0% found this document useful (0 votes)
20 views36 pages

CO2 Session-7,8,9

The document outlines a session on digital forensics, focusing on the filesystem, metadata, and content categories. It aims to educate students on locating evidence, analyzing unallocated data, and understanding the importance of various file attributes in forensic investigations. The session also addresses the challenges of linking suspects to digital evidence and the methods for reconstructing transgressions.

Uploaded by

dsailajaklu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views36 pages

CO2 Session-7,8,9

The document outlines a session on digital forensics, focusing on the filesystem, metadata, and content categories. It aims to educate students on locating evidence, analyzing unallocated data, and understanding the importance of various file attributes in forensic investigations. The session also addresses the challenges of linking suspects to digital evidence and the methods for reconstructing transgressions.

Uploaded by

dsailajaklu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Department of CSE

DIGITAL FORENSICS
20CS3259AA
Topics:
The filesystem, transgression, Indexing and searching for files,
look for possible evidence, Unallocated data analysis

Session - 3

CREATED BY K. VICTOR BABU


AIM OF THE SESSION

To familiarize students with the concepts of The filesystem category, The metadata category, The
content category

INSTRUCTIONAL OBJECTIVES

This Session is designed to:


1. Describe about The filesystem category
2. Describe about The metadata category
3. Describe about The content category

LEARNING OUTCOMES

At the end of this session, you should be able to:


1. Illustrate about importance of The filesystem category
2. Illustrate about importance of The metadata category
3. Illustrate about importance of The content category

CREATED BY K. VICTOR BABU


SESSION CONTENTS

 The filesystem category


 The metadata category
 The content category
 Locating evidence in file systems
 Determining the means of transgression
 Determining opportunity to transgress
 Determining the motive to transgress
 Deciding where to look for possible evidence
 Indexing and searching for files
 Unallocated data analysis
CREATED BY K. VICTOR BABU
The filesystem category

 The filesystem category records the general filesystem information, which,


while following a general design, is a unique structure on each individual
device.
 By cataloging this data, the filesystem category shows users where to find the
data and files they are seeking as well as acting as a map for the filesystem.
 It brings order to chaos and allows sound storage and retrieval of files for
users.
 There is also a benefit of the filesystem, which is rich in file metadata, to
practitioners.
CREATED BY K. VICTOR BABU
The filesystem category

 Filesystem metadata forms an essential part of practitioners' navigation and


the examination of filesystem information.
 It can assist greatly in reconstructing events of relevance to a case.
 However, if any of this data is corrupted or lost, then additional analysis is
made more difficult because backup copies of the data and records will be
required.
 Otherwise, the practitioner will need to guess what the original values were
and guess the type of application that created the filesystem and the creation
date of the file or folder.
CREATED BY K. VICTOR BABU
The filename category

 The filename category, sometimes referred to as the human interface category,


catalogs data used to assign a name to each file.
 It consists of directory lists of filenames with the corresponding metadata
address of each file.
 Deleted filenames and their corresponding metadata addresses are used to
recover the file content using metadata-based recovery.
 Being able to use filename listings is a fundamental part of forensic examinations
as it allows the practitioner to identify the names of the files and parent
directories and can be used for searching for evidence based on filename, path,
or file extension.
CREATED BY K. VICTOR BABU
The filename category

 A file extension identifies the type of file, such as a system file or, in the case of
an MS Word document, a file denoted by the .docx extension.
 However, if the metadata address is cleared during file deletion, it may not be
possible to locate further information.
 If only part of a filename is known, it is still possible to search using that part,
such as in the case of the file extension or name being known, but not its full
path.
 Metadata is stored in fixed-length tables with its own address.
 When a file is deleted, the metadata entry is changed to the unallocated state,
and the operating system may wipe some of the file values.
CREATED BY K. VICTOR BABU
The filename category
 It should also be noted that file-wiping tools may delete filenames and metadata addresses or overwrite
key values in the filename, showing that an entry existed before being invalidated.
 The operating system stores all file data and metadata in binary form, which is translated to human-
readable text or images through the application interface, often referred to as the Graphical User
Interface (GUI).

This figure shows the


filename data saved
in binary form and
the timestamp
metadata:

CREATED BY K. VICTOR BABU


The metadata category

 The metadata category contains data that describes the properties or attributes of a
file, displaying the file location and size.
 Most importantly, it provides a history of the file, providing timestamps for its
creation, modification, and access.
 Metadata-based recovery may be required to look for that missing or elusive file and
is used when metadata from the deleted file has not been erased.
 The file may have been relocated, such as being moved from one folder to another.
 This may prove problematic to detect as it is not uncommon when a file has been
reallocated to recover two or more unallocated metadata entries that have the same
file address.
CREATED BY K. VICTOR BABU
The metadata category

 Examination of metadata may assist


when viewing file contents and searching
for file values as well as locating deleted
files.
 It is usually initiated when a filename
points to a specific metadata structure
and file examination is required.
 The following figure shows metadata
recovered from a thumbnail of a
photographic image.
CREATED BY K. VICTOR BABU
The metadata category

 The thumbnail database files keep a record of multimedia files stored in specific
folders.
 Even after the original file has been removed from the folder, the small database
file may remain, containing miniature versions of the original file and file
metadata.
 In this example, the file metadata contains Exchangeable Image File Format (EXIF)
data typical of photographs taken with a digital camera or device.
 This may provide additional details of the precise map reference where the image
was taken for certain types of camera and, occasionally, the serial number of the
camera.
CREATED BY K. VICTOR BABU
The metadata category

 Different file types provide basic


metadata and sometimes even
versions of the file, as in MS
Word documents.
 The file properties shown in the
next screenshot provide details
of the file creation, modification,
and last accessed timestamps
and the file location:

CREATED BY K. VICTOR BABU


The content category

The content category consists of the contents of a file, such as


the text written to a document file, figures added to a
spreadsheet, or a picture inside an image file.
 If recovered from unallocated space, it may have no linked
metadata or filename, and the only clues to its antecedents
may be gleaned from the file signature and clues garnered
from the contents, especially text documents.
CREATED BY K. VICTOR BABU
Locating evidence in file systems

 The nature of the transgression to some extent dictates the type of relevant
evidence that may be recovered.
 For example, in a homicide where the victim died of gunshot wounds, it would
be helpful to determine the time, location, and cause of death.
 A search would commence for the weapon; discharged bullets or shot, spent
cartridges; gunpowder residue; blood spatter; and projectile trajectory data.
 At a microscopic level, DNA analysis of samples from the spent cartridge,
chemical analysis of the gunpowder residue, postmortem analysis to
determine the cause of death, and so forth will be undertaken.
CREATED BY K. VICTOR BABU
Locating evidence in file systems

 One of the fundamental challenges practitioners face is determining with


any certainty the link between a suspect and the data recovered from a
computer.
 Without a human observer or perhaps a CCTV camera to place the suspect at
the computer at the time of the transgression, it becomes a matter of an
educated guess at best or speculation at worst.
 The practitioner must be guided by the evidence and if that proves
inconclusive, he or she must look for more evidentiary clues to offer likely
hypotheses as to what happened.
CREATED BY K. VICTOR BABU
Locating evidence in file systems

 The practitioner collects all relevant evidence that supports various


hypotheses, but it is for others, such as juries, to decide whether the evidence
helps determine guilt or innocence.
 The challenge to practitioners is locating information or data of relevance to
the case under investigation.
 It is also common for the examination to seek specific evidence in accordance
with a legal brief, but during the examination, evidence of other transgressions
may be recovered.

CREATED BY K. VICTOR BABU


Determining the means of transgression

 Reconstructing the transgression may be a relatively easy process, or it may be


difficult to reconstruct because little record remains of the transgression and
transgressors.
 The practitioner would have to determine where the truth lay and undertake a
thorough analysis of the e-mail message in relation to the computer being
examined.
 Another aspect of determining whether a suspect had the means to
commission an offense is verifying whether the suspect had the computer skills
to use the software involved, such as in the case of forging an electronic
document or manipulating a photograph.
CREATED BY K. VICTOR BABU
Determining the means of transgression

 The practitioner collects all relevant evidence that supports various


hypotheses, but it is for others, such as juries, to decide whether the evidence
helps determine guilt or innocence.
 The challenge to practitioners is locating information or data of relevance to
the case under investigation.
 It is also common for the examination to seek specific evidence in accordance
with a legal brief, but during the examination, evidence of other transgressions
may be recovered.

