100% found this document useful (1 vote)
163 views110 pages

Digital Forensics: Computer Forensics Tools, Encase and Windows Os

This document discusses computer forensics tools and operating systems. It covers file systems, how they manage data storage and access. It also discusses the boot process for computers, including the roles of the BIOS, POST, and boot sequence. The importance of understanding operating systems and file systems for forensic investigators is emphasized.

Uploaded by

ABC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
163 views110 pages

Digital Forensics: Computer Forensics Tools, Encase and Windows Os

This document discusses computer forensics tools and operating systems. It covers file systems, how they manage data storage and access. It also discusses the boot process for computers, including the roles of the BIOS, POST, and boot sequence. The importance of understanding operating systems and file systems for forensic investigators is emphasized.

Uploaded by

ABC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 110

Digital Forensics

Module 4
Computer forensics tools, Encase and Windows os

Dr. Nagaraj S V & Prof Seshu Babu Pulagara


VIT Chennai
2

File systems
 A file system  controls how data is stored and retrieved.
 Without a file system, data placed in a storage medium would be one
large body of data with no way to tell where one piece of data stops
and the next begins.
 It provides the OS a road map to data on a disk
 The types of file systems used by an OS specify how data is stored on
the disk

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
3

 There are many different kinds of file systems. Each one has
different structure and logic, properties of speed, flexibility, security,
size and more. Some file systems have been designed to be used for
specific applications.
 A file system is responsible for arranging storage space. Reliability,
efficiency, and tuning with regard to the physical storage medium
are important design considerations.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
4

 The forensic investigator must be familiar with the operating


systems used by a computer and also its file systems
 This is essential for accessing a defendant’s computer in order to
scrutinize or acquire data
 The file system manages access to both the content of files and
the metadata about those files.
 Modern computers can accommodate more than one operating
system and file system

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
5

 Linux supports numerous file systems, but common choices for the


system disk on a block device include the ext* family
(ext2, ext3 and ext4), XFS, JFS, and btrfs.
 Mac OS (formerly Mac OS X) uses the Apple File System (APFS),
which recently replaced a file system inherited from classic Mac OS
called HFS Plus (HFS+).

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
6

Microsoft Windows File systems


 Microsoft Windows makes use of the FAT, NTFS, exFAT, Live File
System and ReFS file systems (the last of these is only supported and
usable in Windows Server 2012, Windows Server 2016, Windows
8, Windows 8.1, and Windows 10; Windows cannot boot from it).
 File Allocation Table (FAT)
 NTFS (NT File System)
(a proprietary journaling file system)  developed by Microsoft

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
7

Encrypting File System (EFS)

 EFS on Microsoft Windows is a feature introduced in version 3.0


of NTFS  that provides file system-level encryption.
 The technology enables files to be transparently encrypted to
protect confidential data from attackers with physical access to the
computer.
 Windows EFS supports a range of symmetric encryption algorithms,
depending on the version of Windows in use when the files are
encrypted

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
8

Understanding booting
 Booting is the process of starting a computer. It can be initiated by
hardware such as a button press, or by a software command.
 After it is switched on, a computer's central processing unit (CPU)
has no software in its main memory, so some process must load
software into memory before it can be executed. This may be done
by hardware or firmware in the CPU, or by a separate processor in
the computer system.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
9

 Restarting a computer is called rebooting, which can be "hard", e.g.


after electrical power to the CPU is switched from off to on, or "soft",
where the power is not cut.
 On some systems, a soft boot may optionally clear RAM. Both hard
and soft booting can be initiated by hardware such as a button press
or by software command.
 Booting is complete when the functional  runtime system,
typically the operating system and some applications, is attained.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
10

 The Basic Input / Output System (BIOS) is firmware stored in a chip


on a computer's motherboard. It is the first program that runs when
a computer is turned on
 When changes are made to the BIOS configuration, the settings are
not stored on the BIOS chip itself, rather, they are stored on a
special memory chip, which is referred to as the Complementary
Metal Oxide Semiconductor (CMOS)

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
11

 The BIOS performs the  power-on self-test (POST which initializes


and tests a computer's hardware. Then it locates and runs the boot
loader, or loads the operating system directly.
 The BIOS also provides a simple interface for configuring a
computer's hardware.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
12

