Part2-DiskForensics
Part2-DiskForensics
Definitions
• Disk forensics is the study and analysis of
storage volumes
• Keep in mind that in 2022 this isn’t all
physical disks!
• Disk forensics is typically used when you:
– Cannot access the running state of the system
– Are investigating historical activity
– Are working a Law Enforcement (LE) case
Types of Disks
Magnetic Disks Solid State Drives
• Traditional “spinning disks” • No magnets
• Spinning platter with a thin • Flash memory to store data
magnetic coating • Specifically uses NAND flash
• “Head” moves over the platter which is persistent without
to write 1’s and 0’s power (unlike RAM)
• Same head used to read data off • Can write to a page level, erase
of the disk at a block level
• Sometimes hard to find / access • Garbage collection
data that’s not sequential
(seeking / fragmentation)
Types of Disks
VMWare Volumes AWS EBS Volumes
• A.k.a. “private cloud” • Public cloud.
• Disk is a logical container on • Everything is abstracted.
another disk. • We again use the abstraction
• May be running on a non- interface to capture the disk
traditional Operating System. (AWS EBS Snapshot).
• We acquire through VMWare • Now we typically mount them
itself – virtual disk acquisition. on another instance to do the
• Suspend the system > take a analysis (like a Magnet instance
snapshot > analyze the vmdk. in AWS).
Common File System Formats
• NTFS New Technology File Allocation
• FAT File Allocation Table
• FAT32
• Apple File System (APFS)
– Standard file system for macOS 10.12.4+
– Also used for iOS, iPadOS, watchOS.
– Optimized for SSDs
What is a file?
• Seems simple right?
• Short answer is that it depends on the file system.
• “indexed” file systems keep an index of every file
on the disk
• On an indexed file system the file is a combination
of:
– Index entry (record) on MFT (Master File Table) for
NTFS (metadata)
– Points to a location(s) on disk where the actual bytes
reside
File Deletion
• File deletion is not straightforward and can
happen differently depending at an
operating system and physical level
• This presents both challenges and
opportunities for forensic investigators
File Deletion – Operating System
• What happens when you “delete” a file in
Windows?
• C:\Windows\Temp
• C:\Users\<USERNAME>AppData\Local\Temp\
• %USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\Web
CacheV*.dat
• %USERPROFILE%\AppData\Roaming\Mozilla\ Firefox\Profiles\<random
text>.default\places.sqlite
– Table:moz_annos
• %USERPROFILE%\AppData\Local\Google\Chrome\User
Data\Default\History
Browser Downloads Cache
Downloads managers in modern browsers will track files downloaded from the
Internet.
• Firefox
– %userprofile%\AppData\Roaming\Mozilla\ Firefox\Profiles\<random
text>.default\downloads.sqlite
• Chrome (also sqlite)
– C:UsersUSER_NAMEAppDataLocalGoogleChromeUserDataDefaultHistory
– C:UsersUSER_NAMEAppDataLocalGoogleChromeUserDataChromeDefaultDataHisto
ry
• Edge
– C:\Users\%USERNAME%\AppData\Local\Microsoft\Edge\User Data\Default
Email Attachments
Lots of malware comes from email attachments.
• %USERPROFILE%\AppData\Local\Microsoft\Outlook
Prefetch
“Increases performance”
• %SYSTEMROOT%\System32\config
• %USERPROFILE%\Ntuser.dat
Jump Lists
Related to recent items in the task bar.