CREATED BY K. VICTOR BABU


Determining opportunity to transgress

 Any one can use computer for some illegal operations but proving the suspect alone
had the opportunity through access to the computer may be problematic.
 It may be difficult, if not impossible, to link the time of the crime to a suspect's access
to the computer or network in the absence of any corroboration.
 Audit logs recording the details of specific users accessing a computer or network
often assume that the person who used the authorized user's logon details and
password was the actual user.
 Often, that may be so, but if another person gained unauthorized access to the user
details and logged on to the system, it may be difficult to prove unless there is some
other evidence, such as a human observer or perhaps a CCTV recording, to clarify
CREATED BY K. VICTOR BABU
Determining opportunity to transgress

 Audit and access user logs are not infallible and can be altered and falsified and are
therefore not always reliable.
 Time and date stamps and file locations of key events help confirm the circumstances
relating to a transgression. They may often help determine which user had the
opportunity to transgress at a given time.
 Time and date stamps and file locations of key events help confirm the circumstances
relating to a transgression. They may often help determine which user had the
opportunity to transgress at a given time.
 Computer user access security may prohibit unauthorized access transgression and
establish user identity. This would help narrow down the list of those users who may
have been responsible for the transgression.
CREATED BY K. VICTOR BABU
Determining opportunity to transgress

 In criminal cases, much is made of assumptions as to who committed the offence, but it
must be proven beyond reasonable doubt, and to a lesser extent in civil cases, where
there is more of a balance of probability and a lower threshold.

CREATED BY K. VICTOR BABU


Determining the motive to transgress

 It is not essential to prove motive, and it is often difficult to do so without


perhaps some form of confession by the transgressor, for who knows what
was in the mind of the transgressor at the time of the act?
 However, data may exist on a device that may offer some explanation to
possible motivation or, for that matter, an absence of motive and criminal
intent.

CREATED BY K. VICTOR BABU


Deciding where to look for possible evidence

 We have a transgression; somebody had the means, the opportunity, and


the motive to commit it using a computing device.
 Records of the applications and files used and the operating system can
provide some useful electronic fingerprints to help practitioners reconstruct
what happened, when it happened, where on the device or in the system it
occurred, how it happened, and, hopefully, why it happened—the often-
hard-to-prove motive. So where should the practitioner start?
 Computers and other devices store information in directory systems of
varying sorts, similar to Windows Explorer.
CREATED BY K. VICTOR BABU
Deciding where to look for possible evidence

 This screenshot shows part of a Windows directory structure viewed


through the advanced forensic tool ILookIX:

CREATED BY K. VICTOR BABU


Deciding where to look for possible evidence

 However, the number of files stored on a typical computer makes it


impracticable because of time constraints and the fatigue of checking every
file.
 Some are system files that will not normally be examined other than for
specific checking.
 So, providing the practitioner with easy-to-review categories of files would be
more helpful.
 If, for example, webpage files such as HTML and other categories were
conveniently categorized, it would make locating and selecting evidence
quicker and less tedious.
CREATED BY K. VICTOR BABU
Deciding where to look for possible evidence

 File categories can be divided into file signature and file type, as shown in
ILookIX's Category Explorer panel in the next screenshot.

CREATED BY K. VICTOR BABU


Deciding where to look for possible evidence

 File signatures recognize the internal structure and pattern of a file, while file types are based
on the application software that uses the files, such as Microsoft Office using Word to open a
file with the .docx file extension.
 If e-mail messages or multimedia files were being sought, then these helpful catalogs would be
a convenient start to a search.
 The main areas of interest may be cataloged and provide some useful starting points for a
broad range of cases, as detailed in the examples set out in the next table:

CREATED BY K. VICTOR BABU


Deciding where to look for possible evidence
Category Reason for Search

Archive files These include zipped and compressed files whose contents may be relevant to the investigation.

These files may record some Skype conversations or provide evidence of downloading music files in breach of
Audio
copyright regulations.

Databases These include databases of thumbnail files (.db) and other records relating to user activities on the device.

E-mails These are a rich source of information about human communications and sometimes contain incriminating evidence.

