Digital Evidence

  • Information stored digitally for use in court
  • Examples:
    • Any digital document
    • Email
    • Word docx
    • Internet history
    • RAM content

Categories of Forensic Data

  • Active Data β€” In use by OS; Not deleted
  • Latent Data β€”Β Not in use by OS but still exists; Logically deleted
  • Archival Data β€” Data stored in offshore backups

Forensic Images

  • File format to store bit-by-bit copy of original evidence
  • File extensions: E01, VMDK, OVF, DD

Image Format

  • Complete Disk β€” Full disk snapshot, comprehensive, large size, contains slack
  • Partition β€” Snapshot of a partition of a disk, kind of comprehensive, medium size, contains slack
  • Logical β€” Snapshot of certain files, not comprehensive, small size, no slack

Imaging Process

  • Connect hardware write blocker to prevent writes
  • Use imaging tools like dd, FTK Imager, EnCase to obtain image

Crime Scene Tools

  • Forensic software
  • Large capacity storage drive
  • Write-blockers
  • Hardware adapters
  • Digital camera (for documentation)
  • Anti-static bags
  • Evidence bags

Handling Live Systems

  • Yank the plug β€” Prevents shutdown scripts from running; May corrupt system as not properly shut down
  • Proper shutdown β€” Shutdown scripts will run, possibly erasing evidence; Won’t corrupt system as its properly shut down
  • Leave it up and running β€” Constantly on, preserves integrity; Tedious to do memory acquisition on large number of systems

Seizing Hard Disks

  • Wear anti-static strap to protect equipment from electricity
  • Ensure equipment is protected from magnetic fields
  • Document internal storage devices
  • Disconnect storage devices to prevent destruction/alteration of data

Chain of Custody

  • Documents every move and access of evidence to prove the preservation of evidence in court
  • Logs data such as
    • Date and time of action
    • Action type
    • Person collecting/accessing the evidence
    • Computer information (model, serial number)
    • Disk drive information (size, manufacturer, serial number, heads, cylinders, sectors per track)
    • Handling procedure

Bagging & Tagging

  • Bagging β€” Protects against contamination and tampering
  • Tagging β€” Associate bagged evidence with case

Transporting Evidence

  • Keep evidence away from magnetic sources and high temperature
  • Maintain chain of custody

Types of Extraction

  • Manual inspection β€” Effective for small disks as its faster & provides increased confidence
  • File signatures β€” Bypasses file extension renaming
  • Timestamp & metadata β€” Contains MD5 hash, can be checked against a database to identify file
  • String and keyword search β€” Look for patterns / names in filename / content
  • File carving β€” Recover deleted files by looking at start and end signatures

Analysis of Data

  • Timeframe β€”Β Determines the sequences of events occurring on a computer system; Associate individual using computer at said timing
  • Data hiding β€” Find data concealed through file extension mismatches, password protected files & steganography
  • Application and file β€” Look through files to infer data from the user, i.e.: installed apps, internet history, correlating files together

MBR vs GPT

AttributeMBRGPT
Max partitions4 primary
or
3 primary + 1 extended
128 primary
Max partition size2TB9.4 Zettabytes
Partition Addressing MethodCylinder head sectorLogical block addressing
Size of a partition entry16B128B
Error DetectionNoneCRC
Firmware interface supportBIOSUEFI