 The BIOS firmware comes pre-installed on a personal computer's


(PC’s) system board
 The BIOS memory has to be non-volatile since it has to retain
information even when the computer is not powered. This is
because the computer must remember its BIOS settings even when
it is turned off.
 Unified Extensible Firmware Interface (UEFI) is a successor to the
legacy PC BIOS, aiming to address its technical defects

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
13

Power-on self-test or POST


 It is a test a computer must perform for verifying that all the
hardware is working properly before starting the remainder of the
boot process.
 The POST process checks computer hardware such as Random
Access Memory (RAM),  hard drives, CD-ROM drives, keyboards to
make sure all are working correctly.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
14

 The information on the CMOS chip includes the types of disk drives
installed, the current date and time of the system clock, and the
computer's boot sequence.
 The CMOS has its own dedicated power source, which is the CMOS
battery

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
15

Boot sequence
 The boot sequence defines which devices a computer should check
for the operating system's boot files.
 It also specifies the order devices are checked. The list can be
changed and re-ordered in the computer's BIOS.
 Common devices usually listed in the boot sequence are the disc
drives (CD or DVD), hard drive, USB flash drive, and Solid State
Devices (SSDs).

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
16

 The forensics investigator should ensure that the suspect’s computer


is made to boot from a forensic disk or CD
 The  boot sequence should be set to how the investigator wants the
computer to boot.
 The purpose of a forensic boot disk is to boot the computer and load
an operating system, in a forensically sound manner in which the
evidentiary media is not  altered.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
17

 Many commercial tools such as EnCase provide forensic boot disks


 Forensic boot CDs are specially designed to write-protect detected
storage in case it has to be forensically imaged

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
18

Understanding disk drives


 Data is recorded or stored in disks by various electronic, magnetic,
optical, or mechanical changes to a surface layer of one or more
rotating disks
 A disk drive is a device implementing such a storage mechanism.
Notable types are the hard disk drive  containing a non-removable
disk, the floppy disk drive and its removable floppy disk, and
various optical disc drives and associated optical disc media.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
19

 Digital disk drives are block storage devices.


 Each disk is divided into logical blocks (collection of sectors).
 Blocks are addressed using their logical block addresses (LBA).
 Read from or writing to disk happens at the granularity of blocks.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
20

 Originally, the disk capacity was quite low and has been improved in
one of several ways.
 Improvements in mechanical design and manufacture allowed
smaller and more precise heads, meaning that more tracks could be
stored on each of the disks.
 Advancements in data compression methods permitted more
information to be stored in each of the individual sectors.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
21

 The drive stores data onto cylinders, heads, and sectors. 


 The sectors unit is the smallest size of data to be stored in a hard disk
drive and each file will have many sectors units assigned to it. 
 Disk drives comprise of one or more platters coated with magnetic
stuff

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
22

Terminology
 Disk - Generally refers to magnetic media and devices
 Platter – An individual recording disk. A hard disk drive contains a set of
platters.
 Track – The circle of recorded data on a single recording surface of a
platter.
 Sector – A segment of a track
 Head – The device that reads and writes the information—magnetic or
optical—on the disk surface.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
23

 Cylinder is a cylindrical intersection through the stack of platters in a


disk, centered around the disk's spindle.
 A combination of tracks forms a cylinder, which is stacked on another
platter
 Spindle – the spinning axle on which the platters are mounted.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
24

Cylinder-head-sector
 Cylinder-head-sector (CHS) is an early method for giving addresses to
each physical block of data on a hard disk drive
 https://en.wikipedia.org/wiki/Cylinder-head-sector
 As the geometry became more complicated (for example, with the
introduction of zone bit recording) and drive sizes grew over time, the
CHS addressing method became restrictive

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
25

 Zone bit recording  is a method used by disk drives to optimise


the tracks for increased data capacity. It does this by placing
more sectors per zone on outer tracks than on inner tracks. 
 By the mid 1990s, hard drive interfaces replaced the CHS scheme
with logical block addressing

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
Solid-state storage 26

 Solid-state storage is a type of non-volatile computer storage that


stores and retrieves digital information using only electronic circuits,
without any involvement of moving mechanical parts.
 This differs fundamentally from the
traditional electromechanical storage, which records data using
rotating or linearly moving media coated with magnetic material.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
27

Solid-State Drive
 A solid-state drive (SSD) is a solid-state storage device that
uses integrated circuit assemblies to store data persistently, typically
using flash memory
 It acts as a secondary storage in the hierarchy of computer storage.
 It is also sometimes called a solid-state device or a solid-state disk

