EnCE Study Guide v7!11!2015
EnCE Study Guide v7!11!2015
EnCE Study Guide v7!11!2015
Version 7
Certification Background
The EnCase Certified Examiner program was created to meet the requests of
EnCase users as well as to provide a recognized level of competency for the
examiner. While many different certifications exist, the EnCE provides an
additional level of certification and offers a measure of professional advancement
and qualifications.
Certain qualifications must be met to enter the certification process. An application
and a detailed explanation can be found at:
http://www.guidancesoftware.com/computer-forensics-training-ence-certification.htm
The cost is USD 200.00 US and USD 300.00 International payable by credit card,
check, or purchase order. The certification program does not generate profits for
Guidance Software; the testing fee covers the cost of the written test provided by
ExamBuilder. Once payment has been received and processed, the certification
coordinator will email testing instructions to you.
The certification process addresses both EnCase software (EnCase) and general
areas of computer forensics. It involves a written test consisting of 180 questions
(174 for international candidates; no legal questions). Two hours are provided to
complete the written exam, which is true/false and multiple choice.
Once the Phase I results are received, the instructions for completing Phase II will
be provided to you in an email message from myaccount@guid.com. This message
will be sent to the address you provided on your application. If you fail the Phase I
test, you will be required to wait two (2) months from the date the test was taken
before being allowed to re-take the test.
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
ExamBuilder
o
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
The Phase I written examination will not be given during class. Once
you complete the class, you will be given login instructions. You will
have ten (10) business days from the last day of class to take Phase I.
After the 10 days, access to the exam will be terminated.
Enfuse
o
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
Earn one (1) credit hour for each classroom hour of training and credit
hour for each one hour of instruction as a computer forensics or
incident-response curriculum instructor.
Attend one Enfuse conference within the renewal period. Your certification
must be current at the time of the conference and you must attend at least
10 sessions to fulfill the requirement to renew your EnCE. Register online at
www.guidancesoftware.com/Enfuse. Renewal forms will be available at the
registration desk during the conference. Please check the box on the
renewal form, and registration will be on file with Guidance Software.
Training and teaching hours may be combined to reach the total 32 hours required.
Documentation may be a certificate of completion, official letter from the provider, or transcript.
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
Should your certification expire, you will be required to restart the EnCE process
from Phase I. Extensions will not be granted. If you are unsure of your expiration
date, please email certification@guid.com
Complete renewal details are available at:
http://www.guidancesoftware.com/EnCE-Renewal.htm
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
Computer knowledge
Legal
EnCase concepts
Contains:
o
Case number
Examiner name
Evidence number
Unique description
Acquisition notes
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
If no compression is used
Exhaustive Sector-by-sector
Both the MD5 and/or SHA-1 hash and CRCs must match for the evidence
file to be verified
o
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
EnCase Concepts
Bookmarks
Investigators notes
A case file can contain any number of hard drives or removable media
The case file should be archived with the evidence cache and evidence files
as it contains all of the investigators notes
o
FileTypes.ini
Local.ini
Viewers.ini
Case management
o
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
Evidence Processor
After adding evidence to a case and confirming that the data is valid and
browsable, the first task you undertake is to run the EnCase Evidence
Processor.
Since you can run the Evidence Processor unattended, you can work on
other aspects of the case while this tool is processing data.
After completion, the case data will be processed and ready for you to begin
the important analytic and reporting phases of your investigation.
Hash analysis Generate MD5 and/or SHA-1 hash values for files and
compare against your case Hash Library
Find email Extract individual messages from email archive files, such
as PST (Microsoft Outlook), NSF (Lotus Notes), DBX (Microsoft
Outlook Express), EDB (Microsoft Exchange), AOL, and MBOX
You also have the option to search unallocated space for the
Internet artifacts
Search for keywords Search raw (not transcript) text for specific
keywords
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
Index text Create an index for when you need to search for keywords
in compound files (Microsoft Office 2007 and 2010) and across large
amounts of data
You can adjust the parameters for index creation, such as the
minimum word length to index and whether to use a noise file
Creating an index will allow you to instantly search for terms in a variety of
ways
o
You can adjust parameters for index creation, such as the minimum
word length to index or whether to use a noise file (a file containing
specific words to ignore)
Compared to keyword searches that search on the raw text, index searches
will search on the transcript output of the file, which is critical for Microsoft
Office 2007 and 2010 files.
