Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas File Systems and Forensics Tools September 20, 2013.

Slides:



Advertisements
Similar presentations
Chapter 12: File System Implementation
Advertisements

Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
File Systems Examples.
File System Analysis.
FILE SYSTEMS. File Names 1 to 255 characters in length  This includes the path You can use uppercase and lowercase (case-aware, but not case-sensitive)
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition
Digital Forensics Module 11 CS /26/2004Module 112 Outline of Module #11 Overview of Windows file systems Overview of ProDiscover Overview of UNIX.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 8: Troubleshooting Storage Devices and Display Devices.
File Management Systems
Guide to Computer Forensics and Investigations Fourth Edition
Lecture 10: The FAT, VFAT, and NTFS Filesystems 6/17/2003 CSCE 590 Summer 2003.
1 Web Server Administration Chapter 3 Installing the Server.
CS 104 Introduction to Computer Science and Graphics Problems Operating Systems (4) File Management & Input/Out Systems 10/14/2008 Yang Song (Prepared.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Guide to Computer Forensics and Investigations Third Edition Chapter 7 Current Computer Forensics Tools.
Guide to Computer Forensics and Investigations Third Edition
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Chapter 12 File Management Systems
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
Operating Systems.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
COEN 252 Computer Forensics
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Guide to Computer Forensics and Investigations, Second Edition
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for Final Exam November 19, 2010.
Chapter 4 Operating Systems and File Management. 4 Chapter 4: Operating Systems and File Management 2 Chapter Contents  Section A: Operating System Basics.
Objectives Learn what a file system does
Mastering Windows Network Forensics and Investigation Chapter 7: Windows File Systems.
BACS 371 Computer Forensics
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Mastering Windows Network Forensics and Investigation Chapter 7: Windows File Systems.
1 Chapter Overview Floppy Disk Drives Hard Disk Drives.
CHAPTER FOUR COMPUTER SOFTWARE.
Component 4: Introduction to Information and Computer Science Unit 4: Application and System Software Lecture 3 This material was developed by Oregon Health.
Bits, Bytes, Files, Hard Drives. Bits, Bytes, Letters and Words ● Bit – single piece of information ● Either a 0 or a 1 ● Byte – 8 bits of information.
File System Management File system management encompasses the provision of a way to store your data in a computer, as well as a way for you to find and.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Guest Lecture September 21, 2009.
Guide to Computer Forensics and Investigations Fourth Edition
14 Step-by-Step Instructions for an Upgrade Installation n Prepare for the installation Verify that all devices and applications are Windows 2000 compatible.
Chapter 3 Partitioning Drives using NTFS and FAT32 Prepared by: Khurram N. Shamsi.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #9 Preserving Digital Evidence; Image Verifications and Authentication.
Week #3 Objectives Partition Disks in Windows® 7 Manage Disk Volumes Maintain Disks in Windows 7 Install and Configure Device Drivers.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
File Storage Organization The majority of space on a device is reserved for the storage of files. When files are created and modified physical blocks are.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 20, 2007.
Operating System Concepts and Techniques Lecture 18 Information management-2* FFS, UFS2, NTFS M. Naghibzadeh Reference M. Naghibzadeh, Operating System.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture 23 Intelligent Digital Forensics October 22, 2007.
Lecture 18 Windows – NT File System (NTFS)
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Chapter 8: Installing Linux The Complete Guide To Linux System Administration.
NTFS Filing System CHAPTER 9. New Technology File System (NTFS) Started with Window NT in 1993, Windows XP, 2000, Server 2003, 2008, and Window 7 also.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Chapter 8 File Systems FAT 12/16/32. Defragmentation Defrag a hard drive – Control Panel  System and Security  Administration tools  Defrag hard drive.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
File System Department of Computer Science Southern Illinois University Edwardsville Spring, 2016 Dr. Hiroshi Fujinoki CS 314.
GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS FOURTH EDITION CHAPTER 7 CURRENT COMPUTER FORENSICS TOOLS.
Creighton Barrett Dalhousie University Archives
Chapter 11: File System Implementation
Working with Disks Lesson 4.
Digital Forensics Dr. Bhavani Thuraisingham
File Managements.
Digital Forensics Dr. Bhavani Thuraisingham
Files Management – The interfacing
Modern PC operating systems
Department of Computer Science
Presentation transcript:

Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas File Systems and Forensics Tools September 20, 2013

Outline l File Systems - File Systems Overview - Windows File System (for Forensics) l Tools and Standards - Forensics Tools - Standards - Revisiting File Systems -

Windows File System l Overview of File Systems l Microsoft File Structures l NTFS Disks (New Technology File System) - Partitions, disks, etc. l Other concepts (Registries, startup tasks) l Virtual Machines

File Systems l What is it? - Structure of the data that is stored - Linear file system, Hierarchical file system, etc. l Type of file system determines how the data is stored on disk l File system is part of the OS; a file system is a way for storing and organizing computer files and the data they contain to make it easy to find and access them.computer files l Key aspects of file system include - Boot sequence - Disk drives - File name, metadata, security access - Different types of file systems

File Systems - 2 l Boot sequence - When a suspect’s computer starts, make sure it boots to a forensic floppy disk/CD and not to the hard disk - Booting to the hard disk may overwrite evidence - Make modifications to CMOS setup l Disk drives - Geometry, Head, Tracks, Cylinders, Sectors l Every file has a file name; metadata consists of information about a file, access control policies may be defined on a file l Types of file systems include disk file system, flash file systems, database file systems, network file systems, - - -

File Systems - 3 l File systems typically have directories which associate file names with files, usually by connecting the file name to an index in a file allocation table (FAT in Windows, Inode in Unix)file names l Directory structures may be flat, or allow hierarchies where directories may contain subdirectories. l In some file systems, file names are structured, with special syntax for filename extensions and version numbers. In others, file names are simple strings l Metadata - The length of the data contained in a file may be stored as the number of blocks allocated for the file or as an exact byte count.byte - The time that the file was last modified may be stored as the file's timestamp; also file creation time, the time it was last accessed

Microsoft File Structures l Sectors - Sectors are groped to for clusters which are the storage allocations units. - Cluster numbers are logical addresses and section numbers are physical addresses. l Disk Partitions l Hard drive is partitioned. A partition is a logical drive. l Master Boot Record (MBR) - Stores information about the partitions in a disk and their locations, sizes etc. l FAT (File Allocation Table) Disks - Original Microsoft file structure database l NTFS - New Technology File System

NTFS Disks l Overview of NTFS Disks - Newer Microsoft products are based on new Technology File System - Everything written to a disk is considered s file - First data set is the Partition Boot Sector - Next is the Master File Table (similar to FAT) - Uses Unicode l NTFS System Files - The first file MFT ahs information in all the files - Records in MFT are called metadata

NTFS Disks - 2 l NTFS Data Streams - Ways data can be appended to existing files - Can obscure evidence; only way to know there is a data stream is by looking at MFT l NTFS Compressed Files - Provides compression to improve data storage l Encryption - Implements public key/private key method - Whole disk encryption (Chapter 4) for extra protection for certain information such as personal identity numbers. l Performance - tune some of global NTFS parameters to achieve significant increase of disk performance. Other techniques like disk defragmentation could help

NTFS Disks – 3 (Summary) l File Storage Hardware and Disk Organization l Hard Disk Drive Basics - Making Tracks - Sectors and Clusters l Master Boot Record (MBR) - Viruses Can Infect the Master Boot Record l Partition Table - Boot Indicator Field - System ID Field - Starting and Ending Head, Sector, and Cylinder Field - Relative Sectors and Number of Sectors Fields - Logical Drives and Extended Partitions

NTFS Recovery l Why id Partition recovery needed - MBR (Master Boot Record) is damaged - Partition is deleted or Partition Table is damaged - Partition Boot Sector is damaged - Missing or Corrupted System Files l Partition/Drive Recovery - "Physical partition recovery". The goal is to find out the problem and write some information to the proper place on HDD and after that partition becomes visible to OS again. - "Virtual partition recovery". The goal is to determine the critical parameters of the deleted/damaged/overwritten partition and after that enable to scan it and display its content.

