Professional Documents
Culture Documents
CH 05
CH 05
and Investigations
Sixth Edition Working with Windows and
CLI Systems
Chapter 5
1
Explain the purpose and structure of file
systems
2
• File system
Fil • Gives OS a road map to data on a disk
e
• Type of file system an OS uses
File Systems pe
• When you need to access a suspect’s
Ac computer to acquire or inspect data
• You should be familiar with both the
ss
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in
part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use. 3
3
Understanding the Boot Sequence (1 of 3)
4
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Videos
https://www.youtube.com/watch?v=G_qKrJPuAmg
5
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Bootstrap process
CMOS should be
modified to boot from a
forensic floppy disk or CD
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole
or in part, except for use as permitted in a license distributed with a certain product or
service or otherwise on a password-protected website for classroom use.
6
6
Understanding the Boot
Sequence (3 of 3): UEFI
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7
7
Disk drives are made up of one or more
platters coated with magnetic material
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8
8
Understanding Disk
Drives (2 of 4)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9
9
Understanding Disk
Drives (3 of 4)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 10 10
• Properties handled at the drive’s hardware or
Understanding firmware level
• Zone bit recording (ZBR)
Disk Drives (4 • Track density
of 4) • Areal density
• Head and cylinder skew
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 11
11
Class Activities
https://www.youtube.com/watch?v=AIeaSM0d_6M
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 13
13
Exploring Microsoft File Structures (1
of 2)
• Need to understand the MS file system, so we understand how the computer store files.
• We need to understand, Clusters, File Allocation Table (FAT) and NT File Systems. (NTFS),
• Methods the OS uses to store file, decide where the data can be hidden,
• In Microsoft file structures, sectors are grouped to form clusters,
• Storage allocation units contains one or more sectors,
• Clusters range from 512 bytes up to 32,000 bytes each
• Combining sectors minimizes the overhead of writing or reading files to a disk.
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
14 14
Exploring Microsoft File Structures (2
of 2)
• Clusters are numbered sequentially starting at 0 in NTFS and 2 in FAT
• First sector of all disks contains a system area, the boot record, and a
file structure database
• OS assigns these cluster numbers, called logical addresses (LA)
• LA Points to a relative cluster's positions
• Sector numbers are called physical addresses
• Clusters and their addresses are specific to a logical disk drive, which is a
disk partition
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
15 15
Disk Partitions (1 of 5)
• A partition is a logical drive
• Windows OSs can have three primary partitions followed by an extended partition
that can contain one or more logical drives
• If someone wants to hide data on HD needs to create Hidden partitions or voids.
• These are Large unused gaps between partitions on a disk.
• Partition gap
• Unused space between partitions
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
16 16
Disk Partitions (2 of 5)
• It is possible to create a partition, add data, then remove references to
the partition so it can be hidden in Windows.
• If the data is hidden in this partition gap, a disk editor could be used to
access it.
• Another techniques is to hide incrementing digital evidences at the end
of a disk, by declaring the small number of bytes than the actual drive
size.
• A disk editing tools can access any hidden or empty areas.
• WinHex or Hex Workshop editors can be used to examine a partition’s
physical level
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in
a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 17 17
Disk Partitions (3 of 5)
• WinHex and Hex workshop allows you to view
• file headers
• other critical parts of a file
• Both tasks involve analyzing the key hexadecimal codes that the OS
uses to identify and maintain the file systems,
• For example:
• The partition table in the Master Boot Record (MBR) is Located at
sector 0 of the disk drive
• In a hexadecimal editor, such as WinHex, you can find the first
partition at offset 0x1BE
• The file system’s hexadecimal code is offset 3 bytes from 0x1BE for
the first partition
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
18 18
Disk
Partitions
(5 of 5)
19
19
• File Allocation Table (FAT)
• File structure database that Microsoft originally designed for floppy disks
• It is used to organized the files on a disk
• Other Oss, such as Linux and Mac can read and write to FAT storage
devices; USB and SD cards.
• FAT database is typically written to a disk’s outermost track and contains:
• Filenames, directory names, date and time stamps, the starting cluster
number, and file attributes
• Three current FAT versions
• FAT16, FAT32, and exFAT (used for mobile personal storage devices)
• Cluster sizes vary according to the hard disk size and file system
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 22
22
• Microsoft OSs allocate disk space for files by clusters
• Results in drive slack
• Unused space in a cluster between the end of an active
file’s content and the end of the cluster
• Drive slack includes:
• RAM slack and file slack, used for older Microsoft
Windows
• In newer Windows, the data is written to disk and the
remaining RAM Slack is zeroed out and no RAM Data.
• An unintentional side effect of FAT16 allowing large clusters
was that it reduced fragmentation
• As cluster size increased
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as 24
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
24
When you run out of
room for an allocated
cluster
OS allocates another cluster for your file
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in
part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in
part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted
in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 27 27
• In Microsoft OSs, when a file is deleted
• Directory entry is marked as a deleted file
• With the HEX E5 character replacing the first letter of
the filename
• FAT chain for that file is set to 0
• Data in the file remains on the disk drive
• Area of the disk where the deleted file resides becomes
unallocated disk space
• Available to receive new data from newly created files or
other files needing more space
•Videos
•https://www.youtube.com/watch?v=_h30HBYxtws
•https://www.youtube.com/watch?v=TLKZEU1DZ9c
29
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
• NT File System (NTFS)
• Introduced with Windows NT
• Primary file system for Windows 10
Examining • Improvements over FAT file systems
• Including, security Features, file ownership and other
NTFS Disks (1 attributes
• NTFS provides more information about a file
of 3) • NTFS gives more control over files and folders
• NTFS was Microsoft’s move toward a journaling file system
- It keeps track of transactions such as file saving or deleting
- It records a transaction before the system carries it out
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
30
30
In NTFS, everything written to the disk is considered a file
On an NTFS disk
• First data set is the Partition Boot Sector
• Next is Master File Table (MFT)
• MFT Similar to FAT and it is created at the same time as the disk partitioning is formatted as an NFTS
Clusters are smaller for smaller disk drives ( SEE next slides comparing FAT and NTFS disks
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in
part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
33 33
• Since everything on NTFS is a file , the MFT contains
information about all files on the disk Including the system
files the OS uses.
• In the MFT, the first 15 records are reserved for system
files,
• Records in the MFT are called metadata
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 35
35
NTFS File System
(3 of 3)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 36
36
• In the NTFS
• All files and folders are stored in separate records of 1024
bytes each
• Each record contains file or folder information
• This information is divided into record fields containing
metadata
• A record field is referred to as an attribute ID
• File or folder information is typically stored in one of two
ways in an MFT record:
• Resident and nonresident
Records of 1024
bytes
-Metadata of files
and folders
-Files data or links to
the data
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use. 38
• Files and folders information are stored in one of two ways
in the MFT records : resident and nonresident
• Files data and metadata, of 512 bytes or less are stored in
MFT records (resident)
• Files data and metadata larger than 512 bytes are stored
outside the MFT (nonresident)
• MFT record provides cluster addresses where the file is
stored on the drive’s partition are referred to as data runs
• Each MFT record starts with a header identifying it as a
resident or nonresident attribute
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 40 40
MFT and File
Attributes (5
of 9)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 41 41
• When a disk is created as an NTFS file structure
• OS assigns logical clusters to the entire disk partition
• These assigned clusters are called logical cluster numbers
(LCNs)
• Become the addresses that allow the MFT to link to
nonresident files on the disk’s partition
• When data is first written to nonresident files, an LCN
address is assigned to the file
• This LCN becomes the file’s virtual cluster number (VCN)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 43 43
MFT and File
Attributes (8
of 9)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 44 44
• When you are view the an MFT record with hexadecimal
editor the data is displayed in little endian format, i.e. it is
read from right to left. E.g:
- Hexadecimal value 400 is displayed 00 04 00 00
- Hexadecimal value 0x40000 is displayed as 00 00 04 00
• The first section of an MFT record is the header that defines
the size and the starting position of the 1st attribute
• Following the header are attributes that are specific for the
file type such as application files or a data file.
• The followings explain how the data files are configured.