Generating an index can take time, however, the trade-off in time spent
creating the index yields a greater payoff with near instantaneous search
times.
o
Once your case has been indexed, keyword searched, tagged, or any
combination of the three, you can then search for desired information. To
create a unified search do the following:
o
A dynamic list is displayed on the right side of the window, showing the
terms in the index and the number of occurrence of a term
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
10
EnCase v7 will show you all words in the index that start with the term
that you have typed and will dynamically update the list as you type
additional letters
At any time you can double click on a query term and it will show
the show the information about that term
Case Sensitive
o
GREP
o
Unicode
o
Selecting this box will enable EnCase to search for keywords in both
ANSI and Unicode
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
11
(ab)
{m,n} The curly braces state number of times to repeat, i.e., m to n times
[]
[^]
[-]
File Signatures
o
The terms file signature and file header mean the same thing, the
standard hex characters at the beginning of a certain file type
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
12
When the examiner double clicks on a file, EnCase will copy the file to
the Temp folder and launch the Windows-associated viewer or userdefined external viewer to read the file
Hash sets can be built with one file or any number of selected files
o
The sets contain the hash values of the file(s) in the set and selected
metadata
The hash value of a file is computed only from the logical file independent
of the file name, time/date stamps, and the slack space of the physical file
The examiner can exclude specific hash sets to remain within the scope
of the examination
File extensions are compared to the file signature (header) according to the
File Types Table
The hash value of each logical file is computed and compared with the
Hash Library composed of the selected hash sets
Both analyses can be used to help identify suspect files and/or exclude
known or benign files
o
The results of both analyses are viewed in the Table view of the
Evidence Entry tab
Computer Knowledge
The BIOS
File systems
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
13
Name
Bit
Binary
1
Nibble
0000
Byte
0000-0000
16
Word
0000-0000 0000-0000
32
Dword
0000-0000 0000-0000
0000-0000 0000-0000
64
The first 128 characters make up the ASCII table and represent
alpha/numeric values common punctuation and other values
Selecting Unicode will cause EnCase to search for the keyword in both
ASCII and Unicode
Qword
The BIOS checks and configures the computer system after power is
turned on
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
14
Sector/RAM slack
Data from the end of the logical file to the end of that sector
Sector/RAM slack is zeroed out prior to writing it to the drive (00 00)
Drive slack
FAT tracks
The 10-byte file written to a 512-byte sector will have 502 bytes of
sector/RAM slack in the same sector that contains the logical data
File fragmentation
Directory records
File name
Starting cluster
A directory (or folder) is a file with a unique header and a logical size
of zero
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
15
FAT 16
FAT 32
exFAT was originally created for USB flash drives and SD cards, but can be
used to format volumes under Windows 7
o
The exFAT file system uses 32 bits within the table and has a limit of
4,294,967,285 (232 11) cluster addresses
The exFAT file system uses free space bitmaps to reduce fragmentation and
free space allocation/detection issues
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
16
Within the directory entries of the exFAT file system, there are multiple,
32-byte records at least three for each directory entry. Each record has an
identifier byte:
o
When a file is deleted, the first bit of the identifier of the record is changed
from 1 to 0, changing the identifier to reflect a record not in use
o
This means that if the file was fragmented and there was a cluster chain, the
chain is not destroyed on deletion
As long as the clusters themselves have not been reused for newer files,
it is possible to accurately recover even heavily fragmented files that
were deleted because the cluster run would still be intact
At least one MFT record is allocated to each file and folder on volume
Resident files
o
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
17
Nonresident files
o
Both types of files may be hashed as long as logical size is greater than 0
Also installed on the motherboard are the Random Access Memory, the
Read Only Memory, and add-in cards, such as video cards, Network
Interface Cards (NIC), Small Computer System Interface (SCSI) cards
Legacy SCSI hard disk drives require a controller card on the motherboard
Partition tables
Partition recovery
First response
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
18
First Response
At the scene
o
Image RAM
Access BIOS
EnCase Portable
Inspection of media
o
Take down the system whether pull plug or shut down depends on
circumstances
Internal Inspection
External Inspection
Onsite triage
o
Tableau fastest
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
19
Tag evidence
Transport evidence
Must be trained
Should test and validate computer forensic tools and techniques prior to
using them on original evidence
NTFS
EXT2/3/4 (Linux)
Reiser (Linux)
UFS (Solaris)
DVD
HP-UX
Etc
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
20
If the file system is not supported by EnCase, the examiner can still conduct
a physical text search, run EnScript programs for file headers and footers,
etc.
