Computer Forensics Analysis and Validation
Computer Forensics Analysis and Validation
Validation
Objectives
• Considerations
– Determine the scope of the investigation
– Determine what the case requires
– Whether you should collect all information
– What to do in case of scope creep
• The key is to start with a plan but remain flexible in
the face of new evidence
Using AccessData Forensic Toolkit to
Analyze Data
• Supported file systems: FAT12/16/32, NTFS, Ext2fs, and Ext3fs
• FTK can analyze data from several sources, including image files
from other vendors
• FTK produces a case log file(record of events)
• Searching for keywords
– Indexed search - allows for fast searching based on keywords.
FTK automatically indexes your evidence while the case is being
processed.
– Live search-This is a time consuming process involving an item-
by-item comparison with the search term.
• Supports options and advanced searching techniques, such as
stemming(finds variations on endings, like: applies, applied, apply.
applied applying in a search for apply applies)
Indexed Search
Index search options
Live search
Using AccessData Forensic Toolkit to
Analyze Data (continued)
• Analyzes compressed files
• You can generate reports
– Using bookmarks(can do quick access)
Using AccessData Forensic Toolkit to
Analyze Data (continued)
Validating Forensic Data
validation and verification
• File manipulation
– Filenames and extensions
– Hidden property
• Disk manipulation
– Hidden partitions
– Bad clusters
• Encryption
– Bit shifting
– Steganography
Hiding Partitions
• Old technique
• Shift bit patterns to alter byte values of data
• Make files look like binary executable code
• Tool
– Hex Workshop
Bit-shifting (continued)
Bit-shifting (continued)
Bit-shifting (continued)
Using Steganography to Hide Data
Note: Password cracking refers to an offline technique in which the attacker has
gained access to the password hashes or database
Recovering Passwords (continued)