CLASS
CLASS
VI YEAR A SECTION
VEL TECH MULTI TECH
Forensic Duplication and Investigation
Preparation for IR : Creating Response Tool
Kit and IR Team
• In a large business or organization the delegation of tasks is
essential to maintaining effective operations. When looking at the
makeup of an Incident Response Plan (IRP), a company's assumes
responsibility for the creation of it.
Write Blockers:
• Allow acquisition of data from a storage device without
changing the drive’s contents. Here write commands are
blocked. Only read commands are allowed to pass the write
blocker.
Contd..
• Types of blockers : Hardware Write Blocker and Software
Write Blocker.
• Hardware Write Blockers : The device sits in between
investigator’s PC and storage device. It supported storage
interfaces are ATA, SCSI, USB or SATA. The controller
cannot write values to the command register, which writes or
erases data on the storage device.
• Software Write Blockers (SWB) : A software layer that sits
in between the OS and the device driver for the storage
device. It prevents all disc requests that use system calls to
write data to the storage device.
• The SWB should not modify a read-only disk. The SWB is
designed to prevent any operations on data storage media that
are not write protected.
Contd..
Data acquisition methods are as follows :
1. Disk-to-image file
2. Disk-to-disk copy
3. Logical disk-to-disk or disk-to-data file
4. Sparse data copy
Contd..
• A bootable Linux CD is a complete Linux operating system
that can boot from an optical disc, USB stick or Preboot
execution Environment (PXE).
• It runs in the computer’s memory and allows an operating
system to run without installing or making changes to the
computer’s original configuration and files.
• Live images can be adjusted to run special (start-up) scripts and
contain special drivers and software. The process of adjusting
the contents of a live image is called re-mastering.
• Linux can read hard drives that are mounted as read-only.
Windows OSs and newer Linux automatically mount and
access a drive.
• Windows will write to the Recycle Bin, and sometimes to the
NTFS Journal, just from booting up with a hard drive
connected
Contd..
• Forensic Linux Live CDs mount all drives read-only, which
eliminates the need for a write blocker. It is configured not to
mount, or to mount as read-only, any connected storage media.
Well designed Linux Live CDs is used for computer forensics.
• Use of fdisk command lists, creates, deletes, and verifies
partitions in Linux. The mkfs.msdos command formats a FAT
file system from Linux.
Set up the scene for data acquisition Suspect host (Linux ) :
1. Load Helix CD-ROM into drive.
2. Ensure that your tools do NOT modify the disk.
3. Use IP addresses instead of hostnames.
4. Used trusted CD-ROM binaries only.
5. Send acquired data over encrypted network
Contd..