These are records of various user and system activities retained by the device—useful for recreating timelines of
Event logs
events.
These provide a record of browsing activities as well as a record of searches made that may relate to an
Internet browser files
investigation.
These files tell us about the files and applications most recently used and help reconstruct user activities and
Link files
timelines of events.

Recycler Deleted files and folders are often a rich source of evidence.

The registry records the state of various features available to users and has a record of various devices
Registry files
attached to the computer.
Most of these may be irrelevant to an examination but some play an important role in reconstructing relevant
System files
events.
These files may contain evidence of user activities of relevance to a case, or child exploitation material, for
Video
example.
CREATED BY K. VICTOR BABU
Indexing and searching for files

 Searches may be index-based or keyword searches.


 Index-based searches require the indexing of each file in the dataset that
the practitioner decides may be relevant to the examination and can filter
out extraneous files that would otherwise slow down the indexing and
searching processes.
 Once the dataset is indexed, the time for a search is almost instantaneous,
with quicker results of hits being provided to the practitioner.
 Keyword searches take longer but are also time savers.

CREATED BY K. VICTOR BABU


Indexing and searching for files

 The following screenshot shows a variety of search terms populating a configuration file
created by the advanced ISeekDesigner program, which provides the practitioner with a rich
selection of keyword search terms.
 In this process, the configuration file is used by the ISeekDiscovery automaton to search for
the terms, which are later indexed for speedier analysis:

CREATED BY K. VICTOR BABU


Indexing and searching for files

 Search results are presented in a variety of formats, allowing the practitioner to examine a
smaller and more manageable dataset, as highlighted in the following screenshot.
 It shows the result of a search of a large dataset consisting of more than two million files
resulting in the identification of six files that assist the case reconstruction of this training crime
simulation designed by me:

CREATED BY K. VICTOR BABU


Unallocated data analysis

 The area available to store data on a hard drive or storage drive depends on the size of the
device and any installed components.
 For example, a newly acquired laptop may have on it the operating system and a range of basic
software applications, system files, user data, and so forth.
 The remaining space, in pristine condition, is available to store data as required by the user,
system, and software applications.
 This free space or unallocated space is initially empty but soon starts getting filled during normal
usage.
 Files may be recovered from allocated space, where they are maintained by the operating
system in what is called a logical state.
 Most of the files here, unless they are hidden files, may be located and recovered during
forensic recovery.
CREATED BY K. VICTOR BABU
Unallocated data analysis

 The same may be said of deleted files that remain in the trash folder.
 Eventually, the device can run out of space and crash the operating system or at least make
its operation sluggish.
 Files are frequently deleted by users and held in the trash bin, from where they may be
restored or removed back into unallocated space.
 There, the remnants of the file remain but will be further eroded and eventually completely
overwritten by new files being written to and occupying the same space.
 However, forensic tools allow the practitioner to recover these files or fragments of deleted
files that may assist in reconstructing key events in a case.
 Deleted files may be readily recoverable by checking for deleted filenames held in file
directories.
CREATED BY K. VICTOR BABU
Unallocated data analysis

 However, it is not uncommon for the names of deleted files to be reused before any
changes to the metadata are made.
 The files may have retained no filename, but the file metadata may still persist.
Conversely, the filename and metadata may remain but not the file contents.
 Consistency checking of unallocated blocks by an experienced practitioner may reveal
deliberate attempts at data hiding or filesystem errors that have hidden data.
 Data wiping may be detected too by finding a zeroed or invalid entry between two valid
entries.
 Data carving is the technique used to undertake the recovery of file fragments and can
be done manually using a hex editor or automatically using advanced forensic tools.

CREATED BY K. VICTOR BABU


Unallocated data analysis

 However, unless access to the device can be gained, all these attempts at data recovery
may be thwarted if the device is password protected and encrypted.
 Motive may be determined by collecting evidence that links the user to some activities
that confirm a degree of knowledge and control over the computer and relevant
applications and files used in the transgression.
 Always be wary of the obvious.
 Speculation such as "it is the suspect's computer; therefore, the suspect is responsible"
is highly inappropriate, even it if not voiced by the practitioner.
 False evidence, too, can relatively easily be generated by mischief-makers out to
implicate an innocent party.

CREATED BY K. VICTOR BABU


THANK YOU

Team – Digital Forensics

CREATED BY K. VICTOR BABU

You might also like