OPEN SOURCE TOOLS Dr. Abraham Professor UTPA. Open Source Freely redistributable Provides access to source code End user may modify source code.

Slides:



Advertisements
Similar presentations
Intro to WinHex CSC 414.
Advertisements

Chapter 12: File System Implementation
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Operating Systems File Management.
Part IV: Memory Management
The Zebra Striped Network Filesystem. Approach Increase throughput, reliability by striping file data across multiple servers Data from each client is.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
File Systems Examples.
The Sleuth Kit Brian Carrier Set of tools to analyze device images.
File System Analysis.
Lecture 10: The FAT, VFAT, and NTFS Filesystems 6/17/2003 CSCE 590 Summer 2003.
1 File Management in Representative Operating Systems.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Chapter 12 File Management Systems
1 Course Outline Processes & Threads CPU Scheduling Synchronization & Deadlock Memory Management File Systems & I/O Networks, Protection and Security.
COEN 252 Computer Forensics
Sleuthkit/Autopsy Kevin Krause.
Passwords, Encryption Forensic Tools
IT GOVERNANCE AND CYBERCRIME Open Source Forensic Tools 19/04/10.
New Technologies File System
BACS 371 Computer Forensics
F9-Common Forensic Analysis Techniques Dr. John P. Abraham Professor UTPA.
F8-Noncommercial-Based Forensic Duplications Dr. John P. Abraham Professor UTPA.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Computer Forensics COEN 252.  File systems can be extent-based ◦ E.g. NTFS ◦ Storage space is allocated in extents, large sets of contiguous blocks ◦
CHAPTER FOUR COMPUTER SOFTWARE.
Introduction to Interactive Media Interactive Media Tools: Software.
Disk Fragmentation 1. Contents What is Disk Fragmentation Solution For Disk Fragmentation Key features of NTFS Comparing Between NTFS and FAT 2.
1 Interface Two most common types of interfaces –SCSI: Small Computer Systems Interface (servers and high-performance desktops) –IDE/ATA: Integrated Drive.
Managing Disks and Drives Chapter 13 powered by dj.
Multiboot System under Windows XP – Ubuntu – Windows 7 Qiong LIN - 28 April 2012.
File Systems CSCI What is a file? A file is information that is stored on disks or other external media.
Guide to Computer Forensics and Investigations Fourth Edition
Computer Forensics Infosec Pro Guide Ch 6 Testing Your Tools.
Week #3 Objectives Partition Disks in Windows® 7 Manage Disk Volumes Maintain Disks in Windows 7 Install and Configure Device Drivers.
File Storage Organization The majority of space on a device is reserved for the storage of files. When files are created and modified physical blocks are.
File Analysis Dr. John P. Abraham Professor UTPA.
Chapter 18 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of UNIX Systems.
Chapter 12 File Management Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
It consists of two parts: collection of files – stores related data directory structure – organizes & provides information Some file systems may have.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
File system and file structures
COEN 252: Computer Forensics Hard Drive Evidence.
Chapter 8 File Systems FAT 12/16/32. Defragmentation Defrag a hard drive – Control Panel  System and Security  Administration tools  Defrag hard drive.
Chapter 3 Data Acquisition Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with additional info from.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
W4118 Operating Systems Instructor: Junfeng Yang.
VMware Recovery Software RECOVER DATA FROM CORRUPT VMDK FILE.
Lesson 9: SOFTWARE ICT Fundamentals 2nd Semester SY
Day 28 File System.
EXT in Detail High-Performance Database Research Center
Chapter 11: File System Implementation
Chapter 12: File System Implementation
Day 27 File System.
Introduction to Computers
File Management.
Chapter 11: File System Implementation
Forensic Concept of Data
FILE SYSTEM ANALYSIS Dr Fudong Li
Chapter 12 File Management
Chapter 8: Memory management
Outline Module 1 and 2 dealt with processes, scheduling and synchronization Next two modules will deal with memory and storage Processes require data to.
Project 3: An Introduction to File Systems
Understanding Forensic Images
Recap – Intro to Project 3 and FAT32
FAT File System.
Disk Image Forensics Part II
Presentation transcript:

OPEN SOURCE TOOLS Dr. Abraham Professor UTPA

Open Source Freely redistributable Provides access to source code End user may modify source code

Benefits of Open Source tools Education Portability Move from one OS to another, computer to another, job to job, and so on. Flexibility You can choose how to use your tools. Install on local or temote systems. Price free

Preparing the examination system Build - Take the source code and convert to useable form. If the tool works on a interpreted language such as Perl, Python or Ruby, install it. Image Files – are forensic copies of the media. –Raw image files (bit by bit copy of the media) and forensic containers (special file format specifically for forensics) are two forms of image files.

How to make an Operating system image mkifs utility – may be bootable or non- bootable. mkefs utility – can create flash file system.

Working with images To use a raw image file use losetup command to create a “loop device” associated with a disk image. –A loop device is a virtual device that allows a disk image to be treat as if it were an actual disk. –You need to give appropriate offset sector for this command. If you do not know it, you can first run the mml s command. losetup [ -e encryption ] [ -o offset ] loop_device file -d will detach the device.

Working with Forensic containers The two forensic container formats are EWF (Expert Witness Format - encase) and AFF (advanced forensic format - open source).

Windows as a host We can create a unix like environment under windows using Cygwin.dll. Through Cygwin we can compile and use linux source codes. Windows does not have losetup. But we can use ImDisk which has much of the same functionality.

Disk and File System Analysis Identification: determine which active and deleted files are available in a volume. Extraction: Retrieval of relevant file data and metadata. Analysis

Concepts –Disk – Physical device –Volume – Collection of one or more partitions. Created by using part of a disk, or whole disk or multiple disks. –File System – layout of files on a volume. –Data unit – smallest available unit of data storage, such as blocks (multiple sectors). –Metadata (inodes in unix) –File name – consists of folder and file names.

Sleuth Kit Sleuth Kit (TSK) developed by Brian Carrier is an updated version of Coroner’s toolkit (TCT). –Supports raw disk images and other image formats such as libEWF and AFFlib. “mm-”: tools that operate on volumes (media management) “fs-” tools that operate on file system structures. “blk-” operate on data unit or block layer. “i-”: operate on the metadata or inode. “f-”: operate on file name layer “img-” operate on image

Volume Layer tools mmstat – type of volume system in use. Will display non allocated space before, after and between volumes.

File System Layer Tools fsstat displays file system information such as: File system type, volume name, volume ID, last written date, last mounted date, checked date, etc.

Data Unit layer tools blkstat command displays information about specific data unit. It can be used to extract all unallocated space of the file system.

Metadata layer tools istat command displays information about a specific metadata structure: ownership, time information, block allocation, etc.)

File Name Layer tools fls lists file names (deleted and allocated).

Image file tools img_stat will display information about the image. img_cat will display content of an image.

Carving Foremost is a file carving program that extracts meaningful file content from unstructured streams of data. You can provide specific words to search. –Deleted files – recoverable –Orphaned files - link between file name and meta data is no longer accurate. –Unallocated- unlinked or reused metadata structure. –Overwritten. Only fragments can be obtained. –Slack space.

DD Create a copy, image. dd inputfile and outputfile dcfldd and dc3dd are specifically designed copy for forensics.