Introduction. Collecting, Searching and Sorting evidence. File Storage

Size: px
Start display at page:

Download "Introduction. Collecting, Searching and Sorting evidence. File Storage"

Transcription

1 Collecting, Searching and Sorting evidence Introduction Recovering data is the first step in analyzing an investigation s data Recent studies: big volume of data Each suspect in a criminal case: 5 hard disks, 140 CDs or DVDs 4 memory cards and USB sticks Business cases Data: 31 hard disks, 14 terabytes for one case FBI s regional computer forensics lab 2013: 5973 TBs of data from 7273 exams 2 Introduction Audit report: 1566 outstanding cases (2015): 57% waited bet 91 days and over 2 years Recent studies: anti-forensics tools delete files, overwrite clusters multiple times, create large volume of data of certain types Discussion: Collecting evidence: file system, file deletion Techniques for recovering files Existing tools and challenges 3 File Storage Files are stored in file system Files: sequence of binary data (bits and bytes) Data is stored in clusters or blocks Blocks corresponding to a file may be Stored contiguously on disk Split and stored all over the disk 4

2 Example: FAT Storage Files: f1.doc, f2.txt, f3.jpg Root table entries Filename Starting block f1.doc 102 f2.txt 106 f3.jpg 110 Block FAT 101 Free EOF EOF Next block 5 Deleted a file entry in the file system is updated to indicate its deleted status clusters that were previously allocated for storing become unallocated and can be reused to store a new file But: data are left on the disk until a new file overwrites them 6 Example: File deletion Example: File deletion Delete f1.doc Root table entries FAT Block Next block 101 Free Delete f1.doc FAT Block Next block 101 Free Filename Starting block?1.doc Free 103 Free 104 Free 102 Free 103 Free 104 Free f2.txt Free 105 Free f3.jpg EOF 108 Free 109 Free Contents of f1.doc have not been deleted 107 EOF 108 Free 109 Free

3 Major types of file structures Example: Contiguous: stored in blocks in a logical order of sequence Fragmented: One or more chunks are not stored in a sequential order (happens when files are added, deleted or modified) Linear (logical order), non-linear Partial files: Incomplete files: some portion of the files are unavailable (overwritten by other data) 9 A: B: C: D: 10 Major types of file structures Major types of file structures Embedded files: Contents of one file are added or stored inside another file: JPEG inside a word document File systems become large Large hard disks: inexpensive, common Huge number of files and fragments Individual files usually lightly fragmented Causes of fragmentation Low disk space Append more data to an existing file 11 Studies: 6% of all files recovered were fragmented Always perform disk allocation which minimizes file fragmentation to reduce seek time and improve file system performance File types of forensic interest (AVI, JPG, ) higher fragmentations than file types of little interest (BMP, TXT, ) JPEG: 16%, AVI: 17% PST: 58% ( , outlook) Word doc: 17% 12

4 Evidence collection Search evidence in the complete file system, including recovering those deleted files File carving: Recovery of file fragments from a digital storage device without the assistance from the file system Scanning the raw bytes of the disk and reassembling them 13 Evidence collection File carving: Possible even if the file system metadata has been completely destroyed Possible even if the files are deleted Delete: means removing the knowledge of where the file is, but not removing the file content Possible to recover files with file name renamed to hidden what the file actually is Possible to recover data that is embedded into another file (JPEG inside a doc) 14 Techniques for File carving Tools for file carving Tools have been developed to automate the process of carving for various file types foremost, scalpel and DataLifter, PhotoRec Specialized forensic tools: EnCase, FTK, X- ways Can be used to extract files from physical memory dumps from mobile devices and from raw network traffic 15 Need to understand how the tools carve files Not a substitute for knowledge Understand limitations of tools 16

5 Techniques for File Carving Header-footer Recover files based on known header Used in EnCase, Foremost, Scalpel File Structure Header-footer + internal layout of a file Use in Foremost, PhotoRec Content-based (Semantics) Header-Footer Carving Most basic carving technique Steps Scan for the header of a file type Once found, scan for the file type s footer File = bytes between header and footer copy byte-by-byte Examples of File Signatures Header Footer File type FFD8FF FFD9 Jpg, jpeg 424D BMP FFFB MP3 without ID3 tag MP3 with ID3 tag D0CF11E0 Doc Wav Pdf B GIF 19 20

6 Header-Footer Carving Problem: Header/footer markers: short May produce many results (false positives) Cannot handle fragmented/partial files Cannot carve files without fixed headers (text/html) File signature: ml Fragmented example Variations Estimate the file size through various means Header-maximum file size carving Fixed the number of bytes in file carving after locating the header Header-embedded file size carving Find out the file size through the information available in the header 23 24

7 Header-Maximum File Size Carving Carve a fixed no of bytes from the beginning of a possible file Steps Scan for the header of a file type Extract a fixed no of bytes Size determined by trial and error Can be useful for files with footers JPEG: store thumbnails within the image Thumbnail: another JPEG Are not affected if additional data is appended to the end of JPEG 25 Header-Maximum File Size Carving Same problem as header-footer carving Always return results much larger than the original file Manual process to discard additional data If the guess for the maximum size is too small carved incorrectly 26 Header-Embedded File Size Carving Many files: embed info about the file size in the first few bytes Find out the size of the file by analyzing the embedded info Steps Scan for the header of a file type Determine the file size by reading the bytes extract Header-Embedded File Size Carving 27 28

