FTK Imager
FTK Imager
Fernando Carbone
BIRMINGHAM - MUMBAI
Computer Forensics with FTK
All rights reserved. No part of this book may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written
permission of the publisher, except in the case of brief quotations embedded in
critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy
of the information presented. However, the information contained in this book is
sold without warranty, either express or implied. Neither the author, nor Packt
Publishing, and its dealers and distributors will be held liable for any damages
caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the
companies and products mentioned in this book by the appropriate use of capitals.
However, Packt Publishing cannot guarantee the accuracy of this information.
ISBN 978-1-78355-902-2
www.packtpub.com
Reviewers Proofreader
Gretchen Gueguen Simran Bhogal
Jacob Heilik
Indexers
Faraz Siddiqui
Mariammal Chettiyar
Technical Editors
Cover Work
Pragnesh Bilimoria
Aditi Gajjar Patel
Nikhil Potdukhe
Copy Editors
Dipti Kapadia
Kirti Pai
About the Author
He has worked in the financial industry (Unibanco and Itau) for seven years, and has
participated in investigation projects and computer forensics involving more than
100,000 assets. He was responsible for the creation of the incident response team at
these institutions.
Jacob Heilik has worked for 35 years in law enforcement (regulatory compliance
and criminal investigation) with the Canadian Federal Government. The last 10 years
of his career were spent learning and practicing digital forensics—searching and
seizing in the field, analyzing in the lab, and managing a talented team of examiners
and analysts. Since retiring from public service in 2009, he has concentrated his
efforts on improving digital forensic skills in law enforcement.
Did you know that Packt offers eBook versions of every book published, with PDF
and ePub files available? You can upgrade to the eBook version at www.packtpub.
com and as a print book customer, you are entitled to a discount on the eBook copy.
Get in touch with us at [email protected] for more details.
www.packtpub.com
Why Subscribe?
• Fully searchable across every book published by Packt
• Copy and paste, print and bookmark content
• On demand and accessible via web browser
[ ii ]
Table of Contents
[ iii ]
Preface
Welcome to Computer Forensics with FTK. This book has specially been created
to provide you with all the information you need to get started with the FTK
investigation platform. You will learn the basics of computer forensics and how to
use the FTK to conduct digital investigations generating court-accepted evidence.
Chapter 2, Working with FTK Imager, will teach you how to use the FTK Imager tool to
create forensic images of digital devices from volatile data, such as memory.
Chapter 4, Working with FTK Forensics, will cover the main computer forensics
process, explaining each step in depth. Also, you will learn some important features
of the FTK, such as managing users and processing options.
Chapter 5, Processing the Case, will cover how to use the most important features
for processing and filtering data during your investigation process. You will learn
how to set up the tool to perform data analysis, search information, and bookmark
your findings.
Chapter 6, New Features of FTK 5, will give an overview of the main new features
that have been developed in the FTK 5, and make you understand how these new
features can help you during your investigations.
Preface
Chapter 7, Working with PRTK, will teach you how to perform a password recovery
from files and systems using the PRTK and DNA products, and how it will help you
to solve problems when you find some protected information.
The book also helps law enforcement officials, corporate security, and IT
professionals who need to evaluate the evidentiary value of digital evidences.
Conventions
In this book, you will find a number of styles of text that distinguish between
different kinds of information. Here are some examples of these styles, and an
explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions,
pathnames, dummy URLs, user input, and Twitter handles are shown as follows:
"These files are located at C:\Windows\System32\Config."
New terms and important words are shown in bold. Words that you see on the
screen, in menus or dialog boxes for example, appear in the text like this: "Install the
Distributed Engine component, as it is necessary for the correct operation of FTK."
[2]
Preface
Reader feedback
Feedback from our readers is always welcome. Let us know what you think about
this book—what you liked or may have disliked. Reader feedback is important for us
to develop titles that you really get the most out of.
If there is a topic that you have expertise in and you are interested in either writing
or contributing to a book, see our author guide on www.packtpub.com/authors.
Customer support
Now that you are the proud owner of a Packt book, we have a number of things to
help you to get the most from your purchase.
[3]
Preface
Errata
Although we have taken every care to ensure the accuracy of our content, mistakes
do happen. If you find a mistake in one of our books—maybe a mistake in the text or
the code—we would be grateful if you would report this to us. By doing so, you can
save other readers from frustration and help us improve subsequent versions of this
book. If you find any errata, please report them by visiting http://www.packtpub.
com/submit-errata, selecting your book, clicking on the errata submission form link,
and entering the details of your errata. Once your errata are verified, your submission
will be accepted and the errata will be uploaded on our website, or added to any list of
existing errata, under the Errata section of that title. Any existing errata can be viewed
by selecting your title from http://www.packtpub.com/support.
Piracy
Piracy of copyright material on the Internet is an ongoing problem across all media.
At Packt, we take the protection of our copyright and licenses very seriously. If you
come across any illegal copies of our works, in any form, on the Internet, please
provide us with the location address or website name immediately so that we can
pursue a remedy.
We appreciate your help in protecting our authors, and our ability to bring you
valuable content.
Questions
You can contact us at [email protected] if you are having a problem with
any aspect of the book, and we will do our best to address it.
[4]
Getting Started with
Computer Forensics
Using FTK
Forensic Toolkit (FTK) is a complete platform for digital investigations, developed
to assist the work of professionals working in the information security, technology,
and law enforcement sectors.
Through innovative technologies used in filters and the indexing engine, the relevant
evidence of investigation cases can be quickly accessed, dramatically reducing the
time to perform the analysis.
This chapter will cover the first steps needed to install and configure the FTK tool.
• Preparation
• Acquisition and preservation
• Analysis
• Reports and presentation
This process will be discussed in more detail in Chapter 4, Working with FTK Forensics,
with the use of FTK forensics and enterprise editions.
The computer forensics tools need to be kept updated to address issues such as an
increasing size of hard drives and the use of encryption in order to reduce the time
to perform the data acquisition and analysis.
Getting Started with Computer Forensics Using FTK
• FTK forensics: This version of FTK, which will be covered in this book, has
the ability to perform the acquisition and analysis of digital devices such
as computer hard drives, USB drives, flash memory devices, smartphones,
tablets, and other digital media. Its approach is related to a process called
post-mortem computer forensics, which happens when the computer has
been powered down.
• AD Enterprise: In general, AD Enterprise has the same features as the FTK
forensics version plus the ability to analyze multiple computers across your
company simultaneously. Another important feature of this version is the
ability to acquire and analyze volatile data, such as RAM. The investigation
process is totally confidential, and the investigated user will not be aware
of the analysis, even if it is done through the network and with the target
equipment in use.
Downloading FTK
Once the FTK platform has been acquired, AccessData usually sends the DVDs
for product installation and the hardware dongle codemeter with the license of
the product.
If not, then it is possible to download the FTK directly from the AccessData website.
All other products are also available for download.
In this book, we will use FTK Version 5 onwards, and you can download the product
from http://www.accessdata.com/support/product-downloads.
[6]
Chapter 1
In general, the specification used for FTK with the PostgreSQL database is shown in
the following screenshot:
[7]
Getting Started with Computer Forensics Using FTK
1. Start the installation process by using the Database component. You can then
enter a password to create the PostgreSQL database admin user.
2. Once the database installation is done, install FTK.
3. Install the Distributed Engine component, as it is necessary for the correct
operation of FTK.
4. The View User Guide installation is optional, but highly recommended.
[8]
Chapter 1
5. To finish the FTK platform installation process, click on the Other Products
button and select the components listed as follows:
Make sure that you select the correct platform, which can be either 32-
or 64-bits, and in case the Unable to connect to the database requested
error message appears, just change the RDBMS option to PostgresSQL.
Next, you can complete the fields in the form and then click on OK to create the first
user. This user will be the application administrator, who will manage the FTK tool.
The use of the FTK tool will be discussed in the next few chapters.
[9]
Getting Started with Computer Forensics Using FTK
Summary
This chapter covered the first necessary steps to be performed in order to use the FTK
forensics tool. The first step was to understand the difference between standalone
and enterprise platforms as it is extremely important to determine the approach to be
used in an investigation. This will certainly impact the time of acquisition and data
analysis. Another important point was to consider the hardware prerequisites. Keep
in mind that more the computing power the hardware has, the faster is the response
of their analysis.
The analysis process is really time-consuming, and if not properly scaled, the
hardware can have a negative impact on your project.
In the next chapter, you will use FTK Imager, the free version of the platform, which
is commonly used for evidence acquisition and preanalysis of data.
[ 10 ]
Working with FTK Imager
FTK Imager is a free tool that can be downloaded from AccessData on its website,
mainly used for conducting acquisition of digital media. To ensure the integrity of
the data collected, it creates exact copies (forensic images), known as bit-to-bit or
bit stream.
FTK Imager is a powerful, free tool. It allows a preanalysis of the data, information
search, and the collection of volatile data such as RAM, along with other features that
will be covered through this chapter. You can download FTK Imager as well as other
products at http://www.accessdata.com/support/product-downloads.
This chapter discusses working with evidence using FTK Imager, allowing you to
accomplish the creation of forensic images that meet your exact needs.
You will also be shown how to operate FTK Imager as well as an overview of all the
features to understand the process of acquiring digital devices, which is considered
one of the most critical factors.
• Magnetic media:
°° Floppy disks
°° Hard drives
°° USB/PC cards
°° ZIP and tape drives
Working with FTK Imager
• Optical media:
°° CDs
°° CD-Rs and CD-RWs
°° DVDs
• Alternative media:
°° MP3 players
°° Tablets
°° Smartphones
°° Video games, TVs, and so on
FTK Imager has the ability to collect and analyze each of these devices.
Acquisition tools
FTK Imager makes a bit-for-bit duplicate image of the media, avoiding accidental
manipulation of the original evidence. The forensic image is an identical copy of
the original device, which includes the file slack and unallocated space, and allows
for the recovery of deleted files. The forensic duplication allows you to conduct the
investigation process using the image, preserving the original media.
The analysis of the acquired image can be performed later in the FTK, which allows
for a much more detailed investigation and the generation of the final report of the
information found.
When you use FTK Imager to create a forensic image of a hard drive or other
electronic device, ensure that you are using a hardware-based write blocker. By
doing this, you can be certain that the system does not alter the original source at
the time of attaching it to your computer.
[ 12 ]
Chapter 2
In the following picture, you can see a sample of the write blocker device:
Image formats
FTK Imager can support almost all types of images used in the market. The main
types are filesystems supported, Imager creates formats supported, and Imager read
formats. These are listed as follows:
[ 13 ]
Working with FTK Imager
°° exFAT
°° VXFS
°° EXT (2, 3, and 4)
°° NTFS (and NTFS compressed)
°° HFS, HFS+, and HFSX
• FTK Imager read formats—in the following screenshot you can see all the
formats that FTK Imager supports to read:
[ 14 ]
Chapter 2
The FTK Imager user interface is divided into several panes. The Evidence Tree
section, the File List section, the Properties section, and the Hex Value Interpreter
pane, The Custom Content Sources panes, the menu, and the toolbar can all be
undocked and resized to best suit your needs. Each can be redocked individually
or you can reset the entire view for the next investigation as shown in the
following screenshot:
[ 15 ]
Working with FTK Imager
• File: The File menu provides access to all the features you can use from
the toolbar.
