vulnerability that humans bring
• long random strings of letters, numbers, and characters make for excellent passwords
• they are also tough for people to remember
• most passwords are based on actual words, recognizable patterns, or both
Options include
• brute force attacks
• resetting passwords
• dictionary attacks
Brute Force Attacks
• Use as much computing power as we can muster to guess the correct password
• The more computers (processors) we can use, the faster we can break it
Password Reset
• Sometimes we will go after the software rather than the password.
• Some applications have vulnerabilities that can be exploited to simply reset the password, giving us
the access we need.
Dictionary Attack
• A dictionary attack is more precise, using words and phrases that can be collected from multiple
sources
• Example: a forensic application can create an index of all the words found on a suspect's hard drive
• These words would come from both the allocated and unallocated space.
• Intelligence, the background information on our suspect or target, can really increase our chances of
success.
• This information can be used to build a dictionary of potential passwords
• Gathering this information starts at the scene.
Steganography
• Steganography, or stegofor short, comes from the Greek words “Stegos” meaning covered and
“Graphie” meaning writing
• Its exact roots equate to covered writing.
• A definition of steganography: “the hiding of a secret message within an ordinary message and the
extraction of it at its destination”
There are two files composing the finished stegofile
Carrier file
Payload
• The file that contains the secret message is called the carrier file.
• Carrier files can be image files, video files, audio files, and word processing documents, just to
name a few. The embedded secret document is called the payload.
• Carrier file types are used because they have a significant amount of redundant data, also known
as “noise”
• The redundant data are replaced with the data composing the hidden message.
• Payload files do not necessarily have to be text based.
• An image file can be inserted into another image file.
Why stegois a challenge?
It is very difficult to detect.
Once discovered it is very tough, if not impossible, to extract the payload without knowing the
stegoapplication and password used to create it.
Data Destruction
• Sometimes hiding data is not enough, and perpetrators try to destroy the data instead
• Destroying the data is a little more complicated than hitting the delete key
• Many drive wiping tools can be very effective in removing data completely
• Using utilities such as these can leave telltale signs of their use, providing substantial evidence
even without the original data in question.
Drive Wiping
• Drive wiping utilities are used to overwrite data on a hard drive in such a way as to make them
unrecoverable
• Most of these applications are promoted and/or intended to keep personal or corporate
information private.
• Using these tools is not an “all or none” proposition
• They can wipe only specified files while leaving others untouched
• Operating system files, for example, could be left intact.
• They can target specific files and folders as well as potentially incriminating system values like
those found in the Windows Registry.
• From an evidentiary or investigative perspective, the presence or use of these applications
can serve as the next best thing to the original evidence.
• Suspects may find it hard to explain why “Evidence Eliminator” software was installed and run
on their computer the day before their computer was searched.
• The figure showing windows registry entry is an indicator that this software was installed on
the machine.
Facebook.com/viralparmarhacker
Twitter.com/viralparmarhack
Instagram.com/viralparmarhacker
Linkedin.com/in/viral-parmar
www.viralparmarhacker.com
Stay Connected
+91 8980808222, +91 8866827872 Stay Safe
#LogOutNow