Module 3 Word file Part 3
Module 3 Word file Part 3
Computer Forensics
Part 3
31. RAID (Redundant Array of Inexpensive Disk): -
RAID (Redundant Array of Inexpensive disks) is a technology that is used to increase the
performance and/or reliability of data storage. A RAID system consists of two or more
drives working in parallel. It is designed to take multiple physical disks and address
them as a single logical unit.
3. RAID level 5
Advantages:
RAID 0 offers great performance, both in read and write operations. There is no
overhead caused by parity controls.
1
Disadvantages:
RAID 0 is not fault tolerant. If one drive fails, all data in the RAID 0 array are lost. It
should not be used for mission critical systems.
Ideal Use:
RAID 0 is ideal for non-critical storage of data that have to be read/written at a high
speed, such as on an image retouching or video editing station.
2
Advantages:
RAID 1 offers excellent read speed and a write speed that is comparable to that
of a single drive.
In case a drive fails, data do not have to be rebuild, they just have to be copied to
the replacement drive.
Disadvantages:
The main disadvantage is that the effective storage capacity is only half of the
total drive capacity because all data get written twice.
Software RAID1 solutions do not always allow a hot swap of a failed drive. That
means the failed drive can only be replaced after powering down the computer it
is attached to. For servers, that are used simultaneously by many people, this
may not be acceptable. Such systems typically use hardware controllers that do
support hot swapping.
Ideal Use:
RAID 1 is ideal for mission critical storage, for instance for accounting systems.
It is also suitable for small servers in which only two data drives will be used.
3. RAID level 5:
RAID 5 is the most common secure RAID level. It requires at least three disks but
can work with up to 16. Data blocks are striped across the drives and on one drive a
parity checksum of all the block data is written. The parity data are not written to a
fixed drive, they are spread across all drives.
3
Advantages:
Read data transaction are very fast whereas write data transaction are
somewhat slower (due to the parity that has to be calculated).
If a drive fails, one still have access to all data, even while the failed drive is being
replaced and the storage controller rebuilds the data on the new drive.
Disadvantages:
This is complex technology. If one of the disks in an array using 4TB disks fails and
is replaced, restoring the data (the rebuild time) may take a day or longer,
depending on the load on the array and the speed of the controller. If another
disk goes bad during that time, data are lost forever.
Ideal Use:
RAID 5 is a good all round system that combines efficient storage with excellent
security and decent performance. It is ideal for file and application servers.
4
32. Foremost and Carving: -
Foremost is a console program to recover price based on their headers, footers
and internal data structures. This process is commonly referred to as data
carving. Although written for law enforcement use, it is freely available and can
be used as a general data recovery tool. Foremost can work on image files, such
as those generated by dd, SafeBack, Encase etc or directly on a drive.
File carving is the process of trying to recover files without this metadata. This is
done by analysing the raw data and identifying what it is (text, executable, png,
mp3 etc). This can be done in different ways, but the simplest is to look for the
signature or “magic numbers” that mark the beginning and/or end of a particular
file type. For instance, every java class file has as it’s first four bytes the
hexadecimal value CA FE BA BE. Some files contain footers as well, making it just
as simple to identify the ending of the file.
5
A memory dump (also called a core dump or system dump) is a snapshot of
computer memory data taken at a specific point of time. A memory dump can
contain important forensic information about the state of the system prior to an
incident like a crash or a security breach.
Memory dumps contain RAM data that can be used to determine the cause of an
incident as well as other important details.
This is useful because of the way processes, files and programmes run in memory
and once a snapshot has been taken, the investigator can determine many
important facts, such as:
Users who have logged into the system and from where they are accessing
the system.
It is already seen how useful this information can be to investigators looking for
system anomalies, and by capturing the volatile information stored in the system
memory, they can create a permanent record of the system’s previous state.
Page File: A page file is a file that stores information that is similar to that which
is stored in the system RAM.
7
35. Tools for Memory data collection: -
Many professionals in the market use a combination of free and paid tolls to collect
data. Some examples are as follows:
Rekall: This is an end-to-end solution that includes both acquisition and analysis
tools for incident responders and investigators. It’s better to think of it as a
forensic framework suite rather than a single application.
Helix ISO: This is a bootable live CD and a standalone application that makes
capturing a memory dump or memory image of a system very simple.
Belkasoft RAM Capturer: It is a forensic tool that allows you to capture the
volatile section of your system memory to a file. The functionality and wide
range of tools available in this software package will allow first responders to get
started on their investigations as soon as possible.
8
When windows were launched at the start, it relied closely on .ini files to store
windows programs configurations and settings. Despite the fact that .ini files are
still routinely used, most windows programs rely on settings made to the
windows registry after being installed.
One can view the registry by using the Regedit (Registry Editor) program for
Windows 9X or by using Regedt32 for Windows 2000, XP and Vista.
In the registry editor, they can use the Edit, Find menu commands to locate the
entries which might have the trace evidence like information identifying the last
person who logged on to the computer, which is usually stored in user account
information.
Windows 9x system don’t record a user’s logon information reliably, but one can
find related user information, such as network logon data, by searching for all
occurrences of “username” or application licences.
One can also use the registry to determine the most recently accessed files and
peripheral devices. In addition, all installed programs store information in the
registry such as website accessed, recent files and even chat rooms accessed.
Terminology Description
9
HKEY Windows split the registry into categories with the prefix
HKEY_Windows 9x systems have six HKEY categories and
Windows 2000 and later have five. Windows programmers
refer to the “H” as the handle for the key.
Value A name and value in a key; it’s similar to a file and its data
content.
