Documents-Metadata9o0
Documents-Metadata9o0
MSc #11761
2018
• Overview..
• File Identification..
• Understanding Metadata..
• Types of Metadata..
• Useful Data!..
• Addition Embedded Metadata..
• Temporary Files..
• Ghiro – Image Forensics..
3
Overview
1
• Any file stored by any file system must have similar
structure
• i.e. MSWord document can be opened with Word for
Macintosh, Word for Windows, or OpenOffice.
2
• Extensions acts as a superficial identifier of file type.
3
• Several internal identifiers that files use to introduce
themselves (file metadata and file structure).
Metadata..
o Files can contain two types of metadata that applications use
to recognize and open the file:
o Internal metadata is contained within the file and can
consist of a binary string or a text string
o Metadata containers (the MFT attributes, the file header,
magic number).
File Header..
5
A binary file has binary metadata.
Digital Archaeology: The Art and Science Digital Forensics
Magic Numbers..
Embedded metadata
• Is generated the first time that the file is saved to the file
system
The Create • It is not necessarily the date that the file was originally
Attribute saved
• create attribute serves only as supplemental evidence to
support other findings
System Metadata.. Create.
Two things affect If a user copies a file The two files are identical, each
will have a different create date
the create date from one location to
another The source file show the date it
was initially saved
o These files are treated as any other deleted file and, if not
overwritten by later files, can still be recovered by most
forensic software.
Tools..
• Metadata Analyzer
• http://regex.info/exif.cgi
• Ghiro, http://www.imageforensic.org/
• https://metashieldanalyzer.elevenpaths.com/
• FOCA, https://www.elevenpaths.com/labstools/foca/
• Python Tools: check…..
• http://www.file-
extensions.org/filetype/extension/name/temporary-files
Ghiro – Image Forensics..
Ghiro: Analysis Results
References..
• Incident Response & Computer Forensics 3E, McGraw Hill, 2014
• Handbook of Digital Forensics and Investigations, Eoghan Casey,
• SIFT, http://computer-forensics.sans.org/community/downloads,
• Digital Forensics Research Workshop. http://www.dfrws.org/
• Forensics Wiki, http://www.forensicswiki.org/wiki/Main_Page,
Carving …
• Overview
• How
42
Overview
• Files continue to exist on most media until overwritten!
• Files cannot be opened without reforming them into their
original structure
• Traditional data recovery methods rely on file system
structures like file tables to recover data that has been
deleted
• But, what if the file system structures are corrupted?
What Is File Carving?
File Carving
• Forensic technique that recovers files based merely on file
structure and content from raw data and without any
matching file system metadata
‒ E.g., recover deleted file from unallocated disk space
Why Need File Carving?
• Data still exists but cannot be correctly interpreted due to
absent or damaged metadata
Examples:
• File system corruption
• Formatted device
• Unknown file formats
• Files deleted (whether intentionally or not)
Caution #1
• File carving is not just about storage media and file systems!
‒ E.g. carving from network traffic, memory dumps, etc)
Caution #2
• Carving is not just about files too!
• Examples
‒ Strings from memory
‒ Code from malware
‒ Single packets from the network
Types of File Carving
A Method for
• Recover a fragmented JPEG file depending on the
Recovering JPEG
process of mapping between the structure of original
Files Based on
image and thumbnail
Thumbnail
Carving • Employing a fixed and unique hex pattern (UHP) in (JFIF, ExIF)
format to detect the thumbnails and embedded JPEG file as a
Thumbnail/s and pre-processing data to simplify the restoring of JPEG files.
Embedded JPEG
Files Using Image • PattrecCarve can distinguish and recognize the structure of the
Pattern Matching thumbnails, embedded JPEG, or original JPEG file
Existing Techniques… Absence of File
System
First, load a configuration file stating specs for files to be carved One
3 full pass records locations for file headers and footers in a DB For
each chunk, a work queue ensures same data is not read twice Files
are written as read, resulting in a small memory foot print