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
28

 Forensic investigators should make a full forensic copy of solid-state


devices, at the earliest to recover data from unallocated disk space
 SSDs provide many challenges to Forensic investigators
 https://link.springer.com/chapter/10.1007/978-3-030-23547-5_11
 https://belkasoft.com/download/info/SSD%20Forensics
%202012.pdf

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
29

Disk Clusters
 In computer file systems, a cluster or allocation unit is a unit of disk
space allocation for files and directories.
 A cluster, or allocation unit, is a group of sectors that make up the
smallest unit of disk allocation for a file within a file system
 A file system's cluster size is the smallest amount of space a file can
take up on a computer. A common sector size is 512 bytes

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
30

 To reduce the overhead of managing on-disk data structures, the file


system does not allocate individual disk sectors by default, but
contiguous groups of sectors, called clusters.
 On a disk that uses 512-byte sectors, a 512-byte cluster contains one
sector, whereas a 4-kibibyte  cluster contains eight sectors.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
31

 A cluster is the smallest logical amount of disk space that can be


allocated to hold a file. Storing small files on a file system with large
clusters will therefore waste disk space; such wasted disk space is
called slack space.
 The term cluster was changed to allocation unit in DOS 4.0. However
the term cluster is still widely used.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
32

 For cluster sizes which are small versus the average file size, the
wasted space per file will be statistically about half of the cluster
size; for large cluster sizes, the wasted space will become greater.
 A larger cluster size reduces bookkeeping overhead and
fragmentation, which may improve reading and writing speed
overall.
 Typical cluster sizes range from 1 sector (512 B) to 128 sectors
(64 KB).

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
33

Disk structure
 Disk structure:
(A) track
(B) geometrical sector
(C) track sector
(D) cluster

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
34

 The first sector of all disks incorporates a system area, the


boot record, and a file structure database
 Clusters are numbered consecutively starting at 0 in NTFS and
2 in FAT
 OS allots these cluster numbers, called logical addresses
 Sector numbers are called physical addresses
 Cluster sizes vary as per the hard disk size and file system

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
35

Partition
 Disk partitioning or disk slicing is the creation of one or more
regions on secondary storage, so that each region can be managed
separately. These regions are called partitions.
 t is typically the first step of preparing a newly installed disk, before
any file system is created. The disk stores the information about the
partitions' locations and sizes in an area known as the partition
table that the operating system reads before any other part of the
disk

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
36

 Each partition then appears to the operating system as a distinct


"logical" disk that uses part of the actual disk. 
 System administrators use a program called a partition editor to
create, resize, delete, and manipulate the partitions]. Partitioning
allows the use of different file systems to be installed for different
kinds of files.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
37

 Windows OSs can have three primary partitions succeeded by an


extended partition that can contain one or more logical drives
 Hidden partitions or voids are large unused gaps between partitions
on a disk
 Partition gaps are unused space between partitions
 Hidden partitions and partition gaps are of concern to investigators
as data could be hidden there

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
38

 Every file system is identified by a unique hexadecimal code in the


partition table.
 See for e.g. https://datarecovery.com/rd/hexadecimal-flags-for-
partition-type/

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
39

Master boot record (MBR)


 A master boot record (MBR) is a special type of boot sector at the
very beginning of partitioned computer mass storage
devices like fixed disks or removable drives intended for use
with IBM PC-compatible systems and beyond.
 The concept of MBRs was introduced in 1983 with PC DOS 2.0.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
40

 The MBR holds the information on how the logical partitions,


containing file systems, are organized on that medium.
 The MBR also contains executable code to function as a loader for the
installed operating system—usually by passing control over to the
loader's second stage, or in conjunction with each partition's volume
boot record (VBR). This MBR code is usually referred to as a boot
loader.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
41

 MBR stores information about partitions on a disk and their


locations, size, and other important items
 A partition table is a table maintained on disk by the operating
system describing the partitions on that disk.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
42

 The terms partition table and partition map are most commonly
associated with the MBR partition table of a MBR in IBM PC
compatibles
 Partitions can be created, resized, or deleted. This is called disk
partitioning. It is usually done during the installation of an operating
system, but it is also possible to make changes to the partitions after
the operating system has been installed.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
43

 The partition table is in the Master Boot Record (MBR) and is situated at
sector 0 of the disk drive
 The first partition is at offset 0x1BE
 The file system’s hexadecimal code is offset 3 bytes from 0x1BE for the
first partition
 Partition tables may be viewed using a hex editor
 See https://www.codeproject.com/Articles/488296/Partition-Tables-
Explained

