David Cowen Matthew Seyer G-C Partners, LLC
|
|
|
- Godfrey Sanders
- 9 years ago
- Views:
Transcription
1 David Cowen Matthew Seyer G-C Partners, LLC
2 Records File System Metadata Changes Optionally Can Retain More Depending on File System Options Allows File System to Return to a Clean State Allows an examiner to determine prior states of files, a forensic time machine.
3 NTFS Ext3 Ext4 HFS+ JFS
4 Transaction Based NTFS Redo and Undo Operations (Before and After) Block Based Ext3, Ext4, HFS+ Blocks with Changes (Redo Operations Only)
5 Journal Depicts Recent Events Only as far back as the journal records Use Volume Shadow Snapshots to extend timeframe Events are Determined Via Operation Signatures Determine Application Signatures
6
7 $LogFile is split into pages Generally 4096 bytes Two Sections: Restart and Logging Great Paper on the $LogFile s Structure A Dig into the $LogFile
8 Restart Header 0x A B C D E F RSTR 0x10 System Page Size Update Seq. Offset Update Seq. Count Log Page Size Restart Offset Check Disk LSN Minor Version Major Version 0x20 Update Sequence Array 0x30 Current LSN Log Client Client List Flags 0x40 0x50 UNKNOWN 0x60 0x70 Oldest LSN Restart LSN
9 Page Header A B C D E F 0x00 0x10 0x20 0x30 RCRD (signature) Flags Update Sequenc e Offset Page Count Last End LSN Update Sequenc e Count Page Position Next Record Offset Update Sequence Array Last LSN or File Offset Word Align DWord Align Page Count: Number of pages that are used for the transaction run. Page Position: The current page number of a transaction run. Next Record Offset: Offset of last LSN on the page. Last LSN: Last overall LSN on page (includes the overlapping LSNs). Last End LSN: Last complete LSN on page. Update Sequence Array: Array containing the update sequences for replacement. The first two bytes of the value is the Update Sequence Value. These are used every 512 bytes.
10 LSN Record Header A B C D E F 0x00 Current LSN Previous LSN 0x10 Client Undo LSN Client Data Length Client ID 0x20 Record Type Transaction ID Flags Alignment or Reserved Redo Redo Undo Undo Target 0x30 Redo OP Undo OP Offset Length Offset Length Attribute MFT Alignment Record Attribute Alignment or 0x40 Cluster or Target VCN Offset Offset Reserved Index Reserved 0x50 Target LCN Alignment or Reserved LCNs to Follow
11 LSN Record Header Current LSN: The LSN of the current record. Previous LSN: The LSN of the previous record. Client Undo LSN: Usually the same as Previous LSN. Client Data Length: Length of the LSN record starting at Record Offset. Record Type: 0x01 is a General Record, and 0x02 is a Check Point Record. Flags: 0X00 Record does not overlap next page, 0x01 Record does overlap. Redo Op: Redo operation code. Undo Op: Undo operation code. Redo Offset: Offset to start of redo data (starting from Redo Op offset). Redo Length: Length of redo data. Undo Offset: Offset to start of undo data (starting from Redo Op offset). Undo Length: Length of undo data. LCNs to Follow: 0x01 LCNs follow LSN Header, 0x00 no LCNs follow LSN Header. Record Offset: The MFT record offset if change affects an MFT record, otherwise 0x00. Attribute Offset: The offset of the attribute effected if an MFT record. Target LCN: Redo/Undo data s logical cluster number on disk.
12 Determined by Redo and Undo Operation Noop 0x00 DeleteDirtyClusters 0x0A ClearBitsInNonresidentBitMap 0x16 CompensationLogRecord 0x01 SetNewAttributeSizes 0x0B PrepareTransaction 0x19 InitializeFileRecordSegment 0x02 AddIndexEntryRoot 0x0C CommitTransaction 0x1A DeallocateFileRecordSegment 0x03 DeleteIndexEntryRoot 0x0D ForgetTransaction 0x1B WriteEndOfFileRecordSegment 0x04 AddIndexEntryAllocation 0x0E OpenNonresidentAttribute 0x1C CreateAttribute 0x05 DeleteIndexEntryAllocation 0x0F DirtyPageTableDump 0x1F DeleteAttribute 0x06 SetIndexEntryVcnAllocation 0x12 TransactionTableDump 0x20 UpdateResidentValue 0x07 UpdateFileNameRoot 0x13 UpdateRecordDataRoot 0x21 UpdateNonresidentValue 0x08 UpdateFileNameAllocation 0x14 UpdateMappingPairs 0x09 SetBitsInNonresidentBitMap 0x15 References: A Dig into the $LogFile Recoverability Support in Windows NT File System (NTFS)
13 Structure Examples Index Entries Redo Op 0x0E : Undo Op 0x0F Redo AddIndexEntryAllocation and Undo DeleteIndexEntryAllocation Redo Op 0x0F : Undo Op 0x0E Redo DeleteIndexEntryAllocation and Undo AddIndexEntryAllocation Whole MFT Entry Redo Op 0x02 : Undo Op 0x00 Redo InitializeFileRecordSegment and Undo Noop Redo Op 0x00 : Undo Op 0x02 Redo Noop and Undo InitializeFileRecordSegment Update Resident Value $SI Changes Redo Op 0x07 : Undo Op 0x07 Redo UpdateResidentValue and Undo UpdateResidentValue (Record contains Undo (original) and Redo (new) data)
14 0x1B098 0x1B228 InitializeFileRecordSegment Transaction at 0x1B228 AddIndexEntryAllocation Transaction at 0x1B098 *Redo InitializeFileRecordSegment contains whole MFT Record Entry
15 0x1E910 0x1EB78 DeleteAttribute Operation at 0x1E910 Create Attribute Operation at 0x1EB78
16 0x20FB8 0x21178 DeallocateFileRecordSegment Operation at 0x21178 DeleteIndexEntryAllocation Operation at 0x20FB8 *Redo DeallocateFileRecordSegment only contains 24 bytes of MFT Entry
17 Consists of five block types and file system blocks Descriptor Block The descriptor block contains the entries that list which file system block a given journal block corresponds to. Seen as FS Block # in JLS. Commit Block Only contains the standard header which gives you the block type and sequence number for the committing transaction. Superblock v1 The journal superblock v1 contains static information about the journal such as the journal block size, size of the journal, and the first block of log information. It also contains information that describes the current state of the log such as the first commit ID expected in the log and the block number of start of the log. Superblock v2 The journal superblock v2 contains the same information as the v1, along with some extra information such as feature sets, the journal s UUID, the number of file systems sharing the log, journal block limits, and file system IDs using the journal. Revoke Block This block lists the file system blocks that have been revoked.
18
19 Create File - System Changes 5: 66 -> Inode Bitmap 6: 1 -> Group Descriptor Table 7: 67 -> Inode Table 8: 577 -> Data Block 9: 65 -> Data Bitmap Journal Block 8: FS Data Block 577
20 Rename File - System Changes 12: 67 -> Inode Table 13: 577 -> Data Block Journal Block 13: FS Data Block 577
21 Delete File - System Changes 16:577 -> Data Block 17:67 -> Inode Table 18:0 -> Super Block 19:65 -> Data Bitmap 20:1 -> Group Descriptor Table 21:66 -> Inode Bitmap Journal Block 16: FS Data Block 577
22 A block/redo only journal much like Ext3/4 Used in both OSX and ios Apple has a built in journal utility but we need to expand it much like Ext3
23 In preliminary research of this journal In ios 4/5/6/7 we can decrypt deleted files as the journal will contain the inode and cipher block to apply Much like in Ext3 we will need to mine the previous blocks for prior states and file names as well as find artifacts that point to inodes
24 NTFS Resources: blueangel. A Dig into the $LogFile. May Singireddy, Pramada. Recoverability Support in Windows NT File System (NTFS). March 10th, HFS+ Resources: Using the HFS+ journal for deleted file recovery
25 Follow us on Read the blog us:
Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline NTFS File System Formats File System Driver Architecture Advanced Features NTFS Driver On-Disk Structure (MFT,...)
Outline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik 2 Hardware Basics Win2K File System Formats Sector: addressable block on storage medium usually 512 bytes (x86 disks) Cluster:
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer
New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good
FORENSIC INSIGHT; DIGITAL FORENSICS COMMUNITY IN KOREA. NTFS Log Tracker. blueangel. [email protected]. forensic-note.blogspot.kr.
