THE file extension.jpg is most commonly referred to as
|
|
|
- Brett McDowell
- 10 years ago
- Views:
Transcription
1 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE Digital Still Camera Forensics Kevin Cohen Abstract In many instances computer forensic practitioners come across digital photographs within an investigation. Examples include law enforcement examining computers for child pornography, intellectual property disputes involving proprietary digital images, or file recovery for individuals who have lost personal photos due to accidental deletion or electronic media corruption. More technical examples include locating steganographic images and digital rights management. Photographic images residing on electronic media most likely originated from digital still cameras ( DSC ). To identify the origin of a DSC image, a forensic examiner should understand the characteristics of a DSC image. This paper describes some of the characteristics associated with DSC images. Knowledge allows a forensic practitioner to isolate specific attributes within a DSC image to identify exact replicas, derivates, or additional images that fall within a particular group set. This paper further outlines some open source software that can be used to extract images based upon the characteristics of a DSC image. Index Terms Digital Still Camera, JPEG Metadata, JFIF Metadata, DCF Metadata, Exif Metadata, Linux Forensics, Recover pictures, Recover digital photos, Digital photo forensics, DSC, Jpeg header, Exif header, USB, DSC images I. A BRIEF HISTORY OF THE DIGITAL STILL IMAGE THE file extension.jpg is most commonly referred to as the JPEG file format - a lossy 1 compression method that takes advantage of the limitation of the human eye. (ITU-T T81) In 1983, the International Organization for Standardization ( ISO ) started to look into methods for adding high resolution graphics and pictures onto computers (at that time text based terminals). Three years later, the Joint Photographic Experts Group ( JPEG ) was formed by the International Telegraph and Telephone Consultative Committee ( CCITT ) and ISO/IEC to develop a standard procedure for encoding grayscale and color images. JPEG published Information Technology - Digital Compression and Coding of Continuoustone Still images - Requirements and guidelines, otherwise known as the JPEG specifications for encoding and decoding compressed images, which is referenced as ISO or ITU-T T.81 (ITU stands for International Telecommunication Union, which is an agency within the United Nations. CCITT is a part of the ITU). In 1992, Eric Hamilton wrote JPEG File Interchange Format ( JFIF ) which calls for some metadata information regarding the JPEG images to be shared outside of the entropy encoded data segments. This additional information allows 1 Lossy - The opposite of lossy is lossless. The term lossy is used to express slight degradation from the original image. Since the human eye does not notice sharp changes in brightness of color, lossy compression can alter images with little or no visual effect. JPEG images to be shared and recognized amongst foreign applications. In 1996, Digital Still Camera Image File Format Standard (Exif: Exchangeable image file format) was published, which is referenced as EXIF Format ISO [2] by Japan Electronic Industry Development Association ( JEIDA ) Also in 1996, a competing file format standard was published by Eastman Kodak, FlashPix Format Specification. Though FlashPix was adopted by Eastman Kodak in collaboration with Hewlett-Packard, Microsoft, and Live Picture, it did not gain wide acceptance with some of the other manufacturers of DSC s. In 1997, Canon published CIFF Specification on Image Data File to specify its camera image file format ( CIFF ). CIFF was intended to become a standard file system to be adopted for removable media used to store images by DSCs, such as SmartMedia, Compact Flash Disks, Memory Sticks, or San Disks. In 1998, JEIDA wrote Design rule for Camera File system ( DCF ), a FAT based file system which is now the generally accepted format and replaced the CIFF architecture. In 2002, Japan Electronics and Information Technology Industries Association ( JEITA ), formerly JEIDA, published Exchangeable image file format for digital still cameras: Exif Version 2.2. Prior to the development of inexpensive DSCs, scanners were used on a much larger scale. In 1986, the Aldus Corporation wrote the TIFF specification. TIFF is the standard for scanning an image without compression. Much of the Exif metadata comes from the document TIFF Revision 6.0 published by Aldus in There are other digital image standards such as JPEG2000, JPEG-LS, and SPIFF; however, for the purpose of this paper, we will not be describing them. As of the writing of this article, Exif is the most current standard for DSCs. Exif incorporates the best features of JPEG, JFIF, TIFF, and DCF while allowing for backwards compatibility of FlashPix, CIFF, and other proprietary formats. A. Analysis of metadata in a.jpg Image The term metadata refers to data about data. The most common interpretation of metadata is the information found within the directory entries of a FAT file system that describes the cluster chains associated with file data, or more recently the Master File Table ( MFT ) Entry describing a data portion of a file within an NTFS partition. The MFT Entry describes the creation time, modified time, accessed time, written time, file name, file extension, file size, location of file data, owner, file permissions, and other attributes associated with the file data.
