Guide To Computer Forensics and Investigations Fourth Edition
Guide To Computer Forensics and Investigations Fourth Edition
Guide To Computer Forensics and Investigations Fourth Edition
and Investigations
Fourth Edition
Chapter 7
Computer Forensics Analysis and
Validation
Objectives
• Considerations
– Determine the scope of the investigation
– Determine what the case requires
– Whether you should collect all information
– What to do in case of scope creep
• The key is to start with a plan but remain flexible in
the face of new evidence
Using AccessData Forensic Toolkit to
Analyze Data
• Supported file systems: FAT12/16/32, NTFS, Ext2fs,
and Ext3fs
• FTK can analyze data from several sources, including
image files from other vendors
• FTK produces a case log file
• Searching for keywords
– Indexed search
– Live search
– Supports options and advanced searching techniques,
such as stemming
Using AccessData Forensic Toolkit to
Analyze Data (continued)
Using AccessData Forensic Toolkit to
Analyze Data (continued)
Using AccessData Forensic Toolkit to
Analyze Data (continued)
• File manipulation
– Filenames and extensions
– Hidden property
• Disk manipulation
– Hidden partitions
– Bad clusters
• Encryption
– Bit shifting
– Steganography
Hiding Partitions
• Old technique
• Shift bit patterns to alter byte values of data
• Make files look like binary executable code
• Tool
– Hex Workshop
Bit-shifting (continued)
Bit-shifting (continued)
Bit-shifting (continued)
Using Steganography to Hide Data
• Techniques
– Dictionary attack
– Brute-force attack
– Password guessing based on suspect’s profile
• Tools
– AccessData PRTK
– Advanced Password Recovery Software Toolkit
– John the Ripper
Recovering Passwords (continued)