FORENSIC INSIGHT; DIGITAL FORENSICS COMMUNITY IN KOREA NTFS Log Tracker blueangel [email protected] forensic-note.blogspot.kr Junghoon Oh Index 1. Introduction 2. $LogFile 3. $UsnJrnl 4. NTFS Log
TRIFORCE ANJP. THE POWER TO PROVE sm USER S GUIDE USER S GUIDE TRIFORCE ANJP VERSION 3.10
TRIFORCE ANJP THE POWER TO PROVE sm USER S GUIDE USER S GUIDE TRIFORCE ANJP VERSION 3.10 TRIFORCE ANJP USER S GUIDE 2 Contents LET'S BEGIN... 5 SAY HELLO TO ANJP... 5 RUNNING ANJP... 6 Software Activation...
Open Source Data Recovery
Open Source Data Recovery Options and Techniques CALUG MEETING October 2008 !! Disclaimer!! This presentation is not sponsored by any organization of the US Government I am here representing only myself
Encrypting MySQL data at Google. Jonas Oreland and Jeremy Cole
Encrypting MySQL data at Google Jonas Oreland and Jeremy Cole bit.ly/google_innodb_encryption Jonas Oreland!! Software Engineer at Google Has worked on/with MySQL since 2003 Has a current crush on Taylor
This text refers to the 32bit version of Windows, unfortunately I don't have access to a 64bit development environment.
Windows 7/2008 Event Log forensic and reversing analysis eseugutrop Reversed 2011/03/16 by ar1vr This text refers to the 32bit version of Windows, unfortunately I don't have access to a 64bit development
REPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
NTFS Documentation. Richard Russon Yuval Fledel
NTFS Documentation Richard Russon Yuval Fledel NTFS Documentation by Richard Russon and Yuval Fledel Abstract This is technical documentation, created to help the programmer. It was originally written
Windows OS File Systems
Windows OS File Systems MS-DOS and Windows 95/98/NT/2000/XP allow use of FAT-16 or FAT-32. Windows NT/2000/XP uses NTFS (NT File System) File Allocation Table (FAT) Not used so much, but look at as a contrast
The Windows File System @ Articles -> Software Oct 07 2004, 00:45 (UTC+0)
select a site 6 forums 6 juice: USS Cole Automatic network monitoring with GFI Network Server Monitor. Dld Free Trial! Main Exploits Links Forums Register features You're not registered and logged, please
A Forensic Investigation of PL/SQL Injection Attacks in Oracle 1 st July 2010 David Litchfield
A Forensic Investigation of PL/SQL Injection Attacks in Oracle 1 st July 2010 David Litchfield PL/SQL injection vulnerabilities are one of the more commonly found security flaws in the Oracle database
Lecture 18: Reliable Storage
CS 422/522 Design & Implementation of Operating Systems Lecture 18: Reliable Storage Zhong Shao Dept. of Computer Science Yale University Acknowledgement: some slides are taken from previous versions of
Prof. Dr. Ing. Axel Hunger Dipl.-Ing. Bogdan Marin. Operation Systems and Computer Networks Betriebssysteme und Computer Netzwerke
Ex 2 File Systems A file is a logical collection of information and a file system is a collection of files, where the latter may also include a variety of other objects that share many of the properties
ZFS On-Disk Data Walk (Or: Where's My Data) OpenSolaris Developer Conference, June 25-27, 2008 Prague
ZFS On-Disk Data Walk (Or: Where's My Data) OpenSolaris Developer Conference, June 25-27, 2008 Prague Max Bruning Bruning Systems, LLC Topic Outline Overview of On-Disk Data Structures Using zdb(1m) and
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc [email protected] Released under the LGPL version 3 February 6, 2010 Abstract: This
File Systems for Flash Memories. Marcela Zuluaga Sebastian Isaza Dante Rodriguez
File Systems for Flash Memories Marcela Zuluaga Sebastian Isaza Dante Rodriguez Outline Introduction to Flash Memories Introduction to File Systems File Systems for Flash Memories YAFFS (Yet Another Flash
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, and Edgar Weippl SBA-Research Vienna, Austria
File System Design and Implementation
Transactions and Reliability Sarah Diesburg Operating Systems CS 3430 Motivation File systems have lots of metadata: Free blocks, directories, file headers, indirect blocks Metadata is heavily cached for
Volume Serial Numbers and Format Date/Time Verification
Volume Serial Numbers and Format Date/Time Verification Written by Craig Wilson, MSc MBCS CITP Digital Detective Group October 2003 (updated June 2005) Table of Contents Table of Contents... 2 Introduction...
