Can Computer Investigations Survive Windows XP?



Similar documents
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

Installing Windows XP Professional

File Recovery: Find Files You Thought Were Lost F 2/1. Clever Tricks to Recover Deleted Files Even if They ve Been Emptied from the Recycle Bin!

RECOVERING FROM SHAMOON

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

Technical Procedure for Evidence Search

EnCase 7 - Basic + Intermediate Topics

Q. If I purchase a product activation key on-line, how long will it take to be sent to me?

Help System. Table of Contents

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Introduction Wiping Transparent Wiping Transparent Wiping Reserved Space Enforcer NOTE: BCWipe Enforcer Jetico Central Manager custom wiping schemes

Deleted File Recovery Tool Testing Results

COMPUTER FORENSICS. DAVORY: : DATA RECOVERY

Ans.: You can find your activation key for a Recover My Files by logging on to your account.

NTFS Undelete User Manual

MSc Computer Security and Forensics. Examinations for / Semester 1

Excerpts from EnCase Introduction to Computer Forensics

2 KillDisk User Guide

Windows 7: Current Events in the World of Windows Forensics

Chapter 4. Operating Systems and File Management

Forensics on the Windows Platform, Part Two

NovaBACKUP. User Manual. NovaStor / November 2011

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Crash Proof - Data Loss Prevention

UNDELETE Users Guide

Incident Response and Computer Forensics

Chapter 5: Fundamental Operating Systems

LAVASOFT FILE SHREDDER FILE SHREDDER

(b) slack file space.

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

PRIVAZER USER GUIDE Version 1.2 Dated 08 June 2013

Hiva-network.com. Microsoft_70-680_v _Kat. Exam A

Microsoft Vista: Serious Challenges for Digital Investigations

EaseUS Todo Backup user guide. EaseUS Todo Backup. Central Management Console. User guide - 1 -

UNDELETE Users Guide

Alternate Data Streams in Forensic Investigations of File Systems Backups

Up-to-the-minute Data Protection

PGP Desktop Quick Start Guide version 9.6

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Microsoft Exchange 2003 Disaster Recovery Operations Guide

Managing Applications, Services, Folders, and Libraries

Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

EnCase v7 Essential Training. Sherif Eldeeb

Practice Exercise March 7, 2016

Outline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

RecoverIt Frequently Asked Questions

Computer Forensics as an Integral Component of the Information Security Enterprise

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)

A Forensic Comparison of NTFS and FAT32 File Systems

Recover Data Like a Forensics Expert Using an Ubuntu Live CD

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

StrikeRisk v6.0 IEC/EN Risk Management Software Getting Started

Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A. DEMO Version

3.2 Install, configure, optimize and upgrade operating systems references to upgrading from Windows 95 and NT may be made

Introduction to Windows Server 2003

Installing a Second Operating System

HOUR 3. Installing Windows Server 2003

Computer Forensics: Permanent Erasing

A review of BackupAssist within a Hyper-V Environment

BACKUP & RESTORE (FILE SYSTEM)

winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR

5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual

Boot Camp Installation & Setup Guide

EaseUS. EaseUS Data Recovery Wizard User guide

PRODISC VER. Computer Forensics Family. User Manual. Version 4.8 9/06

Legal Notices. AccessData Corp.

Forensic Analysis of Internet Explorer Activity Files

Imation LOCK User Manual

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

Quantifying Hardware Selection in an EnCase v7 Environment

HP FutureSmart Firmware Device Hard Disk Security

Unified Messaging. User Guide

Wharf T&T Cloud Backup Service User & Installation Guide

Maintaining a Microsoft Windows Server 2003 Environment

Acronis Backup & Recovery 11

Microsoft Office Outlook 2013: Part 1

Contents. Using Web Access Managing Shared Folders Managing Account Settings Index... 39

Computer Forensics Discipline

HP ProtectTools Embedded Security Guide

Digital Forensics. Larry Daniel

FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter Dr. Barnicki January 28, 2000

NovaBACKUP. User Manual. NovaStor / May 2014

DISK DEFRAG Professional

Enterprise Erase LAN

Q&A. DEMO Version

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas

WARNING!!: Before installing Truecrypt encryption software on your

Backup and Recovery FAQs

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

Use it or Lose it: Microsoft Windows Backup By Tom Dell, ntb group partner

Operating Systems: Microsoft Windows XP, Windows Vista or Windows 7 RAM: 2GB

Hyperoo 2 User Guide. Hyperoo 2 User Guide

EaseUS Partition Master

Deploying EFS: Part 2

Transcription:

