Digital forensic techniques for static analysis of NTFS images
|
|
|
- Mitchell Andrews
- 10 years ago
- Views:
Transcription
1 Digital forensic techniques for static analysis of NTFS images Mamoun Alazab Internet Commerce Security Laboratory University of Ballarat, Australia Sitalakshmi Venkatraman Internet Commerce Security Laboratory University of Ballarat, Australia Paul Watters Internet Commerce Security Laboratory University of Ballarat, Australia ABSTRACT Static analysis of the Windows NT File System (NTFS) which is the standard and most commonly used file system could provide useful information for digital forensics. However, since the NTFS disk image records every event in the system, forensic tools need to process an enormous amount of information related to user / kernel environment, buffer overflows, trace conditions, network stack and other related subsystems. This leads to imperfect forensic tools that are practical for implementation but not comprehensive and effective. This research discusses the analysis technique to detect data hidden based on the internal structure of the NTFS file system in the boot sector. Further, it attempts to unearth the vulnerabilities of NTFS disk image and the weaknesses of the current forensic techniques. This paper argues that a comprehensive tool with improved techniques is warranted for a successful forensic analysis. Key Words: NTFS, Forensics, disk image, data hiding. 1. Introduction Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital electronic storage devices to be used in a court of law [1, 2, 3]. It attempts to provide full descriptions of a digital crime scene. In computer systems, the primary goals of digital forensic analysis are fivefold: i) to identify all the unwanted events that took place, ii) to ascertain their effect on the system, iii) to acquire the necessary evidence to support a lawsuit, iv) to prevent future incidents by detecting the malicious techniques used and v) to recognize the incitement reasons and intendance of the attacker for future predictions [4]. The general component in digital forensic process are; acquisition, preservation, and analysis [5]. Digital electronic evidence could be described as the information and data of investigative value that are stored by an electric device, such evidence [6]. This research focuses on the third goal of acquiring the necessary evidence of intrusions that take place on a computer system. In particular, this paper investigates the digital forensic techniques that could be used to analyze and acquire evidences from the most commonly used file systems on
2 computers, namely, Windows NT File System (NTFS). Today, NTFS file system is the basis of predominant operating systems in use, such as Windows 2000, Windows XP, Windows Server 2003, Windows Server 2008, Windows Vista, Windows 7 and even in most free UNIX distributions [7, 8, 9]. Hence, attackers try to target on NTFS as this could result in affecting more computer users. Another compelling reason for witnessing a strong relationship between computer crime and the NTFS file system is the lack of literature that unearth the vulnerabilities of NTFS and the weaknesses of the present digital forensic techniques [10]. This paper attempts to fill this gap by studying the techniques used in the analysis of the NTFS disk image. Our objectives are i) to explore the NTFS disk image structure and its vulnerabilities, ii) to investigate different commonly used digital forensic techniques such as signatures, data hiding, timestamp, etc. and their weaknesses, and iii) finally to suggest improvements in static analysis of NTFS disk image. 2. Research Methodology In order to achieve the above mentioned objectives of this research work, we conducted an empirical study using selected digital forensic tools that are predominantly used in practice. Several factors such as effectiveness, uniqueness and robustness in analyzing NTFS disk image were considered in selecting the tools / utilities required for this empirical study. Since each utility does some specific functionality, a collection of such tools were necessary to perform a comprehensive set of functionalities. Hence, the following forensic utilities / tools were adopted to conduct the experimental investigation in this research work: i) Disk imaging utilities such as dd [11] or dcfldd V [12] for obtaining sector-by-sector mirror image of the disk; ii) Evidence collection using utilities such as Hexedit [13], Frhed 1.4.0[14] and Strings V2.41[15] to introspect the binary code of the NTFS disk image; iii) NTFS disk analysis using software tools such as The Sleuth KIT (TSK) 3.01[16] and Autopsy [17] and NTFSINFO v1.0 [18] to explore and extract intruded data as well as hidden data for performing forensic analysis. Test data for the experimental investigation with the above tools was created on a Pentium (R) Core (TM) 2 Due CPU, 2.19 GHz, 2.98 of RAM with Windows XP professional that adopts the NTFS file system partition. In this research, we focus on the boot sector of the NTFS disk image for the empirical study. We adopt the following three steps to perform digital forensic analysis in a comprehensive manner: i) Hard disk acquisition, ii) Evidence searching and iii) Analysis of NTFS file system. 2.1 Hard Disk Data Acquisition In this step, we used the dcfldd developed by Nicholas Harbour and dd utility from George Garner to acquire the NTFS disk image from the digital electronic storage devices since they are simple and flexible acquisition tools. The advantage of using these tools is that we could extract the data in or between partitions to a separate file for more analysis, and in addition, it provides built-in MD5 hashing features. Some of its salient features allow the analyst to calculate, save, and verify the MD5 hash values. In digital forensic analysis, using hashing technique is important to ensure data integrity and to identify whether the value of data has been changed as well as explore known data objects [19]. 2.2 Evidence searching