47
47
MFT Structures for File Data (3 of 7)
Standard Info are: start of MFT records
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as 48
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
48
MFT
Structures for
File Data (4 of
7)
Files with
Files with eight or fewer MFT
records has one ox30
Files with more then 8
characters MFT records has two
attributes
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 49 49
MFT Structures for File Data (5 of 7)
This attribute contains the file ownership and access control info
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as 50
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
50
MFT Structures for File Data (6 of 7)
Gives the size of attribute and start of the data run
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as 51
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
51
MFT
Structures for
File Data (7 of
7)
attribute 0x80 for the nonresident
file
52 52
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
• The first data run for a nonresident attribute 0x80 filed start at offset
0x40
• Data Run has three components :
Interpreting a • -First component: declares how many bytes in the attribute filed
needed to store the values for the 2nd and 3rd component,
data run • Second component stores the number of clusters assigned to the
data run,
• - The third component contains the starting cluster address value
(LCN or the VCN)
• LCN: Logical Cluster Number: logical clusters of the entire disk
partition ,
• VCN: Virtual Cluster Number: LCN assigned to the file at the
attribute 0x80 field of the MFT.
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 53 53
a) Multiple data run b) data run components
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as 54
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
-32 is the data run’s first component,
Digit 2 is the second bytes, contains the number of clusters assigned to the data run
Digit 3: means the next 3 bytes, contain the cluster address value VCN(0).
-B1 07 is the second component, 7B1 = 1969 in decimal
2 bytes needed to store the hexadecimal values for the clusters assign to this data
-0x8C8C third component, = 35980 in decimal
First data run for the file , LCN
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use. 55
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use. 56
57
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
• Alternate data streams
• Ways data can be appended to existing files
• Can obscure valuable evidentiary data, intentionally or by
coincidence
• In NTFS, an alternate data stream becomes an additional
file attribute
• Allows the file to be associated with different applications
• You can only tell whether a file has a data stream attached
by examining that file’s MFT entry
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 59 59
• NTFS provides compression similar to FAT DriveSpace 3 (a
Windows 98 compression utility)
• With NTFS, files, folders, or entire volumes can be
compressed
• Most computer forensics tools can uncompress and analyze
compressed Windows data
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as 74
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
74
Exploring the Organization of the Windows Registry (4 of 6)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as 75
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
75
Exploring the Organization of the Windows Registry (5 of 6)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as 76
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
76
Exploring the Organization of the Windows Registry (6 of 6)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as 77
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom
use.
77
• Tools with built-in or add-on Registry viewers:
- X-Ways Forensics
- OSForensics
- Forensic Explorer
- FTK
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
79
• Learn what files are accessed when Windows starts
• This information helps you determine when a suspect’s
computer was last accessed
• Important with computers that might have been used
after an incident was reported
Startup in Windows 7,
Windows 8 and Windows 10
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8 81
1
• All NTFS computers perform the following steps when
the computer is turned on:
• Power-on Self Test (POST)
• Initial startup
• Boot loader
• Hardware detection and configuration
• Kernel loading
• User logon
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 86
86
• Contamination Concerns with Windows XP
• When you start a Windows XP NTFS workstation,
several files are accessed immediately
• The last access date and time stamp for the files
change to the current date and time
• Destroys any potential evidence
• That shows when a Windows XP workstation was last
used
Understanding Virtual
Machines (1 of 3)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8 88
8
Understanding
Virtual
Machines (2 of
3)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 89 89
• In digital forensics
• Virtual machines make it possible to restore a suspect
drive on your virtual machine
• And run nonstandard software the suspect might have
loaded
• From a network forensics standpoint, you need to be
aware of some potential issues, such as:
• A virtual machine used to attack another system or
network
Understanding Virtual
Machines (3 of 3)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9 90
0
• Common applications for creating virtual machines
• VMware Server, VMware Player and VMware
Workstation, Oracle VM VirtualBox, Microsoft Virtual
PC, and Hyper-V
• Using VirtualBox
• An open-source program (download)
• Consult with your instructor before doing the activities
using VirtualBox
Summary (1 of 3)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9 92
2
• When files are deleted in a FAT file system, the hexadecimal
value 0x05 is inserted in the first character of the filename
in the directory
• NTFS is more versatile because it uses the Master File Table
(MFT) to track file information
• Records in the MFT contain attribute IDs that store
metadata about files
• In NTFS, alternate data streams can obscure information
that might be of evidentiary value
Summary (2 of 3)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in
a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9 93
3
• File slack, RAM slack, and drive slack are areas in which
valuable information can reside on a drive
• NTFS can encrypt data with EFS and BitLocker
• NTFS can compress files, folders, or volumes
• Windows Registry keeps a record of attached hardware,
user preferences, network connections, and installed
software
• Virtualization software enables you to run other OSs on a
host computer
Summary (3 of 3)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9 94
4