Can Computer Investigations Survive? An Examination of Microsoft and its Effect on Computer Forensics December 2001 by Kimberly Stone and Richard Keightley 2001 Guidance Software All Rights Reserved

Executive Summary, Microsoft s latest operating system, has arrived and is now appearing on computers slated for forensic investigation. Computer forensics examiners are now using as a platform on which they conduct forensic analysis. This white paper will examine both as a platform utilized by an examiner for computer forensics investigations and as a subject file system for computer forensics analysis. There is some uncertainty regarding how to conduct a computer forensic analysis of an XP system. Some have speculated that may significantly hamper the ability to conduct computer forensic investigations. This paper will test this theory and will also propose as a viable choice as a forensic operating system. This study was conducted using EnCase software. EnCase is a fully integrated Windows-based computer forensic software application that provides investigators with means of analyzing all electronic data contained on computer drives for forensic evidence purposes. Introduction appears to be an improved operating system, touting increased stability, increased user friendliness, more features, and (of more importance to forensic investigators everywhere) increased security. The two main security issues with are the "secure erase" (otherwise termed "scrubbing") feature when deleting files and the built-in file-encryption feature. This analysis illustrates that a proper forensic analysis of an XP system requires a clear understanding of how and its NTFS file system works and stores data. Otherwise, those in the security industry may be confused by speculation and myths that have propagated with the release of the operating system. While comes in both a Home edition and Professional edition, these tests were conducted on the Professional edition alone, as the Home version is (for the most part) a stripped-down version of the Professional. Definition of terms used in this paper is available at the end of the document. Section 1 Tests: as a Forensics Platform Like any new operating system from Microsoft, needs both additional hard drive space than its predecessor (1.5 GB for a full install) and more RAM. Microsoft recommends that users have 128 MB of RAM installed on their computers. Most reports from the field recommend 256 MB, especially if one is going to take advantage of such features as support for multiple users. Keeping Microsoft s recommendation in mind, all tests were conducted on a typical midrange PC (Gateway GP7-600 P-III @ 600 MHz computer with 128 MB RAM), using EnCase v3.16. [Note: forensic examiners typically use high-end systems with substantial memory and data storage.]. White Paper 2

Investigative Methods To prepare for this portion of the study, an 8.4 GB drive was wiped, partitioned and formatted in NTFS (a requisite to take advantage of the file-encryption abilities in ). A substantial number of files were then copied to it; some were encrypted and others deleted to mimic the file patterns found on a typical XP hard drive. The hard drive was then connected via an IDE interface using a FastBloc (a physical write-block device manufactured by Guidance Software). The setup of the FastBloc unit in was simple. One is required to install a generic disk drive driver in Windows 98 and, but detected and installed the driver for the FastBloc quickly, with no browsing or prompting on our part. The next step was to acquire the drive physically in both Professional and Windows 2000 (SP2), once each with NO compression and once each with BEST compression. No compression : 15 minutes, 6 seconds : 14 minutes, 45 seconds Best compression : 30 minutes, 16 seconds : 30 minutes, 2 seconds XP acquired the test drive faster than in every test. EnCase Media Acquisition with FastBloc Compression: BEST Compression: NONE 0.00 10.00 20.00 30.00 40.00 Time (minutes) edges out 2000 in FastBloc acquisitions Having acquired an evidence file, XP was primed to be stressed some more. Next, a battery of EnCase 3.16 functions in both Professional (sp2) and Professional were run. Knowing XP's need for memory, it was speculated that would beat XP in every test, but this was not the case.. White Paper 3

Five more tests were conducted: Test 1: Evidence File Verification Evidence File Verification 10.3 minutes 10.1 minutes 0.00 2.00 4.00 6.00 8.00 10.00 12.00 14.00 Time (minutes) just defeats XP in evidence file verification Test 2: Hash Drive Command Hash Drive 10.6 minutes 10.5 minutes 0.00 2.00 4.00 6.00 8.00 10.00 12.00 14.00 Time (minutes) beats XP in the hash drive command. White Paper 4

Test 3: 1 Keyword Search 1 Keyword Search 15.75 minutes 16 minutes 0.00 5.00 10.00 15.00 20.00 Time (minutes) barely loses to XP in the 1-keyword Test 4: 10 Keyword Search 10 Keyword Search 102.5 minutes 60.75 minutes 0.00 20.00 40.00 60.00 80.00 100.00 120.00 Time (minutes) comes up strong in the 10-term keyword search Test 5: Page-Down in Gallery (While Previewing in FastBloc) Page down in Gallery while Previewing 8 seconds 6 seconds 0.00 0.10 0.20 0.30 0.40 0.50 0.60 0.70 0.80 0.90 1.00 Time (minutes) 2-second differential multiplied over and over again. White Paper 5