8 File Structure Based Carving Carve by using knowledge about the internal file structure Metadata Header, footer, identifier strings, size info, etc Can be used to detect cases of fragmentation if the file structure data is detailed and extensive Example: File structure JPEG file Header Start of image: FF D8 EXIF info Start of image data A series of sections End of image data Footer End of image data (FF D9) File structure PNG file Header byte Size of the next section IHDR: identifier of the next section 12 bytes: unstructured data Challenges in File carving Original file may be fragmented carving process that assumes all portions of the file was stored contiguously on the disk will fail salvaging fragments of multiple files and incorrectly combining them into a single container Content-based carving Main idea: read individual block and analyze its contents to find out if it belongs to a particular file 31 32

9 Content-based Carving Main idea: Fragmentation can occur only at block boundaries Block: size of the smallest data unit that can be written to a storage media (sector or cluster size) One block one single file Information entropy Entropy: measure of randomness Large changes in entropy Indicate that the sector belongs to a different file Entropy Example 1: tossing a coin: Possible outcomes: head/tail Prob(head) = Prob(tail) = N n 1 Entropy = p log p n 2 n 33 Entropy Example 2: In a bin, there are four different colored balls: red, yellow, blue and green. There are 9 red color balls, 1 yellow color ball, 1 blue color ball and 1 green color ball N n 1 Entropy = p log p n 2 n Entropy Example 3: In a bin, there are four different colored balls: red, yellow, blue and green. There are 3 red color balls, 3 yellow color balls, 3 blue color balls and 3 green color balls N n n 1 Entropy = p log p 2 n

10 Sliding entropy Sliding window Measure average value of the bytes Entropy formula: N pn n 1 log N: total number of different values P n : probability of the n-th value 2 p n Sliding entropy Sliding window Measure average value of the bytes Bytes: 8 bits: values = 0 to 255 Entropy: : Text and HTML blocks 7 8: zip and JPEG blocks Studies txt and jpg Studies Mp3 file, zip version, encrypted version 39 40

11 Example Sliding entropy Calculate the entropy of the block of the data If the block contains compressed data entropy of these blocks would be similar If a sudden in entropy that block doesn t belong to PNG image data Example: sliding entropy Block: Block: Example: sliding entropy Remove the section where the entropy drops: 43 44

12 Data inbetween zip files Current Research approach 1 Stage 1: Header/footer Stage 2: 45 Complete JPEG file for segment 2 46 Stage 3: Decoding to RGB Stage 4: Fragmentation point high CED value CED ED ED boundary nearby Current Research approach 1 Stage 6: Aim: construct from header to footer Join segments together Boundary: RGB values of pixels on both sides of the boundary Nearby: RGB values of pixels on one side of the boundary 47 48

13 Current Research approach 2 Current Research approach 2 Graph approach Assume all file clusters are randomized Step 1: identify headers/footers 49 Step 2 For each header, find the best match (using similarity) Similarity calculation would depend on the content of the cluster Image file: check block similarity Text file: check word likelihood 50 Current Research approach 2 Comparison of different methods Probability/likelihood Lots of different tools/methods for file carving Performance comparison: Carving quality Memory and space used Terminology: Positive: a file that is correctly carved from the dataset 51 52

14 Quality Terminology: False positive: a carving result which is not a positive False negative: a file that is present in the dataset, but was not carved In dataset Recovered Yes No Yes Positive False positive No False negative 53 Quality Recall: proportion of the files is recovered tp Recall tp fn Precision: proportion of the recovered files is correct tp Precision tp fp F measure: control user s preference on recall and precision 1 Fmeasure P R Example Consider there is a total of 10,000 files. Out of these 10,000 files, there are 100 files that are fragmented. Suppose that a tool can only recover 60 fragmented files. Determine Recall Precision Accuracy Performance Analysis Public datasets: FAT carving test dataset (15 files) dftt.sourceforge.net/test11 DFRWS 2006 challenge image (32 files) dfrws.org/2006/challenge Basic data carving test: Simple datasets good results Complex datasets poor results Fragmentation of files: major impact 56

15 Tools comparison Look at Percentage of files recovered The correctness and reliability of tool output Processing speed of the tool Requirement: Process roughly 100GB data per day 1.16 MB per second Handle less than 0.58 MB Impractical datasets Tools comparison: example 1 Basic data carving test: Contains Valid doc, jpeg, wav, pdf, zip, gif, doc, xls files Invalid jpg file (header has been modified) Deleted ppt, wmv files Contains only contiguous files E.g., PhotoRec: can find all, except invalid jpg files (bec header info is not correct) Tools comparison: example 1 Tools comparison: example 2 Another test set shtml Contains Jpeg, zip, html, txt, word files Fragmented files 59 60

16 Tools comparison: example 2 Example: One JPEG non-fragmented One JPEG non-fragmented, larger than a typical default max file size One JPEG non-fragmented, but sector before it has 0xffd8 in the first two bytes One JPEG fragmented with text in between One JPEG fragmented with a Word document in between One JPEG fragmented with random data in between 61 Tools comparison : example 2 Example One JPEG fragmented with a JPEG in between Two JPEGs that are intertwined One JPEG non-fragmented that is REALLY big One JPEG fragmented with singe sector in between that starts with 0xffd9 E.g., PhotoRec: Performance drops because the dataset is more complicated Contiguous + fragmented files 62 Tools comparison : example 2 Tools comparison : example

