0% found this document useful (0 votes)
129 views38 pages

Digital Forensics - Getting Started With File Systems

Uploaded by

EDu Jose
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
129 views38 pages

Digital Forensics - Getting Started With File Systems

Uploaded by

EDu Jose
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Digital Forensics – Getting Started

with File Systems


GETTING STARTED WITH NEW TECHNOLOGY FILE
SYSTEM (NTFS)

Evan Morgan, CISSP, CISM

@1evanski www.evanski.com
Prepare your forensic environment

Explain the basics of hard disks

Provide an overview to tracks, sectors, clusters,


and slack space
Overview
Go over timestamps and how important they are

Discuss metadata

Explain journaling

Highlight permission types in NTFS

Go over the Master File Table

Discuss the Change Journal

Provide some methods to help hide things from a


forensic investigator
Preparing Your Environment
for Forensic Analysis
There are lots of forensic tools available
today
Mixed bag on what they offer
Some exceptional ones have a cost
associated with them
Some free ones are still exceptional
Autopsy®, the tool for this course, is one of
those exceptional, yet still free, ones

Photo from Autopsy® website:


https://www.sleuthkit.org/picts/renzik_sm.jpg
We’ll be preparing your computer for
Demo forensic analysis during this demo,
including:
- Finding our tool for this course
(Autopsy®)
- Downloading and installing it
- Initial startup and configuration
Basics of Hard Disks
Hard Disk Basics
Platters

Head

Head
Actuator
Arm
Hard Disk
Types of “Hard” Disks

Traditional (Platters) Solid State Virtual


Tracks, Sectors, Clusters, and Slack Space
Relation to Each Other

Platter

Track

Sector

Cluster
Tracks, Sectors, and Clusters

Track (aka
cylinder)

Cluster

Sector
Slack Space

Slack
Space

Cluster

File
Demo
We’ll look at cluster contents from the
native operating system
Timestamps
Timestamps are vitally
important to forensic
investigations
NTFS Timestamp Types

Created Accessed

Modified Changed
Demo
We’ll take a look at timestamps in more
detail, including looking at the Timeline
feature within Autopsy®
Metadata
Metadata
Data about data
Common Types of Metadata

Name Type Size

Timestamps Owner Hash Value


Demo
We’ll take a look at some file metadata
natively within the operating system,
followed by viewing metadata from
within Autopsy®
Journaling
Journaling
Delete is
processed

User’s
Delete is written
File
to Journal
Permissions
Common NTFS Permissions

Read Write Read & Execute

Modify Full Control


Demo
We’ll take a look at some file permissions
natively within the operating system,
followed by viewing permissions from
within Autopsy®
Master File Table
Master File Table !=
Master Boot Record
Exists on NTFS file
systems
Like a manifest / map
of file system
Alternate Data Streams

Hello,
world!
Open with Text
Editor
User’s
File

Alternate Data
Stream Secret plans to take
over the organization!
Mwahaha!
Demo
We’ll take a look at the Master File Table
and some of its aspects
Change Journal
Comparison

Journaling Change Journaling


Previously covered What we’re covering now
Conceptually similar in nature Conceptually similar in nature
Records metadata changes Records changes to files, streams,
to the volume directories, etc.
Leverages $LogFile for changes Leverages $Extend\$UsnJrnl
for changes
Used mainly by the file system to
prevent data corruption Used mainly by applications to track
changes to the volume
Demo
We’ll take a look at the Change Journal
and some of its aspects
Anti-forensic Methods
Common Anti-forensic Method Types

Hide the evidence Destroy the evidence


Common Hiding Methods

Encrypt Steganography Obfuscation


Prepared your forensic environment

Explained the basics of hard disks

Provided an overview to tracks, sectors, clusters,


and slack space
Summary Went over timestamps and how important they
are

Discussed metadata

Explained journaling

Highlighted permission types in NTFS

Went over the Master File Table

Discussed the Change Journal

Provided some methods to help hide things from


a forensic investigator
What’s next?
Working with Extended File System (EXT)
What is it?
What makes it similar to other file systems?
What makes it different from other file
systems?

You might also like