Analytical Forensic Investigation With Data Carving Tools
Analytical Forensic Investigation With Data Carving Tools
ISSN No:-2456-2165
Abstract:- Data carving and file recovery are techniques Metadata, sometimes known as "data about data,"
for recovering lost or deleted files and data from storage assists the operating system in identifying data. Metadata
media such as hard discs, flash drives, and memory contains technical information such as the data's creation
cards. These methods can be used to recover data that and modification dates, as well as the file type. This
have been deleted by accident, lost due to a hardware information makes it much easier to find and index files.
failure, or are otherwise unreachable. In digital Instead of standard metadata produced by or connected with
investigation and computer forensics, data carving is a filesystems, file carving pulls data and files from
critical issue. As a result, research into enhancing data unallocated space utilising specified criteria such as the file
carving techniques is required to enable digital structure and file headers.
investigators to recover critical data and evidence from
damaged or corrupted data resources. The purpose of a Even if the file extension has been modified or
Foremost file recovery and data carving study would be removed entirely, file headers retain information that may
to examine and assess the tool's capabilities and be used to identify the file type and dissect the file by
performance in recovering lost or deleted files and data analysing header and footer information. Data carving is a
from a range of storage systems. Testing may entail time-consuming procedure that should be completed
testing the tool on various storage devices, utilising utilising automated technologies. It also helps if the
various file kinds and recovery scenarios, and investigator knows what file types they are looking for in
comparing the tool's performance to that of competing order to focus better and save time. But, this is forensics,
file recovery and data carving tools. and we know that patience and time are essential. Some
typical file types, as shown in hexadecimal notation inside
Keywords:- Digital Investigation, Computer Forensics, File the file headers, are as follows:
Recovery, Data Carving, Foremost Tool.
Joint Photographic Experts Group (JPEG): FF D8 FF
I. INTRODUCTION E0
Portable Document Format (PDF): 25 50 44 46
The technique of collecting evidence from both the
digital and physical environments in a crime by preserving Hashing (ideally SHA-256) of all carved data,
the data in its original form for use in court is known as recovered files and media should be undertaken in
digital forensics. In the case of digital crime, the investigator accordance with best practices and effective case
should collect and preserve all evidence or other material management. This stage is critical for investigators and
related to the crime found in digital media such as follows worldwide best practices.
(computers, cameras, and networks...etc.) in order to
conduct an investigation based on it, as well as to establish a
timeline and determine the sequence of events. It should be
remembered that certain digital information may be
unavailable or purposely removed. As a result, the
investigator must look through both existing and pre-
existing data (such as data that has been erased or crashed)
in order to recover it using some method.
A. Foremost Tool:
Man Foremost
The output shows the user manual for everything and the supported file formats:
To Begin Carving the 11-Carve-Fat.Dd Image with Foremost, we Type the Following Command in the Terminal:
Upon opening the output directory "foremostrecovery", you will find that the recovered files are categorized according to
their file types. Additionally, there will be an audit.txt file within the directory which contains a detailed report of the findings
from the carving process:
The audit.txt file located within the "foremostrecovery" directory provides a list view of the items recovered by Foremost,
along with their corresponding sizes and file offset locations. This information can be used to identify and further analyze the
recovered files:
As you scroll down the audit.txt file, you will come across a summary of all the files discovered during the carving process.
In this particular case, the first three items listed in the audit.txt file are .jpg picture files, which can be found in the "jpg"
sub-folder within the "foremostrecovery" output directory:
B. Scalpel Tool:
The Scalpel configuration file (scalpel.conf) is shown below with all file types commented away. Take Serious note that
each line begins with a hashtag:
Fig 9 All File Types that were not Selected as Shown by the #.
To teach Scalpel to hunt for these specific file types, we removed the hashtags at the beginning of multiple lines. This also
reduces the time required to search for all available file types. Scalpel is seen in the screenshot below looking for GIF and JPG
files after the comments have been removed. Make sure you finish this step before specifying the image to be carved. If this is not
done, an error notification is sent to the investigator as a reminder. Once we've done all of the required changes, we can go to the
GUI menu and then just select Scalpel to start carving.
When the programme is opened, a Terminal window displays, indicating the version number as (1.60), the developer
(Golden G. Richard III), and the information that it is based on version 0.69. Scalpel's syntax and additional arguments are also
shown, as with foremost tool:
As given in the preceding screenshot, Scalpel has now successfully completed all Data carving processes.
Within the mov-12-0 folder, we can clearly see two .mov files.
Within the pdf-30-0 folder, we can now see two .pdf files.
The below screenshot shows a snippet of the audit.txt file, showing information of the carved files:
C. Bulk Extractor:
Although foremost and Scalpel can extract images, music, video, and compressed files, bulk extractor recovers a wide range
of additional data that may be quite useful in analyses. Although bulk extractor can recover and carve Image, video, and document
files, it can also carve and extract the following data:
Using Bulk_Extractor:
To receive a list of widely used arguments and options, start bulk extractor by entering command bulk extractor -h.
Like foremost and Scalpel, Bulk extractor has a straightforward syntax that calls for an output folder (-o) and the forensic
picture. As previously indicated, for this experiment, we will extract data from the terry-workusb- 2009-12-11.E01 image and
store the results to a folder entitled bulk-output.
When all threads have completed, the bulk extractor displays an overview of the operation as well as some outcomes. Bulk
extractor, as demonstrated in the accompanying image, displays the MD5 hash, the total number of MB processed, and even
announces the detection of three email characteristics. In the next section, we'll look more closely at the findings.
Keep in mind that not all of the text files mentioned below will contain data. Data will be present only for those with
numbers larger than 0 to the left of the text filenames. If we go to the output folder, we can see all of the extracted data in the
various text files: