RAID FORENSICS
RAID FORENSICS
Shashidhar T K
Principal Consultant,
Data Security Council of India
DISCLAIMER
What is RAID?
RAID is a storage technology that combines multiple physical disks into a single
logical unit. It offers data redundancy, improved performance and scalability.
RAID can be implemented using either hardware-based or software-based
approaches. Hardware RAID employs dedicated hardware controllers for efficient
RAID operations, while software RAID relies on the operating system to manage
RAID configurations.
Why RAID?
Data
RAID is one of the versatile technology that finds 1 Redundancy
Due to the RAID-enabled system's design, configuration, and the large storage
capacities involved, acquiring and reconstructing data from RAID-enabled disks
presents significant challenges for forensic examiners. With systems now scaling
to multiple terabytes, the primary concern is the sheer storage capacity of RAID-
enabled disks. Addressing these challenges is essential for investigators to
effectively solve cases involving RAID-enabled systems.
01 CCITR|RAID Forensics
UNDERSTANDING RAID
RAID protects against data loss in case of a single drive failure. Imagine having
multiple copies of important files spread across different drives. If one drive fails,
you can still access the data from the remaining drives.
There are different RAID levels available to preserve the data on Hard Disk Drive
(HDD) or Solid-State Drive (SDD). RAID levels are categorized based on the
techniques used in RAID. The key techniques include:
Striping: Data is divided into blocks and distributed across multiple disks for
increased performance.
Mirroring: Data is duplicated on multiple disks for redundancy.
Parity: Error-correcting code is calculated and stored on one or more disks to
recover data in case of a disk failure.
The most popular RAID levels include RAID 0, RAID 1, RAID 5, RAID 6, RAID 10,
though there are many more. The RAID level employed by an organization
depends on what the company likes to achieve. Certain RAID configurations can
significantly improve reading and writing speeds. This is achieved by distributing
data across multiple drives, allowing the system to access data in parallel. RAID
systems can be scaled up by adding more disks. As mentioned earlier, different
levels use different techniques for storing data.
RAID 0
RAID 0: This level performs basic disk striping
by spreading data across all the drives in the D1 D2 Data
RAID 1
CCITR|RAID Forensics 02
RAID 5: This level stripes data and parity information across at least three
drives. Parity information allows for the reconstruction of failed data in case of
a single drive failure.
RAID 5
B1 B2 B Parity B3
Stripe
C1 C Parity C2 C3
D Parity D1 D2 D3
RAID 10: This level combines striping and mirroring. It stripes data across
multiple mirrored sets of drives. RAID 10 offers good performance and
redundancy, but it requires more drives than other RAID levels.
RAID 10
RAID 0
Striping
RAID 1 RAID 1
Mirroring Mirroring
D1 D1 D2 D2
D3 D3 D4 D4
D5 D5 D6 D6
D7 D7 D8 D8
03 CCITR|RAID Forensics
For example, consider a RAID-enabled system having 24TB storage capacity
(4 Hard Disk Drives x 6TB storage capacity) as shown below.
Even though the total raw storage capacity is 24TB (4 HDDs x 6TB), it is showing
12TB storage space only. This difference makes sense because RAID 10 offers data
redundancy but sacrifices storage space.
CCITR|RAID Forensics 04
RAID 10
RAID 0
Striping
RAID 1 RAID 1
Mirroring Mirroring
6 TB 6 TB 6 TB 6 TB
With four drives, half are used for mirroring, leaving the other half for usable
storage.
Therefore, in this case, only half the total capacity (24TB) is available, which is
12TB.
In this research 02 test devices were used. The specifications of devices are as
follows:
Workstation Tower Desktop
05 CCITR|RAID Forensics
INTRODUCTION TO RAID FORENSICS
Unlike a system attached with a single drive, RAID presents a unique challenge for
the investigators. To handle RAID-enabled systems, law enforcement officials
would require a deep understanding of different RAID levels (e.g., RAID 5, RAID 6),
its configurations and expertise in RAID forensics to handle them.
RAID forensics deals with the recovery and analysis of digital evidence from
storage systems that utilize RAID technology. RAID forensics requires specialized
knowledge, tools, and techniques to effectively analyze and interpret data stored
within RAID arrays.
RAID level involved. For example, recovering data from RAID 0 (striping) is
more challenging than RAID 1 (mirroring).
The condition of the RAID-enabled disks. For example, data recovery becomes
more difficult if multiple disks have failed.
01 03 05
IDENTIFY RE-CONSRTUCT
Examine and Reassemble
determine the RAID ACQUIRE fragmented data ANALYSE & REPORT
SEIZE
level and its from multiple
Taking control or Extracting a complete Analyzing the re-
configurations. disks
possession of RAID- copy of the data constructed data and
enabled systems and using appropriate reporting the relevant
02 tools and techniques 04
its peripherals evidence
CCITR|RAID Forensics 06
SEARCH AND SEIZURE OF RAID-ENABLED SYSTEM IN “ON” CONDITION
Please ensure that you have the proper legal authority to conduct search and
seizure. Obtain a search warrant in case of a private place.
