Analysis and Validation: Determining What Data To Analyze
Analysis and Validation: Determining What Data To Analyze
! Process the data methodically and logically ! Supported file systems: FAT12/16/32, NTFS, Ext2fs, and
! Basic steps for all computer forensics investigations Ext3fs
! List all folders and files on the image or drive ! FTK can analyze data from several sources, including
image files from other vendors
! If possible, examine the contents of all data files in all folders
! Starting at the root directory of the volume partition
! FTK produces a case log file
! For all password-protected files that might be related to the ! Searching for keywords
investigation ! Indexed search
! Make your best effort to recover file contents ! Live search
! Identify the function of every executable (binary or .exe) file ! Supports options and advanced searching techniques, such as
that doesn’t match known hash values stemming, phonics, synonyms and fuzzy search
! Maintain control of all evidence and findings, and document ! Analyzes compressed files
L11: Analysis and Validation
! Advanced hexadecimal editors offer many features not ! Commercial computer forensics programs have built-in
available in computer forensics tools validation features
! Such as hashing specific files or sectors ! Using hash values to discriminate data
! AccessData has a separate database, the Known File Filter
! Hex Workshop provides several hashing algorithms (KFF)
! Such as MD5 and SHA-1 ! Filters known program files from view, such as MSWord.exe, and
identifies known illegal files
! KFF compares known file hash values to files on your
! Hex Workshop also generates the hash value of selected evidence drive or image files
data sets in a file or sector ! Periodically, AccessData updates these known file hash values
and posts an updated KFF
18 Rootkits (contd.)
19 Recovering Passwords
! Remote acquisitions are handy when you need to image ! Ch 9: B. Nelson, A. Phillips and C. Steuart, Guide to
the drive of a computer far away from your location Computer Forensics and Investigations. ISBN:
! Or when you don’t want a suspect to be aware of an ongoing 978-1-435-49883-9
investigation
! Remote acquisition software follow a client-server
model to exchange information
! Server component runs on suspect machine providing a
portal into it
! Client component talks to the server and pulls the
information to the target machine