Unit 3
Unit 3
Forensics
• SATA (Serial ATA): Common in modern PCs, offers faster data transfer and
better efficiency than IDE.
1
• SCSI (Small Computer System Interface): Found in enterprise systems, sup-
ports multiple devices and high-speed data transfer.
Forensic analysis involves understanding these interfaces for proper data extraction.
2
EXT (Extended File System)
• Common in Linux distributions.
• Versions include EXT2 (no journaling), EXT3 (adds journaling), and EXT4 (sup-
ports larger volumes and better performance).
• Supports journaling and large files but lacks modern features like snapshots.
• Metadata Journaling: Logs only metadata changes before writing to the disk.
Used in file systems like EXT3 and NTFS.
• Full Journaling: Logs both metadata and file content changes, providing higher
reliability but incurring additional overhead.
• Ordered Journaling: Ensures that metadata changes are committed only after
the corresponding file data is written to disk.
3
• NTFS (Windows): Implements metadata journaling to ensure consistency.
• File Carving: Recovers deleted files by scanning for known file signatures without
relying on file system structures.
• Undelete Utilities: Tools like TestDisk and PhotoRec can restore recently deleted
files from FAT, NTFS, and EXT file systems.
• RAID Reconstruction: Used for recovering data from RAID arrays where file
systems have been partially damaged.
• Stores the bootloader in the first 512 bytes of the disk (MBR sector).
4
Forensic Considerations for MBR:
• Stores multiple copies of partition data across the disk, improving redundancy.
• GPT stores multiple backup partition tables, making it more resilient to corruption.
• Analysis of GPT disk images requires tools that support UEFI-based partitions.
• MBR-based disks are more prone to partition table corruption, leading to data loss.
• GPT provides better forensic reliability due to redundancy and integrity checks.
5
• Tools such as TestDisk, GParted, and Forensic Imager help recover partition
structures.
Understanding partitioning schemes is crucial for forensic analysts when recovering
lost partitions, detecting hidden data, and analyzing boot records.
6
Data Protection Best Practices
To ensure data security and prevent unauthorized access, best practices include:
• Secure Key Storage: Storing encryption keys in a TPM or secure vault prevents
unauthorized access.
• Data Wiping Before Disposal: Secure erasure techniques ensure encrypted disks
cannot be recovered after disposal.
• Live Analysis: Extracting encryption keys from RAM during an active session.
• Cold Boot Attacks: Retrieving encryption keys from residual RAM data.
• File systems like FAT, NTFS, and EXT maintain records of deleted files in
metadata structures (e.g., the Master File Table in NTFS).
• Recovery tools can locate file entries and restore data before it is overwritten.
2. File Carving
• File carving extracts deleted files by searching for known file headers, footers, and
patterns.
7
• This technique does not rely on file system metadata and is useful when metadata
is damaged.
• Tools like Scalpel, Foremost, and PhotoRec are commonly used for file carving.
• Journaling file systems (e.g., NTFS, EXT4, APFS) maintain records of file op-
erations.
• Log entries can reveal deleted file names, timestamps, and contents.
• Windows Volume Shadow Copy (VSS) and macOS Time Machine retain pre-
vious file versions.
• Even after file deletion, remnants may persist in unallocated disk space.
• Application Metadata: Embedded data within files, such as EXIF data in im-
ages, document properties in PDFs, and ID3 tags in audio files.
8
– FTK Imager (recovers metadata from forensic disk images).
• Forensic analysts counter these techniques by analyzing system logs, backup meta-
data, and journaling file systems.
• File Carving: Recovering deleted or fragmented files by scanning for known file
signatures without relying on file system structures.
• Timeline Reconstruction: Analyzing system logs, file metadata, and user activ-
ity to create a chronological sequence of events for forensic investigations.
These techniques help forensic investigators trace security breaches, retrieve lost data,
and identify unauthorized file modifications.
9
• Secure File Deletion: Overwriting deleted files with secure erase methods to
prevent recovery by forensic tools.
10