Secure and take control of the scene of crime both physically and
electronically.
Physically, by limiting access of all persons to the scene of the crime.
Electronically, by limiting additional new entries to the scene of crime by
disabling connectivity.
Document the current state (ON/OFF) of the system being seized.
If the target system is in ON condition, follow the steps below:
Capture the photograph of the system, including the peripherals
connected to it.
Take a photograph of the desktop screen containing files & folders,
shortcuts, along with date & time.
If possible, collect all the credentials related to the system.
Examine whether the system is connected to the network, if yes, isolate
the system from the network by disconnecting the connected ethernet
cable from the system or by disabling the Wi-Fi connection.
07 CCITR|RAID Forensics
Connect the external USB drive (Preloaded with live data acquisition/ RAM
acquisition tools) to the target system.
Record the make, model, serial number of the USB drive and document it in
the mahazar, including the date and time of insertion.
Acquire RAM dump using the memory acquisition tools (e.g., Dumpit, CAINE,
etc).
After acquiring the RAM, generate hash value of the forensic image file using
the hashing tools (certutil command, HashMyFiles, HashCalc, etc).
Take the picture of the hash value along with the hashing algorithm used or
copy and paste in notepad and save in external USB drive.
Check whether the disks utilized for RAID are encrypted or not.
Open the "Disk Management" tool by searching in the “Start Menu”.
In the lower central pane, identify the column named “File System” for
each listed disk.
If the “File System” of any disk marked as “NTFS (BitLocker Encrypted),”
note down the BitLocker Drive Encryption recovery keys of those disks
using Control Panel\All Control Panel Items\Device Encryption.
The Magnet Encryption Disk Detector tool may also be used.
If encrypted, identify and capture the encryption recovery key of the target
system.
If you are, unable to identify the encryption keys, it is recommended to take
logical backup/image.
CCITR|RAID Forensics 08
SEARCH AND SEIZURE OF RAID-ENABLED SYSTEM IN “OFF” CONDITION
CCITR|RAID Forensics 10
11 CCITR|RAID Forensics
IDENTIFICATION OF RAID CONFIGURATIONS
While dealing with RAID-enabled disks, the investigator must ensure proper
identification of RAID configurations because of the following reasons:
DATA RECOVERY
Knowing the RAID configuration can facilitate smooth data
recovery. Different RAID levels (e.g., RAID 0, RAID 1, RAID 5)
1
have different methods of data striping and redundancy, so
understanding the specific configuration is essential for
effective recovery of the data.
DATA INTERPRETATION
RAID configurations affect how data is stored and accessed.
Understanding the RAID setup allows investigators to interpret
3
the data correctly. For instance, they need to know if data is
striped across disks or mirrored for redundancy, as this impacts
how they analyse and interpret the information.
ENCRYPTION
Certain RAID configurations may encrypt the disks. Identifying
4 the RAID setup helps investigators determine if encryption is in
use and what steps are necessary to access the encrypted data,
such as obtaining encryption keys or passwords.
DATA DUPLICATION
RAID configurations can involve data duplication for
redundancy and performance reasons. Using the identified
5
RAID configuration, investigators do not mistakenly treat
duplicated data as separate evidence, thereby avoiding errors
in analysis and interpretation.
CCITR|RAID Forensics 12
PROCEDURE TO IDENTIFY THE RAID CONFIGURATIONS
Step 01: Right-click on “This PC” and select “Manage” the “Computer
Management” window will open.
Step 02: Click on “Disk Management” available under the “Storage” category. All
the disks and volumes will be displayed as shown below.
Figure 2: Disk Management window displaying all the storage drives attached to the system.
“UNALLOCA
“PRIMARY “SPANNED “STRIPED “MIRRORED
TED”
PARTITION” VOLUME” VOLUME” VOLUME”
STORAGE
On performing the above step, IO will be able to identify how many disks are
utilized to configure RAID and determine the levels of RAID employed. As a best
practice, it is recommended to record each disk details including volume name,
layout, type, file system, status, storage capacity, free space, etc.
13 CCITR|RAID Forensics
ACQUISITION OF RAID-ENABLED SYSTEM
Identify the RAM capacity of the target system and accordingly use a
destination USB drive (pen drive or external HDD) having more storage
capacity.
Plugin the USB drive, pre-loaded with the necessary tools (eg., Dumpit, FTK
Imager.exe, etc) for acquiring the RAM dump of the target system.
Run the “FTK Imager.exe” application available in the USB drive. In the home
page, go to “File” tab & click on “Capture Memory” and store the RAM dump in
the USB drive.
