ICT706 Lecture 6
ICT706 Lecture 6
Chapter 6
Current Digital Forensics Tools
Objectives
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Evaluating Digital Forensics Tool Needs
Consider open-source tools; the best value for as many features as possible
Questions to ask when evaluating tools:
On which OS does the forensics tool run?
Is the tool versatile?
Can the tool analyze more than one file system?
Can a scripting language be used with the tool to automate repetitive functions and tasks?
Does it have automated features?
What is the vendor’s reputation for providing product support?
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Types of Digital Forensics Tools
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (1 of 20)
Follow guidelines set up by NIST’s Computer Forensics Tool Testing (CFTT) program
ISO standard 27037 states: Digital Evidence First Responders (DEFRs) should use validated tools
Five major categories:
Acquisition
Validation and verification
Extraction
Reconstruction
Reporting
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (2 of 20)
Acquisition
Making a copy of the original drive
Acquisition subfunctions:
Physical data copy
Logical data copy
Data acquisition format
Command-line acquisition
GUI acquisition
Remote, live, and memory acquisitions
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (3 of 20)
Acquisition (cont’d)
Two types of data-copying methods are used in software acquisitions:
Physical copying of the entire drive
Logical copying of a disk partition
The formats for disk acquisitions vary
From raw data to vendor-specific proprietary
You can view a raw image file’s contents with any hexadecimal editor
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (4 of 20)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (5 of 20)
Acquisition (cont’d)
Creating smaller segmented files is a typical
feature in vendor acquisition tools
Remote acquisition of files is common in larger
organizations
Popular tools, such as AccessData and
EnCase, can do remote acquisitions of
forensics drive images on a network
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (6 of 20)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (7 of 20)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital
Forensics Tools (8 of 20)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (9 of 20)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (10 of 20)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital
Forensics Tools (11 of 20)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (12 of 20)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (13 of 20)
Extraction
Recovery task in a digital investigation
Most challenging of all tasks to master
Recovering data is the first step in analyzing an
investigation’s data
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (14 of 20)
Extraction (cont’d)
Subfunctions of extraction
Data viewing
Keyword searching
Decompressing or uncompressing
Carving
Decrypting
Bookmarking or tagging
Keyword search speeds up analysis for
investigators
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (15 of 20)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (16 of 20)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (17 of 20)
Extraction (cont’d)
From an investigation perspective, encrypted
files and systems are a problem
Many password recovery tools have a feature
for generating potential password lists
For a password dictionary attack
If a password dictionary attack fails, you can
run a brute-force attack
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (18 of 20)
Reconstruction
Re-create a suspect drive to show what happened during a crime or an incident
Methods of reconstruction
Disk-to-disk copy
Partition-to-partition copy
Image-to-disk copy
Image-to-partition copy
Disk-to-image copy
Rebuilding files from data runs and carving
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (19 of 20)
Reconstruction (cont’d)
To re-create an image of a suspect drive
Copy an image to another location, such
as a partition, a physical disk, or a virtual
machine
Simplest method is to use a tool that
makes a direct disk-to-image copy
Examples of disk-to-image copy tools:
Linux dd command
ProDiscover
Voom Technologies Shadow Drive
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Tasks Performed by Digital Forensics Tools (20 of 20)
Reporting
To perform a forensics disk analysis and examination, you need to create a report
Subfunctions of reporting
Bookmarking or tagging
Log reports
Timelines
Report generator
Use this information when producing a final report for your investigation
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Other Considerations for Tools
Considerations
Flexibility
Reliability
Future expandability
Create a software library containing older versions of forensics
utilities, OSs, and other programs
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Digital Forensics Software Tools
The following sections explore some options for command-line and GUI tools in both Windows and Linux
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Command-line Forensics Tools
The first tools that analyzed and extracted data from floppy disks and hard disks were MS-DOS tools for IBM PC file
systems
Norton DiskEdit
One of the first MS-DOS tools used for computer investigations
Command-line tools require few system resources
Designed to run in minimal configurations
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Linux Forensics Tools (1 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Linux Forensics Tools (2 of 3)
Helix 3
One of the easiest suites to use
You can load it on a live Windows system
Loads as a bootable Linux OS from a cold boot
**Some international courts have not accepted live acquisitions as a valid forensics practice
Kali Linux
Formerly known as BackTrack
Includes a variety of tools and has an easy-to-use KDE interface
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Linux Forensics Tools (3 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Other GUI Forensics Tools (1 of 2)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Other GUI Forensics Tools (2 of 2)
Disadvantages
Excessive resource requirements
Produce inconsistent results
Create tool dependencies
Investigators’ may want to use only one tool
Should be familiar with more than one type of tool
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Digital Forensics Hardware Tools
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Forensic Workstations (1 of 4)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Forensic Workstations (2 of 4)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Forensic Workstations (3 of 4)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Forensic Workstations (4 of 4)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Using a Write-Blocker (1 of 2)
Write-blocker
Prevents data writes to a hard disk
Software-enabled blockers
Typically run in a shell mode (Windows CLI)
Example: PDBlock from Digital Intelligence
Hardware options
Ideal for GUI forensic tools
Act as a bridge between the suspect drive and
the forensic workstation
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Using a Write-Blocker (2 of 2)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Recommendations for a Forensic Workstation (1 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Recommendations for a Forensic Workstation (2 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Recommendations for a Forensic Workstation (3 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Validating and Testing Forensic Software
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Using National Institute of Standards and Technology
Tools (1 of 3)
NIST publishes articles, provides tools, and creates procedures for testing/validating forensics software
Computer Forensics Tool Testing (CFTT) project
Manages research on forensics tools
NIST has created criteria for testing forensics tools based on:
Standard testing methods
ISO 17025 criteria for testing items that have no current standards
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Using National Institute of Standards and Technology
Tools (2 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Using National Institute of Standards and Technology
Tools (3 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Using Validation Protocols (1 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Using Validation Protocols (2 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Using Validation Protocols (3 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Summary (1 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Summary (2 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Summary (3 of 3)
Tools that run in Windows and other GUI environments don’t require the same level of computing expertise as
command-line tools
Always run a validation test when upgrading your forensics tools
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.