Essential Computer Forensic Tools Guide
Essential Computer Forensic Tools Guide
to
Computer Forensic
Tools
Foreword
• The goal of Computer forensics is to perform criminal investigations by
using evidence from digital data to find who was the responsible for
that particular crime.
• Forensic examiners need a range of forensic tools to
strengthen their investigation process.
• As more information is stored in digital form, it is very likely that the
evidence needed to prosecute the criminals is also in digital form
• In this module we look at the most popular forensic tools for
Conducting Computer Forensics Investigations. Both open source and
commercial tools are discussed.
2
Objectives
• By the end of this module you will get an understanding of the;
• Steps for Conducting Computer Forensics Investigations
–Policies and Procedures
–Quality Assurance
• Tools used in the each of the phases of the investigation
–Hardware and Software
3
Investigation phases
• Typical Steps for Conducting Computer Forensics
Investigations
• Acquisition
• Examination, Recovery
• Analysis
• Reporting, Presentation
4
Investigation phases
1. Acquisition
• Analogous to crime scene in the “real world”
–Goal is to recover as much evidence without altering the crime
scene
• Investigator should document as much as possible
–Maintain Chain of Custody
• Determine if incident actually happened
• Fully document the hardware and software configuration of the examiner system
as well as the digital devices being examined. This includes boot settings, the
exact hardware configurations, log on passwords etc
5
Investigation phases…
Acquisition
• What kind of system is to be investigated?
Can it be shut down?
Does it have to keep operating?
• Are there policies governing the handling of the incident?
• Is a warrant needed?
• Get most fleeting information first
– Running processes
– Memory
– Storage media
• Create 1:1 copies of evidence (imaging)
6
Investigation phases…
Acquisition
• Hard drive
• Capture entire drive (imaging)
–Bit by bit copy.
RAM
–Volatile. Do not reboot
–Create a dump
7
Investigation phases…
2. Examination and Recovery
• Goal is to extract data from the acquired evidence
• Always work on copies, never the original
– Must be able to repeat entire process from scratch
– Data, deleted data, “hidden” data
File systems
– Get files and directories
– Metadata: User IDs, Timestamps (MAC times),Permissions, …
–Some deleted files may be recovered
8
Physical Extraction
• Data is extracted at the physical level without regard to any file
systems present on the drive.
• Keyword searching: Performing a keyword search across the physical
drive can be useful as it allows the examiner to discover & extract data
that may not be accounted for by the operating system and file system.
• File Carving: Using file utility programs to scan the physical drive and
help recover and extract useable files and data that may not be
accounted for by the operating system and file system.
• Looking at the Partition Table: The partition structure will help identify the
file systems present and determine if the entire physical size of the
hard drive is accounted for. (i.e If there is a 1Tb hard disk present, but partition
table only shows 900Gb then where is the missing 100Gb?) 9
Logical Extraction
• Data from the drive is based on the file system(s) present on the drive.
• Steps may include:
Extraction of the file system information to reveal characteristics such as directory
structure, file attributes, file names, date and time stamps, file size, and file location.
Data reduction to identify and eliminate known files through the comparison of
calculated hash values to authenticated hash values.
Extraction of files pertinent to the examination. Methods to accomplish this may be
based on file name and extension, file header, file content, and location on the drive
Recovery of deleted files.
Extraction of password-protected, encrypted, and compressed data.
Extraction of file slack and unallocated space
10
Investigation phases…
Recovery (1)
File deletion
• Most file systems only delete directory entries but not the data blocks associated
with a file.
• Unless blocks get reallocated the file may be reconstructed
– The earlier the better the chances
– Depending on fragmentation, only partial reconstruction may be possible
Slack space
• Unallocated blocks
–Mark blocks as allocated to fool the file system
• Unused space at end of files if it doesn’t end on block boundaries
• Unused space in file system data structures 11
Investigation phases…
Recovery (2)
Steganography
• Data hidden in other data
• Unused or irrelevant locations are used to store information
• Most common in images, but may also be used on executable files, meta data,
file system slack space
Encrypted data
• Depending on encryption method, it might be infeasible to get to the information.