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
44

FAT disks
 File Allocation Table (FAT) is a computer file system architecture.
Originally developed in for use on floppy disks, it was adapted for use
on hard disks and other devices
 It is often supported for compatibility reasons by current operating
systems for personal computers and many mobile
devices and embedded systems, allowing interchange of data between
disparate systems.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
45

 FAT database is typically written to a disk’s outermost track


 It has filenames, directory names, date and time stamps, the
starting cluster number, and file attributes
 The increase in disk drives capacity required three major variants: 
FAT12, FAT16 and FAT32. 

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
46

 FAT file systems are still commonly found on floppy disks, flash and


other solid-state memory cards and USB flash drives, as well as
many portable and embedded devices  such as PDAs, 
digital cameras, camcorders, media players, and mobile phones.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
47

 FAT was also used on hard disks throughout the DOS and 


Windows 9x eras. 
 Windows XP, introduced a new file system, NTFS.
 FAT is still used in hard drives expected to be used by multiple
operating systems, such as in shared Windows, GNU/Linux and
DOS environments.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
48

 exFAT (Extensible File Allocation Table) is a file system introduced by 


Microsoft in 2006 and optimized for flash memory such as 
USB flash drives and SD cards
 exFAT can be used where NTFS is not a feasible solution (due to data-
structure overhead), but a greater file-size limit than the standard 
FAT32 file system (i.e. 4 GB) is required.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
49

 See https://en.wikipedia.org/wiki/Comparison_of_file_systems for


a comparison of file systems and their capabilities, limitations etc.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
50

 Unused space in a cluster between the end of an active file and


the end of the cluster leads to creation of drive slack
 This is because operating systems such as Microsoft OSs
allocate disk space for files by clusters
 Drive slack includes RAM slack and file slack

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
51

Fragmentation of files
 When the first allotted cluster is full and runs out of space, FAT assigns
the next usable cluster to the file
 If the next usable cluster is not adjacent to the current cluster then the
file becomes fragmented
 Unallocated disk space gets created when a FAT file is deleted

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
52

NTFS - NT File System


 NTFS is a proprietary journaling file system developed by Microsoft
 Incorporates advances over FAT file systems such as improved
support for metadata and advanced data structures to improve
performance, reliability, and disk space use
 NTFS gives more information about a file
 NTFS provides more control over files and folders

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
53

 NTFS offers many advantages over FAT see


https://en.wikipedia.org/wiki/NTFS
 Clusters are more minuscule for smaller disk drives
 NTFS causes much less file slack space than FAT
 NTFS uses Unicode which is a global data format
 In NTFS, all data written to a disk is regarded as a file

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
54

Default cluster size for NTFS, FAT, and


exFAT
 https://support.microsoft.com/en-us/help/140365/default-cluster-size
-for-ntfs-fat-and-exfat#:~:text=By%20default%2C%20the%20maximum
%20cluster,have%20a%20larger%20cluster%20size
.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
Master File Table (MFT) 55

 In NTFS, all file, directory and metafile data—file name, creation date,


access permissions (by the use of access control lists), and size—are
stored as metadata in the Master File Table. 
 Even info about system files the OS uses is in the MFT
 MFT records are called metadata. The first 15 records are earmarked
for system files

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
56

Metadata records in the MFT

 See http://209.68.14.80/ref/hdd/file/ntfs/archFiles-c.html

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
57

File Attributes
 In the NTFS MFT, the files and folders are stored in assorted records
of 1024 bytes each
 Each record contains file or folder information, which is divided into
record fields containing metadata
 A record field is called an attribute ID

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
58

 Files bigger than 512 bytes are stored outside the MFT
 Files whose info are recorded in the MFT are classified as resident or
non-resident
 Almost everything in NTFS is a file
 Files are implemented as collections of attributes. 
 Attributes are pieces of information of various kinds
 See http://209.68.14.80/ref/hdd/file/ntfs/files_Attr.htm

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
Exercise 59

 See
http://www.c-jump.com/bcc/t256t/Week04NtfsReview/W01_0240_
mft_attribute_types.htm
for info about MFT Attribute types
 See
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/
windows-server-2003/cc781134(v=ws.10)#ntfs-physical-structure
to know how NTFS works