2 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE TABLE I JPEG MARKER CODE ASSIGNMENTS USED IN EXIF (JEITA CP-3451) Originally JPEG was developed for the compression techniques used to allow compression of 10:1 to 20:1 without visible loss. The entropy encoded compression and decompression was to be performed within a single application and thus no extra information about the data was necessary. For extensibility, Exif includes many additional attributes that describe the entropy encoded data within the data portion of the file. Information found within the data portion of an Exif file includes date and Time picture was taken, make & model of camera, artist or owner of camera, F-stop, aperture and ISO settings, as well as many other camera settings including GPS information where the picture was taken. B. JPEG Metadata JPEG uses either Huffman coding or arithmetic coding compression to create a lossy representation of an image. The encoded data is separated into entropy encoded segments of the JPEG file. These entropy segments are separated by two byte markers. A marker consists of two bytes, with the first byte being the hexadecimal value FF. Table 1 is a list of marker code assignments that can be used to identify segments within DSC images that originated from the JPEG image standard. Some markers to become familiar with are the start of image ( SOI ) and end of image ( EOI ). Hex value FF D8 represents the SOI of a JPEG image. Hex value FF D9 represents the EOI of a JPEG image. If a file conforms to the JPEG standards, it will contain a header signature that starts with the SOI marker FFD8 and ends with a footer of the EOI marker FFD9. Entropy encoded data segments sometimes have compression values that equate to FF. In such an instance, to distinguish the encoded data from a segment marker, the FF byte will be followed by another byte equal to 0 or hexadecimal representation of 00. Thus, if you see the two byte hexadecimal value FF 00 within a JPEG image, you should realize it is part of an entropy encoded segment and not a marker. Thumbnails within Exif files may use a JFIF header and footer. JFIF appends an APP0 segment directly after the SOI. The APP0 segment provides the information relating to version number, x and y pixel density, pixel aspect ratio, and an optional thumbnail. If a file conforms to the JFIF standards, then it will contain a header signature that starts with the FF D8 FF E0 xx xx 4A and ends with a footer of FF D9. Hexadecimal representation ASCII representation FF D8 FF E0 xx xx 4A ÿøÿá..jfif. FF D8 represents the SOI FF EO represents the APP0 xx xx is an unknown two bytes representing the length of the APP0 segment 4A represents a signature JFIF terminated by 00 D. DCF Metadata Design rule for Camera File system ( DCF ) is a FAT 16 based file system. The metadata associated with DCF can be found within the data entry portion, specifically the naming convention. DCF uses only upper case alpha numeric characters and the underscore symbol (A-Z, 0-9, ). DCIM (DCF Camera Images) is the DCF image root directory. Directories within the root directory consist of eight characters. The first three characters are digits equaling 100 or higher. The last five characters are upper case alpha characters. An example of a DCF compliant directory name would be 101ABCDE. File names consist of 8 characters. The first four characters are alpha (including the ), and the last four are numerical 0001 or greater. An example of a DCF compliant file name is ABCD0001.JPG. In Windows this particular file might look like: D:\DCMI\101ABCDE\ABCD0001.JPG E. Exif Metadata Exchangeable image file format has APP1 and APP2 application segments and uses some metadata tags associated with the TIFF tags. The Image File Directory ( IFD ) is where the metadata is stored within Exif file. IFD is split into three sections, Exif IFD, GPS IFD, and Interoperability IFD. The 0th IFD has tags associated with the primary image. The 1th IFD has tags associated with the thumbnail. Exif files contain distinctive headers that start with the SOI and are followed by APP1. If a file conforms to the Exif standards, it will contain a header signature that starts with the FF D8 followed by APP1 FF E1 xx xx and ends with a footer of FF D9. C. JFIF Metadata JPEG File Interchange Format adds some additional information to the JPEG image which enables foreign applications to read and view the contents of a compressed JPEG image.
3 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE TABLE II METADATA TAGS USED IN EXIF (JEITA CP-3451) Interoperability IFD Attached Information Relating to Interoperability InteroperabilityIndex Hexadecimal representation ASCII representation FF D8 FF E1 xx xx ÿøÿá..exif. FF D8 represents the SOI FF E1 represents the APP1 xx xx is an unknown two bytes representing the length of the APP1 segment represents a signature JFIF terminated by 00 APP1 appears at the beginning of an Exif file. APP1 contains the thumbnail and cannot be more that 64 Kb in size. Exif files allow for an optional APP2 which contains FlashPix extensions and has a signature FF E2 xx xx Hexadecimal representation ASCII representation FF E2 xx xx ÿøÿâ..fpxr. II. FORENSIC ANALYSIS ON DIGITAL STILL CAMERAS A. Preservation Prior to analysis, an examiner should understand that overwriting data could corrupt images contained within a device. An examiner should adhere the same level of precaution as if the data were part a criminal investigation. Meaning, it is the investigator s responsibility to preserve the evidence and maintain a chain of custody. To accomplish this task, the investigator should obtain write protection, bit by bit imaging software, and a method of demonstrating that neither the original data nor its copy was altered or overwritten during the copy process. To achieve these goals, this paper will focus on some open source Linux tools; however, many other commercial or non-commercial products are available. Typically, DSCs utilize some form of removable media which store the digital images or other file data such as