• Locating the keys is often a better approach.
• A suspect may be compelled to reveal the keys by law.
12
Investigation phases…
Recovery (3)
• Locating hidden or encrypted data is difficult and might even be impossible.
• Investigator has to look at other clues:
– Steganography software
– Crypto software
– Command histories
File residue
• Even if a file is completely deleted from the disk, it might still have left a trace:
– Web cache
– Temporary directories
– Data blocks resulting from a move
– Memory 13
Investigation phases…
Recovery (4)
• Methodology differs depending on the objectives of the investigation:
– Locate contraband material
– Reconstruct events that took place
– Determine if a system was compromised
– Authorship analysis
Contraband material
• Locate specific files
– Databases of illegal pictures
– Stolen property
• Determine if existing files are illegal
– Picture collections, Music or movie downloads 14
Investigation phases…
3. Analysis
• Analysis is the process of interpreting the extracted data to determine their
significance to the case. Various analytical methods exist, examples of which
include:-
–Timeframe,
–Data hiding,
–Application and file,
–Ownership and possession.
• Requires specific knowledge of file system and OS.
• Data may be encrypted, hidden, obfuscated(confusing in order to conceal the
truth)
• Obfuscation: Misleading file suffix, Misleading file name, Unusual location15
Investigation phases…
Analysis
Event reconstruction
• Utilize system and external information
– Log files
– File timestamps
– Firewall/IDS information
• Establish timeline of events
16
Investigation phases…
Analysis
The needle in the haystack
• Locating files:
– Storage capacity approaches the terabyte magnitude
– Potentially millions of files to investigate
• Event reconstruction:
– Dozens, hundreds of events a second
– Only last MAC times are available
– Insufficient logging
Compromised system
• If possible, compare against known good state
– Databases of “good” files 17
Investigation phases…
Analysis
Compromised system
– Look for unusual file MACs
– Look for open or listening network connections (trojans)
– Look for files in unusual locations
Unknown executables
• Run them in a constrained environment
– Dedicated system
– Sandbox
– Virtual machine
• Might be necessary to disassemble and decompile
– May take weeks or months 18
Investigation phases…
Analysis
Authorship analysis
• Determine who or what kind of person created file.
– Programs (Viruses, Tojans, Sniffers/Loggers)
– E-mails (Blackmail, Harassment, Information leaks)
• If actual person cannot be determined, just determining the skill level of the author
may be important.
19
Investigation phases…
4. Presentation and Reporting
• An investigator that performed the analysis may have to appear in
court as an expert witness.
• For internal investigations, a report or presentation may be required.
• Challenge: present the material in simple terms so that a jury or CEO can
understand it.
–Investigator's Report: Forms the basis for legal proceedings
–Investigator's Findings: What should be found if someone else conducted
the same investigation
20
Forensic Laboratories
Lab Security
• Physical security
– Keep unauthorized people out of critical areas
• Examination stations
• Evidence storage
– Keys, swipe cards, access codes
– Digital access control is better than keys
• Keeps an audit trail to support chain of custody
– Protection from fire, flood. etc.
22
Chain of Custody
• Evidence must be signed in and out of storage
• Evidence log must be complete
23
Work in Isolation
• Forensic examination computer should not be connected to
the Internet
• This avoids arguments over contamination by malware
• Evidence drives may contain malware
–Scan them with antivirus software
24
Evidence Storage
• Data safety
– Protects evidence from tampering
– Fireproof and waterproof
• Evidence log
– Must record who entered, when, and what they removed
or returned
• Data storage lockers must be kept locked
25
Policies and Procedures
Best Practices for Evidence Collection
27
Best Practices for Evidence Collection
28
Best Practices for Evidence Collection
29
Quality Assurance
30
Tool Validation
31
Tool Requirements
• Usability - Present data at a layer of abstraction that is useful to an investigator
• Comprehensive - Present all data to investigator so that both inculpatory and exculpatory
evidence can be identified
• Accuracy - Tool output must be able to be verified and a margin of error must be given
• Deterministic - A tool must produce the same output when given the same rule set and
input data.
