













Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
An in-depth exploration of file systems, focusing on windows and dos, and their role in computer forensics. It covers topics such as the boot sequence, disk drives, microsoft file structures, and ntfs. The document also discusses tools for identifying file headers and examining ntfs disks, as well as the impact of whole disk encryption on computer forensics.
Typology: Study notes
1 / 21
This page cannot be seen from the preview
Don't miss anything!
To investigate computer evidence effectively, you must understand how the most commonlyused OSs work and how they store files. In addition to this section on file systems, you should review books on Computer Technology Industry Association. A file system gives an OS a road map to data on a disk. The type of file system an OS uses determines how data is stored on the disk. A file system is usually directly related to an OS, although some vendors grandfather in previous OSs so that newer ones can read them. For example, most current Linux releases can access disks configured in the older Linux Ext2fs and Ext3fs file systems. No matter which platform you use, you need to know how to access and modify system settings when necessary. When you need to access a suspect’s computer to acquire or inspect data related to your investigation, you should be familiar with the computer’s plat- form. Understanding the Boot Sequence: To ensure that you don’t contaminate or alter data on a suspect’s Windows or DOS PC, youmust know how to access and modify a PC’s Complementary Metal Oxide Semi- conductor (CMOS) and Basic Input/ Output System (BIOS) settings. A computer stores system configuration and date and time information in the CMOS when power to the system is off. The system BIOS contains programs that perform input and output at the hardware level. When a subject’s computer starts, you must make sure it boots to a forensic floppy disk or CD, because booting to the hard disk overwrites and changes evidentiary data. To do this, you access the CMOS setup by monitoring the subject’s computer during the initial bootstrap process to identify the correct key or keys to use. The bootstrap process is contained in ROM andtells the computer how to proceed. As the computer starts, the screen usually displays the key or keys, such as the Delete key; you press to open the CMOS setup screen. You can also try unhooking the keyboard to force the system to tell you what keys to use. The key you press to access.
but you can refer to the vendor’s documentation or Web site for instructions on changing the boot sequence. Fig: A typical CMOS setup screen Understanding Disk Drives: You should be familiar with disk drives and how data is organized on a disk so that you can find data effectively. Disk drives are made up of one or more platters coated with magnetic material, and data is stored on platters in a particular way. For additional information on disk drive configurations, see www.storagereview.com/guide2000/ref/hdd/index.html. Follow- ing is a list of disk drive components: Geometry —Geometry refers to a disk’s structure of platters, tracks, and sectors. Head —the head is the device that reads and writes data to a drive. There’s one head per platter. Tracks —Tracks are concentric circles on a disk platter where data is located. Cylinders —a cylinder is a column of tracks on two or more disk platters. Typically, each platter has two surfaces: top and bottom. Sectors —a sector is a section on a track, usually made up of 512 bytes. The manufacturer engineers a disk to have a certain number of sectors per track, and a typical disk drive stores 512 bytes per sector. To determine the total number of addressable bytes on a disk, multiply the number of cylinders by the number of heads (actually tracks) and by the number of sectors (groups of 512 or more bytes).
