Current Computer Forensics Tools
Current Computer Forensics Tools
Current Computer Forensics Tools
Tools
Objectives
• Validation
– Ensuring the integrity of data being copied
• Discrimination of data
– Involves sorting and searching through all
investigation data
Validation and discrimination
(continued)
• Subfunctions
– Hashing(process of converting a given key into another value)
• CRC-32, MD5, Secure Hash Algorithms
– Filtering
• Known system files can be ignored
• Based on hash value sets
– Analyzing file headers
• Discriminate files based on their types
• National Software Reference Library (NSRL) has compiled a
list of known file hashes(algorithm that calculates a fixed-size
bit string value from a file)
• CRC32 is a popular checksum algorithm used to
detect data corruption.
• The MD5 hash function was originally designed for
use as a secure cryptographic hash algorithm for
authenticating digital signatures
• SHA-1 (short for Secure Hash Algorithm 1) is one
of several cryptographic hash functions. SHA-1 is
most often used to verify that a file has been
unaltered.
Tasks Performed by Computer
Forensics Tools (continued)
Validation and discrimination
(continued)
• Subfunctions
– Data viewing
– Keyword searching
– Decompressing
– Carving (reconstructing
file fragments)
– Decrypting
– Bookmarking
• Keyword search speeds up analysis for
investigators
FTK's Search Pane
Extraction (continued)
A.Acquisition
B.Validation
C.Discrimination
D.Carving
E.Extraction
Which task includes creating a
working duplicate of the
evidence hard disk on a
physical hard disk?
A.Discrimination
B.Carving
C.Extraction
D.Reconstruction
E.Reporting
Which task includes remotely
imaging a suspect's hard drive?
A.Acquisition
B.Validation
C.Extraction
D.Reconstruction
E.Reporting
Which tool allows you to boot
from the evidence drive safely?
A.VOOM Shadow 2
B.Hardware write-blocker
C.FTK Imager
D.VMware
E.EnCase
Shadow 3 offers investigators the unique ability to boot
and interact with systems running any operating system
without affecting the data on connected drives. Whether
it's a computer, a game console, a DVR, or something else,
you can see what's on the system—in the field, in the lab,
or in court. Hardware write-blocking ensures that drives in
evidence remain unchanged, even as the system performs
operations that normally write changes to the drive. With
Shadow 3, you get the speed and convenience of exploring
suspect systems through their native environments while
preserving your evidence.
Computer Forensics Software
Tools
Computer Forensics Software Tools
• Helix
– Helix is an incident response and computer forensics
toolkit based on the popular Knoppix Live bootable
CD.
– It contains dozens of tools for incident response on
Windows and Linux systems.
• Autopsy and SleuthKit
– Sleuth Kit is a Linux forensics tool
– Autopsy is the GUI/browser interface used to access
Sleuth Kit’s tools
UNIX/Linux Forensic Tools (continued)
• Knoppix-STD
– Knoppix Security Tools Distribution (STD)
• A collection of tools for configuring security measures,
including computer and network forensics
– Knoppix-STD is forensically sound
• Doesn’t allow you to alter or damage the system
you’re analyzing
– Knoppix-STD is a Linux bootable CD
BackTrack
http://forensicir.blogspot.com/2009/07/uns
ung-tools-raptor-forensics.html
http://forensicir.blogspot.com/2009/07/unsung-tools-raptor-
forensics.html
Advantages & Disadvantages
• Advantages
– Ease of use
– Multitasking
– No need for learning older OSs
• Disadvantages
– Excessive resource requirements
– Produce inconsistent results
– Create tool dependencies
Computer Forensics
Hardware Tools
Computer Forensics Hardware Tools
• Having vendor support can save you time and frustration when you have
problems
Using a Write-Blocker
• Write-blocker
– Prevents data writes to a hard disk
• Software-enabled blockers
– Software write-blockers are OS dependant
– Example: PD(physical Drive)Block from Digital
Intelligence
• DOS only, not Windows
• Hardware options
– Ideal for GUI forensic tools
– Act as a bridge between the suspect drive and the
forensic workstation
Using a Write-Blocker (continued)
• Can navigate to the blocked drive with any application
• Discards the written data
– For the OS the data copy is successful
• Connecting technologies
– FireWire(high-speed computer data-transfer interface used
to connect personal computers, audio and video devices)
– USB 2.0(connect a variety of peripheral devices such as
mice, keyboards, printers, scanners, external hard drives)
– SCSI controllers(chip that allows a Small Computer System
Interface (SCSI) storage device to communicate with the
operating system across a SCSI bus.)
Recommendations for a Forensic
Workstation
• Disk editors
– Do not have a flashy interface
– Reliable tools
– Can access raw data
• Computer Forensics Examination Protocol
– Perform the investigation with a GUI tool
• Usually FTK or EnCase
– Verify your results with a disk editor
– If a file is recovered, compare hash values obtained
with both tools
Using Validation Protocols (continued)
A.FTK
B.EnCase
C.Raptor
D.Hex Editor
E.NSRL
Which tool has a Forensics
Mode, but does not boot into
that mode by default?
A.Norton DiskEdit
B.Helix
C.Knoppix-STD
D.Raptor
E.BackTrack
Which tool used to be free but
now costs money?
A.SMART
B.Helix
C.Knoppix-STD
D.Raptor
E.BackTrack
Which tool comes built in to
Windows?
A.DIR /Q
B.SMART
C.Helix
D.Autopsy & SleuthKit
E.BackTrack