Table of Contents for
System Forensics, Investigation, and Response, 3rd Edition

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition System Forensics, Investigation, and Response, 3rd Edition by Easttom Published by Jones & Bartlett Learning, 2017
  1. Cover Page
  2. Contents
  3. System Forensics, Investigation, and Response
  4. Title Page
  5. Copyright Page
  6. Content
  7. Preface
  8. About the Author
  9. PART I Introduction to Forensics
  10. CHAPTER 1 Introduction to Forensics
  11. What Is Computer Forensics?
  12. Understanding the Field of Digital Forensics
  13. Knowledge Needed for Computer Forensics Analysis
  14. The Daubert Standard
  15. U.S. Laws Affecting Digital Forensics
  16. Federal Guidelines
  17. CHAPTER SUMMARY
  18. KEY CONCEPTS AND TERMS
  19. CHAPTER 1 ASSESSMENT
  20. CHAPTER 2 Overview of Computer Crime
  21. How Computer Crime Affects Forensics
  22. Identity Theft
  23. Hacking
  24. Cyberstalking and Harassment
  25. Fraud
  26. Non-Access Computer Crimes
  27. Cyberterrorism
  28. CHAPTER SUMMARY
  29. KEY CONCEPTS AND TERMS
  30. CHAPTER 2 ASSESSMENT
  31. CHAPTER 3 Forensic Methods and Labs
  32. Forensic Methodologies
  33. Formal Forensic Approaches
  34. Documentation of Methodologies and Findings
  35. Evidence-Handling Tasks
  36. How to Set Up a Forensic Lab
  37. Common Forensic Software Programs
  38. Forensic Certifications
  39. CHAPTER SUMMARY
  40. KEY CONCEPTS AND TERMS
  41. CHAPTER 3 ASSESSMENT
  42. PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
  43. CHAPTER 4 Collecting, Seizing, and Protecting Evidence
  44. Proper Procedure
  45. Handling Evidence
  46. Storage Formats
  47. Forensic Imaging
  48. RAID Acquisitions
  49. CHAPTER SUMMARY
  50. KEY CONCEPTS AND TERMS
  51. CHAPTER 4 ASSESSMENT
  52. CHAPTER LAB
  53. CHAPTER 5 Understanding Techniques for Hiding and Scrambling Information
  54. Steganography
  55. Encryption
  56. CHAPTER SUMMARY
  57. KEY CONCEPTS AND TERMS
  58. CHAPTER 5 ASSESSMENT
  59. CHAPTER 6 Recovering Data
  60. Undeleting Data
  61. Recovering Information from Damaged Media
  62. File Carving
  63. CHAPTER SUMMARY
  64. KEY CONCEPTS AND TERMS
  65. CHAPTER 6 ASSESSMENT
  66. CHAPTER 7 Email Forensics
  67. How Email Works
  68. Email Protocols
  69. Email Headers
  70. Tracing Email
  71. Email Server Forensics
  72. Email and the Law
  73. CHAPTER SUMMARY
  74. KEY CONCEPTS AND TERMS
  75. CHAPTER 7 ASSESSMENT
  76. CHAPTER 8 Windows Forensics
  77. Windows Details
  78. Volatile Data
  79. Windows Swap File
  80. Windows Logs
  81. Windows Directories
  82. Index.dat
  83. Windows Files and Permissions
  84. The Registry
  85. Volume Shadow Copy
  86. Memory Forensics
  87. CHAPTER SUMMARY
  88. KEY CONCEPTS AND TERMS
  89. CHAPTER 8 ASSESSMENT
  90. CHAPTER 9 Linux Forensics
  91. Linux and Forensics
  92. Linux Basics
  93. Linux File Systems
  94. Linux Logs
  95. Linux Directories
  96. Shell Commands for Forensics
  97. Kali Linux Forensics
  98. Forensics Tools for Linux
  99. CHAPTER SUMMARY
  100. KEY CONCEPTS AND TERMS
  101. CHAPTER 9 ASSESSMENT
  102. CHAPTER 10 Macintosh Forensics
  103. Mac Basics
  104. Macintosh Logs
  105. Directories
  106. Macintosh Forensic Techniques
  107. How to Examine a Mac
  108. Can You Undelete in Mac?
  109. CHAPTER SUMMARY
  110. KEY CONCEPTS AND TERMS
  111. CHAPTER 10 ASSESSMENT
  112. CHAPTER 11 Mobile Forensics
  113. Cellular Device Concepts
  114. What Evidence You Can Get from a Cell Phone
  115. Seizing Evidence from a Mobile Device
  116. JTAG
  117. CHAPTER SUMMARY
  118. KEY CONCEPTS AND TERMS
  119. CHAPTER 11 ASSESSMENT
  120. CHAPTER 12 Performing Network Analysis
  121. Network Packet Analysis
  122. Network Traffic Analysis
  123. Router Forensics
  124. Firewall Forensics
  125. CHAPTER SUMMARY
  126. KEY CONCEPTS AND TERMS
  127. CHAPTER 12 ASSESSMENT
  128. PART III Incident Response and Resources
  129. CHAPTER 13 Incident and Intrusion Response
  130. Disaster Recovery
  131. Preserving Evidence
  132. Adding Forensics to Incident Response
  133. CHAPTER SUMMARY
  134. KEY CONCEPTS AND TERMS
  135. CHAPTER 13 ASSESSMENT
  136. CHAPTER 14 Trends and Future Directions
  137. Technical Trends
  138. Legal and Procedural Trends
  139. CHAPTER SUMMARY
  140. KEY CONCEPTS AND TERMS
  141. CHAPTER 14 ASSESSMENT
  142. CHAPTER 15 System Forensics Resources
  143. Tools to Use
  144. Resources
  145. Laws
  146. CHAPTER SUMMARY
  147. KEY CONCEPTS AND TERMS
  148. CHAPTER 15 ASSESSMENT
  149. APPENDIX A Answer Key
  150. APPENDIX B Standard Acronyms
  151. Glossary of Key Terms
  152. References
  153. Index

Storage Formats

Working with forensics, you need to be familiar with a variety of storage formats. Specifically, you should be familiar with the various hard drive types, file systems, and journaling. This section reviews a variety of storage and file formats and explores additional issues with storage formats.

Magnetic Media

Although mobile devices, like smartphones and tablets, are a growing part of forensic work, computers are still the biggest target of forensic investigations. Most computers utilize magnetic media. Hard drives and floppy drives are types of magnetic media. Essentially, the data is organized by sectors and clusters, which are in turn organized in tracks around the platter. A typical sector is 512 bytes, and a cluster can be from 1 to 128 sectors.

Because the data is stored magnetically, the drives are susceptible to magnetic interference. This can include being demagnetized. If a drive has been demagnetized, there is no way to recover the data. You should transport drives in special transit bags that reduce electrostatic interference. This reduces the chance of inadvertent loss of data.

There are five types of magnetic drives:

  • Integrated Drive Electronics (IDE)

  • Extended Integrated Drive Electronics (EIDE)

  • Parallel Advanced Technology Attachment (PATA)

  • Serial Advanced Technology Attachment (SATA)

  • Serial SCSI

These drive types refer to the connection between the drive and the motherboard, as well as the total capacity of the drive, but they are all magnetic drives.

It is important to remember that because magnetic drives have moving parts in them, they are also susceptible to physical damage. If you drop a drive, you may render the data inaccessible. This is why you must take care when handing magnetic drives.

Solid-State Drives

Solid-state drives (SSDs) use microchips, which retain data in nonvolatile memory chips and contain no moving parts. Most SSDs use Negated AND (NAND) gate–based flash memory, which retains memory even without power. Because there are no moving parts, these drives are usually less susceptible to physical damage than magnetic drives are.

One reason these drives are so popular is because they generally require one-half to one-third the power of hard disk drives (HDDs). The start-up time for SSDs is usually much faster than for magnetic storage drives. However, they are still more expensive than magnetic drives and usually have a lower capacity. They are often used in tablets and in some laptops. This means that you are likely to encounter them at some point in your forensic career.

If these drives are internal, they can use the same interfaces magnetic drives use, including SCSI and SATA. However, if connected externally, it is most common for them to have a universal serial bus (USB) connection.

Both magnetic and solid state drives include a few features that are important for forensics:

  • Host protected area (HPA): This was designed as an area where computer vendors could store data that is protected from user activities and operating system utilities, such as delete and format. To hide data in the HPA, a person would need to write a program to access the HPA and write the data.

  • Master boot record (MBR): This requires only a single sector, leaving 62 empty sectors of MBR space for hiding data.

  • Volume slack: This is the space that remains on a hard drive if the partitions do not use all the available space. For example, suppose that two partitions are filled with data. When you delete one of them, the data is not actually deleted. Instead, it is hidden.

  • Unallocated space: An operating system can’t access any unallocated space in a partition. That space can contain hidden data.

  • Good blocks marked as bad: Suppose that someone manipulates the file system metadata to mark unusable blocks as bad. The operating system will no longer access these blocks. These blocks can then be used to hide data.

  • File slack: File slack is the unused space that is created between the end of file and the end of the last data cluster assigned to a file.

