Data Acquisition
Data Acquisition
Data Acquisition
objectives
Data Acquisition
• Rules of Acquisition:
No changes to the original storage medium must be tolerated.
All acquired data must be authentic and relate in full integrity to its original
evidence.
The chain of custody must be protected at all the times.
Why create an Image?
• The computer/media is a crime scene and it should be protected to ensure that the evidence is
not contaminated.
• Live data acquisition is the process of extracting volatile information from registries, cache
and RAM of digital devices through its normal interface.
• The volatile information is dynamic in nature and changes with time, therefore, the
investigators should collect the data in real time.
• Volatile information assists to in determining a logical timeline of the security incident, and
the possible users responsible.
System Information.
Network Information.
System Information: Includes, information about current configuration and running state of
the suspicious computer, current system date and time, command history, running processes,
open files, logged on users, clipboard data, etc.
• Network Information: Includes, information about the network state of suspicious computer
such as open connections and ports, routing information and configuration, shared files,
services accessed, etc.
Order of Volatility
• Static data acquisition is defined as acquiring data that remains unaltered when the system is
powered off or shutdown.
• This type of data is termed as non-volatile data and is usually recovered from secondary
storage devices such as hard drives, thumb drives, CD-ROMs, etc.
• The better the quality of evidence, the better the analysis and likelihood of solving the
crime.
• According to NIJ, write protection should be initiated to preserve and protect the original
evidence.
• The examiner should consider creating a known value for the subject evidence prior to
acquiring the evidence.
• Write blocker is a hardware or software application that allows data acquisition from storage
media without altering its contents.
Some of the hardware write blockers are CRU Weibtech USB Write blocker, Tableau Forensic
Bridges , etc.
Software write blocker examples include, SAFE Block, MacForensicLab Write Controller, etc.
Sanitize the Target Media
• A proper data sanitization method must be utilized to remove the previous information from
the target media before data duplication.
• According to NIST SP 800-88 guidelines, the categories of sanitization are defined as follows:
Clear applies logical techniques to sanitize data in all user-addressable storage locations for
protection against simple non-invasive data recovery techniques; typically applied through the
standard Read and Write commands to the storage device, such as by rewriting with a new value
or using a menu option to reset the device to the factory state (where rewriting is not supported).
Purge applies physical or logical techniques that render Target Data recovery infeasible using
state of the art laboratory techniques.
Destroy renders Target Data recovery infeasible using state of the art laboratory techniques and
results in the subsequent inability to use the media for storage of data.
Determine the Data Acquisition Format
• Makes it possible to write bit-stream data to files. This copy technique creates
simple sequential flat files of a data set or suspect drive. The output of these flat
files is referred to as raw format.
• Advantages
Fast data transfers
Can ignore minor data read errors on source drive
Most computer forensics tools can read raw format
• Disadvantages
Requires as much storage as original disk or data
Tools (mostly freeware versions) might not collect marginal (bad) sectors
Proprietary Formats
• Commercial forensic tools have their own formats to collect digital evidence.
Proprietary formats usually offer features that counterpart vendors analysis tools
such as:
Option to compress or not compress image files
Ability to split an image into smaller segmented files
Can integrate metadata into the image file
• Disadvantages
Inability to share an image between different tools
File size limitation for each segmented volume
Advanced Forensics Format (AFF)
• Developed by Dr. Simson L. Garfinkel of Basis Technology Corporation, AFF is
an open source acquisition format with the following design goals:
Determining the best method & tool depends on the circumstances of the
investigation
• Size of the source disk.
• Time
• Whether you can retain the disk
• Tools available
• Volatile or non-volatile
• Skillset of the analyst
• Condition of the seized evidence
• Requirement of the investigation in terms of artifacts required and ultimate goal of
the investigation in progress.
Data Acquisition
• FTK
• EnCase Forensic
• Autopsy
• OSForensic
Data recovery Contingency:
• Investigators must make contingency plans when data acquisition fails.
• To preserve digital evidence, investigators need to create a duplicate copy of the
evidence files.
• In case the original data recovered is corrupted, investigators can make use of the
second copy.
• Use at least two data acquisition tool to create copy of the evidence incase the
investigator’s preferred tool does not properly recover data.
• Copy host protected area of a disk drive as well
• Consider using a hardware acquisition tool that can access the drive at the BIOS level.
• Be prepared to deal with encrypted drives
Validating the Data
• Validation techniques
MD5, and SHA-1 to SHA-512, CRC 32
SHA-1: Secure Hash Algorithm 1 is a cryptographic hash function which takes an input and
produces a 160-bit (20-byte) hash value. It is 40 digits long.
Data Acquisition Tools:
• Hardware Tools:
Ultrakit
Forensic Falcon
XRY Office
Atola Insight Forensic
FRED
UFED Touch
UFED Pro Series
FRED, etc.
• Software Tools:
EnCase Forensic
AccessData FTK
X-Ways Forensic
OSForensic
Magnet Axiom
Belkasoft Acquisition Tool
Autopsy, etc.
Data Acquisition Tools:
• Linux Standard Tools:
Forensic investigators can use built in Linux commands dd & dcfldd to copy data from a disk
drive.
dd commands:
To create of hard disk: dd if =/dev/hda of/dev/case5img1
Make an ISO image of a CD: dd if/dev/ hdc of/home/sam/mycd.iso bs 2048 conv=not runc
Remote Data Acquisition
• Data can be copied from a suspect computer by connecting to it via a network connection.
• Drawbacks:
LANs data transfer speeds and routing table conflicts could cause problems.
Heavy traffic on the network could cause delays and errors during the acquisition.
Data Acquisition Mistakes
• An investigator may commit some common mistakes while collecting data from the system
that result in the loss of critical evidence. Common mistakes investigators commit include: