SlideShare a Scribd company logo
1 of 33
Computer/Digital Forensics
●
Hard drive imaging
●
Volume structure & analysis
●
File system structure & analysis
●
Tools
●
Case studies
Computer/Digital Forensics
Computer/Digital Forensics:
Acquisition of information on digital devices
1) Rigid recipe
Investigation of digital devices and digital data for
evidence of
1) a crime or violation of stated policy committed by the computer
2) a crime or violation of stated policy against the computer
3) a crime or violation of stated policy using the computer
4) accidental or intentional destruction or corruption of data
Preparation for trial
1) Documentation of evidence
2) Proof the evidence has not been altered
Phases of an Investigation
System Preservation
Phase
Evidence Searching
Phase
Event Reconstruction
Phase
courtesy Priscilla
Layers of Analysis
Application/OS
Analysis
File System Analysis
Volume Analysis
Swap Space Analysis
Database Analysis
Memory Analysis
Network Analysis
Physical Storage Media Analysis
Finding a File
Name:
miracle.txt
Cluster 344
Last Accessed:
October 27,2004
Cluster:
345
Size:
40
Today, the Yankees won the
World Series.
Cluster 345
Today, the Red Sox won the
World Series.
Computer/Digital Forensics
Computer/Digital Forensics
– Investigation of block devices that contain digital information
– Procedures that will maintain the integrity of the digital
evidence
– Analysis of the condition and content of the block device that
will permit the reconstruction of an incident or use
Computer/Digital Forensics
This Part of the Course will cover
– Hard disk imaging
– dd and NIST standards
– Volume Analysis
– Disk layout
– Partitions
– File system analysis
– Fat, ntfs
– ext2, ext3
– UFS1, USF2
Computer/Digital Forensics
Important
●
Maintain chain of custody
●
A casual exam request from your boss can result in
legal stuff
●
At first conduct a liturgical exam. You will never
regret it.
●
Written consent to proceed: business plan or policy
or memo. Don't go to jail or get sued.
Computer Foundations
●
bin-to- hex and back again
●
Big/little endian confusion
●
Data structures
●
Allocation of “space” to a data structure
●
bit, byte, etc.
●
Size allocated depends on location
Boot Process
Many layered (each hw/os system is different)
1.BIOS – ROM locates HW and initializes some of the
hardware,
2.EPROM – determines boot device and HW
configurations
3.LBA Sector 0/ CHS (0,0,1) more
boot code and dereferences kernel code
Boot Process
Linux
1. JMP 0xFFFFFFF0
1st
instruction after power on is a jump to BIOS (or)
1. Power-On-Self-Test
2. HW detect
3. Load interrupt vector table
4. Find bootable MBS
5. Copy MBS to 0x7C00 - RAM
MBS Structure
1FE
Boot code – Master Boot Record, MBR
1CE
1DE
1FD
1FF
1EE
1BE
000
1ED
1DD
1CD
1BD
1st
Partition Entry
2nd
Partition Entry
3st
Partition Entry
4st
Partition Entry
Sector signature = 0x55 aa
Partition Entry Structure
0C
Bootable flag: 0x80 – bootable, 0x00 – not bootable
04
05
0B
0F
08
01
00
07
04
03
00
Starting CHS Address – (C, H, S)
Partition type – 0x83 = linux, 0x82 = swap
Ending CHS Address
Starting LBA Address
Size in Sectors
Booting Cont'd
1. Move MBR to 0x9000 and execute
2. Transfers control to LILO
3. Loads compressed kernel
4. Decompresses itself
5. Log into the blue screen
Hard Disks
Current Technology - Moore's Law
1. Rotating platters
1.Platters: 1 – 12+
2.Heads: 1 - 24+
2. Organized – Cylinders/Tracks, Heads, Sectors
1.Track = Cylinder: tpi = 31,200 per inch
2.Bits per inch of track: bpi = 501,760
3.Areal density: 15.655 Gb/sq in (2000)
329 Gb/sq in (2009) projected 1 Tbit/sq max
1. Cost .50$ per Gbyte
1. Update 1 Tera Byte == $100
2. .10$ per Gbyte
Giant magnetoresistance (GMR)
2005
Antiferromagnetically coupled (AFC) media
http://www.hindawi.com/journals/at/2013/521086/
Areal Density of Tbit/in2
2013
Hard Disks
Geometry
1. CHS Address ( (Cylinder, Head, Sector)
1. Cylinder, Head, Sector
2. Cylinder address is limited to a byte – max = 255
3. Lying must take place at tpi = 32K
4. Most disks – radius = 1.25 inches
5. Sectors = 793 per track (variable)
6. Allocated 1 byte
2. LBA - (Logical Block Address)
1. LBA = (((C*heads-per-cyl) + H) * sectors-per-track) + S – 1
2. LBA = 0 -- CHS = (0, 0, 1)
3. Physical location – addressing
1. Sequential sector number
Hard Disks
Interfaces
1. IDE – ATA/ATAPI/etc
2. SCSI
3. Floppy
4. USB
5. 1394
Many, many flavors of each. Most of the flavors do not affect
the forensic analysis of the actual media.
Hard Disks
ATA/ATAPI
1. AT Attachment Packet Interface
1. 1994 Original
2. Before 1994 was a crap shoot
3. ATAPI spec issued in 1998
2. 2002, ATA/ATAPI-6 allowed 48 bit LBA vs. 32 bit
1. Permitted another factor of 64K sectors to the disk
3. Current rev is 7/8
4. www.t13.org
ATA/ATAPI
Commands
1. Register delivered commands
1.Write command ID and parameters to HD register
2.HD loads parameters into appropriate registers
3.Executes command
4.Loads error values into register
5.Host reads error values
2. Packet delivered commands
1.Used when the command/parameter structure is larger
than the register
ATA/ATAPI
Features
1. Passwords
2. Host Protected Area
3. Device Configuration Overlay
4. Serial ATA
ATA/ATAPI
Passwords
1. User password & master password
2. High security mode
1.Both user and administrator can access the HD
3. Maximum security mode
1.Admin can access HD only after the HD has been
wiped
4. After n password attempts the disk freezes until reboot
ATA/ATAPI
Host Protected Area
1. HPA: Not accessible to the average user
2. Configurable using ATA commands
3. HD vendor can store configuration data that won't be
overwritten by a format command
4. BIOS can write to the HPA at power up time
5. Located at the end of the HD, i.e. highest LBA address
ATA/ATAPI
HPA Commands
1. READ_NATIVE_MAX_ADDRESS
1.Returns the maximum physical address
2. IDENTIFY_DEVICE
1.Returns the max address the user can access
3. HPA = #1 - #2
4. HPA is created with a SET_MAX_ADDRESS
ATA/ATAPI
HPA Commands
1. The HPA may contain
1.BIOS settings
2.System files
3.Vendor information
4.Hidden information (Oh paranoia)
2. The HPA can be password protected
ATA/ATAPI
Device Configuration Overlay
Another way to hide data from the user
Changes the apparent capabilities of the disk to be limited
HPA DCOUser Addressable Space
IDENTIFY_DEVICE
READ_NATIVE_MAX_ADDRESS
DEVICE_CONFIGURATION_IDENTIFY
ATA/ATAPI
Device Configuration Overlay
1. A DCO can cause the IDENTIFY_DEVICE command to lie
about supported features
2. A DCO can show a smaller disk size than actually exists
3. DEVICE_CONFIGURATION_SET changes or creates a
DCO
4. DEVICE_CONFIGURATION_RESET removes a DCO
5. The DCO remains unchanged through reboots and resets
ATA/ATAPI
Serial ATA
1. 7 versus 40+/- connectors
2. No device chaining
3. A little more flexible
ATA/ATAPI
BIOS vs Direct Access
1. Direct: the SW must know the geometry and translation
equations to access the HD. It is the fast method for disk
access and data transfer.
2. BIOS: services disk commands through software interrupt
0x13 etc.
SCSI
SCSI vs ATA
1. More devices per bus
2. No controller required only a bus controller
3. Many more flavors: connectors, commands, etc.
SCSI
Flavors of SCSI
1. Mostly transfer speed and connector types
2. Cable specs have changed