17 General Findings MPEG, ZIP: Difficult to carve bec of common header values Scalpel: header-based carving PhotoRec: structure-based carving Contiguous files: good performance Fragmented: not easy Use of file carving to solve Data hiding conceal a file: change its name to mislead digital investigators Renaming an illegal photograph from xxx.jpg to xxx.exe Need to check the file header (file signature) The file xxx.exe that has a JPEG header (FF D8 FF) will be correctly recognized as a graphics file Steganography? It hides info inside image files Two types: insertion and substitution Insertion Hidden data is not displayed when viewing the original file Need to analyze the data structure carefully Hidden message 67 68

18 Steganography? Substitution Replaces bits with other bits of data Usually change the last two LSBs (least significant bit) Original pixel Altered pixel Steganography Detect variations of the graphic image When applied correctly you cannot detect hidden data in most cases Check to see whether the file size, image quality, or file extensions have changed Clues to look for: Duplicate files with different hash values Steganography programs installed on suspect s drive 70 Data and File carving Summary DeepSound: is a steganography tool and audio converter that hides secret data into audio files. The application also enables you to extract secret files directly from audio files or audio CD tracks. Collecting evidence: file storage clusters fragmentation file deletion Data remains in clusters Techniques for recovering files Header-footer, file structure, content-based approach Existing tools and challenges 72

19 Summary Bec of the large volume of data Investigator: analyze data and understand interrelationships Gold standard: analyze all files to ensure nothing is overlooked Now: intelligence-based : subset of files are analyzed dependent upon the intelligence provided to the investigator Not find every piece of evidence, rather sufficient evidence to determine innocence of guilt Summary File Carving vs Keyword searching: Looks for data that fits into known file structures and interprets that data in light of these structures Search for content that matches one or more keywords or keyword patterns Find structures matching known structures vs Find data matching known data Summary Bec of the large volume of data Investigator: analyze data and understand interrelationships Gold standard: analyze all files to ensure nothing is overlooked Now: intelligence-based : subset of files are analyzed dependent upon the intelligence provided to the investigator Not find every piece of evidence, rather sufficient evidence to determine innocence of guilt 75

File Carving Using Sequential Hypothesis Testing

File Carving Using Sequential Hypothesis Testing File Carving Using Sequential Hypothesis Testing Anandabrata (Pasha) Pal, Taha Sencar and Nasir Memon Introduction File Carving: recovery without file system meta-data. Recovery based on file structure/content

More information

Introduction to carving File fragmentation Object validation Carving methods Conclusion

Introduction to carving File fragmentation Object validation Carving methods Conclusion Simson L. Garfinkel Presented by Jevin Sweval Introduction to carving File fragmentation Object validation Carving methods Conclusion 1 Carving is the recovery of files from a raw dump of a storage device

More information

CEIC 2007 May 8, 2007

CEIC 2007 May 8, 2007 Basic File Carving With FTimes CEIC 2007 May 8, 2007 KoreLogic, Inc: Andy Bair pab-ceic@korelogic.com Jay Smith jsmith-ceic@korelogic.com 1 Overall Agenda Basic Section Introduction - File Carving Overview

More information

Dissecting Files. Endianness. So Many Bytes. Big Endian vs. Little Endian. Example Number. The "proper" order of things. Week 6

Dissecting Files. Endianness. So Many Bytes. Big Endian vs. Little Endian. Example Number. The proper order of things. Week 6 Dissecting Files Endianness Week 6 The "proper" order of things So Many Bytes So Many Bytes On a 32-bit system, each word consists of 4 bytes So, when any 32-bit value is stored in memory, each of those

More information

INSTITUTO SUPERIOR TÉCNICO

INSTITUTO SUPERIOR TÉCNICO INSTITUTO SUPERIOR TÉCNICO DEPARTAMENTO DE ENGENHARIA INFORMÁTICA FORENSICS CYBER-SECURITY MEIC, METI Lab Guide II Evidence Examination 2015/2016 nuno.m.santos@tecnico.ulisboa.pt 1 Introduction This guide

More information

File Systems and Volumes

File Systems and Volumes File Systems and Volumes Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Data organization in storage systems! File deletion and recovery!

More information

Model-Driven Engineering in Digital Forensics. Jeroen van den Bos with Tijs van der Storm and Leon Aronson

Model-Driven Engineering in Digital Forensics. Jeroen van den Bos with Tijs van der Storm and Leon Aronson Model-Driven Engineering in Digital Forensics Jeroen van den Bos (jeroen@infuse.org) with Tijs van der Storm and Leon Aronson Contents Digital forensics MDE in forensics Domain-specific optimizations Conclusion

More information

GJU IT-forensics course. Storage medium analysis

GJU IT-forensics course. Storage medium analysis Harald Baier Storage medium analysis / 2014-04-02 1/32 GJU IT-forensics course Storage medium analysis Harald Baier Hochschule Darmstadt, CASED 2014-04-02 Partitions Harald Baier Storage medium analysis

More information

24) Type a note then click the OK button to save the note. This is a good way to keep notes on items of interest.

24) Type a note then click the OK button to save the note. This is a good way to keep notes on items of interest. 23) Click File Analysis Tab - This allows forensic investigators to look for files on the system as they would on a regular system. Key file attributes are provided to assist the investigator (file size,

More information

FRAME BASED RECOVERY OF CORRUPTED VIDEO FILES

FRAME BASED RECOVERY OF CORRUPTED VIDEO FILES FRAME BASED RECOVERY OF CORRUPTED VIDEO FILES D.Suresh 1, D.V.Ramana 2, D.Arun Kumar 3 * 1 Assistant Professor, Department of ECE, GMRIT, RAJAM, AP, INDIA 2 Assistant Professor, Department of ECE, GMRIT,

More information

Topic Data carving, as defined by Digital Forensic Research Workshop is the process of

Topic Data carving, as defined by Digital Forensic Research Workshop is the process of Chad Cravens 8/25/2006 DF Research Project 1 Data Carving Topic Data carving, as defined by Digital Forensic Research Workshop is the process of extracting a collection of data from a larger data set.