• View: The View menu allows you to customize the appearance of FTK
Imager, which includes showing or hiding panes and control bars.
• Mode: The Mode menu lets you select the preview mode of the viewer.
• Help: The Help menu provides access to the FTK Imager user guide,
which gives information about the program version and more ways that
can assist you.
The toolbar
The toolbar contains all the tools and features that can be accessed from the
File menu.
[ 16 ]
Chapter 2
[ 17 ]
Working with FTK Imager
2. Select the source type you want to preview and then click on Next.
3. Select the drive or browse to the source you want to preview and then click
on Finish:
[ 18 ]
Chapter 2
[ 19 ]
Working with FTK Imager
[ 20 ]
Chapter 2
[ 21 ]
Working with FTK Imager
This feature allows you to add the emulated physical disk to a virtual machine, as
shown in the following screenshot:
Through the collection in the memory, you can extract information such as
running processes, documents in use, websites accessed, username and
password, and a lot more.
[ 22 ]
Chapter 2
[ 23 ]
Working with FTK Imager
[ 24 ]
Chapter 2
Summary
This chapter covered the main features of FTK Imager.
FTK Imager is a very important tool to produce forensic images and can support
almost all evidence file formats. You can preview the evidence before the image.
This is important because you can do a triage and collect only important information,
considerably reducing the collection and analysis time.
You are able to understand the importance of using a write block device along with
FTK Imager. In this way, it is possible to assure the integrity of a piece of evidence.
You have learned about the interface in the solution and the main features of FTK
Imager, as Add and Preview Evidence Item, Creating Forensic Images, Image
Mounting, Capture Memory, Obtain Protected Files, and Detect EFS Encryption.
To summarize, FTK Imager is an essential tool for all experts and examiners. The
best part of it is that it is free!
[ 25 ]
Working with Registry View
The AccessData Registry Viewer is a standalone product that can be integrated
with the FTK and allows you to view the contents of the Windows registry. Unlike
the traditional Windows Registry Editor, Regedit, which displays only the current
system registry, the Registry Viewer can visualize registry files from any system.
It also provides access to a registry-protected storage that contains passwords,
usernames, and other information that is not accessible with Regedit. However,
this tool is not free. In order to use it, you will need a CodeMeter USB stick with
a valid license.
In this chapter, you will understand the structure of the Windows registry files, the
main features of the tool, and its integration with the forensics FTK.
You'll see how to quickly access information from the users of the operating system,
such as the following:
• Username
• Logon count
• Last logon time
• Last password change time
• Invalid logon time
• Last failed logon time
Working with Registry View
[ 28 ]
Chapter 3
Another important key is located in each user folder and is called NTUSER.DAT. The
location of this file is shown in the following screenshot:
[ 29 ]
Working with Registry View
The tool will interpret the data of the registry key and will present it in a friendly
format, as shown in the following screenshot:
[ 30 ]
Chapter 3
Generating a report
You can select important keys and add them to a report by performing the
following steps:
1. Select the key you would like to add to the report and right-click on it.
2. Click on Add to Report.
3. To generate the report, click on the Report option in the toolbar.
4. Click on OK:
[ 31 ]
Working with Registry View
Alternatively, you can use the FTK to export the same files, as shown in the following
screenshot. You can do this by right-clicking on the registry file and then clicking on
Open in Registry Viewer.
[ 32 ]
Chapter 3
If you do not know the time zone of the seized computer, Registry Viewer can
help you.
[ 33 ]
Working with Registry View
You can add the registry key, System, and locate the information at System\
ControlSet001\Control\TimeZoneInformation, as shown in the
following screenshot:
Account information
Another important feature of the Registry Viewer is the ability to view information
about all the users of the system in a very easy way. This important information is
shown in the following screenshot:
[ 34 ]
Chapter 3
Summary
This chapter covered the use of the Registry Viewer, which is presented in its
interface and main features. You are now able to understand the importance of
the correct use of the Time Zone feature and how to locate it within Windows
registry keys. The Registry Viewer can display key bits of information about the
user accounts in a friendly manner. It is certainly an important tool for conducting
research on registry information that cannot be accessed by the operating system. It
is easy to use and very useful during the investigation process because it allows you
to quickly access information contained in the registry keys and helps to interpret
their values.
In the next chapter, you will learn how to manage their investigation cases and the
options for processing evidence, which is one of the most important tasks of the FTK.
[ 35 ]
Working with FTK Forensics
As mentioned in previous chapters, the FTK is a complete platform for digital
investigations, and although it has a friendly interface, its use requires attention,
especially during the preanalysis phase. A wrong setting of the case can generate
negative impacts on the project and may require more time than planned.
This chapter will cover the process of computer forensics and the first steps of using
the FTK.
You will notice that the correct understanding of the computer forensics process will
help you with the use of the tool, and the right the FTK setup will save you a lot of
analysis time and provide you with the best results.