• Verifiable - To ensure accuracy, one must be able to verify the output by having access to
the layer inputs and outputs. Verification can be done by hand or a second tool set.
32
Documentation
• Case File
–Case submission forms
–Requests for assistance
–Chain of custody reports
–Examiner's notes
–Crime scene reports
–Examiner's final reports
–Copy of search warrant
–All collected in a case file
33
Examiner Notes
• Must be detailed enough to enable another examiner to
duplicate the process
–Discussions with key players including prosecutors and investigators
–Irregularities found and actions taken
–OS versions & patches
–Passwords
–Changes made to the system by lab personnel and law enforcement
• It may be years before trial, and you will need to
understand your notes
34
Examiner's Final Report
• Formal document delivered to prosecutors. investigators,
opposing counsel, etc.
• Remember the audience is nontechnical
• Avoid jargon, acronyms, and unnecessary details
35
Examiner's Final Report Contents
• Identity of the reporting agency
• Case ID #
• Identity of the submitting person and case investigator
• Dates of receipt and report
• Detailed description of the evidence items submitted
–Serial numbers, makes, models, etc.
• Identity of the examiner
• Description of the steps taken during the examination process
• Results and conclusions
36
Examiner's Final Report Sections
• Summary
–Brief description of the results
• Detailed findings
–Files pertaining to the request
–Files that support the findings
–Email, Web cache, chat logs, etc.
–Keyword searches
–Evidence of ownership of the device
• Glossary
37
Hardware Tools
• Cloning devices
• Cell phone acquisition devices
• Write blockers
• Portable storage devices
• Adapters
• Cables
• Much more
38
Cloners and Kits
• Hardware Cloners
– Faster, can clone multiple drives at once
– Provide write protection, hash authentication, drive wiping, audit trail…
• Crime scene kits
– Preloaded with supplies to collect digital evidence
– Pens, digital camera, forensically clean storage media, evidence bags, evidence
tape, report forms, markers…
39
Open source tools
40
Autopsy
• Autopsy is a GUI-based open source digital forensic program to
analyze hard drives and smartphones efficiently.
• Autospy is used by thousands of users worldwide to investigate what happened on
the computer.
41
[Link]
Autopsy
• It’s widely used by corporate examiners, military to investigate, and
some of the features are.
Email analysis
File type detection
Media playback
Registry analysis
Photos recovery from memory card
Extract geolocation and camera information from JPEG files
Extract web activity from a browser
Show system events in a graphical interface
Timeline analysis
Extract data from Android – SMS, call logs, contacts, etc.
It has extensive reporting to generate in HTML, XLS file format.
42
Encrypted Disk Detector
• [Link] 43
Wireshark
• [Link] 44
Wireshark
• Features:
It provides rich VoIP (Voice over Internet Protocol) analysis.
Capture files compressed with gzip can be decompressed easily.
Output can be exported to XML (Extensible Markup Language), CSV (Comma
Separated Values) file, or plain text.
Live data can be read from the network, blue-tooth, ATM, USB, etc.
Decryption support for numerous protocols that include IPsec (Internet Protocol
Security), SSL (Secure Sockets Layer), and WEP (Wired Equivalent Privacy).
You can apply intuitive analysis, coloring rules to the packet.
Allows you to read or write file in any format.
• [Link] 45
Network Miner
• [Link] 46
NMAP
• [Link] 47
Volatility
48
Kali Linux Forensics Tools
49
Kali Linux Forensics Tools
• PALADIN forensic suite – the world’s most famous Linux forensic suite
is a modified Linux distro based on Ubuntu available in 32 and 64 bit.
• The entire suite consists of over, data leak, modification of existing data, malicious
software like spyware and malware.
• Paladin is a forensic tool designed by Sumuri, which is a modified Linux
distribution based on Ubuntu.
• Paladin has an easy to use Graphical User Interface (GUI) that offers a complete
solution for triage, imaging, examination, and reporting.
• This Digital forensics software provides more than 100 useful tools for
investigating any malicious material.
• [Link]
51
Paladin
• Features:
• It provides both 64-bit and 32-bit versions.
• This tool is available on a USB thumb drive.
• This toolbox has open-source tools that help you to search for the required
information effortlessly.
• This tool has more than 33 categories that assist you in accomplishing a cyber
forensic task.
52
The Sleuth Kit
• [Link] 53
The Sleuth Kit
Features:
You can identify activity using a graphical interface effectively.
This application provides analysis for emails.
You can group files by their type to find all documents or images.
It displays a thumbnail of images to quick view pictures.
You can tag files with the arbitrary tag names.
The Sleuth Kit enables you to extract data from call logs, SMS,
contacts, etc.
It helps you to flag files and folders based on path and name.
54
CAINE
55
Oxygen Forensic Suite
[Link] 56
Xplico
• [Link]
57
Xplico
Features:
You can get your output data in the SQLite database or MySQL
database.
This tool gives you real time collaboration.
No size limit on data entry or the number of files.
You can easily create any kind of dispatcher to organize the extracted
data in a useful way.
It is one of the best open source forensic tools that support both IPv4
and IPv6.
You can perform reserve DNS lookup from DNS packages having
58
input files.
Crowdstrike
• [Link]
59
SIFT: SANS Investigative Forensic Toolkit
• SIFT (SANS investigative forensic toolkit) workstation
• SIFT is a suite of forensic tools you need and one of the most popular open
source incident response platform.
• The SIFT Workstation is a collection of tools for forensic investigators
• [Link] 60
SIFT Capabilities
61
SIFT Capabilities
• Evidence Image Support
– Expert Witness (E01)
– RAW (dd)
– Advanced Forensic Format (AFF)
62
SIFT
• Features:
• It can work on a 64-bit operating system.
• This tool helps users to utilize memory in a better way.
• It automatically updates the DFIR (Digital Forensics and Incident
Response) package.
• You can install it via SIFT-CLI (Command-Line Interface) installer.
• This tool contains numerous latest forensic tools and techniques.
63
SIFT Capabilities
• [Link]
65
Forensic Acquisition of Websites (FAW)
• Forensic Acquisition of Websites (FAW) is a way to forensically acquire
a website or webpage as it is viewed by the user.
• FAW preserves what is publicly available at the time.
• It is a helpful tool in non-solicitation cases as it will preserve the evidence before it
can be taken down by the user.
• In order to capture a webpage with FAW, the investigator must go to the webpage
in a live environment.
66
Forensic Acquisition of Websites…
• This tool would be used in a scenario where an investigator may want
to take a screenshot of a webpage as evidence of a crime such as
cyber terrorism, narcotics sales, cyberbullying, etc.
• For example, an active investigation of a narcotics dealer may be ongoing, where
his or her social media presence is being monitored.
• If the suspect tweets about the latest substance he has for sale, then that tweet
and the entire page it is viewed on may be captured with FAW.
• FAW allows the investigator to take a screenshot of the tweet, at the same time
also recording many other useful artifacts, such as iFrames, advertisments, links,
and streaming data.
• FAW records and logs every action within the tool for forensic documentation
purposes. 67
X-Ways Forensics
• [Link] 68
X-Ways Forensics
• Features:
• It has ability to read partitioning and file system structures inside .dd image files.
• You can access disks, RAIDs (Redundant array of independent disk), and more.
• It automatically identifies lost or deleted partitions.
• This tool can easily detect NTFS (New Technology File System) and ADS
(Alternate Data Streams).
• X-Ways Forensics supports bookmarks or annotations.
• It has the ability to analyze remote computers.
• You can view and edit binary data by using templates.
• It provides write protection for maintaining data authenticity.
69
HashMyFiles
• HashMyFiles can help to calculate the MD5 and SHA1 hashes. It
works on almost all the latest Windows OS.
• HashMyFiles is a great little tool that will easily hash multiple files with multiple
algorithms.
• Hash algorithms used are MD5, SHA1, CRC32, SHA-256, SHA-215, and SHA-
384.
• Hashing is extremely useful in providing a way to check if programs or files are the
same, and have not been changed from the original.
• [Link] 70
DEFT
• DEFT: Digital Evidence and
Forensics Toolkit
• The Linux distribution includes many
popular and useful utilities for
computer forensics, incident
response, penetration testing, and
security analysis
• [Link]
71
DEFT
• DEFT Extra is also available on windows. The GUI is
indicated below
72
ExifTool
• ExifTool helps you to read, write, and edit meta information for a
number of file types. It can read EXIF, GPS, IPTC, XMP, JFIF,
GeoTIFF, Photoshop IRB, FlashPix, etc
• One of the best tool for Extracting Meta data from a image file including GPS,
Camera Information, It is user-friendly and convenient because of its simple
command-line utilized easy to use
• [Link] 73
Helix3
• Helix is a Ubuntu live CD customized for computer forensics
• It allows you to quickly Detect, Identify, Analyze, Preserve and Report
giving you the evidence to reveal the truth and protect your business.
• This tool can collect data from physical memory, network connections, user
accounts, executing processes and services, scheduled jobs, Windows Registry,
chat logs, screen captures, SAM files, applications, drivers, environment variables
and Internet history.
74
WindowsSCOPE
75
Encase
• Encase is an application that helps you to recover evidence from hard
drives.
• It allows you to conduct an in-depth analysis of files to collect proof like
documents, pictures, etc.
• Manufactured and sold by Guidance Software.
• Widely recognized and accepted.
76
[Link]
Encase
• Features:
• You can acquire data from numerous devices, including mobile phones, tablets,
etc.
• It is one of the best mobile forensic tools that enables you to produce complete
reports for maintaining evidence integrity.
• You can quickly search, identify, as well as prioritize evidence.
• Encase-forensic helps you to unlock encrypted evidence.
• It is one of the best digital forensics tools that automates the preparation of
evidence.
• You can perform deep and triage (severity and priority of defects) analysis.
•
77
[Link]
EnCase
• Features :
• Court-validated Logical Evidence File format.
• Advanced search options.
• Internet and email support.
• Multiple viewers.
• Instant message analysis.
• Support for most system files.
• Multiple acquisition options.
78
FTK Imager
• FTK Imager is a forensic toolkit i developed by AccessData that can be used to get
evidence. It can create copies of data without making changes to the original
evidence. This tool allows you to specify criteria, like file size, pixel size, and data
type, to reduce the amount of irrelevant data.
• [Link] 79
FTK Imager
• Features:
It provides a wizard-driven approach to detect cybercrime.
This program offers better visualization of data using a chart.
You can recover passwords from more than 100 applications.
It has an advanced and automated data analysis facility.
FTK Imager helps you to manage reusable profiles for different investigation
requirements.
80
[Link]
Magnet RAM Capture
• [Link] 81
Magnet RAM Capture
• Features:
• You can run this app while minimizing overwritten data in memory.
• It enables you to export captured memory data and upload it into
analysis tools
• This app supports a vast range of Windows operating systems.
82
[Link]
Registry Recon
• Registry Recon is a computer forensics tool used to extract,
recover, and analyze registry data from Windows OS.
• This program can be used to efficiently determine external
devices that have been connected to any PC.
• Features:
• It supports Windows XP, Vista, 7, 8, 10, and other operating systems.
• This tool automatically recovers valuable NTFS data.
• You can integrate it with the Microsoft Disk Manager utility tool.
• This program rebuilds the active registry database.
[Link]
83
RedLine
• [Link]
84
ProDiscover Forensic
• ProDiscover Forensic is a computer security app that allows you to locate all the
data on a computer disk. It can protect evidence and create quality reports for the
use of legal procedures.
• Features:
This product supports Windows, Mac, and Linux file systems.
You can preview and search for suspicious files quickly.
This Digital forensics software creates a copy of the entire suspected disk to keep the original
evidence safe.
This tool helps you to see internet history.
You can import or export .dd format images.
It enables you to add comments to evidence of your interest.
ProDiscover Forensic supports VMware to run a captured image.
• [Link] 85
Cell Phone Forensic Tools
• BitPim is a robust open-source application that was not built for forensic purposes.