More information

Introduction. Secondary Storage. File concept. File attributes

Introduction. Secondary Storage. File concept. File attributes Introduction Secondary storage is the non-volatile repository for (both user and system) data and programs As (integral or separate) part of an operating system, the file system manages this information

More information

FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 23

FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 23 FILE SYSTEMS CS124 Operating Systems Winter 2015-2016, Lecture 23 2 Persistent Storage All programs require some form of persistent storage that lasts beyond the lifetime of an individual process Most

More information

Atari Games - FTP Site Statistics. Top 20 Directories Sorted by Disk Space

Atari Games - FTP Site Statistics. Top 20 Directories Sorted by Disk Space Property Value FTP Server ftp.infogrames.net Description Atari Games Country United States Scan Date 02/Apr/2015 Total Dirs 488 Total Files 1,547 Total Data 26.66 GB Top 20 Directories Sorted by Disk Space

More information

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D.

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. Chapter Two File Systems CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. 1 Learning Objectives At the end of this section, you will be able to: Explain the purpose and structure of file systems

More information

Digital Forensics Practicum CAINE 8.0. Review and User s Guide

Digital Forensics Practicum CAINE 8.0. Review and User s Guide Digital Forensics Practicum CAINE 8.0 Review and User s Guide Ana L. Hernandez Master of Science in Cybersecurity Digital Forensics Concentration University of South Florida 12-8-2017 Table of Contents

More information

Running head: FTK IMAGER 1

Running head: FTK IMAGER 1 Running head: FTK IMAGER 1 FTK Imager Jean-Raymond Ducasse CSOL-590 June 26, 2017 Thomas Plunkett FTK IMAGER 2 FTK Imager Outline Process for Adding Individual Files & Folders as Evidence Items Although

More information

CSE 4482 Computer Security Management: Assessment and Forensics. Computer Forensics: Working with Windows and DOS Systems

CSE 4482 Computer Security Management: Assessment and Forensics. Computer Forensics: Working with Windows and DOS Systems CSE 4482 Computer Security Management: Assessment and Forensics Computer Forensics: Working with Windows and DOS Systems Instructor: N. Vlajic,, Fall 2010 Required reading: Guide to Computer Forensics

More information

Performance Analysis of File Carving Tools

Performance Analysis of File Carving Tools Performance Analysis of File Tools Thomas Laurenson To cite this version: Thomas Laurenson. Performance Analysis of File Tools. Lech J. Janczewski; Henry B. Wolfe; Sujeet Shenoi. 28th Security and Privacy

More information

A SURVEY ON MULTIMEDIA FILE CARVING

A SURVEY ON MULTIMEDIA FILE CARVING A SURVEY ON MULTIMEDIA FILE CARVING Raj Kumar Pahade 1, Bhupendra Singh 2 and Upasna Singh 3 Department of Computer Science & Engineering, Defence Institute of Advanced Technology (DIAT), Pune, India ABSTRACT

More information

COMP 530: Operating Systems File Systems: Fundamentals

COMP 530: Operating Systems File Systems: Fundamentals File Systems: Fundamentals Don Porter Portions courtesy Emmett Witchel 1 Files What is a file? A named collection of related information recorded on secondary storage (e.g., disks) File attributes Name,

More information

Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity

Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity Mohammed Alhussein, Duminda Wijesekera Department of Computer Science George Mason University Fairfax,

More information

Understanding FAT12. Introduction to Computer Forensics. Kessler/Schirling

Understanding FAT12. Introduction to Computer Forensics. Kessler/Schirling Understanding FAT12 Introduction to Computer Forensics Kessler/Schirling Fall 2002 EXP 248 Project #3 You have a floppy disk image file Examine floppy to find an address and a password, and verify MD5

More information

Ed Ferrara, MSIA, CISSP

Ed Ferrara, MSIA, CISSP MIS 5208 - Lecture 12 Investigation Methods Data Acquisition Ed Ferrara, MSIA, CISSP eferrara@temple.edu Objectives List digital evidence storage formats Explain ways to determine the best acquisition

More information

Computer forensics technologies for personally identifiable information detection and audits

Computer forensics technologies for personally identifiable information detection and audits Rochester Institute of Technology RIT Scholar Works Articles 2010 Computer forensics technologies for personally identifiable information detection and audits Yin Pan Bill Stackpole Luther Troell Follow

More information

Digital Forensics File Carving Advances

Digital Forensics File Carving Advances Digital Forensics File Carving Advances Team: Jay Smith KoreLogic Klayton Monroe KoreLogic Andy Bair MITRE Version 1.1 (October 2006) KoreLogic DFRWS-2006 Project Agenda Introduction to Digital File Carving

More information

National Aeronautics and Space Admin. - FTP Site Statistics. Top 20 Directories Sorted by Disk Space

National Aeronautics and Space Admin. - FTP Site Statistics. Top 20 Directories Sorted by Disk Space National Aeronautics and Space Admin. - FTP Site Statistics Property Value FTP Server ftp.hq.nasa.gov Description National Aeronautics and Space Admin. Country United States Scan Date 26/Apr/2014 Total