More Related Content

What's hot

Managing the system and network connection Linux
Managing the system and network connection LinuxManaging the system and network connection Linux
Managing the system and network connection LinuxShriharsh Shendre
 
Licão 06 process text streams with filters
Licão 06 process text streams with filtersLicão 06 process text streams with filters
Licão 06 process text streams with filtersAcácio Oliveira
 
Getting started with ubuntu
Getting started with ubuntuGetting started with ubuntu
Getting started with ubuntuAbhinav Upadhyay
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The ComputerNasir Jumani
 
Computer Architecture - Hardware - Lessons 1-2 - Eric Vanderburg
Computer Architecture - Hardware - Lessons 1-2 - Eric VanderburgComputer Architecture - Hardware - Lessons 1-2 - Eric Vanderburg
Computer Architecture - Hardware - Lessons 1-2 - Eric VanderburgEric Vanderburg
 
Chapter 8: Advanced Drive Technology
Chapter 8: Advanced Drive TechnologyChapter 8: Advanced Drive Technology
Chapter 8: Advanced Drive Technologyaskme
 
Raspberry Pi - Lecture 2 Linux OS
Raspberry Pi - Lecture 2 Linux OSRaspberry Pi - Lecture 2 Linux OS
Raspberry Pi - Lecture 2 Linux OSMohamed Abdallah
 
Floppy disk interface
Floppy disk interfaceFloppy disk interface
Floppy disk interfaceMansi Chauhan
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsMayank Chaudhari
 
Hacking and Computer Forensics
Hacking and Computer ForensicsHacking and Computer Forensics
Hacking and Computer ForensicsKristian Arjianto
 
101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystemsAcácio Oliveira
 
M Compevid
M CompevidM Compevid
M CompevidCTIN
 
Linux Network commands
Linux Network commandsLinux Network commands
Linux Network commandsHanan Nmr
 
(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensicsINSIGHT FORENSIC
 
Part 4 of 'Introduction to Linux for bioinformatics': Managing data
Part 4 of 'Introduction to Linux for bioinformatics': Managing data Part 4 of 'Introduction to Linux for bioinformatics': Managing data
Part 4 of 'Introduction to Linux for bioinformatics': Managing data Joachim Jacob
 

What's hot (20)

1.2 boot the system v2
1.2 boot the system v21.2 boot the system v2
1.2 boot the system v2
 
Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)
 
Managing the system and network connection Linux
Managing the system and network connection LinuxManaging the system and network connection Linux
Managing the system and network connection Linux
 
File000174
File000174File000174
File000174
 
Licão 06 process text streams with filters
Licão 06 process text streams with filtersLicão 06 process text streams with filters
Licão 06 process text streams with filters
 
Getting started with ubuntu
Getting started with ubuntuGetting started with ubuntu
Getting started with ubuntu
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The Computer
 
Computer Architecture - Hardware - Lessons 1-2 - Eric Vanderburg
Computer Architecture - Hardware - Lessons 1-2 - Eric VanderburgComputer Architecture - Hardware - Lessons 1-2 - Eric Vanderburg
Computer Architecture - Hardware - Lessons 1-2 - Eric Vanderburg
 
Chapter 8: Advanced Drive Technology
Chapter 8: Advanced Drive TechnologyChapter 8: Advanced Drive Technology
Chapter 8: Advanced Drive Technology
 
Raspberry Pi - Lecture 2 Linux OS
Raspberry Pi - Lecture 2 Linux OSRaspberry Pi - Lecture 2 Linux OS
Raspberry Pi - Lecture 2 Linux OS
 
Floppy disk interface
Floppy disk interfaceFloppy disk interface
Floppy disk interface
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 
Hacking and Computer Forensics
Hacking and Computer ForensicsHacking and Computer Forensics
Hacking and Computer Forensics
 
101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems
 
M Compevid
M CompevidM Compevid
M Compevid
 
Linux Network commands
Linux Network commandsLinux Network commands
Linux Network commands
 
(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensics
 
Chapter22
Chapter22Chapter22
Chapter22
 
Part 4 of 'Introduction to Linux for bioinformatics': Managing data
Part 4 of 'Introduction to Linux for bioinformatics': Managing data Part 4 of 'Introduction to Linux for bioinformatics': Managing data
Part 4 of 'Introduction to Linux for bioinformatics': Managing data
 
Batel f re v66
Batel f re v66Batel f re v66
Batel f re v66
 

Viewers also liked (11)

OLIMPÍADES CICLE SUPERIOR
OLIMPÍADES CICLE SUPERIOROLIMPÍADES CICLE SUPERIOR
OLIMPÍADES CICLE SUPERIOR
 
The seahorse!
The seahorse!The seahorse!
The seahorse!
 
The princess and the pea
The princess and the peaThe princess and the pea
The princess and the pea
 
Tutoria 6è
Tutoria 6èTutoria 6è
Tutoria 6è
 
Tutoria 4t i 5è
Tutoria 4t i 5èTutoria 4t i 5è
Tutoria 4t i 5è
 
Tutoria 2n
Tutoria 2nTutoria 2n
Tutoria 2n
 
Tutoria P3
Tutoria P3Tutoria P3
Tutoria P3
 
Tutoria 1r
Tutoria 1rTutoria 1r
Tutoria 1r
 
Reunió tutories p 4
Reunió tutories p 4Reunió tutories p 4
Reunió tutories p 4
 
Tutoria P5
Tutoria P5Tutoria P5
Tutoria P5
 
Reunió general de famílies - Curs 2016/17
Reunió general de famílies - Curs 2016/17Reunió general de famílies - Curs 2016/17
Reunió general de famílies - Curs 2016/17
 

Similar to Computer/Digital Forensics: Hard Drive Imaging, File System Analysis

Similar to Computer/Digital Forensics: Hard Drive Imaging, File System Analysis (20)

Os
OsOs
Os
 
44con
44con44con
44con
 
Hard disk PPT
Hard disk PPTHard disk PPT
Hard disk PPT
 
Disk Architecture.pptx
Disk Architecture.pptxDisk Architecture.pptx
Disk Architecture.pptx
 
Lecture Notes for Device management in Operating Systems
Lecture Notes for Device management in Operating SystemsLecture Notes for Device management in Operating Systems
Lecture Notes for Device management in Operating Systems
 
Disks.pptx
Disks.pptxDisks.pptx
Disks.pptx
 
Processor2
Processor2Processor2
Processor2
 
Thiru
ThiruThiru
Thiru
 
Lecturedevicemanagement
LecturedevicemanagementLecturedevicemanagement
Lecturedevicemanagement
 
1 study of motherboard
1 study of motherboard1 study of motherboard
1 study of motherboard
 
Hard Disk Componets
Hard Disk ComponetsHard Disk Componets
Hard Disk Componets
 
Lec45chap4f04
Lec45chap4f04Lec45chap4f04
Lec45chap4f04
 
Disk Scheduling
Disk SchedulingDisk Scheduling
Disk Scheduling
 
Lpi 101 study_guide
Lpi 101 study_guideLpi 101 study_guide
Lpi 101 study_guide
 
HARD DISK DRIVE ppt
HARD DISK DRIVE pptHARD DISK DRIVE ppt
HARD DISK DRIVE ppt
 
Multimedia Technology
Multimedia TechnologyMultimedia Technology
Multimedia Technology
 
Presentation007
Presentation007Presentation007
Presentation007
 
Unix 6 en
Unix 6 enUnix 6 en
Unix 6 en
 
Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Data recovery with a view of digital forensics
Data recovery with a view of digital forensics
 
IMD 203 - Ch08
IMD 203 - Ch08IMD 203 - Ch08
IMD 203 - Ch08
 

Recently uploaded

Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxTanveerAhmed817946
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...shivangimorya083
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationBoston Institute of Analytics
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project Presentation
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 

Computer/Digital Forensics: Hard Drive Imaging, File System Analysis

  • 1. Computer/Digital Forensics ● Hard drive imaging ● Volume structure & analysis ● File system structure & analysis ● Tools ● Case studies
  • 2. Computer/Digital Forensics Computer/Digital Forensics: Acquisition of information on digital devices 1) Rigid recipe Investigation of digital devices and digital data for evidence of 1) a crime or violation of stated policy committed by the computer 2) a crime or violation of stated policy against the computer 3) a crime or violation of stated policy using the computer 4) accidental or intentional destruction or corruption of data Preparation for trial 1) Documentation of evidence 2) Proof the evidence has not been altered
  • 3. Phases of an Investigation System Preservation Phase Evidence Searching Phase Event Reconstruction Phase courtesy Priscilla
  • 4. Layers of Analysis Application/OS Analysis File System Analysis Volume Analysis Swap Space Analysis Database Analysis Memory Analysis Network Analysis Physical Storage Media Analysis
  • 5. Finding a File Name: miracle.txt Cluster 344 Last Accessed: October 27,2004 Cluster: 345 Size: 40 Today, the Yankees won the World Series. Cluster 345 Today, the Red Sox won the World Series.
  • 6. Computer/Digital Forensics Computer/Digital Forensics – Investigation of block devices that contain digital information – Procedures that will maintain the integrity of the digital evidence – Analysis of the condition and content of the block device that will permit the reconstruction of an incident or use
  • 7. Computer/Digital Forensics This Part of the Course will cover – Hard disk imaging – dd and NIST standards – Volume Analysis – Disk layout – Partitions – File system analysis – Fat, ntfs – ext2, ext3 – UFS1, USF2
  • 8. Computer/Digital Forensics Important ● Maintain chain of custody ● A casual exam request from your boss can result in legal stuff ● At first conduct a liturgical exam. You will never regret it. ● Written consent to proceed: business plan or policy or memo. Don't go to jail or get sued.
  • 9. Computer Foundations ● bin-to- hex and back again ● Big/little endian confusion ● Data structures ● Allocation of “space” to a data structure ● bit, byte, etc. ● Size allocated depends on location
  • 10. Boot Process Many layered (each hw/os system is different) 1.BIOS – ROM locates HW and initializes some of the hardware, 2.EPROM – determines boot device and HW configurations 3.LBA Sector 0/ CHS (0,0,1) more boot code and dereferences kernel code
  • 11. Boot Process Linux 1. JMP 0xFFFFFFF0 1st instruction after power on is a jump to BIOS (or) 1. Power-On-Self-Test 2. HW detect 3. Load interrupt vector table 4. Find bootable MBS 5. Copy MBS to 0x7C00 - RAM
  • 12. MBS Structure 1FE Boot code – Master Boot Record, MBR 1CE 1DE 1FD 1FF 1EE 1BE 000 1ED 1DD 1CD 1BD 1st Partition Entry 2nd Partition Entry 3st Partition Entry 4st Partition Entry Sector signature = 0x55 aa
  • 13. Partition Entry Structure 0C Bootable flag: 0x80 – bootable, 0x00 – not bootable 04 05 0B 0F 08 01 00 07 04 03 00 Starting CHS Address – (C, H, S) Partition type – 0x83 = linux, 0x82 = swap Ending CHS Address Starting LBA Address Size in Sectors
  • 14. Booting Cont'd 1. Move MBR to 0x9000 and execute 2. Transfers control to LILO 3. Loads compressed kernel 4. Decompresses itself 5. Log into the blue screen
  • 15. Hard Disks Current Technology - Moore's Law 1. Rotating platters 1.Platters: 1 – 12+ 2.Heads: 1 - 24+ 2. Organized – Cylinders/Tracks, Heads, Sectors 1.Track = Cylinder: tpi = 31,200 per inch 2.Bits per inch of track: bpi = 501,760 3.Areal density: 15.655 Gb/sq in (2000) 329 Gb/sq in (2009) projected 1 Tbit/sq max 1. Cost .50$ per Gbyte 1. Update 1 Tera Byte == $100 2. .10$ per Gbyte
