Guide to Computer Forensics and Investigations, Second Edition Chapter 8 Macintosh and Linux Boot Processes and File Systems.

Slides:



Advertisements
Similar presentations
Hard Disks Low-level format- organizes both sides of each platter into tracks and sectors to define where items will be stored on the disk. Partitioning:
Advertisements

Chapter 12: File System Implementation
Chapter 9 Part III Linux File System Administration
Genesis: from raw hardware to processes System booting sequence: how does a machine come into life.
Chapter 9: Understanding System Initialization The Complete Guide To Linux System Administration.
Linux can be generally divided into four major components: 1. KERNEL – OS, ultimate boss The kernel is the core program that runs programs and manages.
Booting the Linux Kernel Dr. Michael L. Collard 1.
Linux Installation LINUX INSTALLATION. Download LINUX Linux Installation To install Red Hat, you will need to download the ISO images (CD Images) of the.
File Systems.
Allocation Methods - Contiguous
1 COMP 4027 Macs, Unix and Forensics This module draws on Introduction to Unix for forensic examiners [electronic resource] / Warren G. Kruse II, Jay G.
Digital Forensics Module 11 CS /26/2004Module 112 Outline of Module #11 Overview of Windows file systems Overview of ProDiscover Overview of UNIX.
Introduction to Unix (CA263) File System
Lecture 10: The FAT, VFAT, and NTFS Filesystems 6/17/2003 CSCE 590 Summer 2003.
1 Web Server Administration Chapter 3 Installing the Server.
COS/PSA 413 Day 4. Agenda Questions? Assignment 1 Corrected – 3 A’s, 2 B’s, 2 C’s, 2 D’s and 1 F’s Assignment 2 posted Due in one week Lab Write-ups (project.
Guide to Computer Forensics and Investigations Third Edition
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Guide To UNIX Using Linux Third Edition
Linux Install. Resources Guide to Linux Installation and Administration, Nicholas Wells, Course Technology, 2000.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 8 Macintosh and Linux Boot Processes and File Systems.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
Computer Forensic Evidence Collection and Management
Computer Forensics DOS Partitioning. Partitioning Practices  We separate partition practices into those used by Personal Computers:  DOS  Apple Servers.
1 Chapter Overview CD-ROM and DVD Drives Advanced Hard Disk Drives SCSI Drives.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Linux+ Guide to Linux Certification, Third Edition
CompTIA Linux+ Certification
Linux+ Guide to Linux Certification Chapter Three Linux Installation and Usage.
Guide To UNIX Using Linux Fourth Edition
Computer Concepts 2013 Chapter 4 Operating Systems and File Management.
Unix File System Internal Structures By C. Shing ITEC Dept Radford University.
BACS 371 Computer Forensics
Linux Booting Procedure
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 2 How an OS Works with Hardware and Other Software.
Understanding and Troubleshooting Your PC. Chapter 5: Understanding, Installing, and Troubleshooting Disk Drives2 Chapter Objectives  In this chapter,
How Hardware and Software Work Together
Introduction to Hard Drives Chapter 6 - Key Terms Information Compiled by Diane Ferris, Michele Henderson & Vicki Kertz.
PC Maintenance: Preparing for A+ Certification Chapter 10: Introduction to Disk Storage.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 8 Macintosh and Linux Boot Processes and File Systems.
1 Interface Two most common types of interfaces –SCSI: Small Computer Systems Interface (servers and high-performance desktops) –IDE/ATA: Integrated Drive.
Windows Vista Inside Out Chapter 28 - Chapter 28 - Managing Disks and Drives Last modified
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 11: File System Implementation.
Linux+ Guide to Linux Certification Chapter Six Linux Filesystem Administration.
Chapter 8: Installing Linux The Complete Guide To Linux System Administration.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
MINIX Presented by: Clinton Morse, Joseph Paetz, Theresa Sullivan, and Angela Volk.
CEG 2400 FALL 2012 Linux/UNIX Network Operating Systems.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Computer Operating Systems And Software applications.
System initialization Unit objectives A.Outline steps necessary to boot a Linux system, configure LILO and GRUB boot loaders, and dual boot Linux with.
File Systems : Hierarchical File System (HFS, for Mac OS) Prepared by : Mohammad Azzuri bin Zaidi UFH
Guide to Computer Forensics and Investigations Fifth Edition Chapter 7 Linux and Macintosh File Systems.
Linux Filesystem Administration
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Fifth Edition
Chapter 8 Unix & Linux.
Chapter 8 Adding a Disk.
EXT in Detail High-Performance Database Research Center
Guide to Linux Installation and Administration, 2e
Chapter 11: File System Implementation
Installing OS.
Chapter 12: File System Implementation
Guide to Computer Forensics and Investigations Fourth Edition
Operating System Module 1: Linux Installation
Booting Up 15-Nov-18 boot.ppt.
Hard disk basics Prof:R.CHARLES SILVESTER JOE Departmet of Electronics St.Joseph’s College,Trichy.
Department of Computer Science
Presentation transcript:

Guide to Computer Forensics and Investigations, Second Edition Chapter 8 Macintosh and Linux Boot Processes and File Systems

Guide to Computer Forensics and Investigations, 2e2 Objectives Understand Macintosh file structures Explore Macintosh boot tasks Examine UNIX and Linux disk structures

Guide to Computer Forensics and Investigations, 2e3 Objectives (continued) Understand UNIX and Linux boot processes Examine CD data structures Understand other disk structures

Guide to Computer Forensics and Investigations, 2e4 Understanding the Macintosh File Structure Mac OS X version 10.3 –Darwin core –BSD UNIX application layer Hierarchical File System (HFC) –Extended Format (HFC+) File Manager and Finder Data fork and resource fork

Guide to Computer Forensics and Investigations, 2e5 Understanding the Macintosh File Structure (continued)

Guide to Computer Forensics and Investigations, 2e6 Understanding Volumes Storage medium used to store files A volume can be all or part of a hard disk –On a floppy disk, is always the entire disk Multiple clients per volume Allocation and logical blocks –Logical blocks cannot exceed 512 bytes –Allocation blocks are a set of logical blocks

Guide to Computer Forensics and Investigations, 2e7 Understanding Volumes (continued)

Guide to Computer Forensics and Investigations, 2e8 Understanding Volumes (continued) Two EOF descriptors –Logical EOF –Physical EOF Clumps –Groups of contiguous allocation blocks –Reduce fragmentation

Guide to Computer Forensics and Investigations, 2e9 Understanding Volumes (continued)

Guide to Computer Forensics and Investigations, 2e10 Exploring Macintosh Boot Tasks Use Open Firmware –Processor- and system-independent firmware Older Macintosh OSs –First two logical blocks are boot blocks –Master Directory Block (MDB) or Volume Information Block (VIB) –Extents overflow file –Volume Control Block (VCB)

Guide to Computer Forensics and Investigations, 2e11 Exploring Macintosh Boot Tasks (continued) Volume Bitmap –Tracks used and unused blocks on a volume Mac OS 9 uses a B*-tree file system for File Manager –Actual file data is stored on the leaf nodes –Header, index, and map nodes

Guide to Computer Forensics and Investigations, 2e12 Using Macintosh Forensic Software For Mac OSs earlier that Mac OS x –Expert Witness originally from ASRData, now owned by Guidance Software –Black Bag Technologies tools Deal specifically with files Macintosh hides PhantomSearch For Mac OS X –Almost any UNIX/Linux forensic tool

Guide to Computer Forensics and Investigations, 2e13 Examining UNIX and Linux Disk Structures UNIX flavors –System 7, SGI IRIX, Sun Solaris, IBM AIX, and HP- UX –BSD, FreeBSD, OpenBSD, and NetBSD Linux distributions –Caldera, Red Hat, SuSe, Mandrake, and Debian –Most consistent UNIX-like OSs GNU and BSD licenses

Guide to Computer Forensics and Investigations, 2e14 Examining UNIX and Linux Disk Structures (continued)

Guide to Computer Forensics and Investigations, 2e15 Examining UNIX and Linux Disk Structures (continued)

Guide to Computer Forensics and Investigations, 2e16 Examining UNIX and Linux Disk Structures (continued) Linux file systems –Second Extended File System (Ext2fs) –Ext3fs, journaling version of Ext2fs Employs inodes –Pointer to other inodes or blocks –Keep internal link count Deleted inodes have count value 0 Linux file structure –Meta-data and data

Guide to Computer Forensics and Investigations, 2e17 Examining UNIX and Linux Disk Structures (continued)

Guide to Computer Forensics and Investigations, 2e18 UNIX and Linux Overview Everything is a file –Files are defined as objects UNIX consists of four components Boot block –Disk allocation unit of at least 512 bytes –Contains the bootstrap code –Only one

Guide to Computer Forensics and Investigations, 2e19 UNIX and Linux Overview (continued) Superblock –Indicates disk geometry, available space, and location of the first inode –Manages the file system Inode blocks –First data after the superblock –Assigned to every file allocation unit Data blocks –Where directories and files are stored

Guide to Computer Forensics and Investigations, 2e20 UNIX and Linux Overview (continued)

Guide to Computer Forensics and Investigations, 2e21 UNIX and Linux Overview (continued) Bad block inode –Keeps track of disk bad sectors –Commands: badblocks, mke2fs, and E2fsck/ Linux ls command displays information about files Continuation inode provides more information about a file or directory

Guide to Computer Forensics and Investigations, 2e22 UNIX and Linux Overview (continued)

Guide to Computer Forensics and Investigations, 2e23 UNIX and Linux Overview (continued)

Guide to Computer Forensics and Investigations, 2e24 Understanding Inodes Link data stored in data blocks Ext2fs and Ext3fs are improvements over Ext –Data recovery easier on Ext3fs than on Ext2fs First inode has 13 pointers –Pointers 1 to 10 are direct pointers –Pointer 11 is an indirect pointer –Pointer 12 is a double-indirect pointer –Pointer 13 is a triple-indirect pointer

Guide to Computer Forensics and Investigations, 2e25 Understanding Inodes (continued)

