Forensics Data
Forensics Data
1. Overview
2. Data Handling
3. Types of Data
4. Data Integrity
5. Data Acquisition
6. Hard Drives and Disk Images
There are many commonalities: It’s really hard to work with this data:
■ Logical vs. Physical ■ Data extraction can be hard.
■ Overt vs. Hidden ■ Capacities are increasing — top-of-the-line
computers to analyze top-of-the-line.
■ Data is frequently corrupt.
Overview (ctd.)
- The forensics data is acquired, stored, transmitted and analyzed
in many different data formats.
Disk Images
■ Disk image files (MB to GB in size)
Memory Images
■ raw files; debug files
■ Swap files
■ Hibernation Files 休眠文件
Data Handling Principles
4
Types of Data
• Two types of data:
不稳定数据 – Volatile data: data that is lost when the system is powered off,
• e.g., a list of running processes and current users
– Nonvolatile data: data that is not lost when the power is removed,
• e.g., the hard disk.
Nonvolatile Data
-Consist of data that will exist after the system is powered off.
●In most cases, this includes only the hard disk.
●A copy of the entire disk, including unallocated, referred to as forensics image,
must be made.
5
Volatile Data
•OS type and version
Volatile System Information •System installation date
•Registered owner
•System profile
•System directory
•Current system date and time
•Total amount of physical
•Command history
memory
•Current system uptime
•Pagefile location
•Running processes
• Installed physical hardware
•Open files, start up files, clipboard data
and configurations
•Logged on users
•Installed software applications
•DLLs or shared libraries
Dynamic-link Library
8
Data Integrity – Chain of Custody
Electronic Evidence -- Chain of Custody Form
Chain of custody
From location Date reason To location Signature
• Dead acquisitions:
• preferred over live ones;
• However, some cases require a live acquisition, e.g., :
• critical server that cannot be shutdown
• shutdown would alert the attacker that he has been detected
• risk of losing the data when the power is removed.
10
Data Acquisition (ctd.)
• Data acquisition guidelines:
• Document what tools you run and any modifications made to the system
• Using the network to copy data from the suspect system to a trusted
server:
• Can be used for both live and dead acquisitions.
• Can be performed, e.g., using netcat (command line) tool, which acts as
both client and server
• Can also be performed (alternatively) by mounting a network drive,
using Samba or NFS, on the trusted server and copying the data to it.
• Placing a new disk in the suspect system, then booting the system
from a trusted CD-ROM, and imaging the suspect disk into the new
disk.
12
Hard Drives and Disk Images
Hard drives and disk images are the most common
form of digital evidence.
A logical dump is a copy of all the files on the drive.
■ Typically 0-1M files, 0-2TB in size.
■ Frequently preserved as a ZIP or ZIP64 file.
■ Commonly used in e-discovery (electronic discovery).
Easy to acquire:
■ Remove disk and image through a write blocker
■ Boot a Linux “live CD” (e.g., Cain) and image to an external drive.
■ Copy the diskname.VHD file from a Virtual Machine
Hard Drives and Disk Images (cont.)
Disk Image Formats
There are many different disk image formats.
■ RAW (dd) — ■ AFF — compressed open source format
—easiest format to work with; fast; very big —Can store image as a single file (>2GB) or as
—Handled by all tools multiple files (.afd format)
—Many file systems (FAT32, ext2), cannot have files —Supports encryption and digital signatures;
larger than 4GB Extensible
—Poorly supported.
—Poor performance on certain Windows NTFS
■ Encase (.E01) — compressed format developed by disk images.
Expert Witness / Guidance Software
—Compressed
—Evidence split across multiple “volumes” (file.E01, ■ Split raw (file.000, file.001, file.002, etc.)
file.E02, etc.) —Not all tools can handle.
—Doesn't work with some tools (carvers, etc.)
—Supports "passwords" but not encryption.
Hard Drives and Disk Images (cont.)
If you mount a disk image,
you will only see the
allocated (“resident” or
“overt”) files.
Hard Drives and Disk Images (ctd.)