Open Source Data Recovery



Similar documents
Linux in Law Enforcement

Introduction to The Sleuth Kit (TSK) By Chris Marko. Rev1 September, Introduction to The Sleuth Kit (TSK) 1

Hands on Post Mortem Forensics Analysis in SUSE Linux Enterprise Servers Technical Tutorial Session Length - 1 hour

Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics

Welcome to new students seminar!! Security is a people problem. forensic proof.com JK Kim

Recover Data Like a Forensics Expert Using an Ubuntu Live CD

Lab III: Unix File Recovery Data Unit Level

Where is computer forensics used?

Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+)

Forensic Investigator. Module XI Linux Forensics

Digital Forensics For Unix. The SANS Institute

Unix/Linux Forensics 1

FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres

Disk and File System Analysis

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Lab V: File Recovery: Data Layer Revisited

Recover data from a defective Fujitsu desktop drive

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

Lukas Limacher Department of Computer Science, ETH. Computer Forensics. September 25, 2014

QUICK RECOVERY FOR RAID

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

COMPUTER FORENSICS. DAVORY: : DATA RECOVERY

Installing a Second Operating System

Using Open Source Digital Forensics Software for Digital Archives Workshop

CHAPTER 17: File Management

Dr Michael Cohen. This talk does not represent my Employer. April 2005

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

David Cowen Matthew Seyer G-C Partners, LLC

Chapter 12 File Management. Roadmap

Chapter 12 File Management

Chapter 12 File Management

GNU/LINUX Forensic Case Study (ubuntu 10.04)

Overview. File Management. File System Properties. File Management

MANAGING DISK STORAGE

Computer Forensic Tools. Stefan Hager

Computer Forensics using Open Source Tools

NSS Volume Data Recovery

File Systems Management and Examples

Windows OS File Systems

The Linux Virtual Filesystem

Acronis Disk Director 11 Advanced Server. Quick Start Guide

TELE 301 Lecture 7: Linux/Unix file

CS3210: Crash consistency. Taesoo Kim

Lecture 18: Reliable Storage

Storage and File Systems. Chester Rebeiro IIT Madras

File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System

Open Source and Incident Response

iphone Forensics with F/OSS A HOWTO for iphone Forensics with free and/or open source tools

Data Storage and Backup. Sanjay Goel School of Business University at Albany, SUNY

Acronis True Image 2015 REVIEWERS GUIDE

COS 318: Operating Systems

2.8.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 16

RECOVERING FROM SHAMOON

by Scott Recover your P0RN from your RAID Array!

Deleted File Recovery Tool Testing Results

LVM2 data recovery. Milan Brož LinuxAlt 2009, Brno

RAID by Sight and Sound

TestDisk Step By Step CGSecurity

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter Dr. Barnicki January 28, 2000

File System Management

Incident Response and Computer Forensics

Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

Data recovery Data management Electronic Evidence

IFSM 310 Software and Hardware Concepts. A+ OS Domain 2.0. A+ Demo. Installing Windows XP. Installation, Configuration, and Upgrading.

Two Parts. Filesystem Interface. Filesystem design. Interface the user sees. Implementing the interface

CS 153 Design of Operating Systems Spring 2015

Security Incident Investigation

UBIFS file system. Adrian Hunter (Адриан Хантер) Artem Bityutskiy (Битюцкий Артём)

Data Loss Prevention (DLP) & Recovery Methodologies

Ans.: You can find your activation key for a Recover My Files by logging on to your account.

Additional information >>> HERE <<<

Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems

Navigating the Rescue Mode for Linux

Storage and File Structure

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Acronis Backup & Recovery 10 Server for Linux. Installation Guide

Crash Proof - Data Loss Prevention

Chapter 4. Operating Systems and File Management

MSc Computer Security and Forensics. Examinations for / Semester 1

Veritas Storage Foundation UMI error messages for HP-UX

Backing Up With Acronis True Image 2015

Chapter 12: Mass-Storage Systems

Library Recovery Center

File Systems for Flash Memories. Marcela Zuluaga Sebastian Isaza Dante Rodriguez

EaseUS Partition Master

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

EXT3 File Recovery. Hal Pomeranz Deer Run Associates

Informatica forense. Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone

DualFS: A New Journaling File System for Linux

BackTrack Hard Drive Installation

Oracle Cloud Storage and File system

Ryusuke KONISHI NTT Cyberspace Laboratories NTT Corporation

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

Oracle Cluster File System on Linux Version 2. Kurt Hackel Señor Software Developer Oracle Corporation

Transcription:

Open Source Data Recovery Options and Techniques CALUG MEETING October 2008

!! Disclaimer!! This presentation is not sponsored by any organization of the US Government I am here representing only myself The opinions stated in this presentation are my own and do NOT represent any official position of the US Government or any Government agency

Open Source Data Recovery Agenda What do we mean by data recovery? How does it differ from computer forensics? Types of recovery: Damaged or dying disks Damaged file systems or partition tables Deleted and lost files What Linux and Open Source tools are available? Okay...so how is it done under Linux?