EnCase gallery view Results of the above five tests: As demonstrated above, barely beats in most of the tests, lagging behind in the one-term keyword search, but coming up strong in the ten-term keyword search. One of the most interesting results came from using the <Page Down> command while previewing graphics thumbnails on the test media. beat by a full two seconds. While this is not much time for one page down command, considering the potential number of times one is likely to tap the <Page Down> key during a preview, this time-differential increases dramatically. The above data shows that EnCase runs solidly on and, in some functions, even faster than on.. White Paper 6

Section II Forensic Analysis of Media Introduction Many computers are now shipping with Home or Professional editions. It is imperative for computer forensic professionals to familiarize themselves with this file system to know what to expect when an XP case arrives for examination. In this document we will identify 1) the technical aspects of the file system; 2) how files are stored and deleted; and 3) the rumored automatic data scrubbing feature. Creating, storing, and deleting data is the base function of all file systems. How the data is created, where it s stored and what occurs when it is deleted are questions that are constantly posed to investigators. Recovering data in each of the above stages is also a challenge. A number of concerns are raised when a new operating system is encountered. Investigators must determine how to proceed with investigations, where to look and what findings to expect. This white paper will address these concerns and cover the aforementioned data scrubbing. Many features of the NTFS file system are cited in this document. These features are not new to the NTFS file system and are therefore not explained thoroughly. The NTFS file system is a complicated file system. Testing Phases EnCase version 3.16 was used for all of the following tests, in which the basic functions of the s file system were examined. PHASE I FILE SYSTEM Professional edition (version 5.1, build 2600) was installed on a 4 GB drive that was previously wiped. During the install an administrator account was created. The computer was shut down and the hard drive imaged. By default, installs the NTFS file system; however, the FAT32 file system is also an option when installing XP. The NTFS system was installed and examined. The NTFS system files were examined first. These are the files installed during the format of an NTFS volume. They existed in the same manner as.. White Paper 7

System File Windows NT MFT X X X MFT Mirror X X X Log File X X X Volume X X X Attribute Def. Table X X X Root Filename Index X X X Cluster Bitmap X X X Partition Boot Sector X X X Bad Cluster File X X X Secure File - X X UpCase Table X X X Quota Table X - - The folder structure was as follows: $Extend, Documents and Settings, Program Files, Recycler, System Volume Information, and Windows. This is essentially the same as, except the Windows directory is now WINDOWS instead of WINNT. The structure of the Master File Table (MFT) was examined and some very minor changes were noted in the MFT records; otherwise the structure is exactly the same. Navigating through the MFT record headers and file attributes was straightforward as the techniques were the same as used with previous version of NTFS. The file data is stored both resident and non-resident, just as it is in all versions of NTFS. PHASE II FILE STORAGE Several tests were conducted to determine how files are stored in the, NTFS environment. was booted and three small text files were created on the volume. The drive was subsequently imaged and the three small files were examined. They were all stored as resident data in the MFT. was booted and five large image files were created. The drive was subsequently imaged and the images were examined. The files were all stored as non-resident data. The MFT data attribute contained pointers (data runs) to the data. Overall, the storage process behaves in the same way that it did in prior NTFS systems. This provided a good platform for testing the deletion process.. White Paper 8

PHASE III FILE DELETION The first step in the investigation of XP media was analyzing the process of resident file deletion. A series of tests were conducted in which resident files were created, recycled, and deleted from the recycler. EnCase was used to examine the results. The recycling process remains the same as with previous version of Windows in NTFS: the file s MFT record is recreated with a new recycle bin filename. The deletion process is the same as well; the MFT records containing the resident data remained in the MFT, marked for deletion, until overwritten by a new MFT record. As a final test for resident data 150 resident files were created on the volume. All were recycled and deleted. The drive was imaged and the evidence file opened with EnCase. EnCase properly undeleted all of the resident deleted files. A series of tests were conducted with non-resident files, which were created, recycled, and deleted from the recycler. EnCase was used to track the MFT records, data runs and the clusters occupied by the files during the testing process. When the files were recycled and deleted, the MFT records remained in the MFT, marked for deletion, until overwritten by a new MFT record. The data remained intact in the previously allocated clusters until overwritten by another file. The recycler process remains the same as with previous version of Windows in NTFS. As a final test for non-resident files, 150 files were created with non-resident data. All were recycled and deleted. The drive was imaged and opened with EnCase. EnCase properly undeleted all of the nonresident deleted files. Figure 1: Deleted files on an XP drive displayed by EnCase. White Paper 9

