FINAL Flashcards
What are Hardware Forensic Tools
single-purpose components to computer systems and servers
What are software forensic tools used for
create copy of data from suspect’s disk drive to an image file
Types of Software forensic tools
Command-line applications, GUI applications
What are the categories of validated tools
Acquisition, Validation & Verification, Extraction, Reconstruction, Reporting
ISO Standard 27037
Digital evidence first responders should use validated tools
Acquisition definition
Making a copy of the original drive
Acquisition subfunctions
Physical data copy, logical data copy, data acquisition format, command-line acquisition, gui acquisition, remote & live & memory acquisition
Acquisition methods
Physically copying entire drive, logically copying disk partition
Format for Disk Acquisition
vary from raw data to vendor-specific proprietary
Acquisition Common feature
Creating smaller segmented files
What do larger organizations use for acquisition
Remote acquisition
Validation Definition
Way to confirm that a tool is functioning as intended
Verification Definition
Proves that two sets of data are identical by calculating hash values or using another similar method, also separating good and suspicious data (filtering)
Validation: common file header value purpose
see whether a file extension is incorrect for the file type, identifiable by most forensic tools
Extraction Definition
Recovery task in digital investigation, most challenging
Extraction Subfunctions
Data viewing, keyword searching, decompressing, carving, decrypting, bookmarking
What can be used to speed up analysis (extraction)
Keyword search
What can you do when things are password protected (2 options)
Brute force or dictionary attack
Reconstruction definition
Re-create a suspect drive to show what happened during a crime or an incident
Reconstruction methods
Disk-to-disk copy, partition-to-partition copy, image-to-disk copy, image-to-partition copy, disk-to-image copy, rebuilding files from data runs and carving
How to recreate an image of a suspect drive
Copy an image to another location, such as a partition, physical disk, or a virtual machine, easiest: direct disk to image copy
Disk to image copy tools
Linux dd command, ProDiscover, Voom technologies shadow drive
Reporting purpose
to perform a forensics disk analysis and examination, you need to create a report
Report subfunctions
Bookmarks or tagging, log reports, timelines, report generator
First tools for analysis
MS-DOS, Norton DiskEdit, Command-line tools
What has mostly replaced Unix
Linux
SMART features
Multiple linux versions, several file systems, many plug-in utilities, hex viewer
Helix 3 features
One of easiest, can load on Windows, loads bootable Linux OS from cold boot, not necessarily valid in international court
Kali Linux features
Includes variety of tools and has an easy-to-use K Desktop Environment interface
Autopsy and SleuthKit features
Sleuthkit is linux forensics tool, autopsy was the browser interface to access SleuthKit
Forcepoint Threat Protection features
Linux memory analysis tool, both onsite and remote memory acquisitions
GUI Forensic tools purpose
Simplify digital forensics investigations
Structure of GUI tools
Suites of tools with simplified training
Advantages of GUI tools
ease of use, multitasking, no need for learning old OS’s
Disadvantages of GUI tools
Excessive resource requirements, inconsistent results, tool dependencies
Budget Considerations
time of workstation, failures, consultant and vendor fees, anticipate equipment restrictions
Categories of Forensic Tools
Stationary, portable, lightweight
Advantages of Forensic Workstations
Customized to needs, save money
Disadvantages of Forensic Workstations
Hard to find support, can become expensive
Vendor Workstations
F.R.E.D, mounts from ForensicsPC
Advantages of Vendor Workstations
Support, mix and match components
Write blocker definition
Prevents data writes to hard disk
Software Blocker Feature
run in shell mode
Hardware blocker features
ideal for GUI tools, bridge between suspect drive and workstation
Write blocker connecting technologies
Firewire, USb 2.0 & 3.0, Sata & Pata & scsi controllers
Recommendations for forensic lightweight workstation
full tower to allow expansion, memory and processor power as budget allows, different size hard drives, 400-watt or better power supply with backup battery, external fireWire and USB ports, assortment of drive adapter bridges, good video card, high-end video card and dual monitors
CFTT
Computer forensics tool testing, manages research on forensics tools
Lab must meet these criteria
Establish categories for tools, identify forensics category requirements, test assertions, identify test cases, establish a test method, report test results
ISO 5725
Specifies results must be repeatable and reproducible
National Software Reference Library Project
Collects all known hash values for commercial software applications and OS files, filtering known information, use RDS to locate and identify known bad files
Validation Protocols
Verify results, use at least two tools, understand how tools work, compare results
Disk editor features
reliable tools, access raw data
Digital Forensics Examination Protocol
Perform investigation with GUI tool, verify your results with disk editor, compare hash values obtained with both tools
Digital Forensics tool upgrade protocol
Test, report problems with tools, use test hard disk for validation, check for any updates
Types of Images
Bitmap images, vector graphics, metafile graphics
Bitmap Images
Collection of dots, grid of individual pixels
Vector Graphics
Based on mathematical instructions
Metafile Graphics
Combination of bitmap and vector
Types of Graphic file programs
Graphics editors, image viewers
Raster Images
Pixels are stored in rows, better for printing
Image Quality is based on…
Screen resolution, software, number of color bits per pixel
Characteristics of Vector Graphics