Storage Efficient Backup of Virtual Machine Images
Storage Efficient Backup of Virtual Machine Images Artur Huletski St. Petersburg Academic University St. Petersburg, Russia [email protected] Abstract In spite of constant decrease of storage price
RECOVERING FROM SHAMOON
Executive Summary Fidelis Threat Advisory #1007 RECOVERING FROM SHAMOON November 1, 2012 Document Status: FINAL Last Revised: 2012-11-01 The Shamoon malware has received considerable coverage in the past
Information Systems. Computer Science Department ETH Zurich Spring 2012
Information Systems Computer Science Department ETH Zurich Spring 2012 Lecture VI: Transaction Management (Recovery Manager) Recovery Manager ETH Zurich, Spring 2012 Information Systems 3 Failure Recovery
Algorithms and Methods for Distributed Storage Networks 7 File Systems Christian Schindelhauer
Algorithms and Methods for Distributed Storage Networks 7 File Systems Institut für Informatik Wintersemester 2007/08 Literature Storage Virtualization, Technologies for Simplifying Data Storage and Management,
PSM/SAK Event Log Error Codes
PSM Error Codes PSM/SAK Event Log Error Codes If you experience a problem using Persistent Storage Manager, the following list of event log messages can be used to troubleshoot. Error codes are logged
File Systems Management and Examples
File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size
SQL Server Transaction Log from A to Z
Media Partners SQL Server Transaction Log from A to Z Paweł Potasiński Product Manager Data Insights [email protected] http://blogs.technet.com/b/sqlblog_pl/ Why About Transaction Log (Again)? http://zine.net.pl/blogs/sqlgeek/archive/2008/07/25/pl-m-j-log-jest-za-du-y.aspx
Deleted File Recovery Tool Testing Results
Deleted File Recovery Tool Testing Results Jim Lyle NIST 1 AAFS Washington CFTT Develop specifications for testing forensic tools Disk Imaging Write Blocking Drive erase for reuse Metadata based deleted
Review NTFS Basics. Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh. Bardsir Branch, Islamic Azad University, Bardsir, Iran
Australian Journal of Basic and Applied Sciences, 6(7): 325-338, 2012 ISSN 1991-8178 Review NTFS Basics Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh Bardsir Branch, Islamic Azad University,
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE Jesús Alexander García Luis Alejandro Franco Juan David Urrea Carlos Alfonso Torres Manuel Fernando Gutiérrez UPB 2012 Content INTRODUCTION... 3 OBJECTIVE 4 EVIDENCE
3. USB FLASH DRIVE PREPARATION. Almost all current PC firmware permits booting from a USB drive, allowing the launch
3. USB FLASH DRIVE PREPARATION 3.1 INTRODUCTION Almost all current PC firmware permits booting from a USB drive, allowing the launch of an operating system from a bootable flash drive. Such a configuration
FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter 1999-2000 Dr. Barnicki January 28, 2000
FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter 1999-2000 Dr. Barnicki January 28, 2000 Table of Contents List of Figures... iv Introduction...1 The Physical Disk...1 File System Basics...3 File
Xbox 360 File Specifications Reference
Xbox 360 File Specifications Reference Introduction This reference attempts to document the specifications of the custom data formats in use by the Xbox 360 console. This data has either been discovered
CHAPTER 17: File Management
CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
The Linux Virtual Filesystem
Lecture Overview Linux filesystem Linux virtual filesystem (VFS) overview Common file model Superblock, inode, file, dentry Object-oriented Ext2 filesystem Disk data structures Superblock, block group,
Oracle Cluster File System on Linux Version 2. Kurt Hackel Señor Software Developer Oracle Corporation
Oracle Cluster File System on Linux Version 2 Kurt Hackel Señor Software Developer Oracle Corporation What is OCFS? GPL'd Extent Based Cluster File System Is a shared disk clustered file system Allows
Storage and File Systems. Chester Rebeiro IIT Madras
Storage and File Systems Chester Rebeiro IIT Madras 1 Two views of a file system system calls protection rwx attributes Application View Look & Feel File system Hardware view 2 Magnetic Disks Chester Rebeiro
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
CTNET Field Protocol Specification November 19, 1997 DRAFT