3 An evidence of intrusion could be gained by looking for some known signatures, timestamps as well as even searching for hidden data [20]. In this step, we used Strings command by Mark Russinovich, Frhed hexeditor tool by Rihan Kibria and WinHex hexeditor tool by X-Ways Software Technology AG to detect a keyword or phrase from the disk image. 2.3 Analysis of NTFS File System The final step in the experimental investigation is to analyze the data obtained from the NTFS disk image that contribute towards meaningful conclusions of the forensic investigation. We adopted a collection of tools such as the Sleuth Kit (TSK) and Autopsy Forensic by Brian Carrier and NTFSINFO v1.0 from Microsoft Sysinternals by Mark Russinovich to perform different aspects of the NTFS file system analysis. To understand how intrusions can lead to data hiding, deleting, etc. and to facilitate recovery, it is essential to understand the physical characteristics of the Microsoft NTFS file system. Master File Table (MFT) is the core of NTFS since it contains details of every file and folder on the volume and allocates two sectors for every MFT entry [23]. Each MFT entry has a fixed sized which is 1 KB (At byte offset 64 in the boot sector to identify the MFT record size). We provide the MFT layout and represent the plan of the NTFS file system using Figure 1. NTFS exists to read and write the attributes instead of read and write the file content. The MFT enables a forensic analyst to examine in some detail the structure and working of the NTFS volume. Therefore, it s important to understand how the attributes are stored in the MFT entry. 3. Analysis of the boot sector of the NTFS disk image The first step for a digital forensic investigator is to acquire a duplicate copy of the NTFS disk image before beginning the analysis so as to ensure that the data on the original devices have not been changed during the analysis. Therefore, it is required to isolate the original infected computer to extract the evidence that could be found on the electronic storage devices from the disk image as the image captures the invisible information as well [21]. The advantages of analyzing disk images are that the investigators can: a) preserve the digital crime-scene, b) obtain the information in slack space, c) access unallocated space, free space, and used space, d) recover file fragments, hidden or deleted files and directories, e) view the partition structure and f) get date-stamp and ownership of files and folders [3, 22]. Figure 1: MFT layout structure. MFT entry within the MFT contains attributes that can have any format and any size. Further, as it shows in Figure 1, every attribute contains an entry header which is allocated in the first 42 bytes of a file record, and it contains an attribute header and attribute content. The attribute header is used to identify the size, name and the flag value. The attribute content can reside in the MFT followed by the attribute header if the size is less than 700 bytes (known as a resident attribute), otherwise it will store the attribute content in an external cluster called cluster run (known as a non-resident attribute). This is because; the MFT entry is 1KB in
4 size and hence cannot fit anything that occupies more than 700 bytes. Metadata files are used to describe the file system. We created a NTFS disk image of the test computer using the dd utility and investigated the boot sector. We used NTFSINFO tool on the disk image as shown in Table 1 which shows the boot sector of the test device and information about the ondisk structure: it enables you to view the MFT information, allocation size, volume size and metadata files. We extracted information such as the size of clusters, sector numbers in the file system, starting cluster address of the MFT, the size of each MFT entry and the serial number given for the file system. Volume Size Volume size : 483 MB Total sectors : Total clusters : Free clusters : Free space : 416 MB (86% of drive) Allocation Size Bytes per sector : 512 Bytes per cluster : 4096 Bytes per MFT record : 1024 Clusters per MFT record: 0 MFT Information MFT size : 0 MB (0% of drive) MFT start cluster : MFT zone clusters : MFT zone size : 60 MB (12% of drive) MFT mirror start : Meta-Data files Table 1: NTFS Information Details. From the information gained above and from analyzing the boot sector image as shown in Figure 2, we performed an analysis of the data structure of this boot sector and this is summarized in Table 2. Figure 2: First Sector of the test boot Sector.
