Cyber Forensics Unit - II
Cyber Forensics Unit - II
(Unit 2)
Introduction
In this networked world organizations need to manage systems,
network, and applications running over them, which can enable
effective data and resource sharing
No operating system can guarantee 100% security to the available
resources and data. There are several shortcomings in their designs
This situation, if exploited well by hackers can lead to end of any
organization’s business !!
The pitiable thing is that, end users are unaware of the vulnerabilities.
Disk Drive Overview - I
● There are two types of Disk drives:
○ Fixed storage drives
○ External storage drives
● Few of removable storage drives are:
○ Floppy disks
○ Compact Disks
○ Digital Versatile Disk (DVD)
○ ZIP Disks
○ r/m Drives
Disk Drive Overview - II
● Hard disk drive is a good example for permanent storage device
platter
● Slack space is the free space on the cluster after writing data on that cluster
● Dos and Windows utilizes fixed size clusters for file system
● If the size of stored data is less than the cluster size, the unused area remains
reserved for the file resulting in slack space
● DOS and FAT 16(file allocation table) file system in the Windows utilizes very
large sized clusters
● For example, if the partition size is 4 GB, each cluster will be 32 K. Even if a file
needs only 10 K, the entire 32 K will be allocated, resulting in 22 K of slack space.
Lost Clusters
● Operating system marks cluster as used but not allocate them
to any file such clusters are known a lost cluster
● Lost clusters can be reassigned data making disk space free
● ScanDisk utility has the capability to identify lost clusters in
DOS and Windows operating system
Bad Sector
A table, which tracks all the system storage A latest file system developed specially for Windows 2000.
changes.
Supported in all versions of windows Supports all the operating systems after windows 2000
operating system
Doesn’t support extremely large storage media. Supports extremely large storage media.
File or
Standard Unused
Directory Data or Index
Information Space
Name
EFS Recovery Key Agent-I
● A recovery policy is always associated with a
encryption policy. A recovery agent decrypts the file if
encryption certificate of an encrypted file is lost
● The recovery agent is used in following conditions:
○ When a user loses a private key
○ When a user leaves the company
○ Whenever a law enforcement agency makes a request
EFS Recovery Key Agent-II
● The Windows administrator can recover key from the
Windows or from the MS-DOS command prompt
● The keys can be recovered from command prompt using the
following commands:
○ CIPHER
○ COPY
○ EFSRECVR
● Recovery agent information of an encrypted file can be viewed
using the efsinfo tool
Understanding Microsoft Boot Tasks
These are the steps that are followed by NTFS during the
startup:
● Power-on self test (POST)
● Initial startup
● Boot loader
● Hardware detection and configuration
● Kernel loading
● User logon
Understanding Boot Sequence DOS
● Boot sequence steps are as ○ Volume boot sector is loaded and
follows: tested
○ Computer waits for power good ○ Loads and executes IO.SYS
signal ○ IO.SYS searches for MSDOS.SYS
○ Processor executes the BIOS loads it and executes the file
○ COMMAND.COM is loaded and
boot program executed for interpreting and
○ BIOS performs Power on self reading CONFIG.SYS and
test(POST) AUTOXEC.BAT
○ BIOS initializes the system
settings from CMOS settings After this point the operating system
○ PCI initializes and displays the takes control of the computer
configuration and status of
devices
○ BIOS locates and loads Disk
operating system(DOS)
○ •BIOS then loads the Master
Boot Record(MBR)
Understanding MS-DOS Startup Tasks
● IO.SYS – It contains all instructions
used by the operating system to
interact with the hardware.It is the
first file loaded after bootstrap
detects the operating system
● MSDOS.SYS –It is the kernel in
MS-DOS and loads COMMAND.COM
and AUTOEXEC.BAT
● COMMAND.COM- It provides
internal DOS commands
● CONFIG.SYS – It contains the
commands that are required during
the startup
● AUTOEXEC.BAT- It contains
customized settings for the MS-DOS
Other DOS Operating Systems
Following are the useful disk operating system other than
Microsoft’s DOS:
● 4DOS: It has more commands, better editor, online help and flow
control commands like; DO WHILE, RERURN, IFF..THEN...ELSE
● Dr- DOS: It is DOS compatible and offers pre-emptive multitasking
and 32-bit protected mode etc
● Caldera OpenDOS: It’s a MS-DOS compatible OS. It is the
descendant of DR DOS and Novell DOS
● Novell DOS: A full feature DOS built for workstations on Novell
networks
● PTS-DOS: Simple graphical user interface DOS; which supports
FAT32, big hard drives, and CD- ROMs. Partition Manager Easy makes
it easy to partition the hard drives;
● QDOS: A 16MB OS created for CP/M operating system
● FreeDOS: It is cheaper than IBM’s and Microsoft’s and is being used
in China on HP PC’s
Registry Data-I
● Registry is the hierarchical database
● Used to store the information regarding the users,
applications, and the hardware devices
● Windows continuously refers the registry for the
information during the execution of the application
● The data in the registry is saved in the form of
binary files
Registry Data-II
Registry Data-III
Examining Registry Data
● Registry has predefined set of keys for every folder
● A registry hive is defined as a set of keys, sub keys, and
values in the used in the windows registry, which has a
group of supporting files that contain backups of its data
● Registry can be examined manually using the register
editor
● Registry can be examined using the tools like:
○ Registry Monitor
○ Registry Checker
Examining Registry Data
● Registry has predefined set of keys for every folder
● A registry hive is defined as a set of keys, sub keys, and
values in the used in the windows registry, which has a
group of supporting files that contain backups of its data
● Registry can be examined manually using the register
editor
● Registry can be examined using the tools like:
○ Registry Monitor
○ Registry Checker
Determining the Best Acquisition Methods
● Forensic investigators acquire digital evidence using the
following methods
○ Creating a bit-stream disk-to-image file
○ Making a bit-stream disk-to-disk copy
○ Creating a sparse data copy of a folder or file
Data Recovery Contigencies
● Investigators must make contingency plans when data acquisition
failure occurs
● To preserve digital evidence investigators need to create a duplicate
copy of the evidence files
● In case the original data recovered is corrupted investigators can
make use of the second copy
● Use of at least two data acquisition tools are preferred to create copy
of evidence incase the investigator’s preferred tool does not properly
recover data
MS-DOS Data Acquisition Tool: DriveSpy
● DriveSpy enables the investigator to direct data from one
particular sector range to another sector
● DriveSpy provides two methods in accessing disk sector
ranges:
○ Defining the absolute starting sector after a comma and
the total number of sectors to be read on the drive
○ Listing the absolute starting and ending sectors
DriveSpy Data Manipulation Commands
● There are two commands in
DriveSpy that is used for
Data Manipulation:
○ The “SaveSect” command-
■ Used to copy particular sectors
on a disk to a file
■ It copies the sectors as a bit-
stream image so that the file
is a duplicate of the original
sectors
○ The “WriteSect” command-
■ Used to regenerate the
information acquired
through the SaveSect
command
DriveSpy Data Preservation Commands
● The data preservation
commands in the DriveSpy
application are :
○ The “SavePart” command-
■ Used to create an image file of
the specified disk partition of
the suspect’s drive
○ The “WritePart” command-
■ Counterpart of the “savePart”
command
■ Used to recreate the saved
partition image file that is
created with the “savePart”
command
Using Windows Data Acquisition Tools
● Windows data acquisition tools allow the investigator to easily
acquire evidence from a disk with the help of removable media
such as USB storage devices
● These tools also can use Firewire to connect hard disks to the
forensic lab systems
● Data acquisition tools in Windows cannot acquire data from
the host protected area of the disk
Data Acquisition Tool : Access Data FTK Explorer
● FTK Explorer acquires data that
can help the investigator
understand how other forensic
tools in Windows work
● This tool was first designed to
examine disks and bit-stream
disk- to-image files created by
using other forensic software
● FTK Explorer can make bit-stream
disk-to-image copies of evidence
disks
● This tool allows the investigator to
acquire the evidence disk from a
logical partition level or a physical
drive level
FTK
Acquiring Data on Linux
● Forensic Investigators use the built- in Linux command “dd” to copy data
from a disk drive
● This command can make a bit-stream disk-to- disk file, disk-to-image file,
block-to-block copy/ block-to-file copy
● The “dd” command can copy data from any disk that Linux can mount and
access
● Other forensic tools such as AccessData FTK and Ilook can read dd image
files
Data Acquisition Tool : Encase
● The Encase tool delivers advanced features for compute
forensics and investigations
● It is the primary data acquisition tool that is used by forensic
investigators
● Provides tools to conduct investigations with accuracy and
efficiency
● Data can be acquired by:
○ Disk to disk
○ Disk to network server drive
○ Parallel port with a laplink cable to the forensics
workstation disk drive
Encase