0% found this document useful (0 votes)
24 views

Lecture 9 Data Analysis and Validation

This lecture discusses data analysis and validation in computer forensics investigations. It covers determining what data to analyze based on the scope of the investigation. Tools used to validate data include hexadecimal editors to manually hash files and sectors to ensure integrity. Common data hiding techniques discussed are file manipulation, disk manipulation using hidden partitions or marked bad clusters, encryption, bit shifting, and steganography.

Uploaded by

ku.hariamu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Lecture 9 Data Analysis and Validation

This lecture discusses data analysis and validation in computer forensics investigations. It covers determining what data to analyze based on the scope of the investigation. Tools used to validate data include hexadecimal editors to manually hash files and sectors to ensure integrity. Common data hiding techniques discussed are file manipulation, disk manipulation using hidden partitions or marked bad clusters, encryption, bit shifting, and steganography.

Uploaded by

ku.hariamu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

LECTURE 9:

DATA ANALYSIS AND


VALIDATION

References:
Guide to Computer Forensics and Investigations
Certified Ethical Hacker and Forensic Investigations
Objectives

• Determine what data to analyze in a computer


forensics investigation
• Explain tools used to validate data
• Explain common data-hiding techniques
• Describe methods of performing a remote
acquisition
Determining What Data
to Collect and Analyze

Examining and analyzing


digital evidence depends on: Scope creep
• Nature of the case
• Investigation expands beyond
• Amount of data to process the original description
• Search warrants and court
orders
• Company policies

Right of full discovery of digital


evidence
Analysis: Volatile Evidence
source: CHFI
Analysis: Volatile Evidence
source: CHFI
source: CHFI
Analysis: Volatile Evidence

Guide to Computer Forensics and


6

Investigations
Evidence
Analysis: Non-Volatile
source: CHFI

Guide to Computer Forensics and


7

Investigations
Evidence
source: CHFI
Analysis: Network

Guide to Computer Forensics and


8

Investigations
source: CHFI
Analysis: Files

Guide to Computer Forensics and


9

Investigations
Approaching Computer
Forensics Cases
Some basic principles apply to almost all computer forensics cases
• The approach you take depends largely on the specific type of case you’re investigating

Basic steps for all computer forensics investigations


• For target drives, use only recently wiped media that have been reformatted and inspected for
computer viruses
• Inventory the hardware on the suspect’s computer and note the condition of the computer when
seized
• Remove the original drive from the computer
• Check date and time values in the system’s CMOS
• Record how you acquired data from the suspect drive
• Process the data methodically and logically
• List all folders and files on the image or drive
• If possible, examine the contents of all data files in all folders
• Starting at the root directory of the volume partition
• For all password-protected files that might be related to the investigation
• Make your best effort to recover file contents
• Identify the function of every executable (binary or .exe) file that doesn’t match known hash values
• Maintain control of all evidence and findings, and document everything as you progress through
your examination
Refining and Modifying
the Investigation Plan
Considerations
• Determine the scope of the investigation
• Determine what the case requires
• Whether you should collect all information
• What to do in case of scope creep

The key is to start with a plan but


remain flexible in the face of new
evidence
Using AccessData Forensic
Toolkit to Analyze Data

FTK can analyze data


Supported file systems: from several sources,
FAT12/16/32, NTFS, including image files
Ext2fs, and Ext3fs from other vendors

Searching for keywords


• Indexed search
FTK produces a case log • Live search
file • Supports options and
advanced searching
techniques, such as
stemming

You can generate reports


Analyzes compressed
files • Using bookmarks
Validating Forensic
Data

One of the most critical Ensuring the integrity of


aspects of computer data you collect is essential
forensics for presenting evidence in
court

Computer forensics tools


have some limitations in
Most computer forensic performing hashing
tools provide automated
hashing of image files • Learning how to use advanced
hexadecimal editors is necessary
to ensure data integrity
Validating with
Hexadecimal Editors
Advanced hexadecimal editors offer many
features not available in computer forensics
tools
•Such as hashing specific files or sectors

Hex Workshop provides several hashing


algorithms
•Such as MD5 and SHA-1
•See Figures 9-4 through 9-6

Hex Workshop also generates the hash


value of selected data sets in a file or sector

Using hash values to discriminate data


•AccessData has a separate database, the Known File
Filter (KFF)
•Filters known program files from view, such as
MSWord.exe, and identifies known illegal files, such
as child pornography
•KFF compares known file hash values to files on your
evidence drive or image files
•Periodically, AccessData updates these known file
hash values and posts an updated KFF
Validating with Computer
Forensics Programs
ProDiscover’s .eve files
contain metadata that
Commercial computer includes the hash value
forensics programs have
built-in validation features •Validation is done
automatically