SmartMedia, CompactFlash, Memory Stick, Secure Digital ( SD ), or xd-picture. Images on flash memory cards need to be DCF compliant for cameras to identify the DSC pictures. Extra directories and files may exist (even other partitions) on the flash media that are not visible to the DSC. Some of the newer digital cameras have external cables that attach the camera to a computer. These attachments do not allow for the DSC to be read as a TTY terminal device for forensic copying. Thus, a memory card reader is necessary. It is possible to purchase an inexpensive universal memory card reader that reads most common cards. These memory card readers are typically attached to the computer via a USB port. 1) Write Block Protection: Some of the newer flash media have write blocking switches. If an evidence device has a write blocking switch, it should be activated for any duplication or investigative process. Unfortunately, most flash media do not have a write block switch, and thus other means are necessary for protecting valuable data from being overwritten. With IDE hard drives, it is possible to use DOS based imaging utilities such as EnCase for DOS that will allow for TABLE III METADATA TAGS USED IN EXIF (JEITA CP-3451) EXIF IFD Tags Relating to Version ExifVersion FlashpixVersion Tags Relating to Image Data Characteristics ColorSpace Tags Relating to Image Configuration ComponentsConfiguration CompressedBitsPerPixel PixelXDimension PixelYDimension Tags Relating to User Information MakerNote UserComment Tags Relating to Related File Information RelatedSoundFile Tags Relating to Date and Time DateTimeOriginal DateTimeDigitized SubSecTime SubSecTimeOriginal SubSecTimeDigitized Tags Relating to Picture-Taking Conditions ExposureTime Fnumber ExposureProgram SpectralSensitivity ISOSpeedRatings OECF ShutterSpeedValue ApertureValue BrightnessVAlue ExposureBiasValue MaxApertureValue SubjectDistance MeteringMode LightSource Flash FocalLength SubjectArea FlashEnergy SjpacialFrequencyResponse FocalPlaneXResolution FocalPlaneYResolution FocalPlaneResolutionUnit SubjectLocation ExposureIndex SensingMethod FileSource SceneType CFAPattern CustomRendered ExposureMode WhiteBalance DigitalZoomRatio FocalLengthIn35mmFilm SceneCaptureType GainControl Contrast Saturation Sharpness DeviceSettingDescription SubjectDistanceRange Other Tags ImageUniqueID software write block protection. Unfortunately, USB drivers are not available for these DOS based tools, and an alternate method of imaging flash media is necessary. With Windows based imaging (other than DOS), write blocking hardware is
4 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE TABLE IV METADATA TAGS USED IN EXIF (JEITA CP-3451) TIFF Tags relating to image data structure ImageWidth ImageLength BitsPerSample Compression PhotometricInterpretation Orientation SamplesPerPixel PlanarConfiguration YCbCrSubSampling YCbCrPositioning XResolution YResolution Tags relating to recording offset StripOffsets RowsPerStrip JPEGInterchangeFormat JPEGInterchangeFormatLength Tags relating to image data characteristics TransferFunction WhitePoint PrimaryChromaticities YCbCrCoefficients ReferenceBlackWhite Other Tags DateTime ImageDescription Make Model Software Artist Copyright TABLE V METADATA TAGS USED IN EXIF (JEITA CP-3451) GPS IFD Tags Relating to GPS GPSVersionID GPSLatitudeRef GPSLatitude GPSLongitudeRef GPSLongitude GPSAltitude GPSTimeStamp GPSSatellites GPSStatus GPSMeasureMode GPSDOP GPSSpeedRef GPSTrackRef GPSTrackRef GPSImgDirectionRef GPSImgDirectionRef GPSMapDatum GPSDestLatitudeRef GPSDestLatitude GPSDestLongitudeRef GPSDestLongitude GPSDestBearingRef GPSDestBearing GPSDestDistanceRef GPSDestDistanceRef GPSProcessingMethod GPSAreaInformation GPSDateStamp GPSDifferential Fig. 1. fdisk example necessary for ensuring that the evidence is not overwritten. (Windows XP does have a registry key that can be added for write blocking. This method of protection may work; however, it is not recommended because the software write block is not initiated between the BIOS and the operating system.) A list of tested write blocking hardware can be found on the Computer Forensic Tool Testing website, part of the National Institute of Standards and Technology ( NIST ). write block.htm A less expensive technique is to utilize software write block protection of an operating system that has control over the read and write functions of its devices. Linux allows for such control. In fact, Guidance Software supports the use of Linux software write block protection for acquiring devices as described in its article How to Acquire a Drive Safely found on its website com/support/articles/acquire safely.aspx. In its article, Guidance Software suggests the use of a nonauto mount distribution of Linux. By attaching an external device or card reader to the USB port, the device will not be automatically mounted. Read calls can be manually initiated to the device without altering or adding additional information. Setting up a Linux forensic laptop or workstation can be laborious, yet rewarding. An easier and faster method is to use a bootable Linux CD that is customized for forensics analysis. A forensic bootable Linux CD can be used on just about any computer, allowing it to become a forensic laptop or workstation. A bootable Linux CD flavor that was recommended by the SANS Institute is Helix, Helix is a bootable Linux CD that is customized for forensics and incident response based on the Knoppix Live Linux CD. 2) Acquisition and Verification using Linux: Within Linux there are a few programs that a forensic examiner should become familiar with during the acquisition stage of an investigation: man, fdisk, mount, dd, and md5sum. The command man is used to view manual pages, similar to a help file. If any questions arise about any of the commands, type man fdisk, man mount, man dd, or man md5sum. To escape out of a man page, type q for quit. The command fdisk is a partition table manipulator for Linux. The program fdisk is used to identify the naming convention of the suspect and target device. By typing fdisk -l, the program fdisk will display devices with their associated partition tables as seen in figure 1. The first SCSI device (small computer system interface) associated with a Linux operating system is /dev/sda. Since a USB device
5 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE is viewed as a SCSI device by Linux, this paper will be referring to /dev/sda as the memory card, and /dev/sda1 as the first partition on the memory card. In figure 1, /dev/sda can be identified as the DSC flash memory card, since DSC images are both DCF compliant by the partition /dev/sda1 system type FAT16 and of the relatively small size of 1015 MB. If /dev/sda1 is imaged instead of /dev/sda, then only the first partition is copied and not the entire device. Also, note /dev/sda is not always the name given to the memory card. /dev/sda could have been given to another SCSI device such as a SATA hard drive or other attached device. Thus the memory card may have a different name such as /dev/sdb or /dev/sdc, etc. The only way to distinguish the naming convention is to interpret the output generated by fdisk. The command mount is used to mount a partition to a directory placeholder. Assume that the target drive and partition is /dev/hdc1 (the device /dev/hdc1 is equivalent to the first partition of the Secondary master IDE drive). To attach the partition to the directory /mnt/hdc1 use the command: #mount /dev/hdc1 /mnt/hdc1 Other options can be used with the mount command such as -r for read only. To obtain more information on mount, please refer to the man page. The command dd is an extremely powerful copy program found on most versions of Unix or Linux. The command dd can copy a file or device to another file or device. The output generated by dd is extremely versatile as it is understood by most, if not all forensic examining tools, commercial or open source. Figure 2 assumes the input device (the flash memory card) is /dev/sda, the output directory is /mnt/hdc1, and the target output file is media.img. The command dd uses if as the input file and of as the output file. Additional options such as bs=512 conv=noerror,notrunc,sync ensure that the byte count for read and write is in chunks of 512 bytes, and if errors occur while copying, the process continues and pads spaces where errors occur. To demonstrate the integrity of the image, the command md5sum can be used to generate a hash value of the image file and device. To obtain the md5 hash value of media.img and output to a file meida.md5, type the command: #md5sum media.img >media.md5 The command md5sum media.img will output the hash value of the image file media.img. The >media.md5 will redirect the hash value output to a new file media.md5. Once the md5 hash value is obtained, verification can be performed on the flash media device by the command md5sum /dev/sda. The results of the md5 hash for the flash media device should match the image file. Some variants of dd have extended its capabilities to perform more efficient forensic imaging operations such as dcfldd, the Department of Defense computer forensics lab ( DCFL ) version of dd; however a strong knowledge of dd is essential. Fig. 2. B. Analysis dd example It is common to find DSC images on a computer hard drive. Images are transferred to a computer hard drive via a camera attachment, , CD/DVD ROM, external hard drive, thumb drive, network connection, web browsing, or by other means including attaching a memory card or camera. Within the Analysis phase we attempt to figure the What, Where, When, Why, and How! What digital images exist? Where did they originate from? When were the images created or when were the images transferred? Why were the images transferred, intentionally or unintentionally? How were the images transferred? Some of these answers can be found through extension analysis, header analysis, registry analysis, carving, metadata analysis, and hash analysis. 1) Extension Analysis: An examiner should use forensic analysis software such as EnCase, FTK, ProDiscover or Filehound to perform a search for all files that contain the file extension(s) associated with the type of DSC image.jpg. Such software has the ability to locate and group directory metadata associated with DSC images contained in the FAT or MFT including metadata associated with deleted files. 2) Signature Analysis: Why would some DSC images not contain a.jpg extension? A user could have intentionally altered an extension to hide the file. Macintosh OS does not utilize file extensions the same way as Windows and does not require an extension. Programs may give images other extension naming conventions. In any instance, a signature analysis search should be conducted to locate all files with matching DSC image headers. FF D8 is the header for both JPEG and Exif files. If a file starts with FF D8, most likely it is a JPEG or DSC image. Other areas to consider for locating DSC images are within compressed files, encrypted files, and s. 3) Registry Analysis: A record of all the devices detected since the system was installed is recorded under the HKLM\SYSTEM\CurrentControlSet\Enum registry key. (Russinovich & Solomon, p598) Within Microsoft Windows 2003, 2000 or XP operating systems, this registry key will list specific camera devices or flash media information such as Manufacturer, Location information, and HardwareID that were attached. 4) Carving Exif Images and Thumbnails: Once all the digital images are found within the allocated clusters on a device, it is time to search for the unallocated clusters and swap space. Within a partition, clusters are allocated or unallocated. Allocated clusters belong to a file. Unallocated clusters are no longer part of a file; however, they still may contain data. The basic building block of a file is a cluster. The clusters comprising a file are typically written in consecutive clusters. If a file did exist on a device it most likely was written
6 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE Fig. 5. carving rule for Exif Fig. 3. Fig. 4. mmls example dd example The tool dls can be used to extract the unallocated clusters from media1.img into a file media1.dls by typing dls media1.img >media1.dls Once the data set of unallocated clusters is available, the tool foremost can be used. The command to carve files from media1.dls is: #foremost -v -q -c ourfile.conf -o TEMPOUT media1.dls consecutively. In some instances where a file is fragmented, the next cluster in its cluster chain is written to the next available cluster or set of clusters. Thus, if the beginning or SOI of a digital image file is found, the remaining clusters should be relatively close. Carving is a technique used to extract segment(s) of data within a larger body of data. Rules for carving are normally based on the header and footer being the start and stop points to carve the data segments. Rules also could be based on a header and a fixed length. There are many different carving tools; however, this paper will discuss the open source tool foremost, originally developed by the United States Air Force Office of Special Investigations and the Center for Information Systems Security Studies and Research. Current versions of foremost can be found at Unallocated clusters are a large body of data that is a great data set to examine. Forensic software programs should have the ability to export the unallocated clusters to a file. Sticking with open source, a good tool to extract the unallocated clusters from a partition is dls. The program dls is a tool that can be found within Sleuth Kit and is maintained by Brian Carrier at For dls to work it has to read a partition file not a device file. The tool mmls can be used to obtain the key information on how to extract a partition into a file. The program mmls is another tool developed by Carrier and found within Sleuth Kit. In the dd example from figure 2, the device is media.img. The tool mmls describes the file partition(s) within an image file. Figure 3 describes the FAT16 partition within media.img starts at sector 249 and has a length of sectors. To extract the FAT16 partition using dd, options bs, skip, and count should be used. In figure 4, the byte count for read and write process is in chunks of 512 bytes (one sector). The copy process starts after skipping 249 sectors (0-248) and the copy process occurs for sectors. Another method of extracting the FAT16 partition into the media1.img file would have been to copy the first partition out of the original DSC flash memory card /dev/sda1 found from the fdisk -l command in figure 1. The command dd if=/dev/sda1 of=media1.img img bs=512 conv=noerror,notrunc,sync will create an identical file to the one created from command in figure 4, possessing the same md5 value. Where: -v = verbose -q = quick (Searches for the header in the beginning of a sector. Most files start in the beginning of a sector; however when searching a compressed file or a cache file, the header might not start at the beginning of a sector.) -c = configuration file (this is a file that should be edited to search only what is desired. The default configuration file is foremost.conf. The file foremost.conf has too many file structures to search for that might confuse results.) -o = output directory The default configuration file foremost.conf can be located in the source directory of foremost, or it might have been copied to the /usr/local/etc/ directory during installation. The file foremost.conf is a good reference as it describes how to write rules for foremost. Each foremost rule set is written on one line. Attributes of a foremost rule include the extension, the maximum size, header and footer. A foremost rule that will carve out Exif image files is: This rule described in figure 5 should be added to the outfile.conf configuration file for the foremost example to work The configuration rule in figure 5 uses 2,000,000 bytes as the size, which is close to 2MB - a little larger than an Exif file should be. In the Exif header, \x is the representation for a hexadecimal character and? is a wild card character. \?\? is the two byte value that represents the length. The foremost rule also has a footer. However, if we leave the footer out, foremost will extract 2,000,000 bytes, or, if the footer is not found, foremost will extract 2,000,000 bytes. The REVERSE value is necessary after the footer, as it implies to start looking for the footer value 2,000,000 bytes after the header and work backwards. The reason for using REVERSE is the footer for both the Exif File and the Thumbnail is FF D9. If the REVERSE value was left out, the carving tool would carve from the beginning of the Exif header to the end of the thumbnail image (APP1 contains the thumbnail, and APP1 is 64Kb or less). Another method of extracting the entire Exif image would be to leave the footer out. If the footer is left out, the foremost carving tool will extract 2,000,000 bytes, a file larger than the Exif image. The extra data will be ignored by an image viewer and will appear as normal. To only extract the thumbnail image, the foremost rule
7 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE would be: jpg y \xff\xd8\xff\xe0\?\?\x4a\x46\x49\x46\x00\xff\xd9 There are at least two good reasons to examine thumbnail images. The thumbnail image might be different from the original image. Also, the thumbnail image is much smaller than an Exif file and might have a better chance for full recovery without corruption. Besides unallocated clusters, swap files and cache files such as Linux swap partition, Windows swap file pagefile.sys or AOL cache file cache.db are good spots to carve for images. 5) Exif Metadata: Table 2 described the metadata that could be associated with a DSC image. The program exiftool is an open source tool written by Phil Harvey that examines the metadata of Exif files. The exiftool can be downloaded from or phil/exiftool/. Since exiftool is written cleanly and published in open source, it would be easy to develop queries specific to an investigation. The metadata from table 2 can be extracted from all of the Exif images found on a device or devices (if the metatag exists). Thus, information such as date and time picture was taken, and GPS location of where picture was taken, could be extracted for investigation. 6) Md5 hash sets: Within the field of child pornography or intellectual property, hash sets can be used to identify an exact match for an image. Unfortunately, if a DSC image is altered slightly from editing attributes, the hash value will differ. Also, when an image is decompressed and saved recompressed again without any alteration, the saved file will most likely result in a lossier image, generating a hash value differing from the original. It may be better to perform md5 hash analysis on the thumbnail image as apposed to the entire image. Steven Murdoch demonstrates in his blog / that some image rendering programs do not alter the thumbnails. 7) DCF Structures: DSCs contain file structures that are DFC compliant. When a DSC is attached to a computer, chances are the directory of the DSC camera is read and files are copied or linked. Programs such as image viewers, image manipulators or antivirus may document touched files within a temporary file, log file or RAM. Evidence of DCF files and directories could remain in areas such as log files, the swap file, or unallocated clusters. Keyword searches for DCF files and directory structures could reveal some information about DSCs and DSC images that were attached or transferred to a computer. DCMI - root directory for DCF ###???? - Directories that are DCF compliant are eight characters. The first three are numbers and the last five are alpha characters A-Z.????#### - Files that are DCF compliant are eight characters (before an extension - usually.jpg). The first four are alpha characters A-Z including and the last four are numbers. III. CONCLUSION While carving, some of the DSC images may have corruption within the visual representation of the image. Since an image is written one horizontal line at a time from left to right, it would be possible to reconfigure a broken image by developing a program that incorporates a hex editor with a visual representation of the image. Like Wireshark does to the IP protocol, an editor could isolate Exif segments visually with the DSC image. This would allow an investigator to piece together a corrupt image by easily cutting and pasting fragmented data. This also would allow an investigator to easily cut identifying tags for hex based searches and for screen shots during trial. A Stegonographic program, like any program, leaves a footprint. Many of the stego programs could be better identified within the metadata and/or a histogram analysis. There should be a repository of footprints left by stegonographic tools, such as the MD5 hash values of common files found within the National Software Reference Library at for investigators and researchers. REFERENCES [1] Aldus Corporation, TIFF Revision 6.0, June [2] Canon Inc., CIFF Specification on Image Data File, December [3] CCITT T.81, Information technology Digital compression and coding of continuous-tone still images Requirements and guidelines, September [4] C-Cube Microsystems, JPEG File Interchange Format Version 1.02, September 1, [5] B. Carrier, File System Forensic Analysis. Pearson Education Inc., [6] M. Dornseif. EXIF Thumbnail in JPEG images, December [Online]. Available: [7] P. Harvey. Read, Write and Edit Meta Information!, [Online]. Available: phil/exiftool/. [8] Guidance Software, How to Acquire a Drive Safely, [Online]. Available: acquire safely.aspx. [9] JEITA JEIDA , Design rule for Camera File System, Version 1.0, December [10] JEITA JEIDA , Digital Still Camera Image File Format Standard (Exchangeable image file format for Digital Still Camera:Exif), December [11] JEITA CP-3451, Exchangeable image file format for digital still cameras: Exif Version 2.2, April [12] JHOVE, JPEG-hul Module, May [Online]. Available: http: //hul.harvard.edu/jhove/jpeg-hul.html. [13] M.E. Russinovich and D.A. Solomon, Windows Internals - Microsoft Windows Server 2003, Windows XP, and Windows Microsoft Press, [14] T. Tachibanaya, Description of Exif file format, February [Online]. Available: tsuruzoh/computer/ Digicams/exif-e.html. [15] M. Wandel, Exif Jpeg header and thumbnail manipulator program, January 11, [Online]. Available: mwandel/ jhead/. [16] Exchangeable image file format, Wikipedia the Free Encyclopedia, [Online]. Available: image file format. Kevin Cohen Kevin Cohen is an international computer forensics consultant. He is president of Data Triage Technologies, LLC. ( a computer forensics and electronic discovery firm based in Los Angeles.
8 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE Mr. Cohen has worked in the field of computer forensics since He is qualified as a computer forensics expert by multiple courts, has been appointed as a neutral computer forensics expert, and has given expert testimony in civil cases involving billions of dollars. Mr. Cohen obtained his Bachelors of Arts in economics at the University of Colorado. He is a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Global Information Assurance Certification ( GIAC ) Certified Intrusion Analyst (GCIA), GIAC Certified Forensic Analyst (GCFA), and EnCase Certified Examiner (EnCE).
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
RaspiCam Documentation
RaspiCam Documentation July 2013 This document describes the use of the three Raspberry Pi camera applications as of July 2013. There are three applications provided: raspistill, raspivid and raspistillyuv.
Design rule. for. Camera File system
JAPAN ELECTRONIC INDUSTRY DEVELOPMENT ASSOCIATION STANDARD Design rule for Camera File system Version 1.0 JEIDA-49-2-1998 Established December 1998 JAPAN ELECTRONIC INDUSTRY DEVELOPMENT ASSOCIATION Design
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
White Paper. Kofax Implementation of TIFF with JPEG Compression
White Paper Kofax Implementation of TIFF with JPEG Compression June 2003 Table of Contents Introduction... 3 Default TIFF-JPEG Storage Filter... 3 Default Writing of a TIFF-JPEG File... 3 Default Reading
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Where is computer forensics used?
