Lec3 23-3-2024
Lec3 23-3-2024
Image Acquisitions
Contingency Planning for Image Acquisitions
Make contingency plans in case software or hardware doesn’t
work or you encounter a failure during an acquisition
• Create a duplicate copy of your evidence image file
• Make at least two images of digital evidence
– Use different tools or techniques (make more attempts to copy
corrupted areas of a drive. So using more than one tool can be helpful in
making sure data has been copied correctly.)
• Copy host protected area of a disk drive
– Consider using a hardware acquisition tool that can access
the drive at the BIOS level
• Be prepared to deal with encrypted drives
– Whole disk encryption feature in Windows Vista Ultimate
and Enterprise editions (Ref. page 100)
Encrypted Hard Drives
• Windows BitLocker
• TrueCrypt
• If the machine is on, a live acquisition will capture
the decrypted hard drive
• Otherwise, you will need the key or passphrase
– The suspect may provide it
Using Acquisition Tools
• Acquisition tools for Windows
– Advantages
• Make acquiring evidence from a suspect drive more convenient
– Especially when used with hot-swappable devices ( USB-3 or SATA)
– Disadvantages
• Must protect acquired data with a well-tested write-blocking hardware
device
• Tools can’t acquire data from a disk’s host protected area
Windows Write-Protection with USB Devices
• Concerns
– How much data storage is needed?
– What type of RAID is used?
– Do you need to have all drives connected?
– Do you have the right acquisition tool?
– Can the tool read a forensically copied RAID image?
– Can the tool read split data saves of each RAID disk?
Acquiring RAID Disks (continued)
• Vendors offering RAID acquisition functions
– Technologies Pathways ProDiscover
– Guidance Software EnCase
– X-Ways Forensics
– Runtime Software
– R-Tools Technologies
• Occasionally, a RAID system is too large for a
static acquisition
– Retrieve only the data relevant to the investigation
with the sparse or logical acquisition method
Using Remote Network
Acquisition Tools
Using Remote Network Acquisition Tools
• Password Protection
• Encrypted communications
• Secure Communication Protocol
• Write Protected Trusted Binaries
• Digital Signatures
Remote Acquisition with EnCase
Enterprise
• Remotely acquires media and RAM data
• Integration with intrusion detection system (IDS) tools
• Options to create an image of data from one or more systems
• Preview of systems
• A wide range of file system formats
• RAID support for both hardware and software
Other Remote Acquisition Tools
• R-Tools R-Studio
• WetStone LiveWire
• F-Response
Remote Acquisition with Runtime
Software
• Compact Shareware Utilities
– DiskExplorer for FAT
– DiskExplorer for NTFS
– HDHOST (Remote access program)
• Features for acquisition
– Create a raw format image file
– Segment the raw format or compressed image
– Access network computers’ drives
Using Other Forensics-
Acquisition Tools
Using Other Forensics-Acquisition
Tools
• Tools
– SnapBack DatArrest
– SafeBack
– DIBS USA RAID
– ILook Investigator IXimager
– Vogon International SDi32
– ASRData SMART
– Australian Department of Defence PyFlag
SnapBack DatArrest
• Functions
– Disk-to-image copy (image can be on tape)
– Disk-to-disk copy (adjusts target geometry)
• Parallel port laplink can be used
– Copies a partition to an image file
– Compresses image files
DIBS USA RAID
• Rapid Action Imaging Device (RAID)
– Makes forensically sound disk copies
– Portable computer system designed to make disk-to-
disk images
– Copied disk can then be attached to a write-blocker
device
ILook Investigator IXimager
• Iximager
– Runs from a bootable floppy or CD
– Designed to work only with ILook Investigator
– Can acquire single drives and RAID drives
ASRData SMART
• Linux forensics analysis tool that can make image
files of a suspect drive
• Capabilities
– Robust data reading of bad sectors on drives
– Mounting suspect drives in write-protected mode
– Mounting target drives in read/write mode
– Optional compression schemes
Australian Department of Defence
PyFlag
• PyFlag tool
– Intended as a network forensics analysis tool
– Can create proprietary format Expert Witness image
files
– Uses sgzip and gzip in Linux