Tuesday, January 26, 2016

Forensic Software Tools

Introduction

In this article we introduce to the hardware and software-based forensic tools. Due to the
large number of hardware and software tools, few can be covered in great detail.We shall list
the software products you will need to be familiar with to pass the exam in Part One.
The second part of this chapter introduces the physical hardware tools available to aid the
forensic practitioner.Tables are included within the chapter that supply a brief description of
the salient features of each tool.



Forensic Software Tools

This section summarizes the features and advantages of a large number of software forensics
tools. For detailed information and technical reports it is always best to view the vendor Web
sites as well as organizations that conduct technical reviews and evaluations such as National
Institute of Standards and Technology (NIST).The Computer Forensic Tools Testing project
(CFTT) web site contains additional valuable information:
■ www.cftt.nist.gov/disk_imaging.htm
■ www.cftt.nist.gov/presentations.htm
■ www.cftt.nist.gov/software_write_block.htm
The information presented in this chapter is heavily based on the assertions of the various
vendors who make the products listed in the chapter. Much of the information has been taken
from the vendors product sheets.The Computer Forensic Tools Testing project is a good source
of comparative data when deciding between these vendors.

Visual TimeAnalyzer

Visual TimeAnalyzer, shown in Figure 13.1, automatically tracks all computer usage and presents
detailed, richly illustrated reports.You can easily log individual users or specific projects and
compile detailed accounts of time spent within each program.The program helps track work
time, pauses, projects, costs, software, and internet use and gives parents control over their chil-
dren’s use of the personal computer.
The software has some privacy s afeguards and does not monitor all user data such as pass-
words and personal documents. Unlike spyware, it does not record specific keystrokes or run
screen captures as a background process.
Software functions:
■ User supervision Get detailed accounts of working hours and breaks.
■ Computer supervision Monitor the family’s PC or the company’s network.
■ Software metering Determine how often software is used and by whom.
■ Internet use Control online time and web usage.
■ Project overview Summarize the amount of time applied to each project milestone.
■ Compare users See the activity of users on their computers.
Figure 13.1 Visual TimeAnalyzer in Action



X-Ways Forensics

X-Ways Forensics also is covered in further detail in Chapter 6. It is based on WinHex and is
designed to be an advanced work environment for the digital forensic analyst.The product pro-
vides a number of features such as:
■ Forensic cloning and imaging of sound disks
■ Examination of the complete directory structure inside raw image files, even if the
directory spans segments
■ Native support for FAT, NTFS, Ext2, Ext3, Ext4, CDFS, and UDF file systems
■ Built-in interpretation of RAID 0 and RAID 5 systems and dynamic disks
■ Viewing and dumping of physical RAM and the virtual memory space of running
processes
■ Several data recovery techniques and file carving
■ File header signature database based on flexible UNIX grep notation
■ Hard disk cleansing to produce forensically sterile media
■ Gathering of slack space, free space, interpartition space, and generic text from drives
and images
■ Creation of file and directory catalogs for all computer media
■ Easy detection of and access to NTFS alternate data streams (ADS), even where
other programs fail
■ Calculation for mass hash file encryption (CRC32, MD5, SHA-1, and SHA-256)
■ Manual decompression of NTFS volumes
■ Support for the HFS, HFS+, ReiserFS, Reiser4, UFS, and UFS2 file systems
■ Support for the following partition types: MBR,Windows dynamic volumes, GUID
(GPT), Apple, unpartitioned (floppy/superfloppy)
■ Gallery view for pictures
■ Calendar view
■ File preview — a seamlessly integrated viewer component for more than 400 file
types
■ Examination of e-mail extracted from Outlook (PST)*, Outlook Express (DBX),
Mozilla (including Netscape and Thunderbird), generic mailbox (mbox, Berkeley,
BSD, UNIX), Eudora, PocoMail, Barca, Opera, Forte Agent,The Bat!, Pegasus,
PMMail, FoxMail, and local copies of maildir folders
■ Automated check of the file signature
■ Tagging of files and add them to customized report tables of notable items
■ Automatic identification of encrypted Microsoft Office and PDF documents
■ Automatic identification of pictures embedded in documents (for example Microsoft
Word, PDF, and PowerPoint)
■ Includes an internal viewer for Windows Registry files (all Windows versions) that
generates an automated Registry report — works with all Windows versions
■ Includes an internal viewer for Windows event log files
■ Listing of the contents of archives within the directory browser, even in a recursive
view
■ Logical search of all or selected files and directories — following fragmented cluster
chains, in compressed files, and optionally decoding text in PDF,WPD, and other file
formats.
■ Searches of Unicode and other types of code pages
■ Skin color detection (that is, a gallery view sorted by skin color percentage that
greatly accelerates searches for traces of child pornography and obscene images)
■ Detection of host-protected areas (HPA) —ATA-protected areas
X-Ways Forensics can also write-protect data to ensure authenticity and integrity. It has a
case management function integrated with automated activity logging (audit logs) and auto-
mated reporting.The generated reports can be imported and further processed by any applica-
tion that processes HTML — for example, Microsoft Word. It also associates comments about
files for inclusion in the generated reports or for filtering.

Evidor

Evidor searches for all occurrences of keywords within text files in digital media such as hard
disks, and retrieves the context. It examines all files in the entire allocated space, — including
Windows swap/paging and hibernate files — along with unallocated and slack space. It will find
data files that have been deleted if they still physically exist on the hard disk. Evidor is a small
subset of the search functionality included in in X-Ways Forensics. Evidor cannot access remote
networked hard disks.
Slack Space and Data Recovery Tools
These tools aid in the recovery of deleted files and data, including file fragments in slack space
on file systems supported by Windows.

Ontrack

Ontrack Data Recovery is a simple-to-use tool used to recover lost, remote, and deleted data. It
is provided with a file repair capability for files in Microsoft Word and Zip format. It also
recovers deleted files, folders, and entire partitions. It uses an emergency boot diskette to
retrieve data from systems that cannot boot Windows.The user can start, stop, or resume the
recovery process and select an FTP location as the destination for the recovered data.The user
can configure the file filter for a quick or full scan.
The analyst can use this application perform an enhanced search using the options such as
find, find next, and find previous. Ontrack can filter and sort data according to the file date,
time, name, status, and size. It can scan the media for lost and remote data and lets the user
specify the locations to copy the recovered files and folders to.

DriveSpy

DriveSpy is a modified MS-DOS shell designed to imitate and extend the potential of MS-
DOS for forensic purposes. It uses a set of standard MS-DOS commands followed by com-
mands specific to DriveSpy to process the computer during investigations.
DriveSpy can wipe an entire drive or partition, unallocated space, or slack space. It can also
create an MD5 hash of an entire drive, partition, or selected files. It saves and restores com-
pressed images of a partition for forensic use.
It can process the following:
■ Hard drives with capacity of more than 8.4 GB
■ Floppy drives and other removable drives
■ FAT 12, FAT 16, /FAT 16x, FAT 32, and FAT 32x partitions
■ Hidden MS-DOS partitions
Filters to sort the recovered files according to date, name, time, status, and size are available.
DriveSpy performs the following functions for recovering data:



Retrieve lost, remote, or deleted data and entire partitions.
Start, stop, or resume the recovery process.
Select an FTP location to copy the recovered files and folders to..

Data Recovery Tools

The following tools may be used to recover information from many sources including PDAs,
cameras, and disk drives.
Device Seizure
Device Seizure is covert surveillance software developed by Paraben Corporation. It can aid in
forensically analyzing and recovering mobile phone and PDA data including deleted text mes-
sages, photos, and call logs. It supports Palm,Windows CE,Windows Mobile, BlackBerry, and
Psion devices as well as certain Nokia, Sony Ericsson, Motorola, iDen, Siemens, LG, Samsung,
and Symbian-based phone models. It also supports GSM SIM card acquisition and deleted data
recovery using SIMCon technology. Device Seizure is supported on Windows 98,Windows
XP, and Windows Vista.

Forensic Sorter

Forensic Sorter organizes and speeds the examination of the contents of a hard drive. It sorts
the contents of hard drives into categories such as video, audio, and spreadsheets so you can
easily find what you’re looking for. It will filter common Windows files, recover deleted files, or
file fragments in slack, deleted, and unallocated space.
The application supports drive images in RAW, PFR (Forensic Replicator), Safeback,
and EnCase image files and is compatible with Paraben’s P2 Forensic Examination
Technology. It sorts files by header rather than file extension for accuracy and sorts files
located in unpartitioned space. Forensic Sorter identifies encrypted files for easy recovery
using Paraben’s Decryption Collection. All data output is non-proprietary so any tool can be
used for analysis performed after sorting. It is designed for use with Paraben’s Case Agent
Companion. It supports:
■ EFS file detection
■ NTFS compressed file read operations
■ NTFS streamoperations
■ HTML reporting
■ Ext 2 and Ext 3 partition operations
■ Compressed archive (ZIP, RAR, etc.) sorting
■ Drives with bad sectors sorting
■ Unicode support
■ Removable disk support
■ OLE storage support
■ Palm OS file detection
■ Chat log file detection
■ E-mail Examiner and Network E-mail Examiner-supported file detection
■ XML output validation

Directory Snoop

This program is a cluster-level search tool that allows Windows users to analyze and view files
in FAT- and NTFS-formatted disk drives to see what data can be recovered. It can recover
deleted files or permanently erase sensitive files. Supported media include hard drives, floppy
disks, Zip disks, magneto-optical drives, and flashcard devices. Its features include:
■ FAT and NTFS modules
■ Recovering deleted files, including those emptied from the recycle bin
■ Destroying sensitive files with the secure wiping functionality, which provides up to
35 wiping passes
■ Secure wiping slack and free drive space
■ Purging sensitive file names left behind after normal erasing
■ Copying open and locked files with the cluster copy function
■ Searching, filtering, and sorting files globally by name and other parameters
■ Viewing, searching, printing, and copying raw cluster data
■ Dynamically linking clusters with cluster chains and the files that use them
■ Examining the FAT and Master File Tables
■ Viewing files through external applications
■ Verifying the effectiveness of other file wiping programs

Permanent Deletion of Files

Drive wiping is a crucial component of all digital forensic examinations. Any drive that is not
thoroughly wiped has to be considered suspect.The following tools aid in this goal.

PDWipe

PDWipe is capable of wiping large hard drives (in excess of 8.4 GB) in just under 11 minutes.
It will perform a declassification drive wipe in accordance with the NAVSO P5239-10 security
standard.This wiping algorithm exceeds that specified by the DOD 5220.22-M specification
for both “clearing” and “purging” of sensitive information on hard drives.
PDWipe provides the option of specifying a character code other than 0x00 when wiping
a drive. It also offers the ability to wipe the drive using a random pattern. PDWipe can also
record Logical Sector Addresses, and cylinder-head-sector (CHS) addresses for Int13 and Int13x
geometries at the beginning of the sectors being wiped.This is useful when diagnosing archi-
tectural discrepancies when moving a drive between systems or validating imaging utilities.
PDWipe can process all drives in a system such that all drives can be wiped with a single
program operation. If desired, PDWipe will generate a report of the wiping activity performed
on a system. PDWipe can also verify that the contents of a specified number of randomly
chosen sectors have been wiped. If wipe verification is requested, PDWipe will also automati-
cally verify the first and last sector on the drive.
PDWipe will support any drive which accessible to your system through the Int13 or the
Microsoft/IBM Int13 extensions. System BIOSs typically provide this capability for all attached
IDE or EIDE devices. In addition, most SCSI adapters offer the ability to support attached
devices through Int13 as well.

Darik’s Boot and Nuke

Darik’s Boot and Nuke (DBAN) is available from http://dban.sourceforge.net/ and is free. It is
a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will
automatically and completely delete the contents of any hard disk that it can detect, which
makes it an appropriate utility for bulk or emergency data destruction.
DBAN can ensure due diligence in computer recycling, a way of preventing identity theft
if you want to sell a computer, and a good way to totally clean a Microsoft Windows installa-
tion of viruses and spyware. DBAN prevents or thoroughly hinders all known techniques of
hard disk forensic analysis.

File Integrity Checker

Failing to maintain the integrity of a file or drive image could be the end of a forensic exami-
nation.These tools help you to prove that the file you copied into evidence has not been
altered subsequently.They make possible a quick and reliable diagnosis of a system image for
the purpose of determining if any changes have occurred.

Filemon

Filemon and Regmon have been replaced by the Process Monitor on Windows 2000 SP4,
Windows XP SP2,Windows Server 2003 SP1, and Windows Vista. Filemon and Regmon are
included in these Windows versions for support of earlier Windows operating systems such as
Windows 95.
Filemon monitors and displays file system activity on a system in real time. Its advanced
capabilities make it a powerful tool for exploring the way Windows works, seeing how applica-
tions use the files and DLLs, or tracking down problems in system or application file configura-
tions. Filemon’s timestamping feature can show you precisely when every open, read, write, or
delete operation happens, and its status column tells you the outcome. It begins monitoring
when you start it, and its output window can be saved to a file for offline viewing. It has full
search capability, and if you find that you’re getting information overload, simply set up one or
more filters.

File Date Time Extractor

File Date Time Extractor (FDTE) from Digital Detectives searches through binary files to
uncover hidden, embedded, 64-bit date and time data.Windows files, such as Word documents
contain several timestamp formats. It is important to note that false positives are common due
to data patterns in files that look like timestamps but are not.

Decode: Forensic Data/Time Decoder

This utility was designed to decode the various date/time values found embedded within
binary and other file types. It supports the following date/time formats and will allow you to
specify the offset from GMT.
■ Windows 64-Bit (little endian) date and time
■ Windows 64-Bitan) date and time
■ Windows cookie-format date and time
■ Windows filetime-format date and time
■ UNIX 32-Bit (little endian) date and time
■ UNIX 32-Bit (big endian) date and time
■ UNIX numeric date and time
■ MAC absolute date and time
■ MS-DOS 32-Bit date and time
■ HFS 32-Bit (little endian) date and time
■ HFS 32-Bit (big endian) date and time
■ HFS+ 32-Bit (little endian) date and time
■ HFS+ 32-Bit (big endian) date and time
Date and time values are stored within Windows in various formats.ample, Internet
History – (index.dat), recycle bin (INFO) files,Windows link files, and Microsoft Office docu-
ments contain a 64-bit date/time structure. Decode can take a decimal hexadecimal value and
convert it into a date and time value in a variety of formats.
Disk Imaging Tools
These tools will create a bit-image copy of a drive or other media.

Snapback DatArrest

SnapBack DatArrest can obtain the mirror images of different operating systems. It provides
successful backup of data present in the hard disk of a system. It is specially designed to create
backup of mission-critical data backups.
The captured image contains all system and networking software with associated drivers,
software applications, and configurations, and all the files including deleted files, slack space, and
data files, as well as the CMOS settings for the system.
The data gathering takes place in several modes such as copying server hard drives to tape,
PC hard drives to tape, server or PC hard drives to removable media, hard drives to hard drives,
or tape to tape. It obtains a bit level backup of data present in a hard disk.The DatArrest Suite
provides the ability to copy:
■ Server hard drive to tape
■ PC hard drive to tape
■ Server or PC hard drive to removable media
■ Hard drive to hard drive
■ Tape to tape
DatArrest backs up any hard drive (SCSI, IDE, etc.) to any SCSI tape drive, removable
drive, and even a SCSI or IDE hard drive.
Partition Managers: Partimage
Partimage is a Linux utility which saves partitions with a supported file system to an image file.
Most Linux and Windows file systems are supported.The image file can be compressed with
the gzip or bzip2 programs to save disk space, and they can be split into multiple files to be
copied on CDs or DVDs, Partitions can also be saved across the network using the Partimage
network support, or using Samba or NFS. If you don’t want to install Partimage, you can
download and run it from a CD.

Linux/UNIX Tools: Ltools and Mtools

The Ltools application is equipped with many command-line applications, which are executed
from a MS-DOSwindow in Windows 9x,Windows ME,Windows NT,Windows 2000, or
Windows XP.These applications provide the same functionality as the Linux “ls”, “cp”, “rm”,
“chmod”, “chown”, and “ln” commands.Therefore, the MS-DOS and Windows operating sys-
tems allow users to list Linux files and directories to copy files from Linux to Windows.
Supported command sets include:
1. Delete or rename files in Linux (ldel and lren)
2. Creation of symbolic links (lln)
3. Create new Linux directories (lmkdir)
4. Modify a Linux file’s access rights (lchange)
5. Change the Linux default directory (lcdrive)
Many of the tools present in UNIX operating systems have functions that are built into a
single executable file.These functions are called a bundle of command-line parameters.
The MTools application is a group of tools that can allow the user to manipulate the
UNIX systems.The MTools application can perform read, write, and other operations on MS-
DOS files. Each application copies the commands that are present in MS-DOS.The MTools
application also allows the user to unload and mount floppy disks.
The Coroner’s Toolkit and Tctutils
Dan Farmer and Wietse Venema developed The Coroner’s Toolkit (TCT).This is a group of
applications that can be used to aid a forensics investigation on UNIX systems.This system can
be executed in most UNIX/Linux operating systems.
The Coroner’s Toolkit has a collection of applications and plug-ins that give the program
additional functionality.The Coroner’s Toolkit was first put into use for the purpose of a post-
mortem analysis of a UNIX operating system after a break-in.The application was first given
to a computer forensic class for real life applications in the field in 1999.This tool is mainly
designed to help in a forensic investigation and is one of the most frequently used by forensic
investigators.

Password Recovery Tools

A password cracker hashes all the words in a dictionary file and compares every result with the
password hash. If a match is found, the password is the dictionary word.The following are tools
that may be used to file poorly configured passwords.

@Stake

The LOphtCrack application has been upgraded to version 5, which is the latest version.The
LOphtCrack application is an award-wining password auditing and recovery application used
by many corporate companies worldwide.The LOphtCrack application uses many methods to
reduce the security risk to network administrators by:
1. Identifying and resolving security vulnerabilities.
2. Recovering Windows and UNIX account password.
3. Rapidly processing accounts by using pre-computer password tables.
LOphtCrack equipped with many additional features which include automated password
scanning that can be scheduled and Windows and UNIX operating system support.The appli-
cation is also equipped with a remote scanning engine for multiple domains.There are many
dictionaries for constructing new and secure passwords.

Android Platform Architecture

Android is more of a complete software stack for mobile devices than an
operating system. It is a combination of tools and technologies that are carefully
optimized for mobile needs.
Android relies on the well-proven Linux kernel in order to provide its operating
system functions. For the user-space application, Android relies on the Java
Virtual Machine technology by employing the Dalvik virtual machine. The
Android Zygote application process, through service preloading and resource
sharing, boosts the application startup times and allows efficient use of scarce
memory resources on mobile platforms. All these successful technologies play
an important role in the success of the Android platform, as illustrated in Figure

         1-2. In addition to these tools and technologies, the Android runtime provides a
unique computing environment that is tailored for providing a smooth mobile
experience to end users, while streamlining mobile application development for
developers.


Hardware Abstraction Layer
Android relies on the Linux kernel as its hardware abstraction layer (HAL), and
also to provide its operating system functionality. During the course of Android
development, multiple improvements have been made to the Linux kernel code
in order to tune it for mobile needs. The following are the most notable features:
 Alarm timer
 Paranoid network security
 Binder
 Wakelocks
 Android shared memory (Ashmem)
 Process shared memory (Pmem)
 Low memory killer (Viking Killer)
 Logger
Although application developers are not expected to interact with these low-
level components directly, knowing their roles in the overall Android platform is
important.
           Alarm Timer
Android is designed to run on mobile platforms, where the only power to the
device is provided through batteries. Android goes into a variety of sleep modes
in order to efficiently use the limited battery resources. While the device is in
sleep mode, the applications need a way to wake up the system in order to
perform certain periodic tasks. On Android, this is achieved through the alarm
timer kernel module. It allows a user-space application to schedule itself to run
at some point in the future, regardless to the state of the device.
The android.app.AlarmManager class in Android runtime allows the user-level
application to interact with the alarm timer through API calls. The Alarm
Manager allows the applications to schedule an intent using the alarm timer
(intents are discussed in the next chapter). When the alarm goes off, the
scheduled intent is broadcast by the system to start the application. The Alarm
Manager holds a CPU wakelock (described a little later in this chapter) as long
as the application is busy executing code in its broadcast receiver’s onReceive
method. This guarantees that the device will not go into sleep mode again until
the application is finished performing its task.

The alarm timer retains the scheduled alarms while the device is asleep;
however, this list is cleared if the device is turned off and rebooted.
Paranoid Network Security
Network security is one of the most important requirements of any mobile
platform. In order to provide an extensive level of security, Android handles this
requirement at the lowest possible layer as a kernel modification. Through this
implementation, Android restricts access by the group of the calling process.
Applications should request the necessary permissions in advance, in order to
be part of these network groups. Otherwise, the network access of these
applications will be blocked within the kernel.

     Binder
The Android platform architecture makes heavy use of interprocess
communication (IPC). Applications communicate with the system, phone
services, and each other by using IPC.
NOTE: Interprocess communication (IPC) is a mechanism to allow applications to
exchange data with each other and also with the operating system itself.
Although Android relies on the Linux kernel for its operating system-related
functionality, it does not use the System V IPC mechanism that is provided
through the Linux kernel. Instead, it relies on an Android-specific IPC system,
which known as Binder.
Binder technology originated with the engineers at Be Inc. as a part of the Be
Operating System (BeOS). The development of Binder continued at PalmSource
as a key foundation of the Cobalt system, and later was open sourced as a
Linux kernel module under the name OpenBinder project. Android’s Binder
implementation is a complete rewrite of the OpenBinder project in order to
comply with the Apache License. Binder communicate between processes
using a kernel module.






Android History



Android Inc. was founded in Silicon Valley, California, in October 2003, with the idea of providing a mobile platform that is more aware of the user’s location and preferences.
Google acquired Android Inc. in August 2005 as a wholly owned subsidiary of Google Inc. Google’s main intention was to provide a fully open platform, backed by Google technologies, for both the users and the application developers.
In November 2007, the Open Handset Alliance was founded as a consortium to develop an open standard for mobile devices. Open Handset Alliance began its journey by announcing the Android platform. In less than a year, new members started joining this consortium.
Android became an open source initiative that is led by Google under Open Handset Alliance’s umbrella. The goal of the Android open source project is to provide an open platform to improve the mobile experience of users. Android is the first complete, open, and free mobile platform.
                       
 Complete:
The Android platform is a robust, secure, easily
upgradable, mobile platform with a comprehensive framework
and well-defined interfaces. It allows application developers to
develop and fully blend their applications into the platform. It
also provides compatibility and certification programs, so
device manufacturers can design highly compliant devices.

 Open:
 The entire Android platform has been developed and
provided under open source Apache licensing terms. Android
does not distinguish between preloaded applications and
third-party applications. Developers have full access to device
features and services while developing applications.

 Free:
 The Android platform does not charge any licensing,
royalty, membership, or certification fees to develop
applications on the platform. Android platform source code
and software development kits are provided free of charge to
application developers. The software development platform is
widely available on many desktop operating systems, allowing
application developers to develop applications using the
operating system of their choice.

Today, Android is one of the major players in mobile phone market. Based on
the recent market analysis, on average, 700 thousand Android devices are
activated daily, and more than 200 million devices are already activated. Android
currently has 48% of the mobile phone market share, and it’s growing rapidly.