Digital Forensics: Module 2: Data Acquisition and Recovery
Digital Forensics: Module 2: Data Acquisition and Recovery
Digital Forensics: Module 2: Data Acquisition and Recovery
Storage formats
Three formats commonly used to store acquired
data as image files include
Raw format
Proprietary formats
Advanced Forensics Format (AFF)
Raw Format
Bit-stream data is written to files
Benefits
1. Many digital forensics tools can handle raw format
2. Data transfers can be fast
3. Minor data read errors on source drives are overlooked
• Drawbacks
1. Bad sectors may be overlooked
2. Storage needed could be as much as original data
Dr.Nagaraj S V & Prof Seshu Babu
Pulagara, VIT Chennai
Proprietary Formats 4
Exercise - Study
https://cs.harvard.edu/malan/publications/aff.pdf
AFF
Open source
Works with several platforms and operating systems
Simple extensible design
Provision for including metadata in the image files or segmented files
No size restriction for disk-to-image files
Provision for compressed or uncompressed image files
File extensions .afd for segmented image files and .afm for AFF
metadata
Acquisition Methods
Static acquisitions
Live acquisitions
Logical acquisition
Sparse acquisition
Remote acquisition
Exercise
Terms such as mirror image, exact copy, bit-stream image, disk
duplicating, disk cloning, and mirroring can confuse novices. Read
https://capsicumgroup.com/2-key-differences-between-digital-forensic-
imaging-and-digital-forensic-clone-and-how-they-can-affect-your-legal-
case/
to understand why it is important to know the terminology clearly
Read https://www.ncjrs.gov/pdffiles1/nij/199000.pdf
to see a report about the SafeBack forensic tool
Read https://en.wikipedia.org/wiki/List_of_digital_forensics_tools for a
list of widely used digital forensic tools
Logical acquisition
In some situations time for acquisition of data may be limited
In such situations, we may acquire only specific files of interest or
specific types of files to the case being investigated
Logical acquisition is feasible when the suspect drive is huge in size
(e.g. a RAID disk ) and when it is not feasible to make a full volume /
physical acquisition onsite
Sparse acquisition
In case we have large disks to acquire data from such as RAID disks
and in case we don’t have much time to acquire then sparse
acquisition can be used
Sparse acquisition collects fragments of unallocated /deleted data
In this deleted data and fragments are also acquired
Often used when performing static acquisition in RAID systems
See https://en.wikipedia.org/wiki/RAID
Exercise
Investigate the difficulties in acquiring data from RAID systems, Storage
Area Networks (SANs), and Network Attached Storage (NAS) devices
See
https://en.wikipedia.org/wiki/RAID
https://en.wikipedia.org/wiki/Storage_area_network
https://en.wikipedia.org/wiki/Network-attached_storage
Study different RAID levels
Exercise
Good practices
Make a duplicate copy of the evidence image file
It is safe to make at least two images of the digital evidence. This can
be done using dissimilar tools or techniques for safety.
It is essential to create a duplicate copy of the evidence image file. In
digital forensics, the golden rule is to ensure that the original digital
evidence is not tampered with.
Benefits
Makes acquiring evidence from a suspect drive easy
Particularly for hot-swappable devices
Note: Hot swapping is the replacement or addition of components to a
computer system without stopping, shutting down, or rebooting the
system. For example, eSATA, FireWire, and USB are examples of interfaces
that are hot-swappable on computers
Drawbacks
It is necessary to protect acquired data with a well-tested write-
blocking hardware device so that it does not get tampered
Often some tools nay not acquire data from a disk’s host protected
area or DCO.
The use of write-blocking devices for data acquisition has not been
universally accepted.
Exercise
Explore the use of Mini-WinFE Boot CDs and USB Drives
Read https://www.winfe.net/
Read
The (Nearly) Perfect Forensic Boot CD – Windows Forensic Environment by
Brett Shavers
https://www.forensicfocus.com/articles/the-nearly-perfect-forensic-boot-cd-
windows-forensic-environment/
See
http://mistyprojects.co.uk/mistype/mini-
winfe.docs/readme.files/intro.htm
As CD and DVD drives have been steadily phased-out, live CDs have
become less popular, being replaced by live USBs, which are
equivalent systems written onto USB flash drives, which have the
added benefit of having write-able storage. The functionality of a live
CD is also available with a bootable live USB flash drive, or
an external hard disk drive connected by USB.
The command dd
Drawbacks
Requires more sophisticated skills than an ordinary user
Has to be used with great caution. Can potentially wipe out the source
media the forensic examiner is trying to replicate
Does not compress data
Was not designed with forensics in mind
The command dd
Benefits
Can produce the raw format file that most digital forensics tools can
read
Can read and write from media instruments and data files
Features of dcfldd
On-the-fly hashing of the transmitted data.
Progress bar of how much data has already been sent.
Wiping of disks with known patterns.
Verification that the image is identical to the original drive, bit-for-bit.
Simultaneous output to more than one file/disk is possible.
The output can be split into multiple files.
Logs and data can be piped into external applications.
Remote Acquisition
Sometimes it may be necessary to remotely connect to a target
computer by means of a network connection and make a copy of data
Drawbacks
Malware may hinder acquisition
Alarms could be set by the suspects to warn them of data being
acquired
Some tools may not support remote acquisition
Exercise
Study how data is acquired by tools such as
ProDiscover https://www.prodiscover.com
EnCase https://www.guidancesoftware.com/encase-forensic
R-Studio https://www.r-studio.com/Data_Recovery_Technician.shtml
USB Live Acquisition and Triage Tool. (US-
LATT) http://www.softwareasia.com/us-latt-pro
F-Response https://www.f-response.com
PassMark software ImageUSB
https://www.osforensics.com/tools/write-usb-images.html
ILook Stand-Alone External Imager Iximager
http://www.ilook-forensics.org/iximager.html
References
Nelson, Amelia Philips, Christopher Steuart, “ Guide to Computer
Forensics and Investigations”, Fifth Edition, 2015.
Wikipedia