Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation.

Slides:



Advertisements
Similar presentations
COEN 252 Computer Forensics Hard Drive Geometry. Drive Geometry Basic Definitions: Track Sector Floppy.
Advertisements

A Strategy for Testing Hardware Write Block Devices James R Lyle National Institute of Standards and Technology.
Jim Lyle National Institute of Standards and Technology.
Deleted File Recovery Tool Testing Results Jim Lyle NIST 2/21/13AAFS -- Washington 1.
Creating Deleted File Recovery Tool Testing Images Jim Lyle National Institute of Standards and Technology.
© Vera Castleman Software Grade 10. What is software? A program is a collection of instructions to do a job. Programs are collectively known as SOFTWARE.
Sanitizing Data from Storage Devices with a Live CD Brian Compton College of Technology – University of Houston Sanitizing Data from Storage Devices with.
Media Sanitization  NIST Guidance  Terms Defined  When is media under/not under your control?  Flowchart for decision making  Spreadsheet of.
14 May 2010Montana Supreme Court Spring Training Conference 1 Verification of Digital Forensic Tools Jim Lyle Project Leader: Computer Forensic Tool Testing.
Disk Clearing and Disk Sanitization
Forensic Tool Testing Results Jim Lyle National Institute of Standards and Technology.
Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test Reports; The Computer Forensics Tool Catalog Website: Connecting Forensic Examiners.
IT Infrastructure: Software September 18, LEARNING GOALS Identify the different types of systems software. Explain the main functions of operating.
Agenda Safe disposal practices for computers and information: –Removing files and folders –Disposing of computers –Disposing of other electronic devices.
1 Web Server Administration Chapter 3 Installing the Server.
1 SOFTWARE TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 2, Thursday 1/18/2007)
Graphic File Carving Tool Testing Jenise Reyes-Rodriguez National Institute of Standards and Technology AAFS - February 19 th, 2015.
Counters and Registers
Mobile Device Forensics Rick Ayers. Disclaimer  Certain commercial entities, equipment, or materials may be identified in this presentation in order.
Mobile Device Forensics - Tool Testing Richard Ayers.
Mass Storage System EMELIZA R. YABUT MSIT. Overview of Mass Storage Structure Traditional magnetic disks structure ◦Platter- composed of one or more.
Passage Three Storage Devices. Training target: In this part , you should try your best to form good reading habits. In order to avoid your ill habits.
Gordon Hughes Feb T13 Change Request re Security Erase Gordon Hughes, UCSD Formerly Seagate (until 1997) PI.
By Drudeisha Madhub Data Protection Commissioner Date:
COEN 252 Computer Forensics
Computer Forensics Tool Catalog: Connecting Users With the Tools They Need AAFS –February 21, 2013 Ben Livelsberger NIST Information Technology Laboratory.
Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?
Quirks Uncovered While Testing Forensic Tool Jim Lyle Information Technology Laboratory Agora March 28, 2008.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Chapter Introduction to Computers and Programming 1.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 8 Understanding and Installing Hard Drives.
Information Technology
NIST CFTT: Testing Disk Imaging Tools James R. Lyle National Institute of Standards and Technology Gaithersburg Md.
Computer Insides and Out Computer Basics 1.1. Basic Personal Computer System  A computer system consists of hardware and software components.  Hardware.
Internal components, Backing Storage, Operating Systems Software
Module Designing Computer-based Information Systems
Active KillDisk © v3.0 Active Data Security Solutions.
Digital Crime Scene Investigative Process
Ben Livelsberger NIST Information Technology Laboratory, CFTT Program
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
IT Essentials Module 1 Review for Test. Hard Drives Know the three common types of interfaces  SCSII  IDE  SATA  Number of devices/controller for.
Media Sanitization at the Idaho National Laboratory Jonathan Bates NLIT 2009.
Securely wiping hard drives The easy way with Live Distros! By Carl Weisheit.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
1 Interface Two most common types of interfaces –SCSI: Small Computer Systems Interface (servers and high-performance desktops) –IDE/ATA: Integrated Drive.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Chapter 5 Organizing Files and Folders. 2Practical PC 5 th Edition Chapter 5 Getting Started In this Chapter, you will learn: − How to get a list of your.
COEN 252 Computer Forensics Hard Drive Geometry. Drive Geometry Basic Definitions: Track Sector Floppy.
An Overview of the Computer System lesson 1. This lesson includes the following sections: The Parts of a Computer System Looking Inside the Machine Software:
1.4 Hardware Review. CPU  Fetch-decode-execute cycle 1. Fetch 2. Bump PC 3. Decode 4. Determine operand addr (if necessary) 5. Fetch operand from memory.
Linux+ Guide to Linux Certification Chapter Six Linux Filesystem Administration.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Hard Drives aka Hard Disk Drives Internal, External, and New Solid State Drives.
1 Software. 2 What is software ► Software is the term that we use for all the programs and data on a computer system. ► Two types of software ► Program.
Chapter 8: Installing Linux The Complete Guide To Linux System Administration.
REGISTER TRANSFER LANGUAGE (RTL) INTRODUCTION TO REGISTER Registers1.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Defining, Measuring and Mitigating Errors for Digital Forensic Tools Jim Lyle, Project Leader NIST Computer Forensics Tool Testing Feb 25, 2016AAFS - Las.
INTRODUCTION TO COMPUTERS. A computer system is an electronic device used to input data, process data, store data for later use and produce output in.
An Overview of the Computer System
REGISTER TRANSFER LANGUAGE (RTL)
Information Technology
WhiteCanyon ADISA Presentation
Looking Inside the machine (Types of hardware, CPU, Memory)
An Overview of the Computer System
Operating Systems Tasks 17/02/2019.
Chapter 11: Mass-Storage Systems
What is keystroke logging?
Presentation transcript:

Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that the products are necessarily the best available for the purpose. 2/26/102AAFS

Testing Drive Wipe Tools at CFTT  Computer Forensic Tool Testing project at NIST  Develop materials for testing forensic tools... o Tool Requirements o Test Plans o Test data (also see Simson Garfinkel; Brian Carrier o Tool test reports submitted to NIJ  Anyone can use our test methodology to test tools as needed 2/26/10AAFS3

Drive Wiping  Remove all data from a drive  DCO & HPA o Tool designer may opt to ignore, i.e., “if hidden area there then it’s not used” o Tool designer may decide “every thing must go”  Command used: WRITE or SECURE ERASE  Number of overwrite passes (WRITE command)  Overwrite pattern 2/26/10AAFS4

Number of Passes  DoD standard M for clearing and sanitizing magnetic media recommends the approach "Overwrite all addressable locations with a character, its complement, then a random character and verify” for clearing and sanitizing information on a writable media.  Technology has changed and according to NIST Special Publication Guidelines for Media Sanitization: “ …the change in track density and the related changes in the storage medium have created a situation where the acts of clearing and purging the media have converged. That is, for ATA disk drives manufactured after 2001 (over 15 GB) clearing by overwriting the media once is adequate to protect the media from both keyboard and laboratory attack.” 2/26/105AAFS

Easy Wiping via WRITE  The easy way to wipe a drive in UNIX (Linux, FreeBSD, etc) dd if=/dev/zero of=/dev/xxx Where /dev/xxx is the name of the device to erase Other dd options can be added to taste  There are limitations and costs o Skips DCO, maybe HPA, if present o Ties up a computer (maybe for hours) o Ignores remapped faulty sectors 2/26/106AAFS

Easy Wiping via ERASE  Use CMRR free tool:  Drive must be attached to ATA or SATA interface  Uses SECURE ERASE to wipe drive  PC BIOS often issues SECURITY FREEZE LOCK 2/26/10AAFS7

Options for Wiping  Use write commands to overwrite each visible sector o Only wipes visible sectors, ignores DCO & HPA o DCO & HPA can be removed first  For ATA & SATA can use SECURE ERASE o Also wipes (accessible) remapped bad sectors o Must remove DCO & HPA first (Some drives implement SECURE ERASE to erase HPA too)  Destroy or degauss the drive 2/26/108AAFS