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
60

Cluster numbers
 In NTFS, the cluster is the fundamental unit of disk usage.
 When a disk is made as an NTFS file structure the OS allots logical
clusters to the entire disk partition
 Each cluster in a volume is given a sequential number. This is its
Logical Cluster Number (LCN)

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
61

Cluster numbers
 Clusters on an NTFS volume are enumerated consecutively from the
start of the partition into logical cluster numbers.
 LCN 0 (zero) refers to the first cluster in the volume viz. the boot
sector.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
Virtual Cluster Number (VCN)
62

 Each cluster of a non-resident stream is assigned a sequential


number. This is its Virtual Cluster Number. VCN 0 (zero) refers to
the first cluster of the stream.
 To locate the stream on a disk, it's necessary to convert from a
VCN to an LCN. This is done with the help of data runs.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
63

Data Runs
 Each conterminous block of LCNs is given a Data Run, which
contains a VCN, an LCN and a length.
 When NTFS needs to locate an object on the disk, it looks up the
VCN in the Data Runs to get the LCN.
 See https://flatcap.org/linux-ntfs/ntfs/concepts/data_runs.html

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
64

Alternate Data Streams (ADS)


 NTFS supports the concept of ADS
 Alternate data streams allow more than one data stream to be
associated with a filename, using the format
"filename:streamname”
 Malwares have used ADS to hide code. As a result, malware
scanners and other special tools now check for ADS
 ADS are a concern for forensics investigators

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
65

 ADS permits data to be appended to existent files


 ADS can blot out worthy evidentiary data, deliberately or by coincidence
 An ADS turns into an additional file attribute of a file and permits it
to be linked with various applications
 It is possible to determine whether a file has a data stream affiliated
to it only by analyzing that file’s MFT entry

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
66

Exercise
 Create a text ADS and detect it using an open source / free hex
editor
 Explore Encrypting File System (EFS)
https://en.wikipedia.org/wiki/Encrypting_File_System
 Explore Resilient File System (ReFS)
https://en.wikipedia.org/wiki/ReFS

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
67

Whole Disk Encryption


 Disk encryption is a technology which protects information by
converting it into unreadable code that cannot be deciphered easily
by unauthorized people
 Disk encryption uses disk encryption
software or hardware to encrypt every bit of data that goes on
a disk or disk volume.
 Whole disk encryption (WDE) is often used to prevent loss of
information in case of theft of devices such as laptops or tablets

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
68

 Full disk encryption (FDE) or whole disk encryption signifies that


everything on disk is encrypted, but the MBR, or similar area of a
bootable disk, with code that starts the operating system loading
sequence, is not encrypted.
 Some hardware-based full disk encryption systems can truly encrypt
an entire boot disk, including the MBR.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
69

Features offered by WDE tools


 Hidden containers
 Pre-boot authentication
 Single sign-on
 Custom authentication
 Hardware acceleration
 Full or partial disk encryption with secure hibernation
 Advanced encryption algorithms
 Key management function
 Two-factor authentication

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
70

 WDE tools often encrypt each sector of a drive on an individual


basis
 If the tools encrypt the drive’s boot sector then attempts to get
around the secured drive’s partition can be thwarted

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
71

Examples of some WDE tools


 BestCrypt
 BitLocker (except for the boot volume)
 Check Point Full Disk Encryption
 DiskCryptor
 PGPDisk
 VeraCrypt

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
72

Exercise
 Evaluate software for disk encryption and study features available
https://en.wikipedia.org/wiki/Comparison_of_disk_encryption_so
ftware

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
73

The Windows Registry


 The Windows Registry is a hierarchical database that stores low-level
 settings for the Microsoft Windows operating system and for
applications that opt to use the registry.
 The kernel, device drivers, services, Security Accounts Manager, and 
user interface can all use the registry. The registry also allows access
to counters for profiling system performance.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
74

 The Windows Registry contains information, settings, options, and


other values for programs and hardware installed on all versions of
Microsoft Windows operating systems.
 For example, when a program is installed, a new sub-key containing
settings such as a program's location, its version, and how to start the
program, are all added to the Windows Registry.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
75

 The Registry is a useful database for forensic investigators since


it stores information about hardware and software configured,
network connections, user preferences, setup etc.
 The registry can be viewed using the Registry Editor (regedit)
program which is available in the Windows OS itself

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
76

 Regedit program works in Windows 9x and the latest Windows


10
 Regedt32 works in older Windows OS versions such as
Windows 2000, XP, and Vista
 For Windows 7 and 8 both Regedit and Regedit32 may be used

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
Keys and values 77

 The registry contains two basic elements: keys and values.