5 Byte Range Size Description Value Note Jump to boot code If bootable, jump. If nonbootable, used to store error message OEM Name System ID NTFS Bytes per sector: Sectors per cluster Reserved sectors 0 Unused Unused 0 Unused Media descriptor Unused 0 Unused Sectors per track 63 Not Check Number of heads 255 Not Check Unused 32 Not Check Unused 0 Unused Drive type check For USB thumb drive Number of sectors in file system (volume) GB Starting cluster address of $MFT 4*8= Starting cluster address of MFT Mirror $DATA attribute 619, Size of record - MFT entry 2 10 = Unused 0 Unused Size of index record 01h Unused 0 Unused Serial number C87C8h Unused 0 Unused Boot code ~ Boot signature 0xAA55 Table 2: Data structure for the test boot sector 4. Analysis of the Hidden Data in the $Boot metadata file system Attackers use different techniques such as disguising file names, hiding attributes and deleting files to intrude the system. Since the Windows operating system does not zero the slack space, it becomes a vehicle to hide data, especially in $Boot file. Hence, in this study, we analyze the hidden data in the $Boot file. The $Boot entry is stored in a metadata file at the first cluster in sector 0 of the file system called $Boot from where the system boots. It is the only metadata file that has a static location so that it cannot be relocated. Microsoft allocates the first 16 sectors of the file system to $Boot and only half of these sectors contains non-zero values [3]. NTFS file system requires knowledge and experience to analyze the data structure and the hidden data [24]. The $Boot metadata file is located in MFT entry 7 and contains the boot sector of the file system. It contains information about the size of the volume, clusters and the MFT. The $Boot metadata file has four attributes: $STANDARD_INFORMATION, $FILE_NAME, $SECURITY_DESCRIPTION and $DATA. The $STANDARD_INFORMATION attribute contains temporal information such
6 as flags, owner, security ID and the last accessed, written, and created times. The $FILE_NAME attribute contains the file name in Unicode, the size and temporal information as well. The $SECURITY_DESCRIPTION attribute contains information about the access control and security properties. Finally, the $DATA attribute contains the file contents. These are illustrated for the test sample as shown in Table 2 using the following TSK command tools: Istat f ntfs c:\image.dd 7 MFT Entry Header Values: Entry: 7 Sequence: 7 $LogFile Sequence Number: 0 Allocated File Links: 1 $STANDARD_INFORMATION Attribute Values: Flags: Hidden, System Owner ID: 0 Created: Mon Feb 09 12:09: File Modified: Mon Feb 09 12:09: MFT Modified: Mon Feb 09 12:09: Accessed: Mon Feb 09 12:09: $FILE_NAME Attribute Values: Flags: Hidden, System Name: $Boot Parent MFT Entry: 5 Sequence: 5 Allocated Size: 8192 Actual Size: 8192 Created: Mon Feb 09 12:09: File Modified: Mon Feb 09 12:09: MFT Modified: Mon Feb 09 12:09: Accessed: Mon Feb 09 12:09: Attributes: Type: $STANDARD_INFORMATION (16-0) Name: N/A Resident size: 48 Type: $FILE_NAME (48-2) Name: N/A Resident size: 76 Type: $SECURITY_DESCRIPTOR (80-3) Name: N/A Resident size: 116 Type: $DATA (128-1) Name: $Data Non-Resident size: Table 2: $Boot Attributes Hence the $Boot attribute of the NTFS file system could be used to hide data. By analyzing the hidden data in the boot sector, one could provide useful information for digital forensics. The size of the data that could be hidden in the boot sector is limited by the number of non-zero that Microsoft allocated in the first 16 sectors of the file system. The data could be hidden in the $Boot metadata files without raising suspicion and without affecting the functionality of the system [25]. Analysis of the $Boot attribute of the NTFS file system will identify any hidden data. The analyzer should start by making a comparison between the boot sector and the backup boot sector. The image with the boot sector and backup boot sector are supposed to be identical; otherwise there is some data hidden on the $Boot file. One method is to check the integrity of the backup boot sector and the boot sector by calculating the MD5 for both of