More information

INFORMZ USER GUIDE: The Asset Manager

INFORMZ USER GUIDE: The Asset Manager INFORMZ USER GUIDE: The Asset Manager Version 1.0 January 29, 2014 ABOUT THIS GUIDE This guide provides an overview of the Asset Manager used by Informz. This guide covers the Asset Manager s basic functionality

More information

Operating Systems. Lecture File system implementation. Master of Computer Science PUF - Hồ Chí Minh 2016/2017

Operating Systems. Lecture File system implementation. Master of Computer Science PUF - Hồ Chí Minh 2016/2017 Operating Systems Lecture 7.2 - File system implementation Adrien Krähenbühl Master of Computer Science PUF - Hồ Chí Minh 2016/2017 Design FAT or indexed allocation? UFS, FFS & Ext2 Journaling with Ext3

More information

File Systems: Fundamentals

File Systems: Fundamentals File Systems: Fundamentals 1 Files! What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks)! File attributes Ø Name, type, location, size, protection, creator,

More information

Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum)

Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum) Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum) Secondary Stora Introduction Secondary storage is the non volatile repository for (both user and system) data and programs. As

More information

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3 1.1.1 Binary systems In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system, or base-2 numeral system, which represents numeric values using two different

More information

ExtremeTech Technology News - FTP Site Statistics. Top 20 Directories Sorted by Disk Space

ExtremeTech Technology News - FTP Site Statistics. Top 20 Directories Sorted by Disk Space ExtremeTech Technology News - FTP Site Statistics Property Value FTP Server ftp.extremetech.com Description ExtremeTech Technology News Country United States Scan Date 14/Oct/2014 Total Dirs 281 Total

More information

Operating Systems. Operating Systems Professor Sina Meraji U of T

Operating Systems. Operating Systems Professor Sina Meraji U of T Operating Systems Operating Systems Professor Sina Meraji U of T How are file systems implemented? File system implementation Files and directories live on secondary storage Anything outside of primary

More information

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission 1

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission 1 Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Storage Subsystem in Linux OS Inode cache User Applications System call Interface Virtual File System (VFS) Filesystem

More information

Jeff Hinson CS525, Spring 2010

Jeff Hinson CS525, Spring 2010 DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction

More information

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers Introduction to steganography org.steganography library principles Hide & Reveal screenshots 14/05/2010 Steganography made

More information

Windows Forensics Advanced

Windows Forensics Advanced Windows Forensics Advanced Index: CF102 Description Windows Forensics - Advanced is the next step for forensics specialists, diving deeper into diverse processes on Windows OS serving computer investigators.

More information

File Systems: Fundamentals

File Systems: Fundamentals 1 Files Fundamental Ontology of File Systems File Systems: Fundamentals What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type,

More information

Image Steganography (cont.)

Image Steganography (cont.) Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares

More information

Chapter 11: File System Implementation. Objectives

Chapter 11: File System Implementation. Objectives Chapter 11: File System Implementation Objectives To describe the details of implementing local file systems and directory structures To describe the implementation of remote file systems To discuss block

More information

Audio Engineering Society. Conference Paper. Presented at the Conference on Audio Forensics 2017 June Arlington, VA, USA

Audio Engineering Society. Conference Paper. Presented at the Conference on Audio Forensics 2017 June Arlington, VA, USA Audio Engineering Society Conference Paper Presented at the Conference on Audio Forensics 2017 June 15 17 Arlington, VA, USA This paper was peer-reviewed as a complete manuscript for presentation at this

More information

Statistical Disk Cluster Classification for File Carving

Statistical Disk Cluster Classification for File Carving Statistical Disk Cluster Classification for File Carving Cor J. Veenman,2 Intelligent System Lab, Computer Science Institute, University of Amsterdam, Amsterdam 2 Digital Technology and Biometrics Department,

More information

RAPID RECOGNITION OF BLACKLISTED FILES AND FRAGMENTS MICHAEL MCCARRIN BRUCE ALLEN

RAPID RECOGNITION OF BLACKLISTED FILES AND FRAGMENTS MICHAEL MCCARRIN BRUCE ALLEN RAPID RECOGNITION OF BLACKLISTED FILES AND FRAGMENTS MICHAEL MCCARRIN BRUCE ALLEN MANY THANKS TO: OSDFCon and Basis Bruce Allen Scott Young Joel Young Simson Garfinkel All of whom have helped with this

More information

Data Storage JMU Computer Science Content Teaching Academy 2014

Data Storage JMU Computer Science Content Teaching Academy 2014 Data Storage JMU Computer Science Content Teaching Academy 2014 Florian Buchholz buchhofp@jmu.edu Abstraction layers to interpret data and information Physical layer Data is physically stored Device BIOS

More information

Paraben s Data Recovery Stick User Manual

Paraben s Data Recovery Stick User Manual Paraben s Data Recovery Stick User Manual Contents About Paraben s Data Recovery Stick... 3 System Requirements... 3 Getting Started... 4 Data Recovery... 4 Application User Interface... 5 Main Page...

More information

File System Implementation. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

File System Implementation. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University File System Implementation Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Implementing a File System On-disk structures How does file system represent

More information

Computer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase

Computer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase Computer Forensics: Investigating Data and Image Files, 2nd Edition Chapter 3 Forensic Investigations Using EnCase Objectives After completing this chapter, you should be able to: Understand evidence files

More information

How to make a PDF from inside Acrobat

How to make a PDF from inside Acrobat How to make a PDF from inside Creating a PDF using Features 1. Create PDF From File>Create PDF... A. Converts a source document into a PDF B. The fonts, formatting graphics, and color from the source file

More information

Typical File Extensions File Structure

Typical File Extensions File Structure CS 355 Operating Systems File Systems File Systems A file is a collection of data records grouped together for purpose of access control and modification A file system is software responsible for creating,

More information

Features & Functionalities

Features & Functionalities Features & Functionalities Release 3.0 www.capture-experts.com Import FEATURES Processing TIF CSV EML Text Clean-up Email HTML ZIP TXT Merge Documents Convert to TIF PST RTF PPT XLS Text Recognition Barcode

More information

File System Case Studies. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

File System Case Studies. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University File System Case Studies Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today s Topics The Original UNIX File System FFS Ext2 FAT 2 UNIX FS (1)

More information

Funcom Multiplayer Online Games - FTP Site Statistics. Top 20 Directories Sorted by Disk Space

Funcom Multiplayer Online Games - FTP Site Statistics. Top 20 Directories Sorted by Disk Space Property Value FTP Server ftp.funcom.com Description Funcom Multiplayer Online Games Country United States Scan Date 13/Jul/2014 Total Dirs 186 Total Files 1,556 Total Data 67.25 GB Top 20 Directories

More information

Overview Metadata Extraction Tool Hachoir Sleuthkit Summary CS 6V Metadata Extraction Tools. Junyuan Zeng

Overview Metadata Extraction Tool Hachoir Sleuthkit Summary CS 6V Metadata Extraction Tools. Junyuan Zeng CS 6V81-05 Metadata Extraction Tools Junyuan Zeng Department of Computer Science The University of Texas at Dallas September 23 th, 2011 Outline 1 Overview 2 Metadata Extraction Tool Overview 3 Hachoir

More information

File Layout and Directories

File Layout and Directories COS 318: Operating Systems File Layout and Directories Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics File system structure Disk

More information

MANAGING DIGITAL PHOTOS AND MEDIA ASSETS: POTENTIAL SOFTWARE SOLUTIONS

MANAGING DIGITAL PHOTOS AND MEDIA ASSETS: POTENTIAL SOFTWARE SOLUTIONS MANAGING DIGITAL PHOTOS AND MEDIA ASSETS: POTENTIAL SOFTWARE SOLUTIONS PRESENTED BY KENRIE HYLTON ASSOCIATION OF SEVENTH-DAY ADVENTIST LIBRARIANS CONFERENCE NEWBOLD COLLEGE, 2017 TYPES OF DIGITAL MEDIA

More information

Digital forensics. Andrej Brodnik. Andrej Brodnik: Digital Forensics

Digital forensics. Andrej Brodnik. Andrej Brodnik: Digital Forensics Digital forensics Andrej Brodnik Computer pre-knowledge: architecture of computers basics (BIOS) operating system secondary memory (disc) and its organization file systems chapter 15 Startup startup steps

More information

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic

More information

There is a general need for long-term and shared data storage: Files meet these requirements The file manager or file system within the OS

There is a general need for long-term and shared data storage: Files meet these requirements The file manager or file system within the OS Why a file system? Why a file system There is a general need for long-term and shared data storage: need to store large amount of information persistent storage (outlives process and system reboots) concurrent

More information

File Systems. File Systems. G53OPS: Operating Systems. File Systems. File Systems 11/27/2008. Why Use Files? Graham Kendall. Two Views of File System

File Systems. File Systems. G53OPS: Operating Systems. File Systems. File Systems 11/27/2008. Why Use Files? Graham Kendall. Two Views of File System Why Use s? Introduction Graham Kendall It allows data to be stored between processes It allows us to store large volumes of data Allows more than one process to access the data at the same time 27 Nov

More information

Digital Forensics UiO

Digital Forensics UiO Digital Forensics UiO About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS I work as: Information Security Consultant Security Audits Digital Forensics / Incident Response Education

More information

Computer Forensic Capabilities. Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice

Computer Forensic Capabilities. Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice Computer Forensic Capabilities Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice Agenda What is computer forensics? Where to find computer evidence Forensic

More information

Digital Forensics UiO. Digital Forensics in Incident Management. About Me. Outline. Incident Management. Finding Evidence.

Digital Forensics UiO. Digital Forensics in Incident Management. About Me. Outline. Incident Management. Finding Evidence. Digital Forensics UiO Outline Incident Management Digital Forensics Finding Evidence 3 About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS I work as: Information Security Consultant

More information

FILE SYSTEMS, PART 2. CS124 Operating Systems Fall , Lecture 24

FILE SYSTEMS, PART 2. CS124 Operating Systems Fall , Lecture 24 FILE SYSTEMS, PART 2 CS124 Operating Systems Fall 2017-2018, Lecture 24 2 Last Time: File Systems Introduced the concept of file systems Explored several ways of managing the contents of files Contiguous

More information

Technical University of Munich - FTP Site Statistics. Top 20 Directories Sorted by Disk Space

Technical University of Munich - FTP Site Statistics. Top 20 Directories Sorted by Disk Space Technical University of Munich - FTP Site Statistics Property Value FTP Server ftp.lpr.e-technik.tu-muenchen.de Description Technical University of Munich Country Germany Scan Date 23/May/2014 Total Dirs