The steps presented in the following diagram are intended to help drive the research
process and get the evidence that could be presented in court, demonstrating that the
best practices of computer forensics were followed. The computer forensics process
can be explained using the steps shown in the following diagram:
Acquisition
Report and
Preparation and Analysis
Presentation
Preservation
Working with FTK Forensics
Preparation
It is very important for the forensic analyst to be prepared to start a new digital
investigation process and should take care of with the following points:
Analysis
Analysis is the part of the investigation process that involves the most amount of
technical aspects. Some of the reasons are listed as follows:
[ 38 ]
Chapter 4
• Adapt the report language for the target audience—use technical language
for the technical team or more formal and appropriate language for lawyers
or judges
• Take care that the reports and presentations are clear and conclusive and
avoid opinions
• Provide the presentation in different kinds of file formats such as PDF,
HTML, DOC, and so on
[ 39 ]
Working with FTK Forensics
4. After entering the required information into the fields, click on Assign Roles.
[ 40 ]
Chapter 4
5. To assign rights to this user, use one of the roles presented as follows:
°° Application Administrator: This performs all tasks, including
adding and managing users
°° Case Administrator: This performs all tasks that an application
administrator can perform, except creating and managing users
°° Case Reviewer: This cannot create cases; it only processes cases
6. After choosing the correct profile, click on OK to apply the role, and then
click on OK again to create the user.
The user's passwords can be changed at any time. Just click on Change Password…
to enter the new password, as shown in the following screenshot:
[ 41 ]
Working with FTK Forensics
1. Click on New… and select New Case. The New Case Options dialog opens,
as shown in the following screenshot:
[ 42 ]
Chapter 4
6. Once all the parameters are configured, click on OK and wait for the
evidence processing.
Incorrect use of the Time Zone option can produce inconsistent results
because it changes all MAC time values of evidence. If you do not know
the Time Zone option of the evidence, use the FTK registry viewer tool
to identify it.
• Menus/Toolbar: In this option, all the functionalities and settings of the tools
can be accessed. Use filters to find relevant evidence.
• Tabs: Each tab will display the data in different structures as follows:
°° Explorer: This tab lists the evidence in a directory structure, similar
to the Windows explorer. Evidence can be viewed in physical or
logical drives.
[ 44 ]
Chapter 4
• Evidence tree viewer: This viewer presents the data structure, depending
on the selections made in the tabs.
• File list viewer: This viewer displays case files and pertinent information
about files, such as filename, file path, file type, and many others properties.
The File List view reflects the files of the selected folder in the explorer tab.
• File content viewer: This viewer displays the content of the currently selected
file from the File List view. The Viewer toolbar gives you the choice of
different view formats.
[ 45 ]
Working with FTK Forensics
If you want to process the evidence as quickly as possible, you can use a predefined
field mode that deselects almost all processing options. If you need an item for later,
an additional analysis can be performed to enable additional processing options.
Or, if you have time to categorize and index files, more options can be enabled. This
step will take a significant amount of time for a large evidence set. Take a look at the
options shown in the following screenshot:
[ 46 ]
Chapter 4
Options Description
MD5 Hash Creates a digital fingerprint using MD5
SHA-1 Hash Creates a digital fingerprint using SHA-1
SHA-256 Hash Creates a digital fingerprint using SHA-256
Fuzzy Hash Compares hash values to determine the
similar data
Match Fuzzy Hash Library Matches new evidence against the Fuzzy
hash library
Flag Duplicate Files Identifies files that are found more than
once in the evidence
KFF Uses a database of hashes from known files
PhotoDNA Compares images in your evidence against
known images in a library
Expand Compound Files Mounts and processes the contents of
compound files such as ZIP, e-mails, and
OLE files
File Signature Analysis Analyzes files to indicate whether their
headers match their extensions
Flag Bad Extensions Identifies files whose types do not match
their extensions
Entropy Test Finds compressed or encrypted files
dtSearch Text Index Indexes the case for a quick retrieval of the
keyword search
Create Thumbnails for Creates thumbnails for all the graphics in a
Graphics case
Create Thumbnails for Creates thumbnails for all the videos in a
Videos case
Generate Common Video Creates a common video type for the videos
File in your case
HTML File Listing Creates an HTML version of the File listing
in the case folder
CSV File Listing Creates a CSV version of the File Listing in
the case folder
Data Carve Identifies deleted files in the evidence based
on file signatures
Meta Carve Locates deleted directory entries and other
metadata
[ 47 ]
Working with FTK Forensics
Options Description
Optical Character Extracts text from graphics files to be
Recognition (OCR) recognized during a keyword process
Explicit Image Detection Identifies suspect explicit content
Registry Reports Creates Registry Summary Reports (RSR)
from case content automatically
Include Deleted Files Shows deleted files in the case
Cerberus Analysis Runs the Cerberus Malware Triage module
Send Email Alert on Job Sends a message once a job is completed
Completion when an e-mail address is inserted in this
field
Decrypt Credant Files Locates and decrypts files encrypted by the
Credant solution
Process Internet Browser Processes Internet browser history files
History for Visualization to be seen in the detailed visualization
timeline
Cache Common Filters Caches commonly viewed files in the list of
files
Perform Automatic Attempts to decrypt files using a list of
Decryption passwords provided by you
Language Identification Automatically attempts to identify the
evidence language
The last option, located on the bottom the screen, is Profile. It is possible to use the
default profiles or create a customized one.
These options can be changed or added later just by clicking on the Evidence option
in the toolbar and selecting Additional Analysis.
It is important that you select only the necessary items for your case
investigation because the selection of many items can greatly increase
processing time.
[ 48 ]
Chapter 4
[ 49 ]
Working with FTK Forensics
This first tab allows you to focus on specific files needed for a case, including or
removing files by type or status. For example, if you only search for evidence in
Word files, it is much more effective if you apply the filters and only select the
Documents checkbox in the File Types list as shown in the following screenshot:
The second tab refines evidence by the date range or file size. In a scenario
where you already know some information about the data you are seeking, it is
recommended to apply this filter. A lot of processing time is saved.
[ 50 ]
Chapter 4
Summary
This chapter covered the overview of the computer forensics process, showing its
importance during the process of research and how it can help your organization
with your case investigation. You were presented with the FTK interface, which will
be worked out in detail in the next chapter. It also covered one of the most important
processes used in the FTK tool; the processing options case. If configured correctly, it
can improve processing time and the results of the analysis considerably.