them. A difference in checksum indicates that there is some hidden data. We performed this comparison by adopting the following commands on the $Boot image file and the backup boot image, see the applied below: dd if=image.dd bs=512 count=1 skip=61949 of=c:\backupbootsector.dd md5sum verifymd5 md5out=c:\hash1.md5 dd if=image.dd bs=512 count=1 of=c:\bootsector.dd md5sum verifymd5 md5out=c:\hash2.md5 We found that hidden data in the $Boot file was not detected directly by the tools used in this study and manual inspections were required alongside these forensic tools. Hence, through the analysis conducted with various utilities and tools, we arrived at the following results: 1. There is a huge amount of data analysis required while scanning the entire NTFS disk image for forensic purposes. Just by focusing on the hidden data in the $Boot, this empirical study showed that many
7 tools and utilities have to be adopted and it takes an immense amount of time to analyze the data derived. 2. Not all computer infections are detected by forensic tools, especially intrusions that are in the form of hidden data in the $Boot file. 3. By adopting a manual introspection of the $Boot file using the three-step approach of i) hard disk acquisition, ii) evidence searching and iii) analysis of the NTFS file system, we could identify hidden data in the $Boot file. 4. Searches can be performed to extract the ASCII and UNICODE characters from binary files in the disk image on either the full file system image or just the unallocated space, which could speed-up the process of identifying hidden data. 5. Microsoft has different versions of the NTFS file system. While Windows XP and Windows Server 2003 use the same version, Windows Vista uses the NTFS 3.1 version [7]. The new NTFS 3.1 has changed the on-disk structure. For example, the location of the volume boot record is at physical sector 2,048. Not all existing tools work with all the different versions of NTFS file system, hence a comprehensive tool is warranted even with the changes in the NTFS file structure. 5. Conclusions and Future Work This paper has attempted to explore the difficulties involved in digital forensics, especially in conducting static analysis of NTFS disk images and propose a solution method. In this empirical study, we have found the boot sector of the NTFS file system could be used as a vehicle to hide data by computer attackers. This is an important NTFS file system weakness to be addressed as research in this domain area could lead to effective methods for the open problem of detecting new malicious codes that use this mode of attack. The existing forensic software tools are not competent enough to comprehensively detect hidden data in boot sectors. As a first step to address this problem, we have formulated a three-step forensic analysis process to facilitate the research methodology. We have reported the results gathered by adopting this process. One clear achievement through this research study is that we were successful in identifying some unknown malicious hidden data in the $Boot file that were hidden from current wellknown virus scanners. The research methodology reported in this paper could be adopted to analyze other sectors of the NTFS file system as well. In this initial research investigation conducted, we had adopted a few forensic techniques and manual inspections of the NTFS file image. Our next stage of this research work would be to automate the proposed process so as to facilitate forensic analysis of the NTFS disk image in an efficient and comprehensive manner. We plan to extract signatures intelligently so as to detect efficiently new malware that use hidden and obfuscated modes of attack. This would help trigger more research to be conducted in satisfying the objective of automatically and proactively identifying unseen malware that try to evade detection. References: [1] Reith, M.; Carr, C. & Gunsch, G., An examination of digital forensic models, International Journal of Digital Evidence, 2002, 1, [2] Technical Working Group for Electric Crime Scene Investigation. Electronic Crime Scene Investigation: A Guide for First Responders, 2001.