Guide to Computer Forensics and Investigations, 2e26 Understanding Inodes (continued)

Guide to Computer Forensics and Investigations, 2e27 Understanding UNIX and Linux Boot Processes Instruction code in firmware is loaded into RAM Instruction code then –Checks the hardware –Load the boot program Boot program –Loads kernel –Transfers control to kernel

Guide to Computer Forensics and Investigations, 2e28 Understanding UNIX and Linux Boot Processes (continued) Kernel –Boots system on single-user mode –Runs startup scripts –Changes to multiuser mode –Identifies root directory, swap and dump files –Sets host name, time zone –Runs consistency checks on the file system and mounts partitions –Starts services

Guide to Computer Forensics and Investigations, 2e29 Understanding Linux Loader and GRUB Linux Loader (LILO) –Old boot manager –Can start two or more OSs –Uses configuration file lilo.conf Grand Unified Boot Loader (GRUB) –More powerful than LILO –As LILO resides on MBR –Command line or menu driven

Guide to Computer Forensics and Investigations, 2e30 UNIX and Linux Drives and Partition Schemes Labeled as path starting at root (/) directory –Primary master disk First partition is /dev/hda Second partition is /dev/hda2 –Primary slave or secondary master or slave First partition is /dev/hdb –SCSI controllers /dev/sda with first partition /dev/sda1

Guide to Computer Forensics and Investigations, 2e31 Examining CD Data Structures Laser burns flat areas (lands) Lower areas are called pits Transitions –From lands to pits have binary value 1, or on –No transition has binary value 0, or off ISO standards –ISO 9660 for CD, CD-R, and CD-RW –ISO for DVDs

Guide to Computer Forensics and Investigations, 2e32 Examining CD Data Structures (continued)

Guide to Computer Forensics and Investigations, 2e33 Examining CD Data Structures (continued)

Guide to Computer Forensics and Investigations, 2e34 Examining CD Data Structures (continued) Frame is the unit storage –Contains bit symbols Frames are combined into blocks Blocks are combined into sectors –2352 bytes for CD-DA –2048 bytes for CD Constant Linear Velocity (< 12X) Constant Angular Velocity (>= 12X)

Guide to Computer Forensics and Investigations, 2e35 Understanding Other Disk Structures SCSI disks IDE/EIDE disks RAID configurations

Guide to Computer Forensics and Investigations, 2e36 Examining SCSI Disks SCSI –Provides a common bus communication device During investigation –Check if the device is internal or external –Check if card, cables, adapters, terminators, and drivers are available –Advance SCSI Programming Interface (ASPI) Might need to adjust settings –Port numbers and terminators

Guide to Computer Forensics and Investigations, 2e37 Examining IDE/EIDE Devices ATA drives from ATA-33 to ATA-133 –Standard 40-pin ribbon or shielded cable –40-pin/80-wire cable for ATA-66, 100, and 133 CMOS identifies proper disk settings –Logical block addressing (LBA) –Enhanced CHS configurations –Can pose a problem during an investigation

Guide to Computer Forensics and Investigations, 2e38 Examining IDE/EIDE Devices Solutions –Disk imaging tools –Old PC –Cards and adapters ISA SCSI card A-Card IDE adapter SCSI-to-IDE adapter EISA FireWire card FireWire-to-EIDE adapter

Guide to Computer Forensics and Investigations, 2e39 Examining the IDE Host Protected Area ATAPI-5 AT introduced in 1998 reserved and protected areas on IDE devices –Protected Area Run Time Interface Extension Service (PARTIES) Contains data stored by diagnostic and restore programs Tools –Area 51 –BIOS, XBIOS Direct Access Reporter (BXDR)

Guide to Computer Forensics and Investigations, 2e40 Understanding RAID RAID 0 –Provides rapid access and increased storage –Lack of redundancy RAID 1 –Designed for data recovery –More expensive than RAID 0 RAID 2 –Data is written to a disk on a bit level –Slower than RAID 0

Guide to Computer Forensics and Investigations, 2e41 Understanding RAID (continued)

Guide to Computer Forensics and Investigations, 2e42 Understanding RAID (continued)

Guide to Computer Forensics and Investigations, 2e43 Understanding RAID (continued)

Guide to Computer Forensics and Investigations, 2e44 Understanding RAID (continued) RAID 3 –Uses data stripping and dedicated parity RAID 4 –Data is written in blocks RAID 5 –Places parity recovery data on each disk RAID 6 –Redundant parity on each disk

Guide to Computer Forensics and Investigations, 2e45 Understanding RAID (continued)

Guide to Computer Forensics and Investigations, 2e46 Summary Macintosh uses HFS –Hierarchical structure Mac OS file structure –Data fork and resource fork Volume refers to any storage media –Allocation and logical blocks Ext2fs uses inodes –Ext3fs: journaling version of Ext2fs

Guide to Computer Forensics and Investigations, 2e47 Summary (continued) Linux file structure –Meta-data and data CDs and DVDs are optical media –ISO 9660 and Other device technologies –SCSI –IDE/EIDE –RAID