Module 02 Data Acquisition
Module 02 Data Acquisition
Disadvantages
• Some countries haven’t accepted the use of write-blocking devices for data
acquisitions
CDs (cont’d)
• Kali Linux
• Knoppix
• SANS Investigative Toolkit
• Preparing a target drive for acquisition in Linux
– Current Linux distributions can create Microsoft FAT and NTFS partition tables
– fdisk command lists, creates, deletes, and verifies partitions in Linux
– mkfs.msdos command formats a FAT file system from Linux
– If you have a functioning Linux computer, follow steps starting on page
99 to learn how to prepare a target drive for acquisition
• Acquiring data with dd in Linux
– dd (―data dump‖) command
• Can read and write from media device and data file
• Creates raw format file that most computer forensics analysis tools can
read
– Shortcomings of dd command
• Requires more advanced skills than average user
• Does not compress data
– dd command combined with the split command
• Segments output into separate volumes
• Acquiring data with dd in Linux (cont’d)
– Follow the step starting on page 104 in the text to make an image of an NTFS
disk on a FAT32 disk
• Acquiring data with dcfldd in Linux
– The dd command is intended as a data management tool
• Not designed for forensics acquisitions
• Acquiring data with dcfldd in Linux (cont’d) – dcfldd additional
functions
Fig: The split image dialog box Fig: The Capture Image dialog box
as Mini-WinFE
• RAID 1
– Designed for data recovery
– More expensive than RAID 0
• RAID 5
– Similar to RAIDs 0 and 3
– Places parity recovery data on each disk
• RAID 6
– Redundant parity on each disk
• RAID 10, or mirrored striping
– Also known as RAID 1+0
– Combination of RAID 1 and RAID 0
– X-Ways Forensics
– AccessData FTK
– Runtime Software
– R-Tools Technologies
• Occasionally, a RAID system is too large for a static acquisition
– Retrieve only the data relevant to the investigation with the sparse or logical
acquisition method
Using Remote Network Acquisition Tools
• You can remotely connect to a suspect computer via a network connection and copy data
from it
• Remote acquisition tools vary in configurations and capabilities
• Drawbacks
– Antivirus, antispyware, and firewall tools can be configured to ignore remote
access programs
– Suspects could easily install their own security tools that trigger an alarm to notify
them of remote access intrusions
Remote Acquisition with ProDiscover
• ProDiscover Incident Response additional functions
– Capture volatile system state information
– Analyze current running processes
– Locate unseen files and processes
– Remotely view and listen to IP ports
– Run hash comparisons
– Create a hash inventory of all files remotely
PDServer remote agent
ProDiscover utility for remote access
Needs to be loaded on the suspect
• PDServer installation modes
– Trusted CD
– Preinstallation
– Pushing out and running remotely
• PDServer can run in a stealth mode
– Can change process name to appear as OS function
• Remote connection security features
– Password Protection
– Encryption
– Secure Communication Protocol
– Write Protected Trusted Binaries
– Digital Signatures
Remote Acquisition with EnCase Enterprise
• Remote acquisition features
– Remote data acquisition of a computer’s media and RAM data
– Integration with intrusion detection system (IDS) tools
– Options to create an image of data from one or more systems
– Preview of systems
– A wide range of file system formats
– RAID support for both hardware and software
Remote Acquisition with R-Tools R-Studio
• R-Tools suite of software is designed for data recovery
• Remote connection uses Triple Data Encryption Standard (3DES) encryption
• Creates raw format acquisitions
• Supports various file systems
Remote Acquisition with WetStone US-LATT PRO
• US-LATT PRO
– Part of a suite of tools developed by WetStone
• Capabilities:
– Data reading of bad sectors
– Can mount drives in write-protected mode
– Can mount target drives in read/write mode
– Compression schemes to speed up acquisition or reduce amount of storage
needed
Runtime Software
• Runtime Software offers shareware programs for data acquisition and recovery:
– DiskExplorer for FAT and NTFS
• Features:
– Create a raw format image file
– Segment the raw format or compressed image for archiving purposes
– Access network computers’ drives
ILook Investigator IXimager
IXimager
– Runs from a bootable floppy or CD
– Designed to work only with ILook Investigator
– Can acquire single drives and RAID drives – Supports:
• IDE (PATA)
• SCSI
• USB
• FireWire