8 [3] Carrier, B., File system forensic analysis, Addison-Wesley Professional, USA, [4] Ardisson, S., Producing a Forensic Image of Your Client s Hard Drive? What You Need to Know, Qubit, 2007, 1, 1-2. [5] Andrew, M., Defining a Process Model for Forensic Analysis of Digital Devices and Storage Media, Systematic Approaches to Digital Forensic Engineering, 2007, SADFE Second International Workshop on, 2007, [6] Investigation, E., Electronic Crime Scene Investigation: A Guide for First Responders, US Department of Justice, NCJ, 2001, [7] Svensson, A., Computer Forensic Applied to Windows NTFS Computers, Stockholm's University, Royal Institute of Technology, [8] NTFS, 22/2/2009. [9] Purcell, D. & Lang, S., Forensic Artifacts of Microsoft Windows Vista System, Lecture Notes in Computer Science, Springer, 2008, 5075, [10] Newsham, T.; Palmer, C.; Stamos, A.; Burns, J. & isec Partners, I., Breaking forensics software: Weaknesses in critical evidence collection, Proceedings of the 2007 Black Hat Conference, [11] DD tool, George Garner s site s/, 14/1/2009. [12] DCFL tool, Nicholas Harbour, 14/1/2009. [13] WinHex tool, X-Ways Software Technology AG, 14/1/2009. [14] FRHED tool, Raihan Kibria site, 14/1/2009. [15] STRINGS, Mark Russinovich, 14/1/2009. [16] TSK tools, Brian Carrier site, 14/1/2009. [17] Autopsy tools, Brian Carrier site, 14,1,2009. [18] NTFSINFO tool, Mark Russinovich, 14/1/2009. [19] Roussev, V.; Chen, Y.; Bourg, T. & Richard, G., md5bloom: Forensic file system hashing revisited, Digital Investigation, Elsevier, 2006, 3, [20] Chow, K.; Law, F.; Kwan, M. & Lai, K., The Rules of Time on NTFS File System Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007, [21] Jones, K.; Bejtlich, R. & Rose, C., Real digital forensics: computer security and incident response, Addison-Wesley Professional, USA, [22] Carvey, H., Windows Forensic Analysis DVD Toolkit, Syngress Press, USA, [23] Naiqi, L.; Yujie, W. & QinKe, H., Computer Forensics Research and
9 Implementation Based on NTFS File System, Computing, Communication, Control, and Management, CCCM'08. ISECS International Colloquium on, 2008, 1. [24] Aquilina, J.; Casey, E.; Malin, C. & MyiLibrary, Malware Forensics Investigating and Analyzing Malicious Code, Syngress Publishing,USA, [25] Huebner, E.; Bem, D. & Wee, C., Data hiding in the NTFS file system, Digital Investigation, Elsevier, 2006, 3,
EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE
EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE Mamoun Alazab, Sitalakshmi Venkatraman, Paul Watters University of Ballarat, Australia {m.alazab, s.venkatraman, p.watters} @ballarat.edu.au ABSTRACT
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer
New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
RECOVERING FROM SHAMOON
Executive Summary Fidelis Threat Advisory #1007 RECOVERING FROM SHAMOON November 1, 2012 Document Status: FINAL Last Revised: 2012-11-01 The Shamoon malware has received considerable coverage in the past
Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)
s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix
Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics
Digital Forensics Lecture 3 Hard Disk Drive (HDD) Media Forensics Current, Relevant Topics defendants should not use disk-cleaning utilities to wipe portions of their hard drives before turning them over
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Where is computer forensics used?
