COEN 252 Computer Forensics

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

The Modern Control Boot Disk. 2 What do we mean by a Modern control boot disk? In your previous lectures you learned about the original DOS control boot.
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
CSN08101 Digital Forensics Lecture 6: Acquisition
Computer Forensics.
COEN 252 Computer Forensics
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Slides by Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802
Guide to Computer Forensics and Investigations, Second Edition
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Digital Forensics Module 11 CS /26/2004Module 112 Outline of Module #11 Overview of Windows file systems Overview of ProDiscover Overview of UNIX.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Guide to Computer Forensics and Investigations Third Edition Chapter 7 Current Computer Forensics Tools.
Guide to Computer Forensics and Investigations Third Edition
1 CSCD496 Computer Forensics Lecture 5 Applying Process to Computer Forensics Winter 2010.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
Guide to Linux Installation and Administration, 2e1 Chapter 13 Backing Up System Data.
Collection of Evidence Computer Forensics 152/252.
Data Acquisition Chao-Hsien Chu, Ph.D.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Guide to Computer Forensics and Investigations, Second Edition
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
Hands-on: Capturing an Image with AccessData FTK Imager
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
Passwords, Encryption Forensic Tools
COEN 252 Computer Forensics Windows Evidence Acquisition Boot Disk.
NIST CFTT: Testing Disk Imaging Tools James R. Lyle National Institute of Standards and Technology Gaithersburg Md.
IT GOVERNANCE AND CYBERCRIME Open Source Forensic Tools 19/04/10.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
Defining Digital Forensic Examination & Analysis Tools Brian Carrier.
Preserving Evidence ● Number one priority ● Must also find incriminating evidence ● Must search the contents of the hard drive ● Can not change the hard.
Digital Crime Scene Investigative Process
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Guest Lecture September 21, 2009.
Guide to Computer Forensics and Investigations Fourth Edition
Computer Forensics Infosec Pro Guide Ch 6 Testing Your Tools.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Evidence Handling If the evidence is there the case is yours to lose.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Chapter 3 Data Acquisition Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with additional info from.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS FOURTH EDITION CHAPTER 7 CURRENT COMPUTER FORENSICS TOOLS.
Evidence Acquisition Slides by Chao-Hsien Chu, Ph.D.
Creighton Barrett Dalhousie University Archives
Data Acquisition Chao-Hsien Chu, Ph.D.
File Structure 2018, Spring Pusan National University Joon-Seok Kim
File Managements.
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
COEN 252: Computer Forensics
Digital Forensics Dr. Bhavani Thuraisingham
Digital Forensics Chris Rozic.
Digital Forensics CJ
Forensic Recovery of Evidence Device (FRED)
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 3 Data Acquisition.
Presentation transcript:

COEN 252 Computer Forensics Forensic Duplication of Hard Drives

Forensics Duplicates as Admissible Evidence Federal Rules of Evidence §1002 requires an original to prove the content of a writing, record, or photograph. Follows from the best evidence rule: Copying can introduce errors.

Forensics Duplicates as Admissible Evidence F.R.E. §1001 (3) If data are stored in a computer or similar device, any printout or other output readable by sight, shown to reflect the data accurately, is an "original".

Forensics Duplicates as Admissible Evidence Federal Rules of Evidence § 1003 A duplicate is admissible to the same extent as an original unless (1) a genuine question is raised to the authenticity of the original or (2) in the circumstances it would be unfair to admit the duplicate in lieu of the original.

Forensics Duplicates as Admissible Evidence As familiarity with digital data increases, behavior of the judicial system will increase in rationality.

Reasons for Forensics Duplication The examination can destroy evidence inadvertently. The original computer system might only be available for capturing.

Definition of Forensic Duplication Able to produce identical byte stream from duplicate as from the original.

Definitions Forensic Duplicate: File that contains every bit of information from the source in a raw bitstream format. Qualified Duplicate: Same as above, but allows embedded metadata or certain types of compression.

Definitions Restored Image: A forensic duplicate or qualified forensic duplicate restored to another storage medium. Difficult to do if second hard drive does not have the same geometry as the previous one.

Definitions Mirror Image created from hardware that does a bit-to-bit copy from one hard drive to another. Issue with disk and file system metadata such as boot sectors.

Creating a Forensics Duplicate of a Hard Drive Hardware Mirroring. Can be done in the field.

Creating a Forensics Duplicate of a Hard Drive Hardware Imager Creates forensic duplicate from suspect drive to evidence drive Sector by Sector Copy Needs (Integrated) Write Blocker Verification of copy MD5, SHA1 of complete copy Logging of results Deal with operation errors Confusion between suspect and evidence drive

Creating a Forensics Duplicate of a Hard Drive Current and Future Issues Large data size Read errors become more likely Storage crosses devices RAID Level 5, 6 Need for acquisition from a life system

Creating a Forensics Duplicate of a Hard Drive Software tools: Unix dd Tested and proven. Runs on Unix/Linux/Mac OS X which can recognize almost any hardware. Free.

Creating a Forensics Duplicate of a Hard Drive Software tools: Encase Expensive. Full Suite of Forensics Tools. Great Market Penetration. Based on Windows, which can be a problem, since Windows might “discover” a drive connected to the system.

Creating a Forensics Duplicate of a Hard Drive Software Tools: Safeback Specialized Imaging Tool. Uses DOS Target Drive needs FAT 32.

Creating a Forensics Duplicate of a Hard Drive FTK Drive Duplication tool included in the Forensic Tool Kit

Write-blocking Software or hardware tool that prevents writes to a disk. Software tools are hard to validate. All forensics tools need to be validated before use. Manufacturers offer expert testimony when tools are challenged Forensics institutes publish test results Test images at Purdue Examiners might to do some testing as well. Publication in peer-reviewed journals increases value of testimony

Write-blocking Hardware write blocking Simple device put between the disk and the interface. Allows acknowledgments of writes to the system on which the drive is mounted, but does not write. Easy to validate by design and experiment

Write-blocking Hardware write blocking Use hardware write blocking devices as a standard means to prevent overwriting evidence when making a forensic duplicate Keep a variety of hardware blockers around because they do not always work. (System does not recognize drive).

Equipment Needs Set of write blockers Set of cables, converters, … Forensics portable (usually not laptop) for software acquisition Hardware duplicator

NIST http://www.cftt.nist.gov/ Digital Data Acquisition Tool Test Assertions and Test Plan Digital Data Acquisition Tool Specification Disk Imaging Specifications 3.1.6 The top-level disk imaging tool requirements are the following: The tool shall make a bit-stream duplicate or an image of an original disk or partition. The tool shall not alter the original disk. The tool shall be able to verify the integrity of a disk image file. The tool shall log I/O errors. The tool’s documentation shall be correct.