Lecture 5 - Data Acquisition
Lecture 5 - Data Acquisition
and Investigations
Sixth Edition
Chapter 3
Data Acquisition
1
Objectives (1 of 2)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 2
classroom use.
Objectives (2 of 2)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 3
classroom use.
Understanding Storage Formats
for Digital Evidence
• Data in a forensics acquisition tool is stored as an image file
• Three formats
• Raw format
• Proprietary formats
• Advanced Forensics Format (AFF)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 4
classroom use.
Raw Format
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 5
classroom use.
Proprietary Formats
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 6
classroom use.
Advanced Forensics Format
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 7
classroom use.
Determining the Best Acquisition
Method (1 of 4)
• Types of acquisitions
• Static acquisitions and live acquisitions
• Four methods of data collection
• Creating a disk-to-image file
• Creating a disk-to-disk
• Creating a logical disk-to-disk or disk-to-data file
• Creating a sparse data copy of a file or folder
• Determining the best method depends on the circumstances of the
investigation
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 8
classroom use.
Determining the Best Acquisition
Method (2 of 4)
• Creating a disk-to-image file
• Most common method and offers most flexibility
• Can make more than one copy
• Copies are bit-for-bit replications of the original drive
• Compatible with many commercial forensics tools
• Creating a disk-to-disk
• When disk-to-image copy is not possible
• Tools can adjust disk’s geometry configuration
• Tools: EnCase and X-Ways
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 9
classroom use.
Determining the Best Acquisition
Method (3 of 4)
• Logical acquisition or sparse acquisition
• Can take several hours; use when your time is limited
• Logical acquisition captures only specific files of interest to the case
• Sparse acquisition collects fragments of unallocated (deleted) data
• For large disks
• PST or OST mail files, RAID servers
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 10
classroom use.
Determining the Best Acquisition
Method (4 of 4)
• When making a copy, consider:
• Size of the source disk
- Lossless compression might be useful
- Use digital signatures for verification
• When working with large drives, an alternative is using lossless compression
• Whether you can retain the disk
• Time to perform the acquisition
• Where the evidence is located
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 11
classroom use.
Contingency Planning for Image
Acquisitions
• Create a duplicate copy of your evidence image file
• Make at least two images of digital evidence
• Use different tools or techniques
• Copy host protected area of a disk drive as well
• Consider using a hardware acquisition tool that can access the drive at the BIOS level
• E.g. hardware acquisition tool like Belkasoft, ILookIX IXImager, with a write-
blocker, Image MASSter Solo, or X-Ways Replica.
• Be prepared to deal with encrypted drives
• Whole disk encryption feature in Windows called BitLocker makes static acquisitions
more difficult
• May require user to provide decryption key
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 12
classroom use.
Using Acquisition Tools
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 13
classroom use.
Mini-WinFE Boot CDs and USB
Drives
• Mini-WinFE
• Enables you to build a Windows forensic boot CD/DVD or USB drive so that connected
drives are mounted as read-only
• Before booting a suspect’s computer:
• Connect your target drive, such as a USB drive
• After Mini-WinFE is booted:
• You can list all connected drives and alter your target USB drive to read-write mode so
you can run an acquisition program
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 14
classroom use.
Acquiring Data with a Linux Boot
CD (1 of 6)
• Linux can access a drive that isn’t mounted
• Windows OSs and newer Linux automatically mount and access a drive
• Forensic Linux Live CDs don’t access media automatically
• Which eliminates the need for a write-blocker
• Using Linux Live CD Distributions
• Forensic Linux Live CDs
- Contain additionally utilities
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 15
classroom use.
Acquiring Data with a Linux Boot
CD (2 of 6)
• Using Linux Live CD Distributions (cont’d)
• Forensic Linux Live CDs (cont’d)
- Configured not to mount, or to mount as read-only, any connected storage media
- Well-designed Linux Live CDs for computer forensics
• Penguin Sleuth Kit
• CAINE
• Deft
• Kali Linux
• Knoppix
• SANS Investigative Forensic Toolkit (SIFT)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 16
classroom use.
Acquiring Data with a Linux Boot
CD (3 of 6)
• Preparing a target drive for acquisition in Linux
• Current Linux distributions can create Microsoft FAT and NTFS partition tables
• fdisk command lists, creates, deletes, and verifies partitions in Linux
• mkfs.msdos command formats a FAT file system from Linux
• If you have a functioning Linux computer, follow steps starting on page 105 to learn
how to prepare a target drive for acquisition
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 17
classroom use.
Acquiring Data with a Linux Boot
CD (4 of 6)
• Acquiring data with dd in Linux
• dd (“data dump”) command
- Can read and write from media device and data file
- Creates raw format file that most computer forensics analysis tools can read
• Shortcomings of dd command
- Requires more advanced skills than average user
- Does not compress data
• dd command combined with the split command
- Segments output into separate volumes
18
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Acquiring Data with a Linux Boot
CD (5 of 6)
• Acquiring data with dd in Linux (cont’d)
• Follow the step starting on page 112 in the text to make an image of an NTFS disk on a
FAT32 disk
• Acquiring data with dcfldd in Linux
• The dd command is intended as a data management tool
- Not designed for forensics acquisitions
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 19
classroom use.
Acquiring Data with a Linux Boot
CD (6 of 6)
• Acquiring data with dcfldd in Linux (cont’d)
• dcfldd additional functions
- Specify hex patterns or text for clearing disk space
- Log errors to an output file for analysis and review
- Use several hashing options
- Refer to a status display indicating the progress of the acquisition in bytes
- Split data acquisitions into segmented volumes with numeric extensions
- Verify acquired data with original disk or media data
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 20
classroom use.
Validating Data Acquisitions
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 29
classroom use.
Linux Validation Methods
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 30
classroom use.
Windows Validation Methods
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 31
classroom use.
Summary (1 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 56
classroom use.
Summary (2 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 57
classroom use.
Summary (3 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 58
classroom use.