In the next chapter, we will delve into the subject of processing and analyzing the
artifacts using the FTK operating system and other advanced features of the tool.
[ 51 ]
Processing the Case
This chapter will cover how to use the most important features for processing
and filtering data during an investigation process.
The processing step is considered to be the most important step because the
correct utilization of its functionality can be decisive in the relevant results of
an investigation.
You will understand the importance of the correct use of the Time Zone feature and
how this impacts the properties of the files, and learn how to use filters and searches.
Finally, you will be able to generate a report of your findings.
Based on this, you must configure the time zone to reflect the location where the
evidence was acquired. For example, if you conducted the acquisition of a computer
that was located in Los Angeles, US, and bring the evidence to Sao Paulo, Brazil,
where your lab is situated, you should adjust the time zone to Los Angeles so that
the MAC time of files can reflect the actual moment of its modification, alteration,
or creation.
The FTK allows you to make that time zone change at the same time that you add a
new evidence to the case. Select the time zone of the evidence where it was seized
from the drop-down list in the Time Zone field. This is required to add evidence in
the case.
Processing the Case
You can also change the value of Time Zone after adding the evidence.
In the menu toolbar, click on View and then click on Time Zone Display.
The following are some of the compound files that you can mount:
[ 54 ]
Chapter 5
[ 55 ]
Processing the Case
°° File Options: This field has advanced options to export files and
folders. You can use the default options for a simple export.
°° Items to Include: This field has the selection of files and folders that
you will export. The options can be checked, listed, highlighted, or
selected all together.
°° Destination base path: This field has the folder to save the files.
[ 56 ]
Chapter 5
Column settings
Columns are responsible for presenting the information property or metadata related
to evidence data. By default, the FTK presents the most commonly used columns.
However, you can add or remove columns to aid you in quickly finding relevant
information. To manage columns in FTK, in the File List view, right-click on column
bars and select Column Settings….The number of columns available is huge. You
can add or remove the columns that you need by just selecting the type and clicking
on the Add button:
[ 57 ]
Processing the Case
The FTK has some templates of columns settings. You can access them by clicking on
Manage and navigating to Columns | Manage Columns:
You can use some ready-made templates, edit them, or create your own.
1. In the File List view, select the files that you want to add to the bookmark.
2. Right-click on selected files and click on Create Bookmark.
3. Enter the information about the bookmark.
4. Click on OK:
[ 58 ]
Chapter 5
[ 59 ]
Processing the Case
Once the bookmark is created, you can add or remove files when necessary.
Most of the tasks available during the initial evidence processing remain available
with Additional Analysis. You can perform multiple processing tasks at the same
time. Make your selections and click on OK to create a new job, as shown in the
following screenshot:
The explanation of all the processing options has been detailed previously. Refer to
Chapter 4, Working with FTK Forensics.
[ 60 ]
Chapter 5
Data carving can be selected in the New Case Wizard or later, using the Additional
Analysis feature:
[ 61 ]
Processing the Case
In the Carving Options dialog box, you can select the file types that you want to try
to recover and click on OK to go back to Detailed Options to then perform the task.
You can also create your own carvers, informing the header and footers of the files
that you would like to recover. To create the carver, perform the following steps:
After the carver is processed, you can find the carved files using the Carved Files
filter or through the following steps:
The KFF database is based on NSRL from National Institute of Standards and
Technology (NIST) and can be downloaded from the AccessData website at
http://www.accessdata.com/support/product-downloads.
The KFF can be selected in the New Case Wizard or later, using the Additional
Analysis feature.
To import a new KFF database and define a group, perform the following steps:
[ 62 ]
Chapter 5
To run the KFF in your case, open the Additional Analysis options:
[ 63 ]
Processing the Case
To use the results of the KFF to hide a known file from your case, use the
following filters:
[ 64 ]
Chapter 5
The Index Search option compares search terms with the indexed database. You
should choose to generate an index file during preprocessing to use this kind of search.
[ 65 ]
Processing the Case
5. The results will appear in Index Search Results with the numbers of hits:
Regular expressions
A regular expression (regex) is a special text string used for describing a search
pattern and can help identify information that has some predefined pattern, such as
a phone number or credit card. The following screenshot shows such search patterns:
[ 66 ]
Chapter 5
As you can see, the FTK has a huge list of ready-to-use regular expressions.
However, you can create your own regular expressions to better achieve your goals.
[ 67 ]
Processing the Case
You can use the predefined filters or you can create your own filters. To use
predefined filters, just click on the combobox in the Filter toolbar as shown in the
following screenshot:
You also can make a combination between filters. Click on Filter Manager… to create
your combinations.
[ 68 ]
Chapter 5
8. Select the Match Any option to use the OR operator or the Match All option
to use the AND operator.
9. To test a filter without having to save it first, check the Live Preview box.
10. Click on Save and then click on Close.
You can create a case report about the relevant information of your investigation
case. Reports can be generated in different formats, including HTML and PDF.
[ 69 ]
Processing the Case
1. Click on File and then click on Report… to run the Report wizard:
2. Select the information that will be used for the generation of the report in the
Report Outline box and fill the information related to each.
3. Click on OK:
[ 70 ]
Chapter 5
4. In the Report Folder field, set the path to output your report.
5. Select a language to use on report.
6. Select the output file format.
7. Click on OK to generate a final report.
You can distribute your report in a printed form by e-mail, portable media,
or as a website.
Summary
This chapter covered several important features to assist in the identification of
relevant information quickly and efficiently through the use of filters and keywords.
