By Donald Wood CSS 350. Overview Forensic tools are an important part of the computer forensic investigator’s ability to perform his/her job. Imaging.

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Basic Computer Hardware and Software.
Computer Basics 1 Computer Basic 1 includes two lessons:
IT Infrastructure: Software September 18, LEARNING GOALS Identify the different types of systems software. Explain the main functions of operating.
CS 104 Introduction to Computer Science and Graphics Problems Operating Systems (4) File Management & Input/Out Systems 10/14/2008 Yang Song (Prepared.
Lesson 4-Installing Network Operating Systems. Overview Installing and configuring Novell NetWare 6.0. Installing and configuring Windows 2000 Server.
CCNA 2 v3.1 Module 2.
Computers They're Not Magic! (for the most part)‏ Adapted from Ryan Moore.
V Material obtained from summer workshop in Guildford County.
Chapter 13: Sharing Printers on Windows Server 2008 R2 Networks BAI617.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Hands-on: Capturing an Image with AccessData FTK Imager
The Operating System. Operating Systems (F) What you need to know about –operating system as a program; –directory/folder.
1 Input/Output. 2 Principles of I/O Hardware Some typical device, network, and data base rates.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Henry Brady Computer Components Unit 2 – Computer Systems.
ADVANCE FORENSIC WORKSTATION. SPECIFICATION Mother board : Xeon 5000 Series Server Board support 667MHz, 1066MHz and 1333MHz1 Processor : Two Intel Quad.
 FILE S SYSTEM  DIFFERENT FILE SYSTEMS  FILE SYSTEM COMPONENTS  FILE OPERATIONS  LOG STRUCTERD FILE SYSTEM  FILE EXAMPLES.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Hardware Case that houses the computer Monitor Keyboard and Mouse Disk Drives – floppy disk, hard disk, CD Motherboard Power Supply (PSU) Speakers Ports.
Process & Organize Data Storage 2 Data can be stored for later recall and use. The storage facility is a very powerful feature as data can be used later.
Flash Cards Computer Technology.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Computers in the real world Objectives Understand what is meant by memory Difference between RAM and ROM Look at how memory affects the performance of.
IOS110 Introduction to Operating Systems using Windows Session 9 1.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
CHAPTER FOUR COMPUTER SOFTWARE.
Lecture No 11 Storage Devices
Hardware. Make sure you have paper and pen to hand as you will need to take notes and write down answers and thoughts that you can refer to later on.
The Mechanics Of Computers The Operating System (OS) & Hardware.
Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection Network Structure.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
INFORMATION SYSTEM-SOFTWARE Topic: OPERATING SYSTEM CONCEPTS.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Input/Output Problems Wide variety of peripherals —Delivering different amounts of data —At different speeds —In different formats All slower than CPU.
Hands-On Virtual Computing
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
Basic Computer Hardware and Software. Guilford County SciVis V
Henry Brady Computer Components Unit 2 – Computer Systems.
1 Device Controller I/O units typically consist of A mechanical component: the device itself An electronic component: the device controller or adapter.
Basic Computer Hardware and Software.
BTEC-Computer Hardware1 BTEC National Unit 23. BTEC-Computer Hardware2 –Investigate basic computer architecture and the functions of devices –Dismantle.
2: Operating Systems Networking for Home & Small Business.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
Chapter 2 Operating Systems
Basic Computer Hardware and Software.
DIT314 ~ Client Operating System & Administration
Chapter Objectives In this chapter, you will learn:
2. OPERATING SYSTEM 2.1 Operating System Function
Local Area Networks, 3rd Edition David A. Stamper
Basic Computer Hardware and Software.
Basic Computer Hardware & Software
CS703 - Advanced Operating Systems
Introduction to Computers
Basic Computer Hardware and Software.
OPERATING SYSTEMS.
Web Server Administration
IT Infrastructure: Software
Operating Systems Chapter 5: Input/Output Management
Modern PC operating systems
Presentation transcript:

by Donald Wood CSS 350

Overview Forensic tools are an important part of the computer forensic investigator’s ability to perform his/her job. Imaging Tools (disk imaging, write protection, etc) Search Tools (Text, program, etc) Data Recovery Tools (deleted files, format recovery, etc) Recommended Hardware Tools Monitoring tools, both network and individual system Strengths, weaknesses, risks, reviews of each

Imaging Suggested Tool DeepSpar Disk Imager The first dedicated imaging device built to handle disk- level problems. DeepSpar Disk Imager Forensic Edition is a portable version of DeepSpar Disk Imager Data Recovery Edition with addition of forensic-specific functionality.

