Guide to Computer Forensics and Investigations Fourth Edition

Slides:



Advertisements
Similar presentations
Guide to Computer Forensics and Investigations Third Edition
Advertisements

Working with Disks and Devices
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
CSN08101 Digital Forensics Lecture 6: Acquisition
Guide to Computer Forensics and Investigations Fifth Edition
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
COS 413 Day 13. Agenda Questions? Assignment 4 Due Assignment 5 posted –Due Oct 21 Capstone proposal Due Oct 17 Lab 5 on Oct 15 in N105 –Hands-on Projects.
COS/PSA 413 Day 5. Agenda Questions? Assignment 1 due –Not corrected-still missing one submission Assignment 2 posted –Case project 2-1 on page 72 and.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Guide to Computer Forensics and Investigations Third Edition Chapter 7 Current Computer Forensics Tools.
Guide to Computer Forensics and Investigations Third Edition
1 CSCD496 Computer Forensics Lecture 5 Applying Process to Computer Forensics Winter 2010.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
COS/PSA 413 Day 11. Agenda Lab 4 Write-ups Corrected –2 A’s, 2 B’s and 1 C –Some need more attention to detail Lab 5 write-ups due Oct 19 Wednesday Lab.
Guide to Computer Forensics and Investigations, Second Edition
Mohd Taufik Abdullah Department of Computer Science
Data Acquisition Chao-Hsien Chu, Ph.D.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
COEN 252 Computer Forensics
Capturing Computer Evidence Extracting Information.
Guide to Computer Forensics and Investigations, Second Edition
Hands-on: Capturing an Image with AccessData FTK Imager
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Preserving Evidence ● Number one priority ● Must also find incriminating evidence ● Must search the contents of the hard drive ● Can not change the hard.
1 Chapter Overview Floppy Disk Drives Hard Disk Drives.
Digital Crime Scene Investigative Process
Window NT File System JianJing Cao (#98284).
Chapter 9 Digital Forensics Analysis and Validation
Managing Disks and Drives Chapter 13 powered by dj.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Guest Lecture September 21, 2009.
Computer Forensics Infosec Pro Guide Ch 6 Testing Your Tools.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Guide to MCSE , Second Edition, Enhanced 1 File Storage Basics Basic storage Centers on partitioning physical disk Dynamic storage New method supported.
Configuring Data Protection Chapter 12 powered by dj.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Chapter 4 Data Acquisition Guide to Computer Forensics and Investigations Fourth Edition Last modified
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
CJ 317 – Computer Forensics
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Chapter 3 Data Acquisition Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with additional info from.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
ITMT Windows 7 Configuration Chapter 4 – Working with Disks and Devices ITMT 1371 – Windows 7 Configuration 1.
GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS FOURTH EDITION CHAPTER 7 CURRENT COMPUTER FORENSICS TOOLS.
Creighton Barrett Dalhousie University Archives
Data Acquisition Chao-Hsien Chu, Ph.D.
Maintaining Windows Server 2008 File Services
Guide to Computer Forensics and Investigations Fifth Edition
Chapter 5 EnCase Concepts.
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Exam Information CSI5107 Network Security.
Guide to Computer Forensics and Investigations Third Edition
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 3 Data Acquisition.
Presentation transcript:

Guide to Computer Forensics and Investigations Fourth Edition Chapter 4 Data Acquisition

Guide to Computer Forensics and Investigations Objectives Explain data acquisition Understand digital evidence storage formats and how to determine the best acquisition method Describe contingency planning for data acquisitions Explain the importance of data acquisition validation Guide to Computer Forensics and Investigations

Introducing Data Acquisition Data Acquisition is the process of copying data. In computer forensics, it’s the task of collecting digital evidence 2 Types of data acquisition Static acquisitions Live acquisitions First, we’ll describe the following 3 formats for digital evidenc. Examples page 103 Guide to Computer Forensics and Investigations

Introducing Data Acquisition (Cont.) Static acquisitions Copy a hard drive from a powered-off system when a suspect's drive is write-protected and can't be altered. Static acquisitions are repeatable if you have preserved the disk evidence. Establish integrity and can be used as evidence in court First, we’ll describe the following 3 formats for digital evidenc. Examples page 103 Guide to Computer Forensics and Investigations

