Dataacquisition
Dataacquisition
ACQUISITION
UNDERSTANDING STORAGE FORMATS
FOR DIGITAL EVIDENCE
▪ Data in a forensics acquisition tool is stored as an image file
▪ Three formats
▪ Raw format
▪ Proprietary formats
▪ Advanced Forensics Format (AFF)
RAW FORMAT
▪ Makes it possible to write bit-stream data to files
▪ Advantages
▪ Fast data transfers
▪ Ignores minor data read errors on source drive
▪ Most computer forensics tools can read raw format
▪ Disadvantages
▪ Requires as much storage as original disk or data
▪ Tools might not collect marginal (bad) sectors
PROPRIETARY FORMATS
▪ Most forensics tools have their own formats
▪ Features offered
▪ Option to compress or not compress image files
▪ Can split an image into smaller segmented files
▪ Can integrate metadata into the image file
▪ Disadvantages
▪ Inability to share an image between different tools
▪ File size limitation for each segmented volume
▪ The Expert Witness format is unofficial standard
▪ FTK uses and Encases USES
ADVANCED FORENSICS FORMAT
▪ Developed by Dr. Simson L. Garfinkel as an open-source acquisition format
▪ Design goals
▪ Provide compressed or uncompressed image files
▪ No size restriction for disk-to-image files
▪ Provide space in the image file or segmented files for metadata
▪ Simple design with extensibility
▪ Open source for multiple platforms and Os’s
▪ Internal consistency checks for self-authentication
▪ Creating a disk-to-disk
▪ When disk-to-image copy is not possible
▪ Tools can adjust disk’s geometry configuration
▪ EnCase, SafeBack, SnapCopy
DETERMINING THE BEST ACQUISITION
METHOD
▪ Logical acquisition or sparse acquisition
▪ Use when your time is limited
▪ Logical acquisition captures only specific files of interest to the case
▪ Sparse acquisition collects fragments of unallocated (deleted) data
▪ For large disks
▪ PST or OST mail files, RAID servers
SNAPSHOT THE SYSTEM
▪ Before shutting down a system an analyst must create a snapshot of the
current run state.
▪ Additionally, this must be done by minimizing your fingerprint.
▪ Question: What is our ISY “Swiss army knife tool” to perform this type
of live acquisition?
SUMMARY
▪ Forensics data acquisitions are stored ▪ Always validate acquisition
in three different formats:
▪ A Linux Live CD, such as SIFT, Kali Linux,
▪ Raw, proprietary, and AFF or Deft, provides many useful tools for
▪ Data acquisition methods digital forensics acquisitions
▪ Disk-to-image file ▪ Preferred Linux acquisition tool is
dcfldd (not dd)
▪ Disk-to-disk copy
▪ Logical disk-to-disk or disk-to-data file ▪ Use a physical write-blocker device for
acquisitions
▪ Sparse data copy