CTNET Field Protocol Specification November 19, 1997 DRAFT Introduction Version 1.0 of CTNET will support the AB3418 protocol for communication to field controllers. AB3418 is a point-topoint protocol
Windows 7: Current Events in the World of Windows Forensics
Windows 7: Current Events in the World of Windows Forensics Troy Larson Senior Forensic Program Manager Network Security, Microsoft Corp. Where Are We Now? Vista & Windows 2008 BitLocker. Format-Wipes
Application Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification
Application Note 3/2003 PC Master Software Communication Protocol Specification By Pavel Kania and Michal Hanak S 3 L Applications Engineerings MCSL Roznov pod Radhostem Introduction The purpose of this
Crash Recovery. Chapter 18. Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke
Crash Recovery Chapter 18 Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke Review: The ACID properties A tomicity: All actions in the Xact happen, or none happen. C onsistency: If each Xact
How to recover partitions and files. (Freeware Guide) Step by step with examples
How to recover partitions and files (Freeware Guide) Step by step with examples Copyright 2012, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form
Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform
Int'l Conf. Security and Management SAM'15 3 Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform R. Malik 1, N. Shashidhar 1, and L. Chen 2 1 Department of Computer Science,
Linux Kernel Architecture
Linux Kernel Architecture Amir Hossein Payberah [email protected] Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management
Module 2: Database Architecture
Module 2: Database Architecture Overview Schema and Data Structure (Objects) Storage Architecture Data Blocks, Extents, and Segments Storage Allocation Managing Extents and Pages Tablespaces and Datafiles
COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters
COSC 6374 Parallel Computation Parallel I/O (I) I/O basics Spring 2008 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network
Chapter 12 File Management
Operating Systems: Internals and Design Principles Chapter 12 File Management Eighth Edition By William Stallings Files Data collections created by users The File System is one of the most important parts
OCFS2: The Oracle Clustered File System, Version 2
OCFS2: The Oracle Clustered File System, Version 2 Mark Fasheh Oracle [email protected] Abstract This talk will review the various components of the OCFS2 stack, with a focus on the file system and
Chapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
Chapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
File System Reliability (part 2)
File System Reliability (part 2) Main Points Approaches to reliability Careful sequencing of file system opera@ons Copy- on- write (WAFL, ZFS) Journalling (NTFS, linux ext4) Log structure (flash storage)
Flexible Storage Allocation
Flexible Storage Allocation A. L. Narasimha Reddy Department of Electrical and Computer Engineering Texas A & M University Students: Sukwoo Kang (now at IBM Almaden) John Garrison Outline Big Picture Part
Review. Lecture 21: Reliable, High Performance Storage. Overview. Basic Disk & File System properties CSC 468 / CSC 2204 11/23/2006
S 468 / S 2204 Review Lecture 2: Reliable, High Performance Storage S 469HF Fall 2006 ngela emke rown We ve looked at fault tolerance via server replication ontinue operating with up to f failures Recovery
Introduction to The Sleuth Kit (TSK) By Chris Marko. Rev1 September, 2005. Introduction to The Sleuth Kit (TSK) 1
Introduction to The Sleuth Kit (TSK) By Chris Marko Rev1 September, 2005 Introduction to The Sleuth Kit (TSK) 1 This paper provides an introduction to The Sleuth Kit (referred to as TSK herein), from Brian
COS 318: Operating Systems. File Layout and Directories. Topics. File System Components. Steps to Open A File
Topics COS 318: Operating Systems File Layout and Directories File system structure Disk allocation and i-nodes Directory and link implementations Physical layout for performance 2 File System Components
COS 318: Operating Systems
COS 318: Operating Systems File Performance and Reliability Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics File buffer cache
Preface. DirX Document Set
Preface DirX Document Set Preface The DirX Troubleshooting Guide describes how to solve problems that can occur in DirX installations. The book is organized as follows: Chapter 1 provides a summary of
FILEMAKER SERVER 12 BACKUPS FREQUENTLY ASKED QUESTIONS
FILEMAKER SERVER 12 BACKUPS FREQUENTLY ASKED QUESTIONS BY: WIM DECORTE AND STEVEN H. BLACKWELL 1. How have backups changed in FileMaker Server 12? Scheduled backups now utilize a process known as hard
File-System Implementation
File-System Implementation 11 CHAPTER In this chapter we discuss various methods for storing information on secondary storage. The basic issues are device directory, free space management, and space allocation
1. Introduction to the UNIX File System: logical vision
Unix File System 1. Introduction to the UNIX File System: logical vision Silberschatz, Galvin and Gagne 2005 Operating System Concepts 7 th Edition, Feb 6, 2005 Logical structure in each FS (System V):
Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+)
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
Extensible Storage Engine (ESE) Database File (EDB) format specification
Extensible Storage Engine (ESE) Database File (EDB) format specification Analysis of the Extensible Storage Engine (ESE) Database File (EDB) format By Joachim Metz Summary
A Forensic Comparison of NTFS and FAT32 File Systems
MARSHALL UNIVERSITY FORENSIC SCIENCE CENTER & FBI, HEART OF AMERICA REGIONAL COMPUTER FORENSICS LABORATORY A Forensic Comparison of NTFS and FAT32 File Systems Summer 2012 Kelsey Laine Rusbarsky #901-60-8173
Active @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
Automating the Computer Forensic Triage Process With MantaRay
Automating the Computer Forensic Triage Process With MantaRay Senior Computer Forensic Analysts Doug Koster & Kevin Murphy Worlds best Summer Intern Chapin Bryce GMU RCFG Conference August 2013 1 MantaRay
The Curious Case of Database Deduplication. PRESENTATION TITLE GOES HERE Gurmeet Goindi Oracle
The Curious Case of Database Deduplication PRESENTATION TITLE GOES HERE Gurmeet Goindi Oracle Agenda Introduction Deduplication Databases and Deduplication All Flash Arrays and Deduplication 2 Quick Show
How to Troubleshoot the Remote Backup Client log Error Message:
How to Troubleshoot the Remote Backup Client log Error Message: VSS open files Backup failed. Error: Connection is not established with the VSS Requestor, restart the client and try again later. In BCVssOpenFilesProcess
UVA. Failure and Recovery. Failure and inconsistency. - transaction failures - system failures - media failures. Principle of recovery
Failure and Recovery Failure and inconsistency - transaction failures - system failures - media failures Principle of recovery - redundancy - DB can be protected by ensuring that its correct state can
XFS File System and File Recovery Tools
XFS File System and File Recovery Tools Sekie Amanuel Majore 1, Changhoon Lee 2 and Taeshik Shon 3 1,3 Department of Computer Engineering, Ajou University Woncheon-doing, Yeongton-gu, Suwon, Korea {amanu97,
Supporting ZDOs with the XBee API
Supporting ZDOs with the XBee API The ZigBee Device Profile is a management and discovery service layer supported on all ZigBee devices. Like all other profiles, the ZigBee Device Profile defines a set
[ X OR DDoS T h r e a t A d v i sory] akamai.com
[ X OR DDoS T h r e a t A d v i sory] akamai.com What is the XOR DDoS threat The XOR DDoS botnet has produced DDoS attacks from a few Gbps to 150+ Gbps The gaming sector has been the primary target, followed
Command Param1 Param2 Return1 Return2 Description. 0xE9 0..0x7F (id) speed pos_high pos_low Set servo #id speed & read position
set Description 0..0x7F (id) Set servo #id target position 0xE1 Read EEPROM 0xE2 Write EEPROM 0xE3 Read memory 0xE4 Write memory 0xE5 Read position 0xE6 Set target position 0xE7 version id Read version
Determining VHD s in Windows 7 Dustin Hurlbut
Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for
EWF specification. Expert Witness Compression Format specification. By Joachim Metz <[email protected]>
EWF specification Expert Witness Compression Format specification By Joachim Metz Summary EWF is short for Expert Witness Compression Format, according to [ASR02]. It is a file
WIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide
WIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide Rev 0.2 This document describes how to make your own Configuration Tool for WIZ100SR, WIZ105SR and WIZ110SR of WIZnet. And
Forensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