Imaging Suggested Tool Con’t Strengths Maps scanned sectors and “remembers” just where you left off if the process is interrupted. Weaknesses Drive caching can cause problems for example: if there is a bad sector within the read ahead block it can cause the drive to hang or timeout Risks Same as weakness Reviews Accesses the drive directly using its own hardware and software routines to send ATA read commands so any media errors can be identified immediately, blocks containing bad sectors are skipped and the imaging process continues from the next block of data until the first pass is finished. Once complete, it then goes backwards through the drive so that any drive caching is disabled.

Imaging Suggested Tool Con’t

Search Tools Hurricane Search Created to help you search for evidence and solve computer crime. Hurricane Search helps find text stored on computer hard drives. Build evidence by searching text files, PDF documents, and Word files thoroughly as well as finding evidence in binary files with embedded information on hard drives.

Search Tools Con’t Strengths Elect multiple directories to include or exclude from searches, User interface enhances the way you work through minimized keystrokes, Preview results in context, Search data hidden in compressed Zip and Binary files Weaknesses None Listed Risks None Listed Reviews Used worldwide by thousands of professionals to find text and build legal evidence. Our customers have reported that Hurricane Search is used to conduct employee investigation, ensure intellectual property protection, assist law enforcement officers, and located malicious data in business environments or on client workstations.

Data Recovery DriveLook V1.00 Scans a drive or a partition of a drive for text strings and stores them in a table. After completion of the scan you can browse this table and view the locations where the words have been found. The search function allows you to do fast inquiries for combinations of words.

Data Recovery Con’t Strengths The search function allows you to do fast inquiries for combinations of words. Weaknesses Limited to a Windows OS Risks None Listed Reviews Used worldwide by thousands of professionals to find text and build legal evidence. Our customers have reported that Hurricane Search is used to conduct employee investigation, ensure intellectual property protection, assist law enforcement officers, and located malicious data in business environments or on client workstations.

Recommended Hardware Tools A hardware platform could be anything from a 7-bay tower to a portable small form factor system or even a laptop. A system with a MicroATX motherboard and medium form factor case is a reasonable compromise for a static lab station. A standard MicroATX board will supply onboard video and be able to support 2 PCI cards, 2 PCI Express cards, 4 DIMMs, Parallel and Serial ATA hard drives, Floppy drives, USB 2.0, and Gigabit Ethernet. A new Intel or AMD CPU will be more than sufficient for most investigations. While the processor speed does make a difference for certain operations, one of the mainstays of the forensic investigation is the keyword search which requires that each sector of a suspect hard drive be examined and the speed of that process relies almost entirely on the speed of the drive itself. Instead of investing in high- priced workstations with the top-of-the-line CPUs, investigators should focus on ensuring the highest speed I/O bus so the system can quickly access the data stored on disk.

Network Monitoring Tools Network Monitoring Scrutinizer - delivers a diverse range of free and commercial flow measuring and monitoring tools.

Network Monitoring Tools Con’t Strengths Saves unlimited amounts of past NetFlow data. Weaknesses None Listed Risks None Listed Reviews Saves unlimited amounts of past NetFlow data. Adds several additional traffic analysis Report Types (e.g. Flows, Flow Volume, NBAR Support, etc.). Algorithms perform Network Behavior Analysis on all flows across all routers / switches. Top (applications, hosts, flows, countries, domains, etc.) across all routers / switches. Constantly resolving all IP addresses. Uses saved Scrutinizer Reports to monitor for threshold violations.

Host Monitoring Tools Advanced Host Monitor Version 8.58 Host Monitor is a highly scalable network monitoring software suitable for small and enterprise-level networks.

Host Monitoring Tools Con’t Strengths In the event of network errors, HostMonitor will alert the network administrator (or even correct the problem when possible) before problems get seriously out of hand. Weaknesses None Listed Risks None Listed Reviews A system management tool that continuously monitors servers' availability and performance. In the event of network errors, HostMonitor will alert the network administrator (or even correct the problem when possible) before problems get seriously out of hand. This helps protect your company's data and reduces the likelihood of costly network failures.

Resources forensic.html?gclid=CMaD8rf6tKECFQz_iAod0Em2Dw forensic.html?gclid=CMaD8rf6tKECFQz_iAod0Em2Dw y,%20McGoff%20- %20Choosing%20Hardware%20for%20a%20Computer%20 Forensic%20Lab.pdf y,%20McGoff%20- %20Choosing%20Hardware%20for%20a%20Computer%20 Forensic%20Lab.pdf netflow-scrutinizer.php netflow-scrutinizer.php

Questions