BitPim is designed to work with CDMA phones that are produced by several
vendors, including LG and Samsung, among others. BitPim can recover data such
as the phonebook, calendar, wallpapers, ring tones, and file system
• [Link]
• Oxygen Forensic Suite is a forensic program specifically designed for cell phones.
It’s a tool that supports more than 2,300 devices. It extracts data such as
phonebook, SIM card data, contact lists, caller groups, call logs, standard and
custom SMS/MMS/e-mail folders, deleted SMS messages, calendars, photos,
videos, JAVA applications, and GPS locations
• [Link]
AccessData’s MPE+ supports more than 3,500 phones. It’s an on-scene, mobile
forensic recovery tool that can collect call history, messages, photos, voicemail,
calendars, and events. It can analyze and correlate multiple phones and
computers using the same interface videos
[Link]
• EnCase Smartphone Examiner is an EnCase tool designed to review and collect
data from smartphones and tablet devices. It collects data from Blackberrys, iTune
backups, and SD cards. Once the information is collected, it is easily imported into
the EnCase Forensic suite for continued investigation
[Link]
87
Cell Phone Forensic Tools
•
The Cellebrite Universal Forensic Extraction Device (UFED) is a stand-alone,
selfcontained hardware device used to extract phonebooks, images, videos, SMS,
MMS, call history, and much more. It supports more than 2,500 phones and is
designed to extract information at the scene. It also has a SIM card reader and
cloner. As an interesting aside, Cellebrite devices (the nonforensic versions) can
be found in many cell phone stores.
• They’re used to transfer a customer’s data from one device to another
• [Link]
88
Other Tools
• Mac Tools
–Softblock
–Macquisition
–Blacklight
–BlackBag
–Mac Marshall
89
Commercial vs Open source Software
Software
• Software used in digital forensic analysis comes in
two varieties:
Commercial software
Open-source software
• In either case, the software is typically used for copying data from a suspect’s
disk drive (or other data source) to an image file, and then analyzing the data
without making any changes to the original source.
Advantages of commercial forensic software:
Proven admissibility in court (for major brands).
Dedicated technical support.
Strict quality control for forensic accuracy.
Often comes with an easy point-and-click graphical user interface.
Better documentation.
Greater availability of training and supplemental materials. 91
Software
Disadvantages of commercial forensic software:
• High initial cost.
• Cost of annual licensing / maintenance.
• Licensing often done through USB keys or “dongles” which can be
lost or damaged.
• Customer may need to be a member of a restricted group of
customers (such as law enforcement or academia) to receive best
pricing and functionality.
92
Software
Advantages of open-source forensic software:
• Lower initial cost
• Open-source software is often free.
• It is possible to create your own forensic software from
source code, incorporating only the features you need.
• Fewer (if any) licensing issues.
Disadvantages of open-source forensic software:
• Little (if any) vendor support on free software.
• Perceived as less standardized and reliable, therefore less
likely to produce admissible results.
• Often uses command-line interface instead of the point-and-
click interface familiar to Windows users
93
Software
97
Hardware.. Incident Response
• UltraKit: Includes write-blockers, cables, adapters, and
power supplies necessary for obtaining evidence during
incident response.
98
Hardware.. Incident Response
• Faraday cage:
• Is a container that isolates wireless devices from radio frequency
signals that could compromise data.
• The Faraday cage can prevent some laptop PCs, mobile phones,
and smartphones from being remotely “wiped” of data or
otherwise locked down by wireless instructions.
• In an emergency, a Faraday cage can be improvised by
wrapping a wireless device in several layers of aluminum foil.
99
Hardware… Incident Response
• The Wireless StrongHold Bag.
• A Faraday cage built into an evidence bag for the safe
collection of wireless devices in incident response.
100
Hardware… Incident Response
• Other essential hardware for incident response:
• Write-blockers
• External hard drives
• USB drives, floppy disks and external floppy drive
• Portable network hub or network switch
• Network cables
• Straight-through cable will allow connection to a hub.
• Crossover cable will bypass a hub or switch in a direct PC-to-PC
connection.