HARD DISK MANAGER 14 / FULL FEATURES LIST. HDM 14 Suite. Features. HDM 14 Pro. Drive Partitioning. Data Backup & Restore
Features HDM 14 Suite HDM 14 Pro Drive Partitioning Create Partition Express Create Partition Format Partition Delete Partition Undelete Partition Move/Resize Partition Express Resize Partition Redistribute
Backup Exec 12.5 Icons Glossary
Backup Exec 12.5 Icons Glossary Note: Some icons in this glossary are shown larger than their actual size. Action icons Alert icons Backup Exec Service Manager icons DB2 backup and restore icons DPM restore
Maximizing VMware ESX Performance Through Defragmentation of Guest Systems. Presented by
Maximizing VMware ESX Performance Through Defragmentation of Guest Systems Presented by July, 2010 Table of Contents EXECUTIVE OVERVIEW 3 TEST EQUIPMENT AND METHODS 4 TESTING OVERVIEW 5 Fragmentation in
Digital Investigation
Digital Investigation 9 (2012) S118 S130 Contents lists available at SciVerse ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin An analysis of Ext4 for digital forensics
Dolphin In-Circuit programming Updating Firmware in the field
Dolphin In-Circuit programming Updating Firmware in the field 1 Introduction In systems e.g. gateways, where an external microcontroller is connected to a Dolphin based product like a TCM300 it might be
CX-Supervisor CX-MODBUS TCP
CX-Supervisor CX-MODBUS TCP Getting Started Guide!! PNSPO! . Specifications.. Introduction is an activex intended to work with Cx-Supervisor to enable communication with Modbus TCP server..2. Supported
Active @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
Using the HFSD journal for deleted file recovery
available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin Using the HFSD journal for deleted file recovery Aaron Burghardt*, Adam J. Feldman Booz Allen Hamilton, Herndon, VA 20171,
Dr Michael Cohen. This talk does not represent my Employer. April 2005
RAID Reconstruction And the search for the Aardvark Dr Michael Cohen This talk does not represent my Employer April 2005 1 RAID 0: Striping What is RAID? Improves performance due to parallel disk access
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
MUSCLE Cryptographic Card Edge Definition for Java 1 Enabled Smartcards
MUSCLE Cryptographic Card Edge Definition for Java 1 Enabled Smartcards David Corcoran Tommaso Cucinotta This document is provided on an as-is basis. Neither the authors nor the MUSCLE project are responsible
Enterprise Manager Performance Tips
Enterprise Manager Performance Tips + The tips below are related to common situations customers experience when their Enterprise Manager(s) are not performing consistent with performance goals. If you
TestDisk Step By Step CGSecurity
This Recovery example guides you through TestDisk step by step to recover a missing partition and repair a corrupted one. Translation of this TestDisk manual to other languages are welcome. Example Problem
Ans.: You can find your activation key for a Recover My Files by logging on to your account.
Faqs > Recover Q1. I lost my activation key Ans.: You can find your activation key for a Recover My Files by logging on to your account. Q2. I purchased on-line, when will my activation key be sent to
Finding a needle in Haystack: Facebook s photo storage IBM Haifa Research Storage Systems
Finding a needle in Haystack: Facebook s photo storage IBM Haifa Research Storage Systems 1 Some Numbers (2010) Over 260 Billion images (20 PB) 65 Billion X 4 different sizes for each image. 1 Billion
ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective
ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective Part II: Data Center Software Architecture: Topic 1: Distributed File Systems Finding a needle in Haystack: Facebook
Digital forensic implications of ZFS
available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin Digital forensic implications of ZFS Nicole Lang Beebe*, Sonia D. Stacy, Dane Stuckey Dept. of Information Systems & Technology
Data recovery Data management Electronic Evidence
Data recovery Data management Electronic Evidence 2 RAID, SAN and Virtual systems RAID, SAN and Virtual systems Data Loss Scenarios: RAID Recovery drive failure Deleted VM recovery Reinstall of ESX on
Practice Exercise March 7, 2016
DIGITAL FORENSICS Practice Exercise March 7, 2016 Prepared by Leidos CyberPatriot Forensics Challenge 1 Forensics Instruction Guide Introduction The goal of this event is to learn to identify key factors
