CH 08
CH 08
Computer
Forensics
and
Investigations
Sixth Edition
Chapter 8
1
2
2
• Explain how to locate and recover graphics files
• Describe how to identify unknown file formats
• Describe types of graphics file formats
3 3
otherwise on a password-protected website for classroom use.
in part, except for use as permitted in a license distributed with a certain product or service or
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
Recognizing a
Graphics File
Graphic files contain digital photographs, line art, three-dimensional images,
text data converted to images, and scanned replicas of printed pictures.
•Graphic program creates 3 types of image file
• Bitmap images: a collection of dots/pixels (represented as a
resolution on display)
• Vector graphics: based on mathematical instructions- they too
are pixels but are stored in a vector, making it easy to print
• Adding text (vector) to a photograph
(bitmap)
• Are usually smaller than bitmap
• Metafile graphics: a combination of bitmap and vector
•Types of programs to edit image files
• Graphics editors ( create, modify and save )
• Image viewers ( Open and view no changes to the content)
• When using these tools, you open image files such as BMP, GIF, and
JPEG.
• These files have different qualities, including color, compression,
4 4
Understanding
Bitmap and Raster
Images
5
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in
whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
5
Understanding
Bitmap and Raster
Images
6
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in
part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use. 6
Understanding Bitmap and Raster Images
Using Irfanview tools
www.irfanview.com
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
7 7
Understanding
Vector Graphics
8
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in
whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
8
otherwise on a password-protected website for classroom use.
in part, except for use as permitted in a license distributed with a certain product or service or
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
Understanding Metafile
Graphics
• Metafile graphics combine raster and vector
graphics
• Example
• Scanned photo (bitmap) with text or arrows
(vector)
• Share the advantages and disadvantages of both
Bitmap and Vector files.
• For example when enlarged, the bitmap part
loses resolution quality, but the vector
formats remain sharp and clear.
9 9
• Graphic files created and saved in
graphic editors, such as:
• MS Paint,
• Adobe Freehand MX,
• Adobe Photoshop
• Gnome GIMP (Linux app) Understanding
• Some editors work for Vectors graphics ( Graphics File
Freehand MX) and others work for both
such as Photoshop Formats (1 of 3)
• Most Graphic editors can create and
save files in one or more of the
Standard Graphic Formats
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 10
classroom use.
10
Understanding
Graphics File
Formats (2 of 3)
11
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in
whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
11
Understanding
Graphics File
Formats (3 of 3)
13
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in
part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use. 13
Understanding
Digital Photograph
File Formats
14
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in
whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
14
Understanding
Digital Photograph
File Formats
15
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in
whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
15
Understanding
Digital Photograph
File Formats (7 of 8)
16
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in
whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
16
Understanding
Digital
Photograph
File Formats
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in
17
whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
17
Differences of EXIF and JPEG Header
Info
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use. 18
otherwise on a password-protected website for classroom use.
in part, except for use as permitted in a license distributed with a certain product or service or
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
Understanding Data
Compression
• Most graphics file formats compress their data
• GIF and JPEG
• Others, like BMP, do not compress their data
• Use data compression tools for those
formats
• Data compression
• Coding data from a larger to a smaller form
• Compression Scheme Types
• Lossless compression and
• lossy compression
19 19
otherwise on a password-protected website for classroom use.
in part, except for use as permitted in a license distributed with a certain product or service or
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
20 20
Locating and Recovering Graphics
Files
• Operating system tools are
• Time consuming
• Results are difficult to verify
• Digital forensics tools:
• Used to analyze graphics files based on the information on the
graphics files.
• Each graphic file has a header that identify the file format
• Header are complex.
• Should not remember the format but it is advised to compare the
good file header with suspect file.
• Eg. If you have an image that you suspect is a jpeg but can not display
with a bitmap graphic program, do compare it with a header of a
known jpeg file to decide if the header is altered.
• Before doing this comparison, you might need to test if the suspect
graphic file header has some damage parts or overwritten with other
data.
• This damage header needed to be repaired by rebuilding the file
header before doing the forensics analysis.
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
21
Identifying Graphics File
Fragments
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 22
22
otherwise on a password-protected website for classroom use.
in part, except for use as permitted in a license distributed with a certain product or service or
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
23 23
24
24
value FFD8, followed by the label JFIF for a
• A JPEG file has the hexadecimal header
• Exercise:
• Case details:
• Two cousins; tom Johnson and Jim Shu. Jim Shu has been terminated.
Bob Aspen is an external contractor and investor who gets strange
email from Terry Sadler about Jim Shu’s new project. Chris Robinson
( President of the company) to inquire about this new project. Chris
also forward this email to the IT consultant to examine the attachment
of the email.
• The IT Consultant examines the attachment and the result shows some
hidden data.
• The following Slides shows the emails exchanged.
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 26 26
Repairing Damaged
Headers (4 of 4)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
in part, except for use as permitted in a license distributed with a certain product or service or 27
otherwise on a password-protected website for classroom use. 27
Searching for and Carving Data
from Unallocated Space
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
28
Rebuilding the Header
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
29
Searching for and
Carving Data
from Unallocated
Space
• Steps
• Planning your examination
• Searching for and
recovering digital
photograph evidence
• Use Autopsy for
Windows to search for
and extract (recover)
possible evidence of
JPEG files
• False hits are referred
to as false positives
30
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use. 30
Activities
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in
whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
31
Identifying Unknow file format:
Introduction
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use. 32
otherwise on a password-protected website for classroom use.
in part, except for use as permitted in a license distributed with a certain product or service or
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
33
otherwise on a password-protected website for classroom use.
in part, except for use as permitted in a license distributed with a certain product or service or
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
34
Identifying Unknow file format:
Analyzing Graphic File Header
• The TIF is a well-known file format for transmitting faxes and printing
publications.
• TIF files header start at offset “0” with hexadecimal 49 49 2A, which
translate to the letter “II” in ASCII.
• The first 3 bytes of an XIF file are the same as TIF file followed by other
hexadecimal values.
• The XIF start with Hexadecimal values 49 49 2A and has offset of 4 bytes
of
5C 00 00 20 65 58 74 65 6E 64 65 64 20 03
See the textbook example
• Knowing the header of the TIF you may detect the XIF file.
• For more information you may check the following :
• www.fileformat.info/info/mimetype/image/vnd.xiff/index.html
36
Identifying Unknow file
otherwise on a password-protected website for classroom use.
in part, except for use as permitted in a license distributed with a certain product or service or
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
format:
Understanding Steganography
in graphics files
37
Identifying Unknow file
otherwise on a password-protected website for classroom use.
in part, except for use as permitted in a license distributed with a certain product or service or
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or
format:
Understanding Steganography
in graphics files
• Two major forms of steganography: insertion
and substitution
• Insertion
• Hidden data is not displayed when viewing
host file in its associated program
• You need to analyze the data structure
carefully to reveal the hidden message.
• Example: Web page
• You may create a web page with Html. You
might display images and text in a web
browser without revealing the HTML code
• To detect hidden text, you need to compare
the file display and what the file contains.
38
The Other type of Steganography is substitution:
format:
Using Steganalysis Tools
• You may use several Steganalysis tools ( Steg
Tools), to detect, decode, and record hidden
data, even in file that have been renamed to
protect their contents.
• The Steg tools can also detect the variation of an
image.
• The steg tool can identify the alternation with
the file header.
41
42
Understanding Copyright Issues