10
Default All keys have a default value that may or may not contain data.
value
It is important to understand that where data files that the registry reads are
located.
The number of records the registry utilizes relies on upon the windows version.
In Windows 9x/Me, it utilizes just two files; in Windows NT,2000,XP and Vista it
utilizes six files. While looking at registry information from a suspect drive, one
has to know where these records are found with the goal that one can extract
them and investigate their content. One can discover these documents with
tools, for example, Access Data Registry Viewer.
The following table shows how registry data files are organized and explains
these file’s purposes in different versions of windows.
11
Windows 9x/Me
Filename and location Purpose of file
Windows\User.dat Consist of the most recently used files list and desktop
configuration settings; every user account created on the
Windows\profile\User
system has it’s own user data file.
Account
12
Winnt\System32\config\Software Consist of installed programs settings and
associated usernames and passwords.
When we open the windows registry editor first time, it displays root keys that contain
all registry values. The description of the root keys is given in the table:
13
14
37. Evidence collection in Logs: -
Windows system maintain three log files: the system log, application log and Security
log. By reviewing these logs, the following information may be obtained:
System Log contains the recorded system processes and device driver
activities. System events audited by windows contain device drivers that fail
to start properly; hardware failures; duplicate IP addresses; and the starting,
pausing and stopping of services.
Application log include activities related to user programs and commercial
off-the-shelf applications. Application events that are audited by Windows
include any errors or information that an application wants to report. The
application log can include the number of failed logons, amount of disk usage
and other important metrics.
Security log include system auditing and the security processes used by
windows. Security events that are audited by windows include changes in
user privileges, changes in the audit policy, file and directory access, printer
activity and system logons and logoffs.
Any user can view the application and system logs, but only administrators
can read the security log. The security log is usually the most useful log during
15
incident response. An investigator must be comfortable with viewing and
filtering the output to these logs to recognize the evidence that they contain.
Unallocated space refers to portions of the disk that are not currently allocated
to any file system or file. This space has not been assigned to store data by the
file system and may contain remnants (a part or quantity that is left after the
greater part has been used, removed, or destroyed) of deleted files or previously
allocated data.
When a file is deleted or a disk is formatted, the data is typically not immediately
overwritten. Instead, the file system marks the space occupied by the deleted file
as unallocated, making it available for future use.
Free Space:
Free space refers to portions of the disk that are currently not occupied by any
files or data. In contrast to unallocated space, free space is part of the file system
and is available for immediate use by the operating system to store new files.
When files are deleted or moved, the space they occupied becomes free space
within the file system. This space can be reused by the file system to store new
data.
16
Free space does not contain remnants of deleted files like unallocated space
does, as the file system has reclaimed it for potential future use.
Slack Space:
Slack space refers to the unused portion of a disk sector that occurs when the
actual data within the sector does not fill it entirely. It is the difference between
the sector size and the size of the data stored within it.
Slack space typically occurs when a file's size is not an exact multiple of the disk's
sector size. The remaining space within the sector is considered slack space.
17
a computer forensic examiner.
(a) Supports a wide variety of file systems, including FAT12, FAT16, FAT32, NTFS,
HPFS, Macintosh, OS/2, EXT2,EXT3 and UFS.
(b) Recovers file slack and not allocate space. The improved loopback kernel makes
it easy to recognize slack and not allocate drive space.
(d) Delivers keyword search competences and performs all functions in a read-only
state on the file system being processed. The NASA kernel also provide the read
only option to setup.
18
7. Check for unauthorized access points
System Log contains the recorded system processes and device driver activities.
System events audited by windows contain device drivers that fail to start properly;
hardware failures; duplicate IP addresses; and the starting, pausing and stopping of
services.
Application log include activities related to user programs and commercial off-the-
shelf applications. Application events that are audited by Windows include any
errors or information that an application wants to report. The application log can
include the number of failed logons, amount of disk usage and other important
metrics.
Security log include system auditing and the security processes used by windows.
Security events that are audited by windows include changes in user privileges,
19
changes in the audit policy , file and directory access, printer activity and system
logons and logoffs.
b) To view all domain accounts on a domain controller and for suspicious entries,
use usrstat from the NTRK.
20
c) Examine the Security log using Event viewer, filtering for event ID 624,626,636
and 642.
ListDLLs gives the full command-line arguments for every running process.
a) Terminal server
b) SQL/Oracle
21
c) Third-party telnet daemons on Windows NT
22
b) Investigating Live LINUX/UNIX System: -
The UNIX is a powerful, flexible and extremely functional operating system. It has
become essential for both UNIX users and forensic investigators to investigate a
compromised UNIX system and the ability to respond to a computer security incident.
23
4. Identifying unauthorized user accounts or groups:
It is very important to recognize the unauthorized user account and groups
because attackers will frequently modify account and group information on victim
systems. This modification can come in the form of additional accounts or increase
in privilege of current accounts. So the audit of users and group accounts on
suspected victim systems is necessary.
a) To assure that user account are not manipulated, those accounts need to be
examined that should be disabled for remote logon. Each user ID and group ID
should be noted. A user ID of 0 or 1 on an user account is suspicious as it
represents root-level and bin-level access respectively. If a normally privileged
user account has a higher privilege level, then it seems to be a backdoor for an
attacker to gain privileged access.
b) Group accounts have the group ID for the groups. While reviewing group
accounts of the system, those clients need to be searched who are in extremely
privileged groups.
24
allow some degree of remote access to unwanted intruders, as can a phone line
connected to a modem.
X Servers, FTP, telnet, TFTP, DNS, sendmail, finger, SNMP, IMAP, POP, HTTP and
HTTPs are some common access points that intruders can take advantage.
25