Raw format image files (.dd In AccessData FTK Imager


extension) don’t contain
metadata • When you select the
Expert Witness (.e01) or
• So you must validate raw the SMART (.s01) format
format image files • Additional options for
manually to ensure the validating the acquisition
integrity of data are displayed
• Validation report lists MD5
and SHA-1 hash values

Figure 9-7 shows how


ProDiscover’s built-in
validation feature works
Performing Computer Forensic
Analysis: Forensic Workstations
Categories
•Stationary
Carefully consider what you •Portable Balance what you need and
need what your system can handle
•Lightweight

Police agency labs


•Need many options Private corporation labs
•Use several PC Keep a hardware library in
configurations •Handle only system types addition to your software
used in the organization library

Disadvantages
Advantages •Hard to find support for
problems Also need to identify what
•Customized to your needs
•Can become expensive if you intend to analyze
•Save money
careless

You can buy one from a


vendor as an alternative Having vendor support can Can mix and match
•Examples save you time and components to get the
•F.R.E.D. frustration when you have capabilities you need for
•F.I.R.E. IDE problems your forensic workstation
Addressing Data-hiding
Techniques
File manipulation
• Filenames and extensions
• Hidden property

Disk manipulation
• Hidden partitions
• Bad clusters

Encryption
• Bit shifting
• Steganography
Hiding Partitions
Delete references to a
partition using a disk
editor
• Re-create links for
accessing it

Use disk-partitioning
utilities
• GDisk
• PartitionMagic
• System Commander
• LILO

Account for all disk


space when analyzing a
disk
Marking Bad Clusters

Marking Bad Clusters

• Common with FAT systems


• Place sensitive information on free space
• Use a disk editor to mark space as a bad cluster
• To mark a good cluster as bad using Norton Disk Edit
• Type B in the FAT entry corresponding to that cluster
Bit-shifting

Bit Shifting

• Old technique
• Shift bit patterns to
alter byte values of
data
• Make files look like
binary executable
code
• Tool
• Hex Workshop
Using Steganography to
Hide Data
Steganography tools were created to
protect copyrighted material
Greek for “hidden writing”
• By inserting digital watermarks into a file

Suspect can hide information on


image or text document files Very hard to spot without prior
• Most steganography programs can knowledge
insert only small amounts of data
into a file

Tools: S-Tools, DPEnvelope, jpgx,


Steghide etc.
Recovering Passwords
Techniques

• Dictionary attack
• Brute-force attack
• Password guessing based on suspect’s profile

Tools

• AccessData PRTK
• Advanced Password Recovery Software Toolkit
• John the Ripper
Recovering Passwords:
PRTK
Using AccessData tools
with password and
encrypted files
• AccessData offers a tool
called Password
Recovery Toolkit (PRTK)
• Can create possible
password lists from
many sources
• Can create your own
custom dictionary based
on facts in the case
• Can create a suspect
profile and use
biographical information
to generate likely
passwords
Recovering Passwords
(continued)

Using AccessData tools with


password and encrypted files
(continued)

• FTK can identify known


encrypted files and those that
seem to be encrypted and
export them
• You can then import these files
into PRTK and attempt to crack
them
Performing Remote
Acquisitions

Remote acquisitions are handy when you


need to image the drive of a computer far
away from your location
• Or when you don’t want a suspect to
be aware of an ongoing investigation
Remote Acquisitions
with Runtime Software
Runtime Software offers the
Preparing DiskExplorer and HDHOST Making a remote connection with
following shareware programs for
for remote acquisitions DiskExplorer
remote acquisitions:

• DiskExplorer for FAT • Requires the Runtime Software, a • Requires running HDHOST on a
• DiskExplorer for NTFS portable media device (USB thumb suspect’s computer
• HDHOST drive or floppy disk), and two • To establish a connection with
networked computers HDHOST, the suspect’s computer
• a remote access program for
communication between two must be:
computers • Connected to the network
• The connection is established by • Powered on
using the DiskExplorer program • Logged on to any user account
(FAT or NTFS) corresponding to with permission to run non-
the suspect (remote) computer’s installed applications
file system. • HDHOST can’t be run surreptitiously
• See Figures 9-18 through 9-24
Remote Acquisitions with
Runtime Software (continued)
Remote Acquisitions with
Runtime Software (continued)
Remote Acquisitions with
Runtime Software (continued)

Making a remote acquisition with


DiskExplorer

• After you have established a connection


with DiskExplorer from the acquisition
workstation
• You can navigate through the suspect
computer’s files and folders or copy data
• The Runtime tools don’t generate a hash
for acquisitions
Summary

Examining and analyzing digital For most computer forensics


evidence depends on the nature of investigations, you follow the same
the investigation and the amount general procedures
of data you have to process

One of the most critical aspects of Data hiding involves changing or


computer forensics is validating manipulating a file to conceal
digital evidence information

Remote acquisitions are useful for


making an image of a drive when
the computer is far away from your
location or when you don’t want a
suspect to be aware of an ongoing
investigation

You might also like