• Evidence inventory logs
• Evidence identification tape, labels, and stickers
• Evidence bags (paper and antistatic)
101
Hardware… Incident Response
• Other essential hardware for incident response…
• Crime scene tape
• Gloves
• Nonmagnetic hand tools
• Cameras (photo and video)
102
Hardware… Laboratory
• In the digital forensic laboratory, Forensic workstations are
customized computer systems that contain the equipment
necessary for analysis of suspect computers.
• In addition to standard PC components such as motherboards,
hard drives, and memory, forensic workstations may include:
Disk duplicators
Disk erasers
Write-blockers
• A modern forensic laboratory
workstation
103
Hardware… Laboratory
• There are three generally accepted methods for duplicating
hard drives
Dedicated forensic duplication systems
System-to-system imaging
Imaging on the original system
Disk Imaging on a Dedicated Forensic System
• Platform specifically built and designed to accommodate
numerous types of hard drive connections.
• Specialized bit‐level imaging software transfers an exact
copy of the contents of the original hard drive (or other data
source) to one or more blanks.
104
Hardware… Laboratory
Disk Imaging on a Dedicated Forensic System…
• Typically, an investigator will make more than one copy of the
suspect hard drive using this method.
If the forensic analysis is correct, the investigation should produce the
same results on identical copies of the drive.
• Example: Tableau Forensic Duplicator
Provides disk-to-disk and
disk-to-file duplication.
Wipes disks to remove all traces
of previous data on lab workstation
hard drives.
Creates cryptographic hashes. 105
Cellebrite UFED
• Cellebrite is an Israeli digital forensics company that provides tools for
collection, analysis, and management of digital data.
• Cellebrite offers a number of commercial digital forensics tools, but its Cellebrite
UFED (Universal Forensic Extraction Device) claims to be the industry standard
for accessing digital data.
• The main UFED offering focuses on mobile devices, but the general UFED
product line targets a range of devices, including drones, SIM and SD cards, GPS,
cloud and more.
• The UFED platform claims to use exclusive methods to maximize data extraction
from mobile devices.
106
Hardware… Laboratory
107
Hardware… Laboratory
108
Concerns
• To avoid the possibility of data contamination, digital forensic
workstations are typically not connected to the Internet or any
computer outside of the laboratory’s secure network.
• Never check e-mail, surf the Internet, or perform typical IT duties on a
forensic workstation. Viruses and spyware will seriously compromise
your investigation!
• Under no circumstances should peer-to-peer file sharing
applications be allowed on the same network as the forensic
workstation.
109
Concerns
• Evidence on Removable Media:
Removable media is normally imaged using a dedicated forensics
system. This allows multiple images to be stored on a local hard drive.
Duplicate copies can be burned from those images. As with any other
kind of digital evidence, original source material should be handled
as little as possible.
CDs and DVDs are the easiest and safest to handle since they are
usually in read-only mode. When dealing with handwritten labels on CDs
and DVDs, consider that the disk may be mislabeled and you are
actually dealing with a re-writable disk.
110
Digital Forensics Hardware Tools
• Technology changes rapidly
• Hardware eventually fails
–Schedule equipment replacements periodically
• When planning your budget consider:
–Amount of time you expect the forensic workstation to be running
–Failures
–Consultant and vendor fees
–Anticipate equipment replacement
111
Forensic Workstations
• Carefully consider what you need
• Categories
–Stationary workstation
–Portable workstation
–Lightweight workstation
• Balance what you need and what your system can handle
–Remember that RAM and storage need updating as technology
advances
112
Forensic Workstations
• Police agency labs
– Need many options
– Use several PC configurations
• Keep a hardware library in addition to your software library
• Private corporation labs
– Handle only system types used in the organization
113
Forensic Workstations
• Building a forensic workstation is not as difficult as it sounds
• Advantages
– Customized to your needs
– Save money
• Disadvantages
– Hard to find support for problems
– Can become expensive if careless
• Also need to identify what you intend to analyze
114
Forensic Workstations
• Some vendors offer workstations designed for digital forensics
• Examples
115
End
116