4 - Evidence acquisition Flashcards
Outer boxes/Inner boxes
Computers holding potential evidence/
Network components connecting outer boxes
Properties of forensic tools
Usability - present data at a useful layer of abstraction
Comprehensiveness - reveal all relevant data
Accuracy
Determinism
Verifiability
Performance
First responder forensic toolkit
Mobile forensic workstation
Bootable forensically sound OS and storage devices
Write blocker
Faraday bag
Obstacles to evidence acquisition
Heterogeneity of technology High dynamism of system state Volatility of the system - tells how long data can survive in a system and depends on a consistent power supply and how fast data changes Accessibility of digital artifacts Potentially large amount of data
Procedure for data extraction from device
Copy the data
Calculate the hash
Create at least another copy
Methods for copying the data
Logical acquisition - select relevant files
Bit-stream copy - exact bit-by-bit copy
Over the network
Computer is off
Leave it off, tape the power receptacle, bag the power cable. If it is a laptop bag the battery
If you cant bring the computer bring the hard disks, if you cant do that boot a trusted OS and perform a bit-stream copy
Computer is on
Pull the plug and that may help preserve evidence but it can also loose evidence
Unplug the network cable
Generally advisable
Destroys the opportunity to list the active connections and gather network traffic and it can seriously impact a business
Password
Do live forensics if not protected, else turn off
Useful data to collect
File and network connections Processes Users Memory Volumes and file systems Applications System specific structures