The examiner can also restore the physical drive to a drive of equal or
larger size
o
The restored drive is verified by the MD5 and/or SHA1 hash value
The restored partition is verified by the MD5 and/or SHA1 hash value
Laboratory Procedures
Cross contamination
o
Chain-of-custody
o
Storage
o
Recycler
Windows artifacts
o
Recent
Link files
Desktop
Send To
Temp
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
21
Windows 7 C:\Users\
Legal Issues
Daubert/Frye
o
Elements of Daubert
o
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
22
Computer knowledge
Good forensic practices
Legal
Case number
Examiner name
Evidence number
Unique description
Date/time of computer system clock
Acquisition notes
Serial number of physical hard drive
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
23
o Calculated when evidence file is added to case and rechecked every time the data
block is accessed
Can be broken into multiple segments with a maximum segment size dependent on
the file system to which the evidence file is written
Individual segments can be verified by the CRCs when compression is not used
o If compression is used, the decompression algorithm is used
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
24
o Both the MD5 and/or SHA-1 hash and CRCs must match for the
evidence file to be verified
If any compression is used, the compression algorithm is used to verify data
blocks
ENCASE CONCEPTS
The case file should be archived with the evidence cache and
evidence files as it contains all of the investigators notes
o Use the Create Package feature
ENCASE CONCEPTS
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
25
EVIDENCE PROCESSOR
After adding evidence to a case and confirming that the data is valid and
browsable, the first task you undertake is to run the EnCase Evidence
Processor
Since you can run the Evidence Processor unattended, you can work on
other aspects of the case while this tool is processing data
After completion, the case data will be processed and ready for you
to begin the important analytic and reporting phases of your investigation
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
26
EVIDENCE PROCESSOR
o Hash analysis Generate MD5 and/or SHA-1 hash values for files and compare against
your case Hash Library
o Expand compound files Expand compound and compressed files, such as ZIP, RAR,
and GZ
o Find email Extract individual messages from e-mail archive files, such as PST
(Microsoft Outlook), NSF (Lotus Notes), DBX (Microsoft Outlook Express), EDB
(Microsoft Exchange), AOL, and MBOX
o Find internet artifacts Collect Internet-related artifacts, such as browser histories and
cached web pages
You also have the option to search unallocated space for the Internet artifacts
EVIDENCE PROCESSOR
Search for keywords Search raw (not transcript) text for specific keywords
Index text Create an index for when you need to search for keywords in compound
files (Microsoft Office 2007 and 2010) and across large amounts of data
o You can adjust the parameters for index creation, such as the minimum word length to
index and whether to use a noise file
File signature analysis Determine if the extension of a file has been altered and
whether or not the extension matches the file type as specified by the files header
Creating thumbnails from images Creates image thumbnails for faster display in the
EnCase GUI
Creating an index will allow you to instantly search for terms in a variety of
ways
o You can adjust parameters for index creation, such as the minimum word length
to index or whether to use a noise file (a file containing specific words to ignore)
Compared to keyword searches that search on the raw text, index searches
will search on the transcript output of the file, which is critical for Microsoft
Office 2007 and 2010 files
Generating an index can take time, however, the trade-off in time spent
creating the index yields a greater payoff with near instantaneous search
times
o Guidance Software recommends always indexing your case data
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
27
Once your case has been indexed, keyword searched, tagged, or any combination of the three, you can
then search for desired information. To create a unified search do the following:
o EnCase v7 will show you all words in the index that start with the term that you have typed
and will dynamically update the list as you type additional letters
You can double-click on a query term at any time and it will show the show the information about
that term
Adding Keywords
o Case Sensitive
Not set by default; selecting will limit hits
to exact case of words entered; can be
used with GREP and Unicode
o GREP
Box must be selected for EnCase to use GREP expression, otherwise EnCase will
search for the literal entered characters; can be used with Case Sensitive and Unicode
o Unicode
Selecting this box will enable EnCase to search for keywords in both ANSI and
Unicode; recommended to be selected for most searches; can be used with GREP and
Case Sensitive; Unicode uses two bytes for each character allowing the representation
of 65,536 characters
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
28
SEARCHING
\wFFFF
?