size. For example, a double-sided floppy disk has one sector per cluster; a hard disk has four or more sectors per cluster. Clusters are numbered sequentially starting at 2 because the first sector of all disks contains a system area, the boot record, and a file structure database. The OS assigns these cluster numbers, which are referred to as logical addresses. These addresses point to relative cluster positions; for example, cluster address 100 is 98 clusters from cluster address Sector numbers, however, are referred to as physical addresses because they reside at the hardware or firmware level and go from address 0 (the first sector on the disk) to the last sector on the disk. Clusters and their addresses are specific to a logical disk drive, which is a disk partition. Disk Partitions Many hard disks are partitioned, or divided, into two or more sections. A partition is a logi- cal drive. For example, an 8 GB hard disk might contain four partitions or logical drives. FAT does not recognize disks larger than 2 MB, so these disks have to be partitioned into smaller sections for FAT to recognize the additional space. Someone who wants to hide data on a hard disk can create hidden partitions or voids—large unused gaps between partitions on a disk drive. For example, partitions containing unused space (voids) can be created between the primary partition and the first logical partition. This unused space between partitions is called the partition gap. If data is hidden in a partition gap, a disk editor utility could also be used to alter information in the disk’s partition table. Doing so removes all references to the hidden partition, concealing it from the computer’s OS. Another technique is to hide incriminating digital evidence at the end of a disk by declaring a smaller number of bytes than the actual drive size. With disk-editing tools, however, you can access these hid- den or empty areas of the disk. One way to examine a partition’s physical level is to use a disk editor, such as Norton Disk- Edit, WinHex, or Hex Workshop. These tools enable you to view file headers and other critical parts of a file. Both tasks involve analyzing the key hexadecimal codes the OS uses to identify and maintain the file system. Table 5-1 lists the hexadecimal codes in a partition table and identifies some common file system structures. Hexadecimal code File system 01 DOS 12 - bit FAT 04 DOS 16 - bit FAT for partitions smaller than 32 MB 05 Extended partition
06 DOS 16 - bit FAT for partitions larger than 32 MB 07 NTFS 08 AIX bootable partition 09 AIX data partition 0B DOS 32 - bit FAT 0C DOS 32 - bit FAT for interrupt 13 support 17 Hidden NTFS partition (XP and earlier) 1B Hidden FAT32 partition 1E Hidden VFAT partition 3C Partition Magic recovery partition 66 – 69 Novell partitions 81 Linux 82 Linux swap partition (can also be associated with Solaris partitions) 83 Linux native file systems (Ext2, Ext3, Reiser, Xiafs) 86 FAT16 volume/stripe set (Windows NT) 87 High Performance File System (HPFS) fault-tolerant mirrored partition or NTFS volume/stripe set A5 FreeBSD and BSD/ A6 OpenBSD A9 NetBSD C7 Typical of a corrupted NTFS volume/stripe set EB BeOS Table 5 - 1 Hexadecimal codes in the partition table
I i I t t i t f Drive size Sectors per cluster Cluster size 0 – 512 MB 1 512 bytes 512 MB– 1 GB 2 1024 bytes 1 – 2 GB 4 2048 bytes 2 – 4 GB 8 4096 bytes n NTFS, everything written to the disk is considered a file. On an NTFS disk, the first data set s the Partition Boot Sector, which starts at sector [0] of the disk and can expand to 16 sectors. mmediately after the Partition Boot Sector is the Master File Table (MFT). The MFT, similar o FAT in earlier Microsoft OSs, is the first file on the disk. An MFT file is cre- ated at the same ime a disk partition is formatted as an NTFS volume and usually consumes about 12.5% of the disk when it’s created. As data is added, the MFT can expand to take up 50 % of the disk. An mportant advantage of NTFS over FAT is that it results in much less file slack space. Compare he cluster sizes in Table 5-3 to Table 5-2, which showed FAT cluster sizes. Clusters are smaller or smaller disk drives. This feature saves more space on all disks using NTFS. Drive size Sectors per cluster FAT 0 – 32 MB 1 512 bytes 33 – 64 MB 2 1 KB 65 – 128 MB 4 2 KB 129 – 255 MB 8 4 KB 256 – 511 MB 16 8 KB 512 – 1023 MB 32 16 KB 1024 – 2047 MB 64 32 KB 2048 – 4095 MB 128 68 KB Table 5 - 2 Sectors and bytes per cluster
4 – 8 GB 16 8192 bytes 8 – 16 GB 32 16,384 bytes 16 – 32 GB 64 32,768 bytes More than 32 GB 128 65,536 bytes Table 5- 3 Cluster sizes in an NTFS disk NTFS System Files Because everything on an NTFS disk is a file, the first file, the MFT, contains information about all files on the disk, including the system files the OS uses. In the MFT, the first 15 records are reserved for system files. Records in the MFT are referred to as metadata. Table 6 - 4 lists the first 16 metadata records you find in the MFT. Filename System file Record position Description $Mft MFT 0 Base file record for each folder on the NTFