Deleted File Recovery Tool Testing Results



Similar documents
The Contribution of Tool Testing to the Challenge of Responding to an IT Adversary

Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test. Reports; The Computer Forensics Tool Catalog Website: Connecting

NIST CFTT: Testing Disk Imaging Tools

Recover My Files v Test Results for Video File Carving Tool

Mobile Device Forensics. Rick Ayers

Can Computer Investigations Survive Windows XP?

Help System. Table of Contents

Digital Forensics at the National Institute of Standards and Technology

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

Practice Exercise March 7, 2016

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

File System Management

File Recovery: Find Files You Thought Were Lost F 2/1. Clever Tricks to Recover Deleted Files Even if They ve Been Emptied from the Recycle Bin!

Computer Forensics: Permanent Erasing

BACKUP & RESTORE (FILE SYSTEM)

Using the HFSD journal for deleted file recovery

EnCase 7 - Basic + Intermediate Topics

Welcome to new students seminar!! Security is a people problem. forensic proof.com JK Kim

NTFS Undelete User Manual

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

Recover data from a defective Fujitsu desktop drive

UNDELETE Users Guide

Forensic Decryption of FAT BitLocker Volumes

DATA RECOVERY FUNCTION TESTING FOR DIGITAL FORENSIC TOOLS

HAVE YOUR COMPUTER FORENSICS TOOLS BEEN TESTED?

RecoverIt Frequently Asked Questions

Open Source Data Recovery

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services

Chapter 12 File Management

Chapter 12 File Management. Roadmap

Lecture 18: Reliable Storage

Incident Response and Computer Forensics

QUICK RECOVERY FOR RAID

4 II. Installation. 6 III. Interface specification Partition selection view Partition selection panel

Data recovery Data management Electronic Evidence

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

RECOVERING FROM SHAMOON

COMPUTER FORENSICS. DAVORY: : DATA RECOVERY

Recover My Files v5. Chapter Contents. Published: 18 March 2013 at 12:52:56. Frequently Asked questions Data Recovery Fundamentals...

UNDELETE Users Guide

Crash Proof - Data Loss Prevention

CHAPTER 17: File Management

Chapter 4. Operating Systems and File Management

David Cowen Matthew Seyer G-C Partners, LLC

File Systems for Flash Memories. Marcela Zuluaga Sebastian Isaza Dante Rodriguez

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

ipod Forensics Update

Q. If I purchase a product activation key on-line, how long will it take to be sent to me?

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Bringing Science to Digital Forensics with Standardized Forensic Corpora.

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

Empirical Analysis of Solid State Disk Data Retention when used with Contemporary Operating Systems

Alternate Data Streams in Forensic Investigations of File Systems Backups

Comparing and Contrasting Windows and Linux Forensics. Zlatko Jovanovic. International Academy of Design and Technology

A Forensic Comparison of NTFS and FAT32 File Systems

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)


FAQ for USB Flash Drive

Windows OS File Systems

File Systems Management and Examples

Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics

Data Storage on Mobile Devices Introduction to Computer Security Final Project

EXT3 File Recovery. Hal Pomeranz Deer Run Associates

Kroll Ontrack Data Recovery. Oracle Data Loss: When the best of plans fail

Recover Data for Windows Software

Operating Systems CSE 410, Spring File Management. Stephen Wagner Michigan State University

Guide to Securing Microsoft Windows 2000 Encrypting File System

Windows 7: Current Events in the World of Windows Forensics

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Forensics on the Windows Platform, Part Two

Forensic Software Testing Support Tools Test Summary Report

Ephp System - Data Recovery Services

UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X

Towards facilitating reliable recovery of JPEG pictures? P. De Smet

Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+)

Course Title: Computer Forensic Specialist: Data and Image Files

PGP Desktop Quick Start Guide version 9.6

Test Results for Mobile Device Acquisition Tool: Lantern v2.3

Ans.: You can find your activation key for a Recover My Files by logging on to your account.

HP FutureSmart Firmware Device Hard Disk Security

Retrieving Internet chat history with the same ease as a squirrel cracks nuts

Main Points. File layout Directory layout

2013 Boston Ediscovery Summit. Computer Forensics for the Legal Issue-Spotter

RECOVERING DIGITAL EVIDENCE FROM LINUX SYSTEMS

BlackLight v Test Results for Mobile Device Acquisition Tool

Digital Forensic Tool for Decision Making in Computer Security Domain

Metadata, Electronic File Management and File Destruction

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Canon imagerunner Hard Disk Drive Data Security Options. Data Encryption and Overwrite

Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik

Open Source Digital Forensics Tools

Tableau TD3 Forensic Imager Test Results for Digital Data Acquisition Tool

EMC Replication Manager and Kroll Ontrack PowerControls for Granular Recovery of SharePoint Items

Windows NT. Chapter 11 Case Study 2: Windows Windows 2000 (2) Windows 2000 (1) Different versions of Windows 2000

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems

The Meaning. Linkfiles In Forensic Examinations

Outline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS

Optimizing and Protecting Hard Drives Chapter # 9

Transcription:

Deleted File Recovery Tool Testing Results Jim Lyle NIST 1 AAFS Washington

CFTT Develop specifications for testing forensic tools Disk Imaging Write Blocking Drive erase for reuse Metadata based deleted file recovery Other specs in development Submit test reports to NIJ for publication ~90 AAFS Washington 2

Deleted File Recovery Deleted file recovery (DFR) Metadata based (from directory, i node, MFT, etc.) now Signature based (aka file carving) next Tested six popular tools Test reports are being drafted for publication later this year AAFS Washington 3

Talk Goals The presentation will impact the forensic community by: increase awareness in the community of ability of tool testing to reveal anomalies in tool behavior help the forensic practitioner recognize tool limitations AAFS Washington 4

Remainder of Talk Metadata relationships Test suite Identifying Supported file systems Consider if there is fragmentation, but intact Overwriting Chaos Summary AAFS Washington 5

Metadata relationships with data Active Metadata Data Residual Metadata Active Metadata Data Residual Metadata Data Active Metadata Data Residual Metadata Residual Metadata Data Residual Metadata AAFS Washington 6

17 BaseTest Cases DFR 01. DFR 02. DFR 03. DFR 04. names. DFR 05. DFR 06. DFR 07. DFR 08. DFR 09. Recover one non fragmented file. Recover file with two fragments. Recover file with multiple frags. Recover files with non ASCII Recover several fragmented files. Recover one large file. Recover one overwritten file. Recover several overwritten files. Recover 1000 files no overwrite. DFR 10. DFR 11. DFR 12. DFR 13. DFR 14. DFR 15. DFR 16. DFR 17. Recover 1000 files, overwritten. Recover one directory. Recover multiple directories. Recover random activity. Recover other file system object. List one of each object. List a large number of files. List deep file paths. At least 4 images per case: 1. FAT: FAT12, FAT16 & FAT32 2. ExFAT 3. NTFS 4. EXT: ext2, ext3 & ext4 Some one off images: NTFS compressed NTFS file in MFT HFS+ file listing Recycle bin/trash can AAFS Washington 7

Supported File Systems Determine supported file systems by trying a simple case Delete a single file, see if the six tools recovers anything FS 1 2 3 4 5 6 ext2 ext3 ext4 FAT NTFS ExFAT HFS+ AAFS Washington 8

FAT Fragmentation Case FAT 03 Recover a file in 4 fragments Layout: A, C, D & E are active files; B is deleted A B1 C B2 D B3 E B4 Results: Three tools recovered entire file One tool stopped after first cluster One tool included part of an active file One tool recovered two fragments and two clusters from active files Tool Recovered File 1 B1 B2 B3 B4 2 B1 3 B1 C(1) 4 B1 B2 B3 B4 5 B1 B2 B3 B4 6 B1 C B2 D AAFS Washington 9