More information

A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification

A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification Q. Li 1, A. Ong 2, P. Suganthan 2 and V. Thing 1 1 Cryptography & Security Dept., Institute for Infocomm Research, Singapore

More information

St Ignatius Girls JL - Form 3. Contents

St Ignatius Girls JL - Form 3. Contents Contents Basic system information...2 Print Screen...2 View files and folders...2 File and folder properties...3 Attributes...3 File Types...3 Sorting Files...5 Searching files...6 Compressing a file...8

More information

File System Implementation

File System Implementation File System Implementation Jinkyu Jeong (jinkyu@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu SSE3044: Operating Systems, Fall 2016, Jinkyu Jeong (jinkyu@skku.edu) Implementing

More information

Digital Forensics UiO

Digital Forensics UiO Digital Forensics UiO About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS I work as: Head of Security Senior Information Security Consultant Security Audits Digital Forensics / Incident

More information

Practice Test. Guidance Software GD Guidance Software GD0-110 Certification Exam for EnCE Outside North America. Version 1.6

Practice Test. Guidance Software GD Guidance Software GD0-110 Certification Exam for EnCE Outside North America. Version 1.6 Guidance Software GD0-110 Guidance Software GD0-110 Certification Exam for EnCE Outside North America Practice Test Version 1.6 QUESTION NO: 1 A FAT directory has as a logical size of: A. One cluster B.

More information

ANALYSIS AND VALIDATION

ANALYSIS AND VALIDATION UNIT V ANALYSIS AND VALIDATION Validating Forensics Objectives Determine what data to analyze in a computer forensics investigation Explain tools used to validate data Explain common data-hiding techniques

More information

Digital Forensics UiO

Digital Forensics UiO About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS Digital Forensics UiO I work as: Head of Security Senior Information Security Consultant Security Audits Digital Forensics / Incident

More information

Social Issues. spam Espionage forgery access to your data years from today destroying old records/ data

Social Issues. spam Espionage forgery access to your data years from today destroying old records/ data CS Concepts document formats interpreting bits ascii, jpg, mp3, meta data representing digital images modeling vs rendering ocr sampling rate cloud computing data compression spatial coherence temporal

More information

File system internals Tanenbaum, Chapter 4. COMP3231 Operating Systems

File system internals Tanenbaum, Chapter 4. COMP3231 Operating Systems File system internals Tanenbaum, Chapter 4 COMP3231 Operating Systems Architecture of the OS storage stack Application File system: Hides physical location of data on the disk Exposes: directory hierarchy,

More information

File System Case Studies. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

File System Case Studies. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University File System Case Studies Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today s Topics The Original UNIX File System FFS Ext2 FAT 2 UNIX FS (1)

More information

Technical University of Munich - FTP Site Statistics. Top 20 Directories Sorted by Disk Space

Technical University of Munich - FTP Site Statistics. Top 20 Directories Sorted by Disk Space Technical University of Munich - FTP Site Statistics Property Value FTP Server ftp.ldv.e-technik.tu-muenchen.de Description Technical University of Munich Country Germany Scan Date 23/May/2014 Total Dirs

More information

File Systems. What do we need to know?

File Systems. What do we need to know? File Systems Chapter 4 1 What do we need to know? How are files viewed on different OS s? What is a file system from the programmer s viewpoint? You mostly know this, but we ll review the main points.

More information

University of Osnabruck - FTP Site Statistics. Top 20 Directories Sorted by Disk Space

University of Osnabruck - FTP Site Statistics. Top 20 Directories Sorted by Disk Space University of Osnabruck - FTP Site Statistics Property Value FTP Server ftp.usf.uni-osnabrueck.de Description University of Osnabruck Country Germany Scan Date 17/May/2014 Total Dirs 29 Total Files 92

More information

File System Interpretation

File System Interpretation File System Interpretation Part III. Advanced Techniques and Tools for Digital Forensics CSF: Forensics Cyber-Security Fall 2018 Nuno Santos Previously: Introduction to Android forensics! How does Android

More information

Digital Media Transfer Workflow Documentation

Digital Media Transfer Workflow Documentation Digital Media Transfer Workflow Documentation Release =0 Rockefeller Archive Center Feb 22, 2018 Contents 1 Inventorying Digital Media Items 3 1.1 Overview.................................................

More information

Paraben Examiner 9.0 Release Notes

Paraben  Examiner 9.0 Release Notes Paraben E-mail Examiner 9.0 Release Notes 1 Paraben Corporation Welcome to Paraben s E-mail Examiner 9.0! Paraben s Email Examiner-EMX allows for the forensic examination of the most popular local e-mail

More information

Design Tradeoffs for Developing Fragmented Video Carving Tools

Design Tradeoffs for Developing Fragmented Video Carving Tools DIGITAL FORENSIC RESEARCH CONFERENCE Design Tradeoffs for Developing Fragmented Video Carving Tools By Eoghan Casey and Rikkert Zoun Presented At The Digital Forensic Research Conference DFRWS 2014 USA

More information

Segmentation with Paging. Review. Segmentation with Page (MULTICS) Segmentation with Page (MULTICS) Segmentation with Page (MULTICS)

Segmentation with Paging. Review. Segmentation with Page (MULTICS) Segmentation with Page (MULTICS) Segmentation with Page (MULTICS) Review Segmentation Segmentation Implementation Advantage of Segmentation Protection Sharing Segmentation with Paging Segmentation with Paging Segmentation with Paging Reason for the segmentation with

