Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics
Introduction Two types of duplications Simple duplication: copying specific data Forensic duplication: an accurate copy (image of every accessible bit) The tool used to make the image must Have the ability to copy every bit of accessible data Create a forensic duplicate of the original storage medium Handle the read errors in a robust and graceful manner Not make any changes to the source Generate results that are repeatable and verifiable
Forensic Image Formats There are three primary types of forensic images Complete disk Partition A subset of complete disk image Contains all of the allocation units from a given partition including unallocated space and slack space in that partition May be required under special circumstances Logical Simple duplication May be required under special circumstances
Image Integrity Generate cryptographic checksums Reasons To verify that the result is an exact duplicate To detect if that data is later modified
Traditional Duplication Performed on static drives Hardware write blockers Image creation tools dd and its variations (dcfldd, dc3dd) FTK Imager by AccessData EnCase by Guidance Software
dd and its Variations Weaknesses of dd No built-in capability to generate cryptographic checksum Does not provide feedback during the process DCFLdd Developed by US Department of Defense Computer Forensics Laboratory (DCFL) Derived from the original dd Available at: sourceforge.net/projects/dcfldd DC3dd Developed by Defense Cyber Crime Center Also derived from the original dd Newer than DCFLdd – contains recent updates and features Available at: sourceforge.net/projects/dc3dd
FTK Imager and EnCase FTK Imager Available for MS Windows, Linux, and Mac OS Windows version is GUI based Full version Lite version: Portable – will run directly from a removable media Encase Available for MS Windows and Linux
Live System Duplication Imaging a system that is actively running Not a preferred method May be the only option available under some circumstances Riskier No writer blocker to prevent overwriting the evidence The process will make minor changes to the source system The image may not be the exact duplicate The source is dynamic
Live System Duplication Never install anything on the source drive Run tools from external media or network shares Use software that is lightweight to minimize the impact on the source Example: FTK Imager Lite