PHASE IV THE SCRUBBING FEATURE and XP now contain a scrubbing feature that has caused some worry and confusion. The feature is a command-line program included with Microsoft & XP that provides an alternate method for managing the EFS (Encrypting File System). The version of the cipher tool included with XP is intended to overwrite, or scrub data, obliterating residue of data within unallocated clusters. The program makes three passes of writes over unallocated space. The first pass is hex 00, the second hex FF and the last pass is random characters, making residual data underlying those clusters effectively impossible to recover. The cipher tool would appear to comply with the Department of Defense 5220.22-M disk-sanitizing standard, which states: "Non-Removable Rigid Disks" or hard drives must be sanitized for reuse by "Overwriting all addressable locations with a character, its complement, then a random character and verify." Tests were conducted in which the cipher tool was used to wipe all unallocated clusters from the root folder. After the program completed the wiping, the drives were imaged. Example Program Output: To remove as much data as possible, please close all other applications while running CIPHER. Writing 0x00..... Writing 0xFF...... Writing Random Numbers...... Results: All unallocated space was filled with random values (which greatly affected file compression in the evidence file); however, the cipher tool affected only the unallocated clusters and a very small portion of the MFT; 10-15 records were overwritten in the MFT, and the majority of the records marked for deletion went untouched). The utility does not affect other items of evidentiary interest on the typical NTFS partition, such as: file slack, registry files, the pagefile and file shortcuts. In terms of its anticipated end-user adoption, the cipher feature is a burdensome command-line utility that is difficult to find and operate. Notably, the cipher function is available on the Professional version, but included in the Home version of XP and. Despite some speculation, the function is not set by default or even selected for repeated execution on an ongoing basis. The cipher must be executed from a command-line each time the user wants to employ it. There is very little documentation supporting this feature, which is largely intended for programmers and system administrators for use in limited circumstances.. White Paper 10

CONCLUSIONS AND RECOMMENDATIONS is a valid forensic operating environment with similar performance results to. This examination of the file system demonstrates that the operating system will introduce new challenges for investigators. will introduce the NTFS file system into home computers. Investigators are just now reporting an increase in residential cases; however, most are still FAT 32 file systems. It is very likely that the near future will bring the NTFS file system into the forefront of computer forensic investigations. With the use of proper tools and examination methods, evidence can be located and explained. The scrubbing feature is a part of, but it is not all that it was initially thought to be. It is a command line tool that is difficult to use, time consuming and nothing more than a good wiping utility. The average computer user will not know how to use it, and even if it is used evidence artifacts still remain in certain system files. Because of the inherent complexity of file systems and their interaction with the operating system, all investigators who wish to properly examine and understand evidence found in the NTFS file system should obtain formal forensic based training on the NTFS file system. Guidance Software offers such training in the advanced computer forensics course. DEFINITION OF TERMS Deleted: EFS: Evidence File: MFT: Non-resident: Recycled: Resident: Shut Down: Wiped: A file deleted manually ( emptied ) from the Recycle Bin. Encrypting File System An EnCase evidence file. Master File Table Used to refer to a file that is too large to be stored in the MFT. Its disk location is stored in the MFT by one or more pointers to the data. A file placed in the Recycler. Used to refer to a file small enough to be stored with that file s MFT record. Will infer that the computer was shut down using the normal Windows Shut Down command. Space on a hard drive that has been overwritten with a hex character, typically \x00, but could be anything or even random characters.. White Paper 11

ABOUT THE AUTHORS Richard Keightley is a graduate of Kenyon College in Ohio and has been working with computers and networks for the past ten years. Rich is Senior Technical Services Specialist at Guidance Software and has been giving support and consultation to computer forensics investigators for the past two years. Kimberly Stone graduated from the University of California Los Angeles with a degree in computer science and has been working in programming and Web development for the past four years. Kimberly is a Junior Programmer at Guidance Software. CONTACT INFORMATION For more information, please contact: Guidance Software 572 E. Green St., Ste. 300 Pasadena, Ca 91101 Phone: (626) 229-9191 Email: info@encase.com www.encase.com. White Paper 12