 Registry keys are container objects similar to folders.
 Registry values are non-container objects similar to files.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
Keys and values 78

 Keys may contain values and sub-keys. Keys are referenced with a
syntax similar to Windows' path names, using backslashes to indicate
levels of hierarchy. Keys must have a case insensitive name without
backslashes
 More details about the Registry can be got at
https://msdn.microsoft.com/en-us/library/ms724871.aspx

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
79

Microsoft Startup Tasks


 Helps the investigator know what files are accessed when Windows
OS starts
 The above information helps ascertain when a suspect’s computer
was last reached
 Suspect’s sometimes attempt to access computers after an incident
was announced as a result of an investigation. In such situations,
startup tasks help

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
80

Exercise
 Study startup In various versions of Windows OS. Try to identify
difficulties which may be faced by investigators

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
81

Virtual machines
 A virtual machine (VM) is an emulation of a computer system.
 Virtual machines are based on computer architectures and provide
functionality of a physical computer.
 Their implementations may involve specialized hardware, software,
or a combination

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
82

 A suspect ‘s drive can be restored on an investigator’s VM


 Using a VM it is also possible to run non-standard software the
suspect may have installed
 Investigator’s have to be careful since VM’s are often used by cyber
criminals to attack other computers or computer networks
 VMware Server, VMware Player and VMware Workstation, Oracle
VM VirtualBox, Microsoft Virtual PC, and Hyper-V help in making
VMs

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
83

Tools for digital forensics


 Digital forensics investigators need many tools for doing their
investigations. A majority of these tools are software tools while some
are hardware tools
 A variety of tools are available: commercial as well as open-source

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
84

Exercise
 List questions that need to be asked when determining what tools are
needed. Hint: think about the following
 Open source / commercial
 OS supported
 File systems supported
 Automation support
 Scripting language facility for automation
 Vendor esteem
 Command line / GUI
Dr.Nagaraj S V & Prof Seshu Babu
Pulagara, VIT Chennai
85

Classification of tools by purpose


 Acquisition
 Validation and verification
 Extraction
 Reconstruction
 Reporting

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
86

Guidelines
 ISO/IEC standard 27037:2012 Information technology — Security
techniques — Guidelines for identification, collection, acquisition
and preservation of digital evidence
https://www.iso.org/standard/44381.html
 US National Institute of Standards and Technology (NIST) Computer
Forensics Tool Testing (CFTT) program
https://www.nist.gov/itl/ssd/software-quality-group/computer-
forensics-tool-testing-program-cftt

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
87

Need for validated tools


 It is necessary for investigators and investigating agencies to use
forensic tools that are validated.
 Validated means declared or made legally valid by accrediting
agencies
 It is to affirm that a tool is operating as proposed
 To prevent damaging the evidence

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
88

Acquisition
 It is the process of making a copy of the original drive or media
 Sub-functions could include
 Physical data copy
 Logical data copy
 Data acquisition format
 Command-line acquisition
 GUI acquisition
 Remote, live, and memory acquisitions

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
89

Acquisition

 Physical copy of the drive as a whole


 Logical copy of a disk partition
 Remote acquisition of files

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
90

Other capabilities of tools


 Verification: establishes that two sets of data are incapable of being
perceived as different by computing hash values
 Filtering: classifying good data and wary data by sorting and searching
through probe determinations
 Hashing: support for hash functions such as SHA-1 , RIPEMD, SHA-3
 examining file headers
 Verifying whether a file extension is wrong for the file type

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
91

Extraction

 Recovering data is the first course of action in examining an


investigation’s data
 Most intriguing of all tasks
 Encrypted files and systems could pose problems as passwords
may be needed

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
92

Extraction
 Sub-functions of extraction include
 Viewing data
 Searching using keywords
 Restoring data to its uncompressed form
 File Carving: searching for files in a data stream based on
knowledge of file formats rather than any other metadata.
 Decrypting
 Bookmarking or tagging

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
93

Reconstruction
 It is the process of revivifying a suspect drive to demonstrate what
occurred during a crime or an incident
 Techniques of reconstruction
 Disk-to-disk copy
 Partition-to-partition copy
 Image-to-disk copy
 Image-to-partition copy
 reconstructing files from data runs and by carving