Use lines instead of dots, store calculations for drawing lines and shapes, smaller than bitmap files, preserve quality when scaled up
Vector Graphic Softwares
CoreIDRAW, Adobe illustrator
Metafile advantages and disadvantages
Share with both types, when enlarged bitmap part loses quality
PNG
Portable Network Graphic
GIF
Graphic Interchange Form
JPEG
Joint Photographic Experts Group
TIFF
Tagged Image File Format
BMP
Window Bitmap
Standard Vector File Formats
Hewlett Packard Graphics Language (hpgl), Autocad (dxf)
TGA
Targa
RTL
Raster Transfer Language
.psd and .ai
Adobe Photoshop and Illustrator
Freehand
.fh11
SVG
Scalable Vector Graphics
PCX
Paintbrush
Raw file format properties
‘digital negative’, typically found on many higher-end digital cameras, maintains best picture quality
Raw file format disadvantage
Not all image viewers can display proprietary images
Demosaicing
Process of converting raw picture data to another format
EXIF
Exchangeable image file, used to store digital pictures
How to view EXIF metadata
Exif reader, IrfanView, Magnet Forensics AXIOM, Autopsy metadata at beginning of file
What type of files compress their data
Graphics (GIF and JPEG)
Types of data compression
Lossy and Lossless
Properties of Lossless compression
Reduces size without removing data, based on Huffman or Lempel-Ziv Welch coding
Properties of Lossy Conversion
Permanently discards bits of information using Vector Quantization
Vector Quantization
Determines what data to discard based on vectors in graphics file
Properties of OS Tools for Locating and Recovering Graphics Files
Time consuming, results are difficult to verify
Properties of Forensic tools for locating and recovering graphics files
Use image headers to create a baseline analysis, reconstruct fragmented files by identifying data patterns and modified headers
Carving or Salvaging
Recovering ay type of file fragments
How to reconstruct image header
compare hex values of known graphics file formats with the pattern of found header
Steps to Reconstruct File Fragments
Locate and export all clusters of file, determine starting and ending cluster number for each fragmented group of sectors, copy each fragmented group of sectors in their correct sequence to a recovery file, rebuild file header, add .txt extension on all copied sectors
Analyzing Graphics File Headers
Necessary on unrecognized tools, use hex editor such as winhex to record hex values in header and use them to define file type
Properties of tools for viewing images
no one tool works for all types, most GUI forensics tools include image viewers that display common image formats
Steganography
hides information inside image files
Steganography major forms
insertion and substitution
Insertion Steganography
Hidden data is not displayed when viewing host file in its associated program
Substitution Steganography
Replaces bits of the host file with other bits of data, usually change last two least significant bits
Clues for Steganography
Duplicate files with different hashes, steganography programs on suspect’s drive
Steganalysis Tools Purpose
detect, decode, and record hidden data
Scope Creep
When investigation expands beyond original description, due to unexpected evidence, increases time and resources needed to extract, analyze, and present evidence
What to include in investigation plan
goal/scope of investigation, materials needed, tasks to perform
What should you investigation plan rely on
Type of case, i.e. corporate, criminal, civil
Steps for digital forensic investigations
- Use wiped media reformatted and inspected for viruses for target drive
- Inventory the hardware on the suspect’s computer, note condition of seized computer
- For static acquisitions, remove original drive
- Record how you acquired
- Process contents
- List folders and files
- Examine contents
- Recover file contents for password-protected
- Identify function of executable files that don’t match hash values
- maintain control of all evidence and findings
Autopsy File Systems Microsoft
FAT, NTFS, ExFAT, UFS1, and UFS2
Autopsy File Systems ISO
9660, YAFFS2
Autopsy File Systems MAC
HFS+, HFSX
Autopsy File Systems Linux
Ext2fs, ext3fs, Ext4fs
Autopsy file formats
Raw, Expert Witness, and vm image files
Validating Forensic Data Process
Ensure integrity of data, hash image files, advanced hex editors to ensure integrity
What do Hex editors offer that forensics tools do not
hashing specific files or sectors
Advantage of recording hash values
Determine whether data has changed
Block-wise hashing
process that builds a data set of hashes of sectors from the original file, examines sectors on suspect drive to find sector match, confirmation of file stored on suspect drive
AccessData’s own hashing database
Known File Filter, filters known program files from view and contains hash values of known illegal files, compares known file hash values with files on your evidence drive to see whether they contain suspicious data, others import NSRL db
Validate with Expert witness or SMART format
additional options for hashing all the data are available, validation report lists MD5 and SHA-1 hash values
Data-Hiding
Changing or manipulating a file to conceal information
Techniques for Data-Hiding
Hide entire partition, change file extensions, set file attributes to hidden, bit-shifting, encryption, password protection
what command hides by unassigning the partition
diskpart remove letter
How to detect if partition is hidden
Account for all the disk space when examining an evidence drive, analyze space you can’t account for
Can forensics tools detect and view hidden partitions
Most can
FAT file systems data-hiding technique
placing data in free or slack space on partition clusters
How does the FAT system trick other OS’s into thinking good clusters are unusable
Mark them as bad clusters
What is bit-shifting
Low level encryption program that changes the order of binary data, changes data from readable code to data that looks like a binary executable