What is computer forensics? The preservation, recovery, analysis and reporting of digital artifacts including information stored on computers, storage media (such as a hard disk or CD-ROM), an electronic
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference
PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference What PTK is about PTK forensics is a computer forensic framework based on command line tools
State of the art of Digital Forensic Techniques
State of the art of Digital Forensic Techniques Enos K. Mabuto 1, H. S Venter 2 Department of Computer Science University of Pretoria, Pretoria, 0002, South Africa Tel: +27 12 420 3654 Email: [email protected]
Design and Implementation of a Live-analysis Digital Forensic System
Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan [email protected]
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
Open Source and Incident Response
Open Source and Incident Response Joe Lofshult, CISSP, GCIH 1 Agenda Overview Open Source Tools FIRE Demonstration 2 Overview Incident Adverse event that threatens security in computing systems and networks.
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
Alternate Data Streams in Forensic Investigations of File Systems Backups
Alternate Data Streams in Forensic Investigations of File Systems Backups Derek Bem and Ewa Z. Huebner School of Computing and Mathematics University of Western Sydney [email protected] and [email protected]
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Introduction to The Sleuth Kit (TSK) By Chris Marko. Rev1 September, 2005. Introduction to The Sleuth Kit (TSK) 1
Introduction to The Sleuth Kit (TSK) By Chris Marko Rev1 September, 2005 Introduction to The Sleuth Kit (TSK) 1 This paper provides an introduction to The Sleuth Kit (referred to as TSK herein), from Brian
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
3. USB FLASH DRIVE PREPARATION. Almost all current PC firmware permits booting from a USB drive, allowing the launch
3. USB FLASH DRIVE PREPARATION 3.1 INTRODUCTION Almost all current PC firmware permits booting from a USB drive, allowing the launch of an operating system from a bootable flash drive. Such a configuration
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE Jesús Alexander García Luis Alejandro Franco Juan David Urrea Carlos Alfonso Torres Manuel Fernando Gutiérrez UPB 2012 Content INTRODUCTION... 3 OBJECTIVE 4 EVIDENCE
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
Significance of Hash Value Generation in Digital Forensic: A Case Study
International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 2, Issue 5 (July 2012), PP. 64-70 Significance of Hash Value Generation in Digital
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
Microsoft Vista: Serious Challenges for Digital Investigations
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2008 Microsoft Vista: Serious Challenges for Digital Investigations Darren R. Hayes and Shareq Qureshi Seidenberg School of
Digital Forensic Tool for Decision Making in Computer Security Domain
Digital Forensic Tool for Decision Making in Computer Security Domain S. K. Khode 1,V. N. Pahune 2 and M. R. Sayankar 3 1, 2, 3 Computer Engineering Department of Bapurao Deshmukh College of Engineering,
Data Hiding Techniques
Data Hiding Techniques You can run, but you can t hide for ever 2014/2015 Dr. Ali Hadi [email protected] # whoami University professor @PSUT by day, DFIR researcher by night! PhD research was in Network
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
The Windows File System @ Articles -> Software Oct 07 2004, 00:45 (UTC+0)
select a site 6 forums 6 juice: USS Cole Automatic network monitoring with GFI Network Server Monitor. Dld Free Trial! Main Exploits Links Forums Register features You're not registered and logged, please
A Forensic Comparison of NTFS and FAT32 File Systems
MARSHALL UNIVERSITY FORENSIC SCIENCE CENTER & FBI, HEART OF AMERICA REGIONAL COMPUTER FORENSICS LABORATORY A Forensic Comparison of NTFS and FAT32 File Systems Summer 2012 Kelsey Laine Rusbarsky #901-60-8173
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Lukas Limacher Department of Computer Science, ETH. Computer Forensics. September 25, 2014
Lukas Limacher Department of Computer Science, ETH Zürich Computer Forensics September 25, 2014 Contents 9 Computer Forensics 1 91 Objectives 1 92 Introduction 2 921 Incident Response 2 922 Computer Forensics
Open Source Digital Forensics Tools
The Legal Argument 1 [email protected] Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
Operating Systems: Microsoft Windows XP, Windows Vista or Windows 7 RAM: 2GB
MRS Absolute security minimum System Requirements Operating Systems: Microsoft Windows XP, Windows Vista or Windows 7 RAM: 2GB Hard Drive: 1 primary partition for O/S and applications. (C:) 1 primary partition
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
TRIFORCE ANJP. THE POWER TO PROVE sm USER S GUIDE USER S GUIDE TRIFORCE ANJP VERSION 3.10
TRIFORCE ANJP THE POWER TO PROVE sm USER S GUIDE USER S GUIDE TRIFORCE ANJP VERSION 3.10 TRIFORCE ANJP USER S GUIDE 2 Contents LET'S BEGIN... 5 SAY HELLO TO ANJP... 5 RUNNING ANJP... 6 Software Activation...