NTFS Recovery - 2 l NTFS File Recovery - Disk Scan for deleted entries l Disk Scan is a process of low-level enumeration of all entries in the Root Folders; The goal is to find and display deleted entries. - Defining clusters chain for the deleted entry l To define clusters chain scan drive, going through one by one all allocated and free clusters belonging to the file until the file size equals to the total size of the selected clusters. If the file is fragmented, clusters chain will be composed of several extents. - Clusters chain recovery l After clusters chain is defined read and save contents of the defined clusters to another place verifying their contents.

Other Concepts l Registry - Registry is a database that stores initialization files such as hardware/software configuration, network connections, user preferences, setup information - Set of tools (e.g., Registry editor) to view and modify the data l Start-up tasks - Forensics examiner must have a very good understanding of what happens to the data during start-up. - E.g., What is the process, what are the files involved, etc.

Virtual Machines l An examiner may need lot more space than he has on the machine he is using. The concept of Virtual machine is used it overcome this limitation. l Virtual machine addresses the need for having a variety of resources by creating the representation of another computer on an existing physical computer. l A few files from the other computer is on the examiner’s machine and space ahs to be allocated for this. l Also useful when one upgrades computer, but still has some old applications. Therefore virtual machine of the old OS is created.

Reading for Lecture for September 20 th Intelligence Digital Forensics l l XIRAF – XML-based indexing and querying for digital forensics l Selective and intelligent imaging using digital evidence bags l l Detecting false captioning using common-sense reasoning

Forensics Tools l Hardware Forensics Tools - Range from single purpose components (e.g., devices) to complete systems (forensics workstations) l Software Forensics Tools - Analysis tools such ProDiscover and EnCase

Functions of Forensics Tools l Acquisition l Validation and Discrimination l Extraction l Reconstruction l Reporting l Comparison of some forensics tools are given on page 277 of Textbook (ProDiscover, AccessData, EnCase)

Functions of Forensics Tools - 2 l Acquisition - Tools for data acquisition - Physical data copy, logical data copy, data acquiring format, GUI acquisition l Validation and Discrimination - Integrity of the data, Also includes hashing, filtering, analyzing file headers l Extraction - Recovery task - Data viewing, Keyword searching, Decompressing l Reconstruction l Reporting

Functions of Forensics Tools - 3 l Reconstruction - Recreate the crime scene (suspect drive) - Disk to disk copy, Image to disk copy, etc. l Reporting - Reporting generation tools help the examiner the prepare report - Also helps to log reports

Software Tools l Command line forensics tools l Unix/Linux forensics tools - SMART, Helix, Autopsy and Sleuth Kit l GUI Forensics Tools - Visualizing the data is important to understand the data

Hardware Tools l Forensics workstations - How to build a workstation - What are the components - How are the workstations connected in a lab - How can distributed forensics be carried out l Write Blockers - Write blocker devoices to protect evidence disks (see the discussion in Chapter 4 under data acquisition)

Validating Forensics Tools l NIST (National Institute of Standards and Technology) is coming up with standards for validation (will be discussed under standards) - Establish categories for forensics tools, Identify forensics category requirements, Develop test assertions - Identify test cases - Establish test method - Report test results - NIST (National Institute of Standards and Technology) is coming up with standards for validation (will be discussed under standards l Chapter 7 discusses validation protocols as well as some examination protocols

NIST Standards l There are three digital forensics projects at the National Institute of Standards and Technology (NIST). l These projects are supported by the U.S. Department of Justice's National Institute of Justice (NIJ), federal, state, and local law enforcement, and the National Institute of Standards and Technology Office of Law Enforcement Standards (OLES) to promote efficient and effective use of computer technology in the investigation of crimes involving computers. l These projects are the following: - National Software Reference Library (NSRL) - Computer Forensic Tool Testing (CFTT) - Computer Forensic Reference Data Sets (CFReDS)

NSRL l The NSRL is designed to collect software from various sources and incorporate file profiles computed from this software into a Reference Data Set (RDS) including hashes of known files created when software is installed on a computer. The law enforcement community approached NIST requesting a software library and signature database that meets four criteria: - The organizations involved in the implementation of the file profiles must be unbiased and neutral. - Control over the quality of data provided by the database must be maintained. - A repository of original software must be made available from which data can be reproduced. - The database must provide a wide range of capabilities with respect to the information that can be obtained from file systems under investigation.