SEARCHING
GREP
*
(ab)
{m,n}
The pipe is an OR statement and can be used with the parentheses, i.e.,
(com)|(net)|(org) for the end of an email address.
SEARCHING
GREP
[]
[^]
[-]
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
29
o When the examiner double-clicks on a file, EnCase will copy the file to
the Temp folder and launch the Windows-associated viewer or userdefined external viewer to read the file
Signature Analysis
Colum
CORRECT
Match
NOT LISTED
N/A
[blank]
Unknown
NOT LISTED
LISTED
INCORRECT
[blank]
Bad Signature
LISTED
LISTED
INCORRECT
Alias
Signature / Header
Extension
Comparison
LISTED
LISTED
NOT LISTED
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
30
o The hash value of a file is computed only from the logical file
independent of the file name, time/date stamps, and the slack space
of the physical file
o The hash value of each logical file is computed and compared with the
Hash Library composed of the selected hash sets
o Both analyses can be used to help identify suspect files and/or exclude
known or benign files
The results of both analyses are viewed in the Table view of the Evidence Entry
tab
COMPUTER KNOWLEDGE
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
31
Name
Binary
Bit
Nibble
0000
Byte
0000-0000
16
Word
0000-0000 0000-0000
32
Dword
0000-0000 0000-0000
64
Qword
0000-0000 0000-0000
The first 128 characters make up the ASCII table and represent alpha/numeric
values common punctuation and other values
Hexadecimal
Character
Binary Code
00
NUL
0000-0000
01
SOH
0000-0001
02
STX [1]
0000-0010
o Selecting Unicode will cause EnCase to search for the keyword in both ASCII and Unicode
Unicode uses two bytes for each character, allowing the representation of 65,536
characters
THE BIOS
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
32
Power
Button
BIOS
POST
BIOS FROM
ADD-IN CARDS
Boot
Sequence?
No
Yes
Boot
Record?
No
C:
Other Devices
Go to Boot Partition
Boot Record
Io.sys
Yes
Msdos.sys
Io.sys
Msdos.sys
Config.sys
Optional
Config.sys
Command.Com
Command.Com
Autoexec.bat
Autoexec.bat
Logical File
3045 Bytes
File Slack
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
33
Sector/RAM slack is zeroed out prior to writing it to the drive (00 00)
In Windows 95A and older sector/RAM slack will contain actual data from
RAM, and it will be stored on the drive with the file
o Drive slack
Data that is contained in the remaining sectors of a cluster that are not a
part of the current logical file
A logical file of 10 bytes stored in a four-sector cluster will have three sectors of
drive slack
o Directory records
File name
Date/time stamps (Created, Accessed, Written)
Starting cluster
o A directory (or folder) is a file with a unique header and a logical size
of zero
Cluste r
Le ngth
1000
1002
1004
24888
79415
88212
952
890
5000
11000
34212
10212
Acce sse d
W ritte n
Cre a te d
8/25/00
8/25/00
8/25/00
8/25/00
8/25/00
8/25/00
8/22/00
6/15/98
7/12/99
8/25/00
7/31/00
8/25/00
8/22/00
6/15/98
7/12/99
8/1/00
6/20/00
8/25/00
.
..