Fragmentation Other File Systems NTFS Well behaved Ext2 recovered where supported One tool had trouble with ext2 FS 1 2 3 4 5 6 FAT 1 1A 2AM ExFAT NTFS ext2 2 not supported not recovered recovered Other partial recovery AAFS Washington 10

Summary for non overwriting Cases # recovered / # deleted FS 1 2 3 4 5 6 FAT 807/819 792/819 792/819 807/819 807/819 792/819 ExFAT 270/273 254/273 265/273 270/273 NTFS 273/273 273/273 273/273 273/273 273/273 273/273 ext 264/273 273/273 273/273 255/273 273/273 271/273 Best results on NTFS, all files recovered by all tools Some tools miss a few files from ext2 All tools miss a few files from ExFAT AAFS Washington 11

Anomalies for non overwriting Cases by data source # multi src / # other src / # Active file FS 1 2 3 4 5 6 FAT 9/0/0 6/0/0 27/3/18 9/0/0 12/0/3 24/0/18 ExFAT 0/0/1 10/0/10 8/0/8 0/0/0 NTFS 0/0/1 0/0/0 23/0/23 0/0/0 0/1/0 0/0/0 ext2 0/0/0 0/0/0 0/0/0 0/0/0 0/0/0 0/0/0 Except for one file recovered by tool #5, and 3 recovered by tool #3, all recovered content came for current or previous files Tool #3 recovered 296 of 273 deleted NTFS files AAFS Washington 12

Overwrite Cases: Data & Metadata Available Metadata and File Block Summary Metadata Exists Metadata Overwritten Case Deleted Intact Partial None Intact Partial None FAT 2894 1118 2 100 7 10 1657 ExFAT 965 376 3 28 1 3 554 NTFS 965 371 3 560 0 3 28 EXT 2869 1225 21 969 17 8 629

Summary for Overwriting Cases # intact files with metadata / # deleted FS 1 2 3 4 5 6 FAT (1118/2894) 885 885 885 885 885 885 ExFAT (376/965) 369 275 305 370 NTFS (371/965) 374 374 353 374 374 374 Ext (408/956) 292 372 372 14 372 372 Best results on FAT & NTFS One tool showed poor results for ext2 Results for ExFAT vary AAFS Washington 14

Anomalies for overwriting Cases by data source # multi src / # other src / # Active file FS 1 2 3 4 5 6 FAT 304/4/41 183/3/41 309/66/17 0 269/3/0 269/3/40 297/81/197 ExFAT 18/14/16 95/7/94 89/10/88 18/18/16 NTFS 24/2/24 21/24/0 29/0/29 21/14/6 24/2/24 24/0/24 ext2 107/52/9 25/26/0 431/17/426 16/8/17 29/56/162 29/17/24 Lots of recovered files include data from more than one source NTFS seems best behaved AAFS Washington 15

Summary The residual metadata varies with the file system. For example, file names may be completely or partially lost, pointers to file blocks may be overwritten. Only the first block of a deleted file is identified for FAT file systems. Some tools guess the location of the remainder of the deleted file; this strategy often leads to recovered files that are mixed from several original files. The tools sometimes include blocks from active files in a recovered file. The tools rarely include blocks that have never been allocated to the current file system, i.e., it is not likely that a block from a recovered file was not a part of some file. Some tools attempt to identify overwritten files. The tools often identify (incorrectly) intact files as overwritten. Support for ExFAT, ext3 and ext4 is sometimes lacking. AAFS Washington 16

Project Sponsors (aka Steering Committee) National Institute of Justice (Major funding) Homeland Security (Major funding) FBI (Additional funding) Department of Defense, DCCI (Equipment and support) State & Local agencies (Technical input) Other federal agencies (Technical input) NIST/OLES (Program management) AAFS Washington 17

Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that the products are necessarily the best available for the purpose. AAFS Washington 18

Contact Information Jim Lyle jlyle@nist.gov http://www.cftt.nist.gov http://www/cfreds.nist.gov Sue Ballou, Office of Law Enforcement Standards Steering Committee representative for State/Local Law Enforcement Susan.ballou@nist.gov AAFS -- Washington 19