Chapter 8 - Computer Forensics Analysis and Validation
Chapter 8 - Computer Forensics Analysis and Validation
and Investigations
Fourth Edition
Chapter 8
Computer Forensics Analysis and
Validation
Objectives
• Considerations
– Determine the scope of the investigation
– Determine what the case requires
– Whether you should collect all information
– What to do in case of scope creep
• The key is to start with a plan but remain flexible in
the face of new evidence
Validating Forensic Data
Validating Forensic Data
• One of the most critical aspects of computer
forensics
• Ensuring the integrity of data you collect is
essential for presenting evidence in court
• Most computer forensic tools provide automated
hashing of image files
• Computer forensics tools have some limitations in
performing hashing
– Learning how to use advanced hexadecimal editors
is necessary to ensure data integrity
Validating with Hexadecimal Editors
• File manipulation
– Filenames and extensions
– Hidden property
• Disk manipulation
– Hidden partitions
– Bad clusters
• Encryption
– Bit shifting
– Steganography
Hiding Partitions
• Old technique
• Shift bit patterns to alter byte values of data
• Make files look like binary executable code
• Tool
– Hex Workshop
Using Steganography to Hide Data
• Techniques
– Dictionary attack
– Brute-force attack
– Password guessing based on suspect’s profile
• Tools
– AccessData PRTK
– Advanced Password Recovery Software Toolkit
– John the Ripper
Recovering Passwords (continued)