MyNote .TXT
Picture 1.GIF
Picture 2.JPG
Job Se a rch.DOC
Re port.DOC
Pe rsona l Le tte r.DOC
Directory
Entry
File Allocation
Table
Clusters
(Allocation Units)
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
34
Directory Entry
Name
Cluster
Length
MyNote.TXT
1000
952
Picture1.GIF
1002
890
Picture2.JPG
1004
5000
Job Search.DOC
24888
11000
Report.DOC
79415
34212
Personal Letter.DOC
88212
10212
EOF
EOF
EOF
EOF
EOF
EOF
1000
1001
1002
1003
1004
1005
EOF
EOF
1005
EOF
FAT
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
35
FILE SYSTEMS
o FAT 32
2 ^ 28 = 268,435,456 total allocation units
4 bits are reserved by Microsoft
exFAT was originally created for USB flash drives and SD cards, but can be used to
format volumes under Windows 7
The exFAT file system uses 32 bits within the table and has a limit of 4,294,967,285
(232 11) cluster addresses
The exFAT file system uses free space bitmaps to reduce fragmentation and free
space allocation/detection issues
o Each cluster is tracked in the bitmap
o A single bit is used for each cluster on the volume
When a file is created within exFAT, a different sequence of events may occur than in
FAT
o If the file is fragmented, then exFAT functions as FAT does
o If the file is not fragmented, the FAT is not updated
Within the directory entries of the exFAT file system, there are
multiple, 32-byte records at least three for each directory entry.
Each record has an identifier byte:
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
36
When a file is deleted, the first bit of the identifier of the record is changed
from 1 to 0, changing the identifier to reflect a record not in use
o It is also possible for the Directory Entry Record to be changed in this
manner if the file is renamed
This means that if the file was fragmented and there was a cluster
chain, the chain is not destroyed on deletion
Resident files
o Data resides within MFT record for file
o Data does not begin at the beginning of a sector/cluster
Nonresident files
o Data not within MFT Record
o MFT record houses pointers to clusters storing file
o Pointers in the form of a data run
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
37
Also installed on the motherboard are the Random Access Memory, the Read Only
Memory, and add-in cards, such as video cards, Network Interface Cards (NIC),
Small Computer System Interface (SCSI) cards
Legacy SCSI hard disk drives require a controller card on the motherboard
First response
Acquisition of digital evidence
Operating system artifacts
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
38
FIRST RESPONSE
At the Scene
o Photograph, take notes, sketch
o Image RAM
EnCase Portable or WinEn
o Take down the system whether pull plug or shut down depends on
circumstances
Shut Down if UNIX/Linux or server
Pull Plug it depends on circumstances
FIRST RESPONSE
o EnCase Portable
FIRST RESPONSE
Onsite triage
o Tableau Fastest
Gallery view, hash/file signature analysis, logical and physical searches
with GREP, copy/unerase, EnScript programs, etc.
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
39
EXT2/3/4 (Linux)
Reiser (Linux)
UFS (Solaris)
CDFS (Joliet, ISO9660, UDF)
DVD
Macintosh HFS/HFS+, Mac OS X (BSD)
HP-UX
Etc
o The examiner can also restore the physical drive to a drive of equal or larger
size
The restored drive is verified by the MD5 and/or SHA1 hash value
o A volume may also be restored to a partition containing the same file system
The restored partition is verified by the MD5 and/or SHA1 hash value
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
40
Laboratory procedures
o Cross contamination
Wipe lab examination drives
Recycler
NTFS directory entries and structure
Windows artifacts
o Recent
o Link files
o Desktop
o Send To
o Temp
o Internet Explorer history, cache, favorites, cookies
o Enhanced MetaFiles; Print Spooler
o Windows 7 C:\Users\
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
41
LEGAL ISSUES
o Compression of acquired data does not affect admissibility under the Best
Evidence Rule
o If original evidence must be returned to the owner, the forensic image could
be considered the Best Evidence
LEGAL ISSUES
Daubert/Frye
o Legal test to determine if a scientific or technical process for obtaining,
enhancing, or analyzing evidence is acceptable
Elements of Daubert
o Has the process been tested and subject to peer review?
o Does the process enjoy general acceptance in the related community?
o Can the findings be duplicated or repeated?
Copyright 2015 Guidance Software, Inc. May not be copied or reproduced without the written permission of Guidance Software, Inc.
42