What is computer forensics? The preservation, recovery, analysis and reporting of digital artifacts including information stored on computers, storage media (such as a hard disk or CD-ROM), an electronic
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
Capturing a Forensic Image. By Justin C. Klein Keane <[email protected]> 12 February, 2013
Capturing a Forensic Image By Justin C. Klein Keane 12 February, 2013 Before you Begin The first step in capturing a forensic image is making an initial determination as to the
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
Digital Forensics Tutorials Acquiring an Image with Kali dcfldd
Digital Forensics Tutorials Acquiring an Image with Kali dcfldd Explanation Section Disk Imaging Definition Disk images are used to transfer a hard drive s contents for various reasons. A disk image can
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE Jesús Alexander García Luis Alejandro Franco Juan David Urrea Carlos Alfonso Torres Manuel Fernando Gutiérrez UPB 2012 Content INTRODUCTION... 3 OBJECTIVE 4 EVIDENCE
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
Computer Forensic Tools. Stefan Hager
Computer Forensic Tools Stefan Hager Overview Important policies for computer forensic tools Typical Workflow for analyzing evidence Categories of Tools Demo SS 2007 Advanced Computer Networks 2 Important
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Introduction to File Carving
By Christiaan Beek Principal Security Consultant McAfee Foundstone Professional Services Table of Contents Overview 3 File Recovery Versus Carving 3 Fragmentation 5 Tooling 5 An example of using Photorec
RECOVERING FROM SHAMOON
Executive Summary Fidelis Threat Advisory #1007 RECOVERING FROM SHAMOON November 1, 2012 Document Status: FINAL Last Revised: 2012-11-01 The Shamoon malware has received considerable coverage in the past
Lab V: File Recovery: Data Layer Revisited
New Mexico Tech Digital Forensics Fall 2006 Lab V: File Recovery: Data Layer Revisited Objectives - Perform searches based on file headers - Data Carving with Foremost - Zip password recovery Procedures
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Microsoft Vista: Serious Challenges for Digital Investigations
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2008 Microsoft Vista: Serious Challenges for Digital Investigations Darren R. Hayes and Shareq Qureshi Seidenberg School of
Recovers Lost or Deleted Pictures from: Any Memory Card Type Any Brand Using Any Mass Storage Reader
Recovers Lost or Deleted Pictures from: Any Memory Card Type Any Brand Using Any Mass Storage Reader Reader and Media not included Image Recovery - Recovers lost or deleted image files (JPEG, TIFF and
Digital Forensics Tool Testing Image Metadata in the Cloud. Philip Clark
Digital Forensics Tool Testing Image Metadata in the Cloud Philip Clark Master s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
Computer Forensics Principles and Practices
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 7: Investigating Windows, Linux, and Graphics Files Objectives Conduct efficient and effective investigations of Windows
Basic File Recording
PART NUMBER: PUBLICATION DATE: 23. October 2015 Copyright 2014 2015 SightLine Applications, Inc. Hood River, OR All Rights Reserved Summary In addition to performing digital video stabilization, object
Xerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Physical Extraction Physical extraction involves either Removing chips from circuit board
Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)
s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix
CCE Certification Competencies
CCE Certification Competencies May 10, 2012 Page 1 The Certified Computer Examiner (CCE) has evolved into one of the most desired certifications in the computer forensics industry. The certification is
New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer
New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good
USB 2.0 Flash Drive User Manual
USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
Survey of Disk Image Storage Formats
Survey of Disk Image Storage Formats Version 1.0 Common Digital Evidence Storage Format Working Group Digital Forensic Research Workshop September 1, 2006 Digital data that could be used as evidence are
Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics
Digital Forensics Lecture 3 Hard Disk Drive (HDD) Media Forensics Current, Relevant Topics defendants should not use disk-cleaning utilities to wipe portions of their hard drives before turning them over
Computer Forensics using Open Source Tools
Computer Forensics using Open Source Tools COMP 5350/6350 Digital Forensics Professor: Dr. Anthony Skjellum TA: Ananya Ravipati Presenter: Rodrigo Sardinas Overview Use case explanation Useful Linux Commands
Installing a Second Operating System
Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
How To Do Digital Forensics
Enterprise Risk Management Miami, FL Digital Forensics Risk Management and Information Systems Security Consulting Services January 2011 UMiami alumnus Bachelors: Information Systems and Marketing MS Computer
Recovering Data from Windows Systems by Using Linux
Recovering Data from Windows Systems by Using Linux Published by the Open Source Software at Microsoft, May 27 Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab Most
Lab III: Unix File Recovery Data Unit Level
New Mexico Tech Digital Forensics Fall 2006 Lab III: Unix File Recovery Data Unit Level Objectives - Review of unallocated space and extracting with dls - Interpret the file system information from the
ELECTRONIC DOCUMENT IMAGING
AIIM: Association for Information and Image Management. Trade association and professional society for the micrographics, optical disk and electronic image management markets. Algorithm: Prescribed set
Open Source Data Recovery
Open Source Data Recovery Options and Techniques CALUG MEETING October 2008 !! Disclaimer!! This presentation is not sponsored by any organization of the US Government I am here representing only myself
GUIDELINES FOR HANDLING IMAGE METADATA
GUIDELINES FOR HANDLING IMAGE METADATA Version 2.0 November 2010 www.metadataworkinggroup.org Copyrights Copyright 2008, 2009, 2010 by Adobe Systems Inc., Apple Inc., Canon Inc., Microsoft Corp., Nokia
Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
Upgrade to Webtrends Analytics 8.7: Best Practices
Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.
NovaBACKUP. User Manual. NovaStor / November 2011
NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without
Open Source and Incident Response
Open Source and Incident Response Joe Lofshult, CISSP, GCIH 1 Agenda Overview Open Source Tools FIRE Demonstration 2 Overview Incident Adverse event that threatens security in computing systems and networks.
Computer Forensics Processing Checklist. Pueblo High-Tech Crimes Unit
Computer Forensics Processing Checklist Pueblo High-Tech Crimes Unit Cmdr. Dave Pettinari Pueblo County Sheriff's Office [email protected] The purpose of this document is to provide computer forensic technicians
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.
Chapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
CDFE Certified Digital Forensics Examiner (CFED Replacement)
Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics
Chapter 5: Fundamental Operating Systems
Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose
PRODISC VER. Computer Forensics Family. User Manual. Version 4.8 9/06
PRODISC VER Computer Forensics Family User Manual Version 4.8 9/06 Copyright 2003-2006 Technology Pathways, LLC. All rights reserved. This manual, as well as the software described in it, are furnished
EnCase v7 Essential Training. Sherif Eldeeb https://eldeeb.net
هللامسب EnCase v7 Essential Training What s in this course Explore the most notable features of the new version. Everything you need to know about EnCase v7 to conduct basic investigations. Create Cases
If you are working with the H4D-60 or multi-shot cameras we recommend 8GB of RAM on a 64 bit Windows and 1GB of video RAM.