Digital Forensics and Cyber Crime Datamining
Journal of Information Security, 2012, 3, 196-201 http://dx.doi.org/10.4236/jis.2012.33024 Published Online July 2012 (http://www.scirp.org/journal/jis) Digital Forensics and Cyber Crime Datamining K.
Operating Systems CS-384. File Systems. NTFS and FAT32. Submitted To: Dr. Chris Taylor. Submitted By: Aditya Sitani
Operating Systems CS-384 File Systems NTFS and FAT32 Submitted To: Dr. Chris Taylor Submitted By: Aditya Sitani Date: 02/3/2003 Table of Contents Introduction... 0 Physical Disk... 1 Files... 2 Files concept...
FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter 1999-2000 Dr. Barnicki January 28, 2000
FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter 1999-2000 Dr. Barnicki January 28, 2000 Table of Contents List of Figures... iv Introduction...1 The Physical Disk...1 File System Basics...3 File
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,
Windows OS File Systems
Windows OS File Systems MS-DOS and Windows 95/98/NT/2000/XP allow use of FAT-16 or FAT-32. Windows NT/2000/XP uses NTFS (NT File System) File Allocation Table (FAT) Not used so much, but look at as a contrast
Live View. A New View On Forensic Imaging. Matthiew Morin Champlain College
Live View A New View On Forensic Imaging Matthiew Morin Champlain College Morin 1 Executive Summary The main purpose of this paper is to provide an analysis of the forensic imaging tool known as Live View.
Digital Forensics. General Terms Cyber Crime, forensics models, Investigation, Analysis, digital devices.
Digital Forensics Ravneet Kaur, Amandeep Kaur Assistant Professor in Computer Science SDSPM College for Women, Rayya (Asr) Guru Nanak Dev University, India International Journal of Computer Applications
ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
Technical Procedure for Evidence Search
Technical Procedure for Evidence Search 1.0 Purpose - The purpose of this procedure is to provide a systematic means of searching digital evidence in order to find data sought by the search authorization.
Overview. Windows Alternate Data Streams How code and data can be hidden within files and directories
Overview Introduction Importance Origin NTFS Stream Basics Usages Demo Issues API Tools Introduction A file is more than one file A file can act as container for other files One visible None or several
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
REPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
User Guide Max Secure Recovery CD/USB creation
User Guide Max Secure Recovery CD/USB creation This user guide describes how you can go about creating an emergency bootable Max Secure Recovery CD / USB. You can boot from this CD/USB into a Windows environment
Operating Systems Forensics
Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!
Computer Forensic Tools. Stefan Hager
Computer Forensic Tools Stefan Hager Overview Important policies for computer forensic tools Typical Workflow for analyzing evidence Categories of Tools Demo SS 2007 Advanced Computer Networks 2 Important
QUICK RECOVERY FOR RAID
Quick Recovery for RAID Features File Systems Supported Who suffers most Recovery Modes De-Stripper File Recovery Frequently Asked Questions QUICK RECOVERY FOR RAID Quick Recovery for RAID 0, RAID 5. Quick
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline NTFS File System Formats File System Driver Architecture Advanced Features NTFS Driver On-Disk Structure (MFT,...)