The use of the KFF and how its features can be useful to save time during an
investigation by eliminating the known files of your investigation case was covered.
The creation and management of bookmarks and how you can generate a final report
using this information was also covered.
In the next chapter, you will learn about the new features of FTK v5.
[ 71 ]
New Features of FTK 5
This chapter is an overview of the main new features that have been developed in
the newest version of the product, the FTK 5.
We will not explore all features in detail, but you will be able to understand the
goals of each one of them and apply them in your investigation case.
Let's understand how these new features can help us to locate evidence quickly;
a task that would earlier have taken a long time or may even have been impossible
to achieve without a specific tool.
Distributed processing
Distributed processing allows you to improve performance and process investigation
cases using computational resources of other computers on your network.
To use this resource, you need to install the Distributed Processing Engine (DPE)
add-on in all the additional computers that you have available.
We know that the processing step requires a lot of hardware resources and the
distributed processing can help us to reduce processing time without having to
perform an upgrade on the examiner machine.
The DPE product can be found on the FTK installation disk in the path
[Drive]:\FTK\AccessData Distributed Processing Engine.EXE.
Once the DPE is installed, you can use other machines to process your case, load
balancing, and minimizing the processing time.
New Features of FTK 5
Encryption support
FTK users can send files directly to Password Recovery Toolkit (PRTK) for on-
the-fly password recovery during evidence review.
Data visualization
Data visualization is a feature that provides a graphical interface to enhance
understanding and analysis of the files and e-mails in a case. You view data
based on the file and e-mail dates.
• File data: This lets you view file data from either the Explore tab or the
Overview tab
• E-mail data: This lets you view e-mail data from the Email tab
• Internet browser history: This lets you view Internet browser history data
To open data visualization, see the Explorer, Overview, or Email tab to select your
dataset. Click on Tools and select Visualization.
[ 74 ]
Chapter 6
• Time line pane: This provides graphics that represent the available data
• Dashboard: This provides graphical chart panes of the data
• Data list pane: This provides a list of the data items
However, a very interesting feature of FTK forensics is that it allows this remote
acquisition limited to a single agent called Single-node enterprise. To use this feature,
perform the following steps:
[ 75 ]
New Features of FTK 5
You may also run the agent manually. It is located in the path C:\Program Files\
AccessData\Forensic Toolkit\5.0\bin\Agent.
Once an agent is distributed to the remote machine, you can connect this device and
perform a pre-analysis or data acquisition by performing the following steps:
[ 76 ]
Chapter 6
Check if the TCP port 3999 (default port) is enabled on the firewall
and if the WMI service is enabled and running.
Volatile data will include information about the running process, network connections,
clipboard contents, and data in memory. This information may be critical to the
discovery of the cause of an incident or to understand a specific behavior.
As seen in previous chapters, the FTK imager can help in the collection of this data,
specifically memory acquisition. Once collected, you can do a deeper analysis using
the platform FTK.
To start the memory analysis, firstly add the file of dump in your case as follows:
[ 77 ]
New Features of FTK 5
The difference between the types of scans is related to the accuracy of research,
which may have an impact on the time to complete the process if you choose
higher accuracy.
To visualize the results of the analysis of EID, just use the filters related to Explicit
Images Folder.
[ 78 ]
Chapter 6
Normally, to use the feature of EID, you need a separate license. Check
this information at the time of acquisition of the solution.
• Threat analysis: This is general file and metadata analysis that identifies
potentially malicious code
• Static analysis: This is disassembly analysis that examines elements of
the code
[ 79 ]
New Features of FTK 5
The results of the Cerberus analysis generates and assigns a threat score to the
executable binary as seen in the following screenshot:
To visualize the results of the analysis of Cerberus, just use the filters related to
Cerberus Score or Cerberus Static Analysis.
The Mobile Phone Examiner (MPE) is a solution for mobile forensics that delivers
an intuitive and simple interface, data visualization, and smart device support in a
single forensic interface. MPE images integrate seamlessly with the FTK, allowing
you to correlate evidence from multiple mobile devices with evidence from multiple
computers within a single interface.
[ 80 ]
Chapter 6
Summary
This chapter covered the main features of the new version of the Forensics Tool
Kit. Activities that usually take a long time to execute can be performed in a much
simpler way with the help of these new features.
The FTK 5 is a complete platform for the acquisition and analysis of many different
types of digital media, and enables the extraction of evidence quickly and efficiently.
Its new features provide an integrated and easy-to-use platform to help in the
examiner's work.
The next chapter will discuss in detail the tool that cracks and recovers
passwords, PRTK.
[ 81 ]
Working with PRTK
This chapter will cover the Password Recovery Toolkit (PRTK) and Distributed
Network Attack (DNA). Both are used to provide a password-cracking function.
You can use PRTK and DNA in computer forensic investigations to access password-
protected files or system passwords.
The main difference between these tools is that PRTK runs on a single machine only
and DNA uses multiple machines across the network.
You will understand this difference and how to use the tools for the password
recovery of a large number of popular software applications.
An overview of PRTK
The use of encryption and data protection through the use of passwords has steadily
grown among the users of computers. Encryption is seen as a strategic business issue
and is adopted by most companies.
Given this scenario, PRTK becomes a fundamental tool to assist in the digital
investigation process, supporting the attempt to access the protected data contained
in the evidence.
You can download the latest stable version of PRTK and DNA at http://www.
accessdata.com/support/product-downloads.
PRTK supports a wide variety of products for password cracking. To access the
full list of supported products and types of attack, click on Help and then click on
Recovery Modules.
Working with PRTK
• Menu: Through this, you can access all the functionalities and options for
configuration and tuning.
• Toolbar: This provides quick access to the main features of the tool.
