Chapter 7 - Current Computer Forensics Tools
Chapter 7 - Current Computer Forensics Tools
and Investigations
Fourth Edition
Chapter 7
Current Computer Forensics
Tools
Types of Computer Forensics Tools
• Acquisition (continued)
– Two types of data-copying methods are used in
software acquisitions:
• Physical copying of the entire drive
• Logical copying of a disk partition
– The formats for disk acquisitions vary
• From raw data to vendor-specific proprietary
compressed data
– You can view the contents of a raw image file with
any hexadecimal editor
• Acquisition (continued)
– Creating smaller segmented files is a typical feature
in vendor acquisition tools
– All computer forensics acquisition tools have a
method for verification of the data-copying process
• That compares the original drive with the image
• Extraction
– Recovery task in a computing investigation
– Most demanding of all tasks to master
– Recovering data is the first step in analyzing an
investigation’s data
• Extraction (continued)
– From an investigation perspective, encrypted files
and systems are a problem
– Many password recovery tools have a feature for
generating potential password lists
• For a password dictionary attack
– If a password dictionary attack fails, you can run a
brute-force attack
• Reconstruction
– Re-create a suspect drive to show what happened
during a crime or an incident
– Subfunctions
• Disk-to-disk copy
• Image-to-disk copy
• Partition-to-partition copy
• Image-to-partition copy
• Reconstruction (continued)
– Some tools that perform an image-to-disk copy:
• SafeBack
• SnapBack
• EnCase
• FTK Imager
• ProDiscover
• Considerations
– Flexibility
– Reliability
– Expandability
– Keep a library with older version of your tools
• Create a software library containing older versions
of forensics utilities, OSs, and other programs