  • 18.
  • 19. Hard Disks Geometry 1. CHS Address ( (Cylinder, Head, Sector) 1. Cylinder, Head, Sector 2. Cylinder address is limited to a byte – max = 255 3. Lying must take place at tpi = 32K 4. Most disks – radius = 1.25 inches 5. Sectors = 793 per track (variable) 6. Allocated 1 byte 2. LBA - (Logical Block Address) 1. LBA = (((C*heads-per-cyl) + H) * sectors-per-track) + S – 1 2. LBA = 0 -- CHS = (0, 0, 1) 3. Physical location – addressing 1. Sequential sector number
  • 20. Hard Disks Interfaces 1. IDE – ATA/ATAPI/etc 2. SCSI 3. Floppy 4. USB 5. 1394 Many, many flavors of each. Most of the flavors do not affect the forensic analysis of the actual media.
  • 21. Hard Disks ATA/ATAPI 1. AT Attachment Packet Interface 1. 1994 Original 2. Before 1994 was a crap shoot 3. ATAPI spec issued in 1998 2. 2002, ATA/ATAPI-6 allowed 48 bit LBA vs. 32 bit 1. Permitted another factor of 64K sectors to the disk 3. Current rev is 7/8 4. www.t13.org
  • 22. ATA/ATAPI Commands 1. Register delivered commands 1.Write command ID and parameters to HD register 2.HD loads parameters into appropriate registers 3.Executes command 4.Loads error values into register 5.Host reads error values 2. Packet delivered commands 1.Used when the command/parameter structure is larger than the register
  • 23. ATA/ATAPI Features 1. Passwords 2. Host Protected Area 3. Device Configuration Overlay 4. Serial ATA
  • 24. ATA/ATAPI Passwords 1. User password & master password 2. High security mode 1.Both user and administrator can access the HD 3. Maximum security mode 1.Admin can access HD only after the HD has been wiped 4. After n password attempts the disk freezes until reboot
  • 25. ATA/ATAPI Host Protected Area 1. HPA: Not accessible to the average user 2. Configurable using ATA commands 3. HD vendor can store configuration data that won't be overwritten by a format command 4. BIOS can write to the HPA at power up time 5. Located at the end of the HD, i.e. highest LBA address
  • 26. ATA/ATAPI HPA Commands 1. READ_NATIVE_MAX_ADDRESS 1.Returns the maximum physical address 2. IDENTIFY_DEVICE 1.Returns the max address the user can access 3. HPA = #1 - #2 4. HPA is created with a SET_MAX_ADDRESS
  • 27. ATA/ATAPI HPA Commands 1. The HPA may contain 1.BIOS settings 2.System files 3.Vendor information 4.Hidden information (Oh paranoia) 2. The HPA can be password protected
  • 28. ATA/ATAPI Device Configuration Overlay Another way to hide data from the user Changes the apparent capabilities of the disk to be limited HPA DCOUser Addressable Space IDENTIFY_DEVICE READ_NATIVE_MAX_ADDRESS DEVICE_CONFIGURATION_IDENTIFY
  • 29. ATA/ATAPI Device Configuration Overlay 1. A DCO can cause the IDENTIFY_DEVICE command to lie about supported features 2. A DCO can show a smaller disk size than actually exists 3. DEVICE_CONFIGURATION_SET changes or creates a DCO 4. DEVICE_CONFIGURATION_RESET removes a DCO 5. The DCO remains unchanged through reboots and resets
  • 30. ATA/ATAPI Serial ATA 1. 7 versus 40+/- connectors 2. No device chaining 3. A little more flexible
  • 31. ATA/ATAPI BIOS vs Direct Access 1. Direct: the SW must know the geometry and translation equations to access the HD. It is the fast method for disk access and data transfer. 2. BIOS: services disk commands through software interrupt 0x13 etc.
  • 32. SCSI SCSI vs ATA 1. More devices per bus 2. No controller required only a bus controller 3. Many more flavors: connectors, commands, etc.
  • 33. SCSI Flavors of SCSI 1. Mostly transfer speed and connector types 2. Cable specs have changed