Lab III: Unix File Recovery Data Unit Level
New Mexico Tech Digital Forensics Fall 2006 Lab III: Unix File Recovery Data Unit Level Objectives - Review of unallocated space and extracting with dls - Interpret the file system information from the
HOST BASED INTERNAL INTRUSION DETECTION AND PREVENTION SYSTEM.
HOST BASED INTERNAL INTRUSION DETECTION AND PREVENTION SYSTEM. 1 Rane Ankit S., 2 Waghmare Amol P., 3 Payal Ashish M., 4 Markad Ashok U, 3 G.S.Deokate. 1,2,3,4 Department of Computer Engineering SPCOE
Outline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik 2 Hardware Basics Win2K File System Formats Sector: addressable block on storage medium usually 512 bytes (x86 disks) Cluster:
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
A Short Introduction to Digital and File System Forensics
Antonio Barili Lab Dept. of Industrial and Information Engineering University of Pavia (Italy) [email protected] Every contact leaves a trace Culprit Scene Victim Edmond Locard (1877-1966) 2015 -
introducing COMPUTER ANTI FORENSIC TECHNIQUES
introducing COMPUTER ANTI FORENSIC TECHNIQUES COMPUTER FORENSIC DATA RECOVERY TECHNIQUES AND SOLUTIONS WORKSHOP Executive Summary Computer Forensics, a term that precisely identifies the discipline that
Survey of Disk Image Storage Formats
Survey of Disk Image Storage Formats Version 1.0 Common Digital Evidence Storage Format Working Group Digital Forensic Research Workshop September 1, 2006 Digital data that could be used as evidence are
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform
Int'l Conf. Security and Management SAM'15 3 Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform R. Malik 1, N. Shashidhar 1, and L. Chen 2 1 Department of Computer Science,
Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.
Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed
COMPREHENSIVE STUDY OF DIGITAL FORENSICS
COMPREHENSIVE STUDY OF DIGITAL FORENSICS Jatinder kaur, Gurpal Singh SMCA, Thapar University, Patiala-147004, India [email protected], [email protected] Abstract This paper presenting the review
Active@ Password Changer for DOS User Guide
Active@ Password Changer for DOS User Guide 1 Active@ Password Changer Guide Copyright 1999-2014, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form
File Server Migration
2 June 2014, HAPPIEST MINDS TECHNOLOGIES File Server Migration Author Suresh Elumalai SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY. Copyright Information This document is an
Unix/Linux Forensics 1
Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,
Capturing a Forensic Image. By Justin C. Klein Keane <[email protected]> 12 February, 2013
Capturing a Forensic Image By Justin C. Klein Keane 12 February, 2013 Before you Begin The first step in capturing a forensic image is making an initial determination as to the
Breaking Forensics Software: Weaknesses in Critical Evidence Collection
Breaking Forensics Software: Weaknesses in Critical Evidence Collection Tim Newsham - Chris Palmer - Alex Stamos -
Computer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
File System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
Course Title: Computer Forensic Specialist: Data and Image Files
Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute
ACTIVE@ UNDELETE 7.0 USER GUIDE
ACTIVE@ UNDELETE 7.0 USER GUIDE COPYRIGHT Copyright 27, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
Recovery of deleted files on a TrueCrypt volume March 23, 2010 rationallyparanoid.com
Recovery of deleted files on a TrueCrypt volume March 23, 2010 rationallyparanoid.com TrueCrypt is a well-known and widely used open source application used for encryption. However at the bottom of their
Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec
Intelligent disaster recovery Dell DL backup to Disk Appliance powered by Symantec The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry s only fully integrated
Open Source Data Recovery
Open Source Data Recovery Options and Techniques CALUG MEETING October 2008 !! Disclaimer!! This presentation is not sponsored by any organization of the US Government I am here representing only myself
Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
Detection of Data Hiding in Computer Forensics. About Your Presenter
Detection of Data Hiding in Computer Forensics NEbraskaCERT Conference August 22nd, 2008 James E. Martin CISSP, JD About Your Presenter 2008-Present: Security Engineer, West Corporation 2004-2008: Senior
