Lecture 9 Data Analysis and Validation
Lecture 9 Data Analysis and Validation
References:
Guide to Computer Forensics and Investigations
Certified Ethical Hacker and Forensic Investigations
Objectives
Investigations
Evidence
Analysis: Non-Volatile
source: CHFI
Investigations
Evidence
source: CHFI
Analysis: Network
Investigations
source: CHFI
Analysis: Files
Investigations
Approaching Computer
Forensics Cases
Some basic principles apply to almost all computer forensics cases
• The approach you take depends largely on the specific type of case you’re investigating
Disadvantages
Advantages •Hard to find support for
problems Also need to identify what
•Customized to your needs
•Can become expensive if you intend to analyze
•Save money
careless
Disk manipulation
• Hidden partitions
• Bad clusters
Encryption
• Bit shifting
• Steganography
Hiding Partitions
Delete references to a
partition using a disk
editor
• Re-create links for
accessing it
Use disk-partitioning
utilities
• GDisk
• PartitionMagic
• System Commander
• LILO
Bit Shifting
• Old technique
• Shift bit patterns to
alter byte values of
data
• Make files look like
binary executable
code
• Tool
• Hex Workshop
Using Steganography to
Hide Data
Steganography tools were created to
protect copyrighted material
Greek for “hidden writing”
• By inserting digital watermarks into a file
• Dictionary attack
• Brute-force attack
• Password guessing based on suspect’s profile
Tools
• AccessData PRTK
• Advanced Password Recovery Software Toolkit
• John the Ripper
Recovering Passwords:
PRTK
Using AccessData tools
with password and
encrypted files
• AccessData offers a tool
called Password
Recovery Toolkit (PRTK)
• Can create possible
password lists from
many sources
• Can create your own
custom dictionary based
on facts in the case
• Can create a suspect
profile and use
biographical information
to generate likely
passwords
Recovering Passwords
(continued)
• DiskExplorer for FAT • Requires the Runtime Software, a • Requires running HDHOST on a
• DiskExplorer for NTFS portable media device (USB thumb suspect’s computer
• HDHOST drive or floppy disk), and two • To establish a connection with
networked computers HDHOST, the suspect’s computer
• a remote access program for
communication between two must be:
computers • Connected to the network
• The connection is established by • Powered on
using the DiskExplorer program • Logged on to any user account
(FAT or NTFS) corresponding to with permission to run non-
the suspect (remote) computer’s installed applications
file system. • HDHOST can’t be run surreptitiously
• See Figures 9-18 through 9-24
Remote Acquisitions with
Runtime Software (continued)
Remote Acquisitions with
Runtime Software (continued)
Remote Acquisitions with
Runtime Software (continued)