Phocus 2.7.6 Windows read-me December 5 2013 Installation To install Phocus, run the installation bundle called Phocus 2.7.6 Setup.exe. This bundle contains Phocus, Hasselblad Device Drivers, Microsoft.NET
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips dc07cc0432 October 19, 2007 This document applies to these Xerox products: X WC 7328/7335/7345 for the user Xerox Network Scanning TWAIN Configuration for the
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
Course Title: Computer Forensic Specialist: Data and Image Files
Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference
PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference What PTK is about PTK forensics is a computer forensic framework based on command line tools
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements
Comparing and Contrasting Windows and Linux Forensics. Zlatko Jovanovic. International Academy of Design and Technology
Comparing and Contrasting Windows and Linux Forensics Zlatko Jovanovic International Academy of Design and Technology Abstract Windows and Linux are the most common operating systems used on personal computers.
Computer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
Active @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES KEVIN MANSELL CONTROL-F LTD. [email protected] DARREN LOLE & FIONA LITCHFIELD SERVICE
ThinkServer RD550 and RD650 Operating System Installation Guide
ThinkServer RD550 and RD650 Operating System Installation Guide Note: Before using this information and the product it supports, be sure to read and understand the Read Me First and Safety, Warranty, and
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
TWAIN Driver Reference Guide
TWAIN Driver Reference Guide Version 1.0 9/2/2005 Copyright 2003-2005 by Xerox Corporation. All rights reserved. XEROX is registered trademark of XEROX. Other product names used in this document may be
Paraben s P2C 4.1. Release Notes
Paraben s P2C 4.1 Release Notes Welcome to Paraben s P2C 4.1! Paraben's P2C is a comprehensive digital forensic analysis tool designed to handle more data, more efficiently while keeping to Paraben's P2
Inside the Dell PC Restore Partition
Preface Page 1 of 6 This page discusses how to fix the Dell System Restore (DSR) feature. The term "restore" has a somewhat fuzzy definition, and users sometimes ambiguously use "restore XP" when they
Recovering Data from Windows Systems by Using Linux
Recovering Data from Windows Systems by Using Linux Published by the Open Source Software Lab at Microsoft. November 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software
Introduction to The Sleuth Kit (TSK) By Chris Marko. Rev1 September, 2005. Introduction to The Sleuth Kit (TSK) 1
Introduction to The Sleuth Kit (TSK) By Chris Marko Rev1 September, 2005 Introduction to The Sleuth Kit (TSK) 1 This paper provides an introduction to The Sleuth Kit (referred to as TSK herein), from Brian
Digital Forensics. Module 4 CS 996
Digital Forensics Module 4 CS 996 Hard Drive Forensics Acquisition Bit for bit copy Write protect the evidence media EnCase for DOS Safeback (NTI: www.forensics-intl.com) Analysis EnCase FTK (www.accessdata.com)
CHAPTER 17: File Management
CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
NIST CFTT: Testing Disk Imaging Tools
NIST CFTT: Testing Disk Imaging Tools James R. Lyle, Ph.D. Computer Scientist National Institute of Standards and Technology 1. Introduction There is a critical need in the law enforcement community to
(b) slack file space.
Hidden Files A Computer Forensics Case Study Question Paper 1. Outline the meaning of the following terms: (a) cookie, [2 marks] A cookie is data stored locally that is used by some websites for data that
SSD Guru. Installation and User Guide. Software Version 1.4
SSD Guru Installation and User Guide Software Version 1.4 Contents Welcome!............................................................................. 1 Key features.........................................................................
Case Study: Quick data recovery using HOT SWAP trick in Data Compass
Case Study: Quick data recovery using HOT SWAP trick in Data Compass What failures can Data Compass help to solve? 1.Logical Malfunctions Partition Loss File loss or destruction Virus attack Accidental
Detection of Data Hiding in Computer Forensics. About Your Presenter
Detection of Data Hiding in Computer Forensics NEbraskaCERT Conference August 22nd, 2008 James E. Martin CISSP, JD About Your Presenter 2008-Present: Security Engineer, West Corporation 2004-2008: Senior
Cloud Portal for imagerunner ADVANCE
Cloud Portal for imagerunner ADVANCE User's Guide Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG How This
Lukas Limacher Department of Computer Science, ETH. Computer Forensics. September 25, 2014
Lukas Limacher Department of Computer Science, ETH Zürich Computer Forensics September 25, 2014 Contents 9 Computer Forensics 1 91 Objectives 1 92 Introduction 2 921 Incident Response 2 922 Computer Forensics
1 ImageBrowser Software User Guide
1 ImageBrowser Software User Guide Table of Contents (1/2) Chapter 1 Try It! ImageBrowser Chapter 2 What is ImageBrowser? Chapter 3 Starting ImageBrowser... 4 Downloading Images to Your Computer... 9 Printing
Computer Forensics. Securing and Analysing Digital Information
Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live
PDF Forensic Report - Job Reference
PDF Forensic Report - Job Reference Final report of for Dated: Specialist field: Photography Forensics On behalf of the claimant: On the instruction of: Subject matter: The client is looking to establish
Journal of Digital Forensic Practice
Journal of Digital Forensic Practice Journal of Digital Forensic Practice, 2:57 61, 2008 Copyright Taylor & Francis Group, LLC ISSN: 1556-7281 print / 1556-7346 online DOI: 10.1080/15567280801958464 UDFP
