Guide To Computer Forensics: 6 Edition
Guide To Computer Forensics: 6 Edition
6TH EDITION
CHAPTER 3
DATA ACQUISITION
List digital evidence storage formats
Live acquisition
Static Acquisition
File metadata, such as date and time
capture data that’s not accessed by other
values, changes when read by an
processes that can change
acquisition tool
if you have preserved the original media,
Making a second live acquisition while a
making a second static acquisition should
computer is running collects new data
produce the same results
because of dynamic
The data on the original disk isn’t altered, no changes in the OS
matter how many times an acquisition is
done
TYPES OF DATA ACQUISITION (2 OF 2)
The processes and data integrity requirements for Because of the use of whole disk encryption, data
static and live acquisitions are similar acquisitions are shifting toward
live acquisitions with newer operating systems (OSs)
UNDERSTANDIN Data in a forensics acquisition
tool is stored as an image file
G STORAGE Three formats
EVIDENCE (AFF)
Makes it possible to write bit-stream data to files
Disadvantages
Disadvantages
Inability to share an image between different tools
File size limitation for each segmented volume
THE BEST
ACQUISITION
METHOD (2 OF
4) Creating • When disk-to-image copy is not possible
a disk- • Tools can adjust disk’s geometry configuration
to-disk • Tools: EnCase and X-Ways
DETERMINING THE BEST
ACQUISITION METHOD (3 OF 4)
PLANNING FOR
IMAGE Copy host protected area of a disk drive as well
ACQUISITIONS Copy • Consider using a hardware acquisition tool that can access the drive at the BIOS level
• BelkaSoft
• ILookIX IXImager
Be • Whole disk encryption feature in Windows called BitLocker makes static acquisitions
more difficult
• May require user to provide decryption key
• Elcomsoft Forensic Disk Decryptor
Acquisition tools for Windows
Advantages
Make acquiring evidence from a suspect drive more convenient
Especially when used with hot-swappable devices
Disadvantages
Must protect acquired data with a well-tested write-blocking hardware device
Tools can’t acquire data from a disk’s host protected area
Some countries haven’t accepted the use of write-blocking devices for data
acquisitions
Mini-WinFE
Enables you to build a Windows forensic boot CD/DVD or USB
drive so that connected drives are mounted as read-only
Before booting a suspect’s computer:
Connect your target drive, such as a USB drive