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
94
Reconstructing an image of a suspect
drive
 Use a tool that makes a direct disk-to-image copy such as
ProDiscover, the Linux dcfldd, dd commands
 It is safer to copy the image to another place, such as a partition,
a physical disk, or perhaps a virtual machine

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
95

Reporting

 It is essential to record the results of an investigation in order to


report
 Bookmarking or tagging, log reports, report generators help in
this process

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
96

Exercise
 Look up major forensic tools and compare the functions that can
be performed by them such as acquisition, physical data copy,
logical data copy, acquisition formats, filtering, extraction,
reporting, flexibility, reliability etc.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
97
Command line tools and GUI-based
tools
 Call for few system resources
 Can run with the least possible configurations
 Nowadays they are very powerful and have many capabilities
hence expertise is required for using them
 Novices may prefer GUI-based tools which have many advantages
such as being easy to use than command line tools, multi-tasking
capability, older Oss need not be learnt

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
98

Exercise
 Make a list of command line tools and GUI-based forensic tools.
Compare and contrast them
 Determine what criteria a forensic lab must meet

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
99

SMART
 Tool meant for Linux versions
 Several file systems can be analyzed
 Numerous plug-in utilities available
 Other utilities are Helix3, Kali Linux, Autopsy and Sleuth KIt

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
100

Hardware Tools
 Forensic Workstations options include stationary, light weight,
portable
 Budget constraints, obsolescence, vendor support
 Write-blockers: can be hardware-based or software-based

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
101

 Computer Forensics Tool Testing (CFTT) project of NIST gives


guidelines regarding tools
https://www.nist.gov/itl/ssd/software-quality-group/computer-
forensics-tool-testing-program-cftt
 NIST has produced standards for testing computer forensics tools
 ISO 17025 standard for testing items that have no current standards

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
102

 ISO 5725 - stipulates results must be repeatable and reproducible. This


is very important when results have to be demonstrated before a court
 It is safer to verify results by repeating the same tasks with other
forensics tools having the same characteristics

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
103

Forensic Tool Functionalities


 Cloud Services
 Data Analytics
 Database Forensics
 Deleted File Recovery
 Disk Cataloging
 Disk Imaging
 Drone Forensics
 Email Parsing
 File Carving

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
104

Forensic Tool Functionalities


 Forensics Boot Environment
 Forensic File Copy
 Forensic Tool Suite (Mac Investigations)
 Forensic Tool Suite (Windows Investigations)
 GPS Forensics
 Hardware Write Block
 Hash Analysis
 Image Analysis (Video & Graphics Files)

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
105

Forensic Tool Functionalities


 Incident Response Forensic Tracking & Reporting
 Infotainment & Vehicle Forensics
 Instant Messenger
 Live Response
 Media Sanitization/Drive Re-use
 Memory Capture and Analysis
 Mobile Device Acquisition, Analysis and Triage
 P2P Analysis
 Password Recovery
 Remote Capabilities / Remote Forensics
Dr.Nagaraj S V & Prof Seshu Babu
Pulagara, VIT Chennai
106

Forensic Tool Functionalities


 Social Media
 Software Write Block
 Steganalysis
 String Search
 Video Analytics
 Video Format Conversion
 VoIP Forensics
 Web Browser Forensics
 WiFi Forensics
 Windows Registry Analysis

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
107

Exercise
 Visit the CFTT web site and find out the various tool functionalities
See https://toolcatalog.nist.gov/taxonomy/
 Visit the following web site and study various tools
https://forensicswiki.xyz/wiki/index.php?title=Tools

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
108

EnCase Forensic software


 EnCase is the shared technology within a suite of digital
investigation products by Guidance Software (now acquired by
OpenText). The software comes in several products designed for 
forensic, cyber security, security analytics, and e-discovery use.

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
109

EnCase Forensic software


 Encase is traditionally used in forensics to recover evidence from
seized hard drives. Encase allows the investigator to conduct in
depth analysis of user files to collect evidence such as documents,
pictures, internet history and Windows Registry information
 https://www.guidancesoftware.com/encase-forensic
 http://www.cosgrovecomputer.com/documents/computer_magazin
e_article.pdf

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai
110

References
 Nelson, Amelia Philips, Christopher Steuart, “ Guide to Computer
Forensics and Investigations”, Fifth Edition, 2015.
 Wikipedia

Dr.Nagaraj S V & Prof Seshu Babu


Pulagara, VIT Chennai

You might also like