More information

Defeating Forensic Analysis

Defeating Forensic Analysis Defeating Forensic Analysis CEIC 2006 Technical Lecture 1 Thursday, May 4 10:30 am to 11:30 am Presented by Vincent Liu and Patrick Stach Welcome Vincent Liu Managing Director, Stach & Liu Researcher,

More information

NTFS Recoverability. CS 537 Lecture 17 NTFS internals. NTFS On-Disk Structure

NTFS Recoverability. CS 537 Lecture 17 NTFS internals. NTFS On-Disk Structure NTFS Recoverability CS 537 Lecture 17 NTFS internals Michael Swift PC disk I/O in the old days: Speed was most important NTFS changes this view Reliability counts most: I/O operations that alter NTFS structure

More information

FILE SYSTEM IMPLEMENTATION. Sunu Wibirama

FILE SYSTEM IMPLEMENTATION. Sunu Wibirama FILE SYSTEM IMPLEMENTATION Sunu Wibirama File-System Structure Outline File-System Implementation Directory Implementation Allocation Methods Free-Space Management Discussion File-System Structure Outline

More information

Computer Hacking Forensic Investigator. Module X Data Acquisition and Duplication

Computer Hacking Forensic Investigator. Module X Data Acquisition and Duplication Computer Hacking Forensic Investigator Module X Data Acquisition and Duplication Scenario Allen a forensic investigator was hired by a bank to investigate employee fraud. The bank has four 30 GB machines

More information

Zum Einsatz von Hash-Funktionen in der Computer-Forensik: Status Quo und Herausforderungen

Zum Einsatz von Hash-Funktionen in der Computer-Forensik: Status Quo und Herausforderungen Harald Baier Hash Functions in Forensics / Fhg-SIT, 2011-04-12 1/25 Zum Einsatz von Hash-Funktionen in der Computer-Forensik: Status Quo und Herausforderungen Harald Baier Hochschule Darmstadt, CASED Fhg-SIT,

More information

File Fragment Encoding Classification: An Empirical Approach

File Fragment Encoding Classification: An Empirical Approach DIGITAL FORENSIC RESEARCH CONFERENCE File Fragment Encoding Classification: An Empirical Approach By Vassil Roussev and Candice Quates Presented At The Digital Forensic Research Conference DFRWS 2013 USA

More information

EECS 482 Introduction to Operating Systems

EECS 482 Introduction to Operating Systems EECS 482 Introduction to Operating Systems Winter 2018 Baris Kasikci Slides by: Harsha V. Madhyastha OS Abstractions Applications Threads File system Virtual memory Operating System Next few lectures:

More information

Unit 2 Digital Information. Chapter 1 Study Guide

Unit 2 Digital Information. Chapter 1 Study Guide Unit 2 Digital Information Chapter 1 Study Guide 2.5 Wrap Up Other file formats Other file formats you may have encountered or heard of include:.doc,.docx,.pdf,.mp4,.mov The file extension you often see

More information

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction SE 4C03 Winter 2004 Steganography Derek Lunn (9943193) Last Revised: April 6th 2004 Introduction Steganography is a means of hiding information in a carrier medium. Although the concept itself is not new,

More information

File Systems Forensics

File Systems Forensics File Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2017 Nuno Santos Summary! Analysis of file systems! Recovery of deleted files 2 Recall

More information

A General Framework for the Structural Steganalysis of LSB Replacement

A General Framework for the Structural Steganalysis of LSB Replacement A General Framework for the Structural Steganalysis of LSB Replacement Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 7 th Information Hiding

More information

Machine Language and System Programming

Machine Language and System Programming زبان ماشين وبرنامه نويسی سيستم Machine Language and System Programming جلسه دوازدھم دانشگاه صنعتی ھمدان پاييز 1389 Objectives Explain the purpose and structure of file systems Describe Microsoft file structures

More information

A file system is a clearly-defined method that the computer's operating system uses to store, catalog, and retrieve files.

A file system is a clearly-defined method that the computer's operating system uses to store, catalog, and retrieve files. File Systems A file system is a clearly-defined method that the computer's operating system uses to store, catalog, and retrieve files. Module 11: File-System Interface File Concept Access :Methods Directory

More information

INSTITUTO SUPERIOR TÉCNICO

INSTITUTO SUPERIOR TÉCNICO INSTITUTO SUPERIOR TÉCNICO DEPARTAMENTO DE ENGENHARIA INFORMÁTICA FORENSICS CYBER-SECURITY MEIC, METI Lab Guide III & IV Case Solving: Mr. Informant Case 2015/2016 nuno.m.santos@tecnico.ulisboa.pt 1 Introduction

More information

Project 3: An Introduction to File Systems. COP 4610 / CGS 5765 Principles of Operating Systems

Project 3: An Introduction to File Systems. COP 4610 / CGS 5765 Principles of Operating Systems Project 3: An Introduction to File Systems COP 4610 / CGS 5765 Principles of Operating Systems Introduction Project 3 learning objectives File system design and implementation File system testing Data

More information

Introduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1

Introduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1 Introduction to OS File Management MOS Ch. 4 Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Mahmoud El-Gayyar / Introduction to OS 1 File Management Objectives Provide I/O support for a variety of storage device

More information

Operating Systems. Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) alphapeeler.sf.net/pubkeys/pkey.htm

Operating Systems. Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) alphapeeler.sf.net/pubkeys/pkey.htm Operating Systems Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm http://alphapeeler.sourceforge.net pk.linkedin.com/in/armahmood

More information