Generate the hash value of captured RAM dump and record the same.
Check whether the disks utilized for RAID are encrypted or not by using
Windows Disk management tool or Encrypted Disk Detector (EDD) tool.
If encrypted, identify and capture the encryption recovery key of the target
system.
If you are, unable to identify the encryption keys, it is recommended to take
logical backup/image.
CCITR|RAID Forensics 14
Step 03: Acquiring the Logical Backup/Image
Identify the storage capacity of the target system’s array of HDDs/SSDs and
accordingly use a destination external HDDs having more storage capacity
than the target system.
Connect the external HDD, pre-loaded with the necessary tools (in this
scenario, we have taken FTK imager tool as an example) for acquiring the array
of HDDs/SSDs.
Run the “FTK Imager.exe” application available in the external HDD. In the
home page, click on “File” and select “Create Disk Image”.
Select source evidence type as “Logical Drive”, click on “Next”, choose the
volume to be imaged from the drop-down list and click on “Finish”.
In the “Create Image” window, click on “Add” to include image destination and
in “Select Image Type” window, select “E01” or “Raw” format because most of
the forensic tools support these image formats.
Click on “Browse”, select the image destination folder to store the image file.
Please note, the destination folder should always be in external storage
device. Then, click on “Start” to initiate the imaging process. After the
completion of the imaging process the images will be available in the given
destination folder.
15 CCITR|RAID Forensics
PROCEDURE TO ACQUIRE THE RAID-ENABLED SYSTEM IN “OFF” CONDITION
At the lab, draw mahazar proceedings of opening and follow the steps below:
Connect the HDDs/SSDs to the examiner’s system through a writeblocker
device to perform forensic imaging process.
Run the “FTK Imager.exe” application available in the external HDD. In the
home page, click on “File” and select “Create Disk Image”.
Select source evidence type as “Physical Drive”, click on “Next”, choose the
physical drive to be imaged from the drop-down list and click on “Finish”.
In the “Create Image” window, click on “Add” to include image destination and
in “Select Image Type” window, select “E01” or “Raw” format because most of
the forensic tools support these image formats.
Click on “Browse”, select the image destination folder to store the image file.
Please note, the destination folder should always be in external storage
device. Then, click on “Start” to initiate the imaging process. After the
completion of the imaging process the images will be available in the given
destination folder.
Repeat the steps for imaging the other remaining seized HDDs/SSDs
CCITR|RAID Forensics 16
RECONSTRUCTION OF THE DATA ACQUIRED FROM RAID ENABLED DISKS
To reconstruct the data, here we are using a free tool named UFS Explorer RAID
Recovery. This tool helps to address the complex RAID data recovery challenges
faced by forensic examiners. The tool can recover the lost files from a wide range
of storage media, including internal hard disk drives, portable devices, virtual
disks, etc. This tool may be downloaded using the link:
https://www.ufsexplorer.com/ufs-explorer-raid-recovery/.
Step 1: Install and open UFS Explorer RAID Recovery tool in the analysis system.
Figure 3: UFS Explorer RAID Recovery tool displaying all the storage drives in the system.
17 CCITR|RAID Forensics
Step 3: In the “Choose disk image file” dialog box, select the target disk and open
the E01 image file of the RAID enabled disk. Subsequently, add all image of the
disks.
Step 4: After adding all the disk images, the tool automatically detects the RAID
level and storage capacity of the disks.
Figure 5: UFS Explorer RAID Recovery tool displaying the image file along with RAID partitions.
CCITR|RAID Forensics 18
Step 5: Double click on the partition to view the reconstructed data.
Once the data reconstruction is completed, the investigator can access the
contents across the array of disks and employ digital forensic techniques to
uncover incriminating evidence.
19 CCITR|RAID Forensics
CHALLENGES INVOLVED IN RAID FORENSICS
The RAID forensics involving identification, acquisition and analysis of data stored
on RAID-enabled systems poses several unique challenges compared to
traditional single-disk forensics. Some of the primary challenges include the
following:
Fragmentation: In few RAID levels, data typically striped across multiple disks
to improve the performance. This fragmentation makes it more challenging to
rebuild the data during forensic analysis.
Complex analysis: The process of analyzing data from a RAID system is often
intricate. Forensic tools need to account for RAID configurations and data
striping, which can be a lengthy process.
Data encryption: If the RAID system utilizes encryption, investigators will need
to acquire the decryption key to access the data. Without the key, data
recovery becomes impossible.
CCITR|RAID Forensics 20
RESEARCH PUBLICATIONS
MONTHLY NEWSLETTER
RAID FORENSICS
SEIZURE, ACQUISITION AND RECONSTRUCTION OF DATA
@CybercrimeCID @DSCI_Connect