NSRL l The primary focus of the NSRL is to aid computer forensics examiners in their investigations of computer systems. l The majority of stakeholders are in federal, state and local law enforcement in the United States and internationally. l These organizations typically use the NSRL data to aid in criminal investigations.

CFTT l The goal of the CFTT project at NIST is to establish a methodology for testing computer forensic software tools through the development of general tool specifications, test procedures, test criteria, test sets, and test hardware. The results provide the information necessary for toolmakers to improve tools, for users to make informed choices about acquiring and using computer forensics tools, and for interested parties to understand the tools capabilities. l The testing methodology developed by NIST is functionality driven. The activities of forensic investigations are separated into discrete functions, such as hard disk write protection, disk imaging, string searching, etc. A test methodology is then developed for each category. After a test methodology is developed it is posted to the web.

CFReDS l The Computer Forensic Reference Data Sets (CFReDS) provide to an investigator documented sets of simulated digital evidence for examination. l Since CFReDS has documented contents, such as target search strings seeded in known locations, investigators can compare the results of searches for the target strings with the known placement of the strings. l Investigators can use CFReDS in several ways including validating the software tools used in their investigations, equipment check out, training investigators, and proficiency testing of investigators as part of laboratory accreditation. l The CFReDS site is a repository of images. Some images are produced by NIST, often from the CFTT (tool testing) project, and some are contributed by other organizations.

CFReDS l In addition to test images, the CFReDS site contains resources to aid in creating test images. l These creation aids are in the form of interesting data files, useful software tools and procedures for specific tasks. l The CFReDS web site is

International Standards l The Scientific Working Group on Digital Evidence (SWGDE) was established in February 1998 through a collaborative effort of the Federal Crime Laboratory Directors. SWGDE, as the U.S.-based component of standardization efforts conducted by the International Organization on Computer Evidence (IOCE), was charged with the development of cross- disciplinary guidelines and standards for the recovery, preservation, and examination of digital evidence, including audio, imaging, and electronic devices. l The following document was drafted by SWGDE and presented at the International Hi-Tech Crime and Forensics Conference (IHCFC) held in London, United Kingdom, October 4-7, It proposes the establishment of standards for the exchange of digital evidence between sovereign nations and is intended to elicit constructive discussion regarding digital evidence. This document has been adopted as the draft standard for U.S. law enforcement agencies. l

Macintosh Operating System (MAC OS X) l Early MAC OS used HFS (Hierarchical file system) OS X uses HFS+ (optional) and also supports Unix File System l OS 9 supports Volumes. Volume can be all or part of the storage media for hard disks l Newer MACs booted can be booted from CD, DVD, Firewire drive. Older systems booted from hard drive l Some forensics tools special for OS X. Some other Windows tools can also be used

Unix/Linux Operating System l Everything is a file including disk drives, monitors, tape drives, network interface cards, etc. l Unix has four components for its file system - Boot block, superblock, Inode, data block - Block is smallest disk allocation - Boot clock has bootstrap code, superblock has system information, Inode is assignee to every file allocation unit., data blocks store directories and files l Forensic examiner must understand the boot process of the operating system l Disk partitions in Unix/Linus is very different from Windows. In Unix/Linux partitions are labeled as paths.

Papers for Lecture on September 24, 2009 Tamper Detection and Forensics Analysis l Richard T. Snodgrass, Stanley Yao and Christian Collberg, "Tamper Detection in Audit Logs," In Proceedings of the International Conference on Very Large Databases, Toronto, Canada, August–September 2004, pp. 504– Tamper Detection in Audit Logs l Did the problem occur? (e.g. similar to intrusion detection) l Kyri Pavlou and Richard T. Snodgrass, "Forensic Analysis of Database Tampering," in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pages , Chicago, June, l Who caused the problem (e.g., similar to digital forensics analysis)