Introducing Data Acquisition (Cont.) Source: http://grussell.org/df/slides/wk6.ppt

Introducing Data Acquisition (Cont.) Write Blockers Do not allow data to be written Read-commands only Source: http://grussell.org/df/slides/wk6.ppt

Introducing Data Acquisition (Cont.) Live acquisitions Acquire data (e.g. RAM data and any other volatile data) when a suspect computer can’t be shut down to perform a static acquisition. Data is collected from the local computer or over a remote network connection. The captured data might be altered during the acquisition because it’s not write-protected Live acquisitions are not repeatable Because data is continuously altered by the OS First, we’ll describe the following 3 formats for digital evidenc. Examples page 103 Guide to Computer Forensics and Investigations

Understanding Storage Formats for Digital Evidence Collected data by a computer forensics acquisition tool is stored as an image file (copy of the digital evidence) in one of three formats: Raw format (open source format) Proprietary formats Advanced Forensics Format (AFF) (open source format) First, we’ll describe the following 3 formats for digital evidence Guide to Computer Forensics and Investigations

Understanding Storage Formats for Digital Evidence (Cont.) Raw Format Bit-by-bit copy of the drive to a file (Linux dd command) Advantages Fast data transfers Can ignore minor data read errors on the source drive Most computer forensics tools can read raw format Disadvantages Requires as much storage space as original disk or data Some raw format tools (freeware versions) might not collect marginal (bad) sectors on the source drive Not all data is collected Guide to Computer Forensics and Investigations

Understanding Storage Formats for Digital Evidence (Cont.) Proprietary Formats Most commercial computer forensics tools have their own formats for collecting digital evidence. Offer features not available with Raw: Compress image file of a suspect drive and save space Can split an image into smaller segmented files to fit onto other media, such as to CDs or DVDs Can integrate meta data into the image file Date and time of the acquisition Hash value (for self-authentication) of the original disk or medium Investigator name, comments, case details, etc. Guide to Computer Forensics and Investigations

Understanding Storage Formats for Digital Evidence (Cont.) Proprietary Formats (Cont.) Disadvantages Inability to share an image between different vendors’ computer forensics analysis tools Proprietary file formats means you will convert from one format to another to use multiple tools Converting between formats may corrupt data if the formats are not well understood File size limitation for each segmented volume Guide to Computer Forensics and Investigations

Understanding Storage Formats for Digital Evidence (Cont.) Advanced Forensics Format (AFF) This open and extensible format (for multiple platforms and OSs) that stores image data and metadata. Design goals Provide compressed or uncompressed image files No size restriction for disk-to-image files Provide space in the image file or segmented files for metadata File extensions include .afd for segmented image files and .afm for AFF metadata Some kinds of metadata that are interesting in computer forensics: File system metadata (e.g. MAC times, access control lists, etc.) Digital image metadata. Although information such as the image size and number of colors are technically metadata, JPEG and other file formats store additional data about the photo or the device that acquired it. Document metadata, such as the creator of a document, it's last print time, etc. Guide to Computer Forensics and Investigations

Determining the Best Acquisition Method Four methods for acquiring data Bit-stream disk-to-image file copy Bit-stream disk-to-disk copy Logical disk-to-disk or disk-to-disk data Sparse data copy (of a file or folder) We’ll describe the following 2 types of data and 4 different methods for acquiring data Guide to Computer Forensics and Investigations

Determining the Best Acquisition Method (Cont.) Bit-stream disk-to-image file copy Most common method and offers the most flexibility for your investigation Can make more than one copy of a suspect drive Copies are bit-by-bit replications of the original drive You can use a variety of tools to read and analyze data (ProDiscover, EnCase, FTK, X-Ways, iLook) Guide to Computer Forensics and Investigations

Determining the Best Acquisition Method (Cont.) Bit-stream disk-to-disk copy Copy data from one drive to another when disk-to-image copy is not possible Because of hardware or software errors or incompatibilities (common issue when you have to acquire older drives) Consider disk’s geometry configuration to copy data exactly from an older disk to a newer disk The copied data matches the original suspect drive You can use EnCase, SafeBack, SnapCopy Guide to Computer Forensics and Investigations

Track Geometry of a Hard Drive Sector Allocated Unit sizes (per sector) 512 bytes 1024 bytes 2048 bytes 4096 bytes 8192 bytes 16 Kilobytes 32 Kilobytes 64 Kilobytes Cluster – Group of Sectors © Thomas Computer Forensics LLC

Determining the Best Acquisition Method (Cont.) Collecting evidence from a large drive can take several hours. If your time is limited, consider using a: Logical acquisition disk-to-disk or disk-to-data file Logical acquisition captures only specific types of files of interest to the case (e.g Outlook .pst files) Use this method when you don’t need to examine the entire drive Sparse acquisition Similar to logical acquisition In addition, it collects fragments of unallocated (deleted) data A relire et comprendre exemples page 103 Microsoft Outlook creates a “pst” file, which is a data file where electronic copies of email generated by Outlook is stored on a hard drive. ost files, created by Microsoft Exchange Server. Microsoft Outlook's offline usage email archive files get an extension of .OST (Offline Storage Table). If you are using Microsoft Exchange Server, all the email messages, calendar, tasks, notes and other items are delivered to and stored on the server. However if an user is not using Exchange Server, then all the email messages, calendar, and other items are delivered to and stored locally in a Personal Folders (.OST) file. Typically, when you use a Microsoft Exchange Server account, your email messages, calendar, and other items are delivered to and saved on the server. You can configure Outlook to keep a local copy of your items on your computer in an Outlook data file that is named an offline Outlook Data File (.ost). This allows you to use Cached Exchange Mode or to work offline when a connection to the Exchange computer may not be possible or wanted. The .ost file is synchronized with the Exchange computer when a connection is available. Your items can also be moved or archived to an Outlook Data File (.pst). Because a .pst file is kept on your computer, it is not subject to mailbox size limits on the mail server. By moving items to a .pst file on your computer, you can free up storage space in the mailbox on your mail server. Guide to Computer Forensics and Investigations

Determining the Best Acquisition Method (Cont.) Main considerations when acquiring data Size of the source (suspect) disk Lossless compression might compress a disk image by 50% or more Use MD5 or SHA-1 hash to verify the image Page 104 Lossless compression a class of data compression algorithm is used in cases where it is important that the original and the decompressed data be identical (used byt zip file format) Guide to Computer Forensics and Investigations

Determining the Best Acquisition Method (Cont.) Main considerations when acquiring data (Cont.) When working with large drives, an alternative is using tape backup systems No limit to size of data acquisition, just use many tapes But slow Whether or not you can retain the suspect’s disk In civil litigation, you may be asked to return the original disk after imaging it Page 104 Guide to Computer Forensics and Investigations

Contingency Planning for Image Acquisitions Create a duplicate copy of your evidence image file Make at least two images of digital evidence Use different tools or techniques Copy host protected area of a disk drive Consider using a hardware acquisition tool that can access the drive at the BIOS level Be prepared to deal with encrypted drives Whole disk encryption feature in Windows Vista Ultimate and Enterprise editions meaning Page 105 Whole Disk Encryption: An encryption technique that performs a sector-by-sector encryption of an entire drive. Each sector is encrypted in its entirety, making it unreadable when copied with a static acquisition method. The host protected area is an area of a hard drive that is not normally visible to an operating system. Often used by manufacturers to hide a maintenance and recovery system for the computer. Guide to Computer Forensics and Investigations

Validating Data Acquisitions Most critical aspect of computer forensics Requires using a hashing algorithm utility Validation techniques CRC-32, MD5, and SHA-1 to SHA-512 MD5 has collisions, so it is not perfect, but it’s still widely used SHA-1 has some collisions but it’s better than MD5 Guide to Computer Forensics and Investigations

Validating Data Acquisitions (Cont.) Windows Validation Methods Windows has no built-in hashing algorithm tools for computer forensics Third-party utilities can be used Commercial computer forensics programs also have built-in validation features Each program has its own validation technique Raw format image files don’t contain metadata Separate manual validation is recommended for all raw acquisitions Guide to Computer Forensics and Investigations

Guide to Computer Forensics and Investigations Summary Data acquisition methods Plan your digital evidence contingencies Several tools available Use a physical write-blocker device for acquisitions Always validate acquisition Guide to Computer Forensics and Investigations