Digital Audio Tape Drives

Although many organizations are moving from electronic backups to optical media or even direct network backups to an off-site location, digital audio tape (DAT) drives are still widely used. DAT drives are among the most common types of tape drives. DAT uses 4-mm magnetic tape enclosed in a protective plastic shell. Even though this looks very similar to audio tapes, the recording is digital rather than analog.

From a forensic point of view, it is important to remember that these tapes do wear out, just like audio tapes. If you are old enough to remember cassette or 8-track tapes, you’ll recall that these tapes would, from time to time, become stretched and worn and no longer usable. The same thing happens with the DAT tapes. In fact, network administrators are admonished to replace them periodically.

When working with DAT drives, most likely they will contain archived/backup data that you need to analyze. Make certain you first forensically wipe the target drive so you can be sure that there is no residual data on that drive. You then need to restore it to the target hard drive (magnetic or solid state) in order to analyze it.

Digital Linear Tape and Super DLT

Digital Linear Tape (DLT) is another type of tape storage, more specifically a magnetic tape. The DLT technology relies on a linear recording method. The tape itself has either 128 or 208 total tracks. This technology was first invented by Digital Equipment Corporation (DEC). This tape, like DAT, is used primarily to store archived data. So, as with DAT, you need to make sure you have a forensically wiped hard drive to restore the data to and then restore the data to that hard drive in order to analyze it.

Optical Media

Like hard disks, optical media such as CD-ROMs use high and low polarization to set the bits of data; however, CDs have reflective pits that represent the low bit. If the pit is nonexistent, the data is a 1; if the pit exists, it’s a 0. The laser mechanism actually detects the distance the light beam has traveled in order to detect the presence or absence of a pit. This is why scratches can be problematic for optical media.

Since the advent of the original compact disc, there have been enhancements. These enhancements still utilize the same optical process, but have larger capacity. The DVD (or digital video disc) can hold 4.7 gigabytes (GB) for a one-sided DVD and 9.4 GB for a double-sided DVD. This technology uses a 650-nm wavelength laser diode light as opposed to 780 nm for CDs. The smaller wavelength allows DVDs to use smaller pits, thus increasing storage capacity.

Blu-ray discs are the successor to the DVD and store up to 25 GB per layer, with dual-layer discs storing up to 50 GB. There are also triple- and quadruple-layer discs, such as the Bluray Disc XL, that allow up to 150 GB of storage. Although Blu-ray discs are primarily associated with movies, you can certainly store data on them. And for smaller organizations, the Blu-ray disc can be an attractive backup medium.

Just like all other storage devices, a Blu-ray disk should be forensically copied to a clean, forensically wiped drive for analysis. No matter what the media, you never work with the original suspect storage if it is at all possible to avoid it.

Using USB Drives

Universal serial bus (USB) is actually a connectivity technology, not a storage technology. And USB can be used to connect to external drives that can be either magnetic or solid state. Small USB flash drives, also known as thumb drives, are also quite common. These drives can be easily erased or overwritten. It is important to copy the data from the USB drive to a target forensic drive for analysis. You must, of course, document the copying process and ensure nothing was missed or altered.

USB thumb drives have no moving parts. Each bit is set by using a two-transistor cell, and the value is changed in each cell using a technique called Fowler-Nordheim tunneling. The memory bank then communicates with the computer using a controller and USB interface, much like a hard disk communicates over IDE or SCSI. Because there are no moving parts, these drives are resilient to shock damage (i.e., dropping them probably won’t hurt them). From a forensic point of view, you should remember that many of these drives come with a small switch to put them in read-only mode. Use this whenever you are extracting data for investigation. If the drive is in read-only mode, it is unlikely you will accidentally alter the data.

File Formats

In addition to physical means of storing data, there are a variety of file formats for storing forensic data on a given storage device. It is important that you have a working knowledge of these formats for forensic analysis.

The Advanced Forensic Format

This file format (abbreviated AFF) was invented by Basis Technology. It is an open file standard with three variations: AFF, AFM, and AFD. The AFF variation stores all data and meta-data in a single file. The AFM variation stores the data and the metadata in separate files. The AFD variation stores the data and metadata in multiple small files. The AFF file format is part of the AFF Library and Toolkit, which is a set of open-source computer forensics programs. Sleuth Kit and Autopsy both support this file format.

EnCase

The EnCase format is a proprietary format that is defined by Guidance Software for use in its EnCase tool to store hard drive images and individual files. It includes a hash of the file to ensure nothing was changed when it was copied from the source.

The Generic Forensic Zip

Gfzip is another open-source file format used to store evidence from a forensic examination.

IXimager

This is a proprietary file format that is used by the iLook tool. This tool was developed by the U.S. Internal Revenue Service (IRS) and is restricted to law enforcement and government use only.