Wipe Tool Features  Choice of WRITE or ERASE command  Number of overwrites  Verification pass  Overwrite pattern: Constant byte, random byte, random sequence  Removal and wiping for HPA or DCO  Interface: ATA, SATA, SCSI, USB & FireWire  Hardware device or Software tool 2/26/109AAFS

CFTT Disk Wipe Requirements  Wipe method: WRITE or ERASE  HPA & DCO wipe and removal  User notification if ERASE selected but not supported by the drive  Features (may be selected, but) not verified: o Multi-pass o Verify o randomness 2/26/10AAFS10

Test Cases  Run 1 &2 for each interface: ATA, SATA, USB, etc  Run 2, 4 & 5 only if SECURE ERASE supported  Run 3 & 4 only on SATA & ATA interface 2/26/10AAFS11 Test Cases 1.Use WRITE on visible sectors 2.Use ERASE on visible sectors 3.Use WRITE on HPA/DCO 4.Use ERASE on HPA/DCO 5.Try to use ERASE on unsupported drive

Test Case Selection Tool 2/26/10AAFS12

Generated Test Plan 2/26/10AAFS13

Running a Test Case 1.Remove DCO/HPA 2.Use NIST tool to fill each sector: 00000/000/ XXX … 3.Optional: add DCO/HPA (cases 3 & 4) 4.Run wipe tool under test 5.Examine result with more NIST tools: DCO/HPA state, drive content 2/26/10AAFS14

Test Support Tools  DISKWIPE – put initial content on drive  DSUMM – disk summary, count number of times each byte value is seen  RANSUM – identify runs of wiped sectors and runs of unchanged sectors  One freeware program HDAT2 (not NIST written) to manipulate DCO & HPA 2/26/10AAFS15

Case Setup 2/26/10AAFS16

Test Result 2/26/10AAFS17

Erase Toshiba with HPA Initial setup size: from total of (with hidden) IDE disk: Model (TOSHIBA MK2049GSY) serial # (788DT0FLT) Size after tool runs: from total of (with hidden) Analysis of tool result – bytes, sectors, 14 distinct values seen sectors have printable text Sector is first sector with printable text Results  HPA not erased and not removed 2/26/10AAFS18

Erase Hitachi with HPA 2/26/10AAFS19 Initial setup size: from total of (with hidden) IDE disk: Model (Hitachi HTS722020K9SA00) serial # Size after tool runs: from total of (with hidden) Analysis of tool result bytes, sectors, 1 distinct values seen Results HPA set to zeros HPA left in place

Reading a CFTT Report  Results Summary section has everything most people need to read.  Test Case Selection section describes why we selected each case. May be useful for deeper understanding or if someone wants to do their own testing.  Test Materials describes the drives used, support tools used, setup procedures and analysis procedures. Not useful unless... o Assess validity of testing o Want to do your own  Test Details – don’t go here! We include it to allow verification of what is reported in the Results Summary. 2/26/10AAFS20

Results Over 6 Tools  All visible sectors wiped – all tools  HPA removed but not wiped  HPA wiped but not removed (ERASE)  Remove and wipe both HPA & DCO  HPA & DCO ignored  HPA & DCO ignored in 1 pass mode, removed & wiped in “DoD 7 pass” mode  Scratch drive required with some writing to the scratch drive 2/26/10AAFS21 Drive eRazerVoom Hard Copy IIBoot & Nuke Disk Jockey PRO FEOmniclone 2XiTD1

5/2/2015AAFS Project Sponsors (aka Steering Committee)  National Institute of Justice (Major funding)  FBI (Additional funding)  Department of Defense, DCCI (Equipment and support)  Homeland Security (Major funding)  State & Local agencies (Technical input)  Internal Revenue, IRS (Technical input)  NIST/OLES (Program management)

Contact Information 2/26/10AAFS23 Sue Ballou, Office of Law Enforcement Standards Steering Committee representative for State/Local Law Enforcement Jim Lyle Craig Russell