What is DATA RECOVERY? Data recovery is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media formats such as hard disk drives, storage tapes, CDs, DVDs, RAID, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system.. Wikipedia

Data Recovery!= Forensics Computer Forensics: Recovery of EVIDENCE - Meta data - Attribution - Lead Generation - Temporal Analysis - Simple Data Recovery without Forensic Analysis maybe harmful to a case Data Recovery: Recovery of INFORMATION -regardless of meta data (but not always) -Attribution is often meaningless

Data Recovery Strategy The #1 guaranteed strategy for proper data recovery:

Data Recovery Strategy Proper Backups! *but y'all knew that, right?

Data Recovery Strategy Given the time limits of this presentation, I will concentrate on the specifics of a limited number of Open Source Tools. Media Errors: ddrescue Partition and FS recovery: testdisk File recovery (Logical): Sleuthkit File recovery (Physical): photorec / scalpel I would be remiss in not mentioning R-Studio suite of tools: http://www.r-tt.com/

Data Recovery Strategy Every data recovery effort has a common step: *PRESERVE THE ORIGINAL MEDIA* Whenever possible, create an image of the data container. Provides redundancy Guards against user error Guards against further loss resulting from mis-diagnosed cause This starts with ddrescue Continued physical recovery can proceed using /dev/loop

Data Recovery Strategy Media Errors Disk Drive Failure User Recoverable: - disk must be kernel accessible - bad sectors (constantly remapping) - some magnetic defects Clean Room: - platter and mechanical failure - head crash You may only get one shot at this, so choose wisely!

Data Recovery Strategy Media Errors Disk Drive Failure http://www.myharddrivedied.com/ Go to the presentations section Good source for advice You may only get one shot at this, so choose wisely!

Data Recovery Strategy Media Errors ddrescue Viable tools: dd dc3dd/dcfldd forensic variants ddrescue (gnu ddrescue, not dd_rescue) Be careful of buffering issues with dd and related programs use direct i/o (flag).

Data Recovery Strategy Media Errors ddrescue Benefits: Non-linear acquisition Interruptions can be continued Robust logging Specifically designed to deal with bad sectors, not just skip over them. General Usage: ddrescue input output log ddrescue /dev/sdx outputfile.ddr ddrlog.txt

Data Recovery Strategy Media Errors ddrescue ddrescue recovery strategy (bad disk): Keep a log for multiple runs Start by skipping bad areas get the good first Keep the drive cool Recovery Usage 2 (or more) Runs: ddrescue -n /dev/sdx outputfile.ddr ddrlog.txt ddrescue -d -r3 /dev/sdx outputfile.ddr ddrlog.txt

Data Recovery Strategy Deleted Partitions Disk Drive Failure Partition table deletion can be recovered using testdisk - http://www.cgsecurity.org/wiki/testdisk Deleted partitions Recover boot sectors MFT/ FAT recovery EXT Backup Superblocks testdisk mkfs.ext2 -n e2fsck -b DEMO

Data Recovery Strategy Deleted Files Deleted Files Two Basic Approaches: 1) Logical Recovery use the file system meta data to locate and recovery 2) Physical Recovery Use file magic (headers and footers) to carve files from physical blocks on the file system.

Data Recovery Strategy Deleted Files Deleted Files Logical Recovery - File system dependent meta data: - NTFS = MFT - FAT = File Allocation Table - EXT = Inode Table / Superblock - We use directory entries for file names

Data Recovery Strategy Deleted Files Deleted Files Logical Recovery - The Sleuthkit - www.sleuthkit.org - Tool Organization (Layers) - File system layer (fs) - File name layer (f) - Data layer (d) - Inode layer (i)

Data Recovery Strategy Deleted Files The SleuthKit (TSK) Deleted Files Disk: disk_stat, disk_sreset Media Mgmt: mmls, mmstat File System: fsstat, ffind, fls istat, ifind, ils, icat dstat, dls, dcat, dcalc jls, jcat Other tools: hfind, sorter, mactime

Data Recovery Strategy Deleted Files Deleted Files Physical Recovery - Use file magic to recover files - file header and footer - known types, or build your own - subject to fragmentation - can be targeted through block groups, etc. - scalpel, foremost, Photorec.

Data Recovery Strategy Deleted Files Scalpel: Deleted Files http://www.digitalforensicssolutions.com/scalpel/ - edit the config file (looks like a magic file) - output is to empty or non-existing dir - use cluster size (for boundry) - consider using unallocated only (dls). DEMO

Rescue Linux Boot Disks Bootable CD's for Forensics: Helix: http://www.e-fense.com/helix/ Based on Knoppix Forensic adjustments Forensic software, including TSK Has a real nice Windows side for live acquisitions Free, and a good starting point for forensic exploration.

Rescue Linux Boot Disks Bootable CD's for Forensics: SMART for Linux http://www.asrdata2.com/ Slackware and Ubuntu versions Forensically optimized Forensic software, including TSK Evaluation version SMART Free CD, But SMART app is $$ Also see the FBCD: http://www.forensicbootcd.com/

Questions? For example: - Can I recover deleted ext3 files? - What's the difference between deleted ext2 and ext3?

It's all about Control