Cst2580 Coursework 1
Cst2580 Coursework 1
TABLE OF CONTENTS
1. Drive Imaging ………………………………………………………………………………. 2
2. Master Boot Record ….…………………………………………………………………….. 13
3. Volume Boot Record ….……………………………………………………………………. 14
4. FAT Data Structures ….……………………………………………………………………. 17
5. Directory Entries …………………………………………………………………………... 19
6. File Content & Extraction ………………………………………………………………… 22
7. Bibliography ……………………………………………………………………………….. 24
DRIVE IMAGING
a) Provide a detailed list of the steps you took to ensure that the image was
acquired correctly and follows best practice.
- Source Evidence Type:
Choose Physical Drive to image a device in its entirety.
- Create Image:
This is where you may specify the location of the image's creation.
b) Insert a scanned copy of the acquisition form that was used and ensure it is
accurate and complete.
c) Using the image summary that was produced by FTK Imager, verify that
the image has been created correctly.
- Image Summary:
When the image is finished, click the Image Summary button to view an overview
of the created image that includes the information you entered about the evidence
item, the drive, the hash verification information, and so on. A text file containing
this data is also saved.
We have located the Master Boot Record (MBR) and we have only 1 active
partition.
b) Locate the Master Boot Record (MBR) and determine how many
partitions are stored on the device?
Bytes: 12 - 15 = 0* 00 B0 03 00
Reverse Endian = 0* 3 B0
Decimal = 944
Size in bytes: Size in sectors* Bytes per sector
944 * 512 = 483,328 bytes
c) What is the offset address for the start of this partition?
Bytes: 0* 80 00 00 00
Reverse Endian = 0* 80
Decimal = 128
Offset address calculation: Start of LBA* bytes per sector
Search for the file system signature at the start of the partition. The signature is
usually found in the first few bytes of the VBR for FAT file systems. This signature
in this instance is "EB 3C 90" in hexadecimal, indicating that it is a FAT 16 file
system.
Inspect Bytes 11–12 in the VBR; these are listed as "00 02".
Reverse Endian = 0* 0200
Decimal = 512 bytes per sector
b) Determine the number of sectors per cluster
Inspect Byte 13 within the Hex Editor window. The value was found to be 0* 04.
Decimal = 4 sectors per cluster
c) Determine the number of reserved sectors
Inspect Bytes 14–15 in the VBR; these are listed as "08 00".
Reverse Endian = 0* 0008
Decimal = 8 reserved sectors
Inspect Bytes 17–18 in the VBR; these are listed as "00 02".
Reverse Endian = 0* 0200
Decimal = 512 entries
f) Determine the number of sectors per FAT
Inspect Bytes 22–23 in the VBR; these are listed as "EC 00".
Reverse Endian = 0* EC
Decimal = 236 sectors per FAT
d) Cluster 2:
Starting Byte Offset = (Cluster Number − 2) × (Sectors per Cluster × Bytes per
Sector) + (Reserved Sectors + FAT Copies × Sectors per FAT × Bytes per Sector)
= (2−2) × (4 × 512) + (8 + 2 × 236 × 512)
= 0 + (8 + 241664) = 241672 bytes
So, the starting byte offset of cluster 2 would be 241,672 bytes.
Hexadecimal Value: 0x3AC28
DIRECTORY ENTRIES
a) Select one directory entry that is an allocated file and larger than one
cluster. Provide a screenshot of the hexadecimal output.
HH MM SS
01001 100010 01
09 36 19
So, the creation time would be 09:34:01 in HH:MM:SS format.
Date:
YY MM DD
101011 1011 01101
43+1980 11 13
2023 11 13
So, the creation date would be 2023:11:13 (13th November 2023) in
YY:MM:DD format.
Verification:
b) Verify the allocated clusters for the file in the FAT and show all of the
cluster chains related to the file.
The groups that make up the chain are marked as allocated in the FAT, where the
matching markers for FAT 1 and FAT 2 are set at 0x1000 and 0x3c000,
respectively, indicating their use in file data organization and storage inside the file
system order.
c) Use two methods that can be used to extract the file content. Verify that
both of the files are exactly the same.
The File Copy/Export method and the Disk Imaging/Forensic Imaging method are
two ways to extract file content.
In the File Copy/Export method, using the "Save" or "Export" features of the
application, users can copy the contents of the file to a new location after opening
the file with the appropriate program or file viewer. The original file structure and
metadata are preserved by this simple, user-friendly method. It might not be the
best option, though, for low-level operations or extracting particular sections of a
file.
On the other hand, the Disk Imaging/Forensic Imaging technique involves creating
an image or bit-by-bit copy of the whole storage medium, including unallocated
space, file system structures, and file content. Once the image has been created,
users can use specialized tools or scripts to analyze it and extract the desired file
content. This method captures the entire state of the storage medium, making it
especially useful for forensic analysis and data recovery. For straightforward file
extraction requirements, it might be deemed unnecessary and necessitates
additional storage space for the image.
BIBLIOGRAPHY
- Carrier, Brian. File System Forensic Analysis. Addison-Wesley Professional,
2005