• View All: This is the main viewer. You can track the status of the password-
cracking attack.
[ 84 ]
Chapter 7
• Properties: This is where you can view information about a file in the
attack process.
The main features and configurations will be discussed in the following topics.
The dictionary utility can be used to create or modify several types of dictionaries.
[ 85 ]
Working with PRTK
The following table lists tools that can be accessed from the Dictionary Tools menu
and their functions:
Tool Function
Dictionary Browser To view the words in each dictionary or to delete a
particular dictionary or dictionaries
Dictionary Info To view specific details about a dictionary, such
as the dictionary type, encoding, language, word
count, and description
Biographical Dictionary Builds the dictionaries of candidate passwords
Generator from a collection of biographical details and from
combinations of the biographical data entered
Pass-phrase Dictionary Builds dictionaries from a phrase file and using
Generator subphrases from the phrase file
Permutation Dictionary Builds dictionaries from a wordlist file and using
Generator the permutations of words from the wordlist file
Standard Dictionary Builds custom dictionaries using a wordlist file
Generator
Golden Dictionary Merge Merges two golden dictionaries into a single golden
dictionary
Managing profiles
To use PRTK for processing a password recovery, you need to select an appropriate
profile for your case investigation. A profile is a set of specific rules that must be
used to define which types of password recovery will be used.
[ 86 ]
Chapter 7
You can use any of the default profiles or create your own.
[ 87 ]
Working with PRTK
3. The suggested types of attacks will appear. You can change the type if
necessary or leave the default model presented.
4. Click on Finish to start the cracking process.
The cracking process will start, and you can follow the progress status of each of
the techniques.
The time for obtaining the password can vary greatly depending on the complexity
of the software application or the algorithm used for the password.
Additionally, the process for password cracking depends largely on the capability
of the hardware, mainly the processor. There is specific equipment for the activity
of cryptanalysis, which uses video cards (GPU) to gain speed.
[ 88 ]
Chapter 7
Note that the process is fully automated, requiring few interactions or modifications.
DNA
As discussed earlier, the process of password cracking requires a lot of
hardware resources.
DNA is a tool that can assist in this process since it uses sharing and distribution
between the computers on the network resource.
DNA has an interface that is very similar to PRTK features with an exception of
solution architecture.
• Supervisor: This is a machine that controls the Worker machines in the DNA
system and the jobs that they process. Install it before the Workers.
• Worker: This is responsible for processing jobs for decryption or password
cracking. You should run the appropriate Worker installation program on
each machine in the system.
[ 89 ]
Working with PRTK
Summary
This chapter covered the first steps to use the PRTK Forensics tool and a brief vision
of the DNA solution.
Even though a simple solution of using their resources is extremely advanced, it can
recover passwords from almost all commonly used files.
PRTK is a mandatory tool used in digital investigations since you will most likely find
some protected files that may contain the key to the outcome of your investigation.
[ 90 ]
Index
A CodeMeter USB Stick 27
column settings 57, 58
AccessData components, DNA
AD Enterprise version 6 Supervisor 89
FTK forensics version 6 compound files
account information, Registry Viewer compressed files 54
viewing 34 e-mail files 54
Add button 57 expanding 55
Additional Analysis feature 60 mounting 54
AD Enterprise version 6 system files 54
Also include option 59 compressed files 54
computer forensics
B about 37
acquisition, tools 38
Biographical Dictionary Generator analyzing, reasons 38
function 86 preparation, steps 38
Bookmark Comment option 59 preservation 38
Bookmark Name option 59 procedural trainings 38
bookmarks steps 37-39
about 58 technical trainings 38
creating 58 Create Thumbnails for Graphics option 47
creating, options 59 Create Thumbnails for Videos option 47
CSV File Listing option 47
C
Cache Common Filters option 48 D
Capture Memory 22 data
Carved Files 62 processing 53
case report Data Carve option 47
creating 69-71 data carving
Cerberus about 61
about 79 creating 62
results, visualizing 80 selecting 61
static analysis 79 data storage media
threat analysis 79 about 11, 12
using 79 alternative media 12
Cerberus Analysis option 48
magnetic media 11 e-mail files 54
optical media 12 Entropy Test option 47
data visualization evidence item
about 74 adding 17, 19
Dashboard component 75 previewing 17, 18
Data list pane component 75 Evidence Refinement (Advanced) feature 51
e-mail data 74 Evidence tree viewer 45
file data 74 Expand Compound Files option 47
Internet browser history 74 Explicit Image Detection. See EID
opening 74
Time line pane component 75 F
Decrypt Credant Files option 48
dictionaries features, FTK 5
creating, with dictionary utility 85 advanced volatile 77
modifying, with dictionary utility 85 data visualization 74
Dictionary Browser distributed processing 73
function 86 encryption support 74
Dictionary Info malware triage 79
function 86 memory analysis 77
Dictionary Tools MPE 80
Biographical Dictionary Generator 86 single-node enterprise 75
Dictionary Browser 86 threat analysis 79
Dictionary Info 86 wxplicit Image detection 78
Golden Dictionary Merge 86 File Comment option 59
Pass-phrase Dictionary Generator 86 File content viewer 45
Permutation Dictionary Generator 86 File list viewer 45
Standard Dictionary Generator 86 files
dictionary utility exporting 56
used, for creating dictionaries 85 File Signature Analysis option 47
used, for modifying dictionaries 85 File to Include option 59
Distributed Network Attack. See DNA filters
Distributed Processing Engine. See DPE creating 68
DNA working with 67, 68
about 83, 89 Filter toolbar 68
URL, for downloading 83 Flag Bad Extensions option 47
versus, PRTK 83 Flag Duplicate Files option 47
Documents checkbox 50 folders
DPE 73 exporting 56
dtSearch Text Index option 47 forensic image
creating 19, 21
creating, FTK Imager used 12
E mounting 21
EFS encryption forensics digital investigations
detecting 24 process 5
EID FTK
about 78 about 5, 37
executing 78 columns settings templates, accessing 58
[ 92 ]
downloading 6 Include Deleted Files option 48
installing 8 Index Refinement (Advanced) feature 51
installing, steps 8, 9 index search
prerequisites 7 about 64
Registry Viewer, integrating with 31, 32 performing 65, 66
running, for first time 9 installation, FTK 8, 9
FTK 5 interface, FTK Imager 15
features 73-80 menu bar 16
URL, for downloading 6 toolbar 16
FTK forensics version 6 view panes 17
FTK Imager interface, PRTK
about 11 functions 84, 85
image formats 13 investigation case
interface 15 creating 41-44
URL, for downloading 11 evidence, refining 48-50
used, for creating forensic image 12 FTK interface 44, 45
FTK Imager functionality processing options 45-48
Capture Memory feature 22 investigation case evidence
EFS encryption, detecting 24 refining options, setting 49, 50
evidence item, adding 17, 19
evidence item, previewing 17, 19 K
forensic image, creating 19, 21
forensic image, mounting 21 KFF
protected files, obtaining 23 about 62
FTK Interface database, importing 62, 63
about 44 results, using 64
Evidence tree viewer 45 running 63
File content viewer 45 using 62
File list viewer 45 KFF Alert Files 64
Menus/Toolbar option 44 KFF Ignore Files 64
Tabs option 44 KFF option 47
Fuzzy Hash option 47 Known File Filter. See KFF
G L
Generate Common Video File option 47 language Identification option 48
Golden Dictionary Merge live search
function 86 about 64
conducting 65
H
M
hash 62
HTML File Listing option 47 Match Fuzzy Hash Library option 47
MD5 Hash option 47
I memory analysis
starting 77
image formats menu bar, FTK Imager interface 16
supported by FTK Imager 13 Meta Carve option 47
[ 93 ]
Mobile Phone Examiner (MPE) Include Deleted Files 48
about 80 KFF 47
smartphone analysis sample 81 language Identification 48
Match Fuzzy Hash Library 47
N MD5 Hash 47
Meta Carve 47
National Institute of Standards and Tech- Optical Character Recognition (OCR) 48
nology (NIST) 62 Perform Automatic Decryption 48
new user PhotoDNA 47
adding 39, 40 Registry Reports 48
password, changing 41 Send Email Alert on Job Completion 48
rights, assigning 41 SHA-1 Hash 47
SHA-256 Hash 47
O Process Internet Browser History for Visu-
alization option 48
Optical Character Recognition
profile 86
(OCR) option 48
protected files
obtaining 23
P PRTK
Pass-phrase Dictionary Generator about 74, 83
function 86 password recovery 86
password recovery, PRTK URL, for downloading 83
profile, managing 86-89 versus, DNA 83
Password Recovery Toolkit. See PRTK PRTK interface
Perform Automatic Decryption option 48 functions 84, 85
Permutation Dictionary Generator
function 86 R
PhotoDNA option 47
Regedit 27
processing options, investigation case
regex 66, 67
about 45
Registry Reports option 48
Cache Common Filters 48
Registry Summary Reports (RSR) 48
Cerberus Analysis 48
Registry Viewer
Create Thumbnails for Graphics 47
account information, viewing 34
Create Thumbnails for Videos 47
features 29
CSV File Listing 47
integrating, with FTK 31, 32
Data Carve 47
report, generating 31
Decrypt Credant Files 48
Time Zone, setting 33
dtSearch Text Index 47
regular expression. See regex
Entropy Test 47
Report Outline box 70
Expand Compound Files 47
report, Registry Viewer
Explicit Image Detection 48
generating 31
File Signature Analysis 47
Flag Bad Extensions 47
Flag Duplicate Files 47 S
Fuzzy Hash 47 Select Bookmark Parent option 59
Generate Common Video File 47 Send Email Alert on Job Completion
HTML File Listing 47 option 48
[ 94 ]
SHA-1 Hash option 47 V
SHA-256 Hash option 47
single-node enterprise view panes, FTK Imager interface 17
about 75 volatile data 77
using 75-77
Standard Dictionary Generator W
function 86
static analysis 79 Windows registry files
Supervisor 89 structure 28, 29
Supplementary Files option 59 Worker 89
system files 54
T
threat analysis 79
Timeline Bookmark option 59
Time Zone
changing 53, 54
setting 33
Time Zone option 44
toolbar, FTK Imager interface 16
[ 95 ]
Thank you for buying
Computer Forensics with FTK
Our books and publications share the experiences of your fellow IT professionals in adapting
and customizing today's systems, applications, and frameworks. Our solution based books
give you the knowledge and power to customize the software and technologies you're using
to get the job done. Packt books are more specific and less general than the IT books you have
seen in the past. Our unique business model allows us to bring you more focused information,
giving you more of what you need to know, and less of what you don't.
Packt is a modern, yet unique publishing company, which focuses on producing quality,
cutting-edge books for communities of developers, administrators, and newbies alike.
For more information, please visit our website: www.packtpub.com.
We're not just looking for published authors; if you have strong technical skills but no writing
experience, our experienced editors can help you develop a writing career, or simply get some
additional reward for your expertise.
Cuckoo Malware Analysis
ISBN: 978-1-78216-923-9 Paperback: 142 pages
BackTrack 5 Cookbook
ISBN: 978-1-84951-738-6 Paperback: 296 pages
Uploaded by [StormRG]