Guide To Computer Forensics and Investigations Fourth Edition
Guide To Computer Forensics and Investigations Fourth Edition
and Investigations
Fourth Edition
Chapter 7
Current Computer Forensics
Tools
Objectives
• Validation
– Ensuring the integrity of data being copied
• Discrimination of data
– Involves sorting and searching through all
investigation data
Validation and discrimination
(continued)
• Subfunctions
– Hashing
• CRC-32, MD5, Secure Hash Algorithms
– Filtering
• Known system files can be ignored
• Based on hash value sets
– Analyzing file headers
• Discriminate files based on their types
• National Software Reference Library (NSRL) has
compiled a list of known file hashes
– For a variety of OSs, applications, and images
Tasks Performed by Computer
Forensics Tools (continued)
Validation and discrimination
(continued)
• Subfunctions
– Data viewing
– Keyword searching
– Decompressing
– Carving (reconstructing
file fragments)
– Decrypting
– Bookmarking
• Keyword search speeds up analysis for
investigators
FTK's Search Pane
Extraction (continued)
• Considerations
– Flexibility
– Reliability
– Expandability
– Keep a library with older version of your tools
• Create a software library containing older versions
of forensics utilities, OSs, and other programs
iClicker Questions
Which task includes removing
files that are known Windows
system files?
A.Acquisition
B.Validation
C.Discrimination
D.Carving
E.Extraction
Which task includes creating a
working duplicate of the
evidence hard disk on a
physical hard disk?
A.Discrimination
B.Carving
C.Extraction
D.Reconstruction
E.Reporting
Which task includes remotely
imaging a suspect's hard drive?
A.Acquisition
B.Validation
C.Extraction
D.Reconstruction
E.Reporting
Which tool allows you to boot
from the evidence drive safely?
A.VOOM Shadow 2
B.Hardware write-blocker
C.FTK Imager
D.VMware
E.EnCase
Computer Forensics Software
Tools
Computer Forensics Software Tools
• Helix
– One of the easiest suites to begin with
– You can load it on a live Windows system
• Loads as a bootable Linux OS from a cold boot
• Autopsy and SleuthKit
– Sleuth Kit is a Linux forensics tool
– Autopsy is the GUI/browser interface used to access
Sleuth Kit’s tools
UNIX/Linux Forensic Tools (continued)
• Knoppix-STD
– Knoppix Security Tools Distribution (STD)
• A collection of tools for configuring security measures,
including computer and network forensics
– Knoppix-STD is forensically sound
• Doesn’t allow you to alter or damage the system
you’re analyzing
– Knoppix-STD is a Linux bootable CD
BackTrack
• Disadvantages
– Excessive resource requirements
– Produce inconsistent results
– Create tool dependencies
Computer Forensics
Hardware Tools
Computer Forensics Hardware Tools
• Write-blocker
– Prevents data writes to a hard disk
• Software-enabled blockers
– Software write-blockers are OS dependant
– Example: PDBlock from Digital Intelligence
• DOS only, not Windows (link Ch 6f)
• Hardware options
– Ideal for GUI forensic tools
– Act as a bridge between the suspect drive and the
forensic workstation
Using a Write-Blocker (continued)
• Disk editors
– Do not have a flashy interface
– Reliable tools
– Can access raw data
• Computer Forensics Examination Protocol
– Perform the investigation with a GUI tool
• Usually FTK or EnCase
– Verify your results with a disk editor
– If a file is recovered, compare hash values obtained
with both tools
Using Validation Protocols (continued)
A.FTK
B.EnCase
C.Raptor
D.Hex Editor
E.NSRL
Which tool has a Forensics
Mode, but does not boot into
that mode by default?
A.Norton DiskEdit
B.Helix
C.Knoppix-STD
D.Raptor
E.BackTrack
Which tool used to be free but
now costs money?
A.SMART
B.Helix
C.Knoppix-STD
D.Raptor
E.BackTrack
Which tool comes built in to
Windows?
A.DIR /Q
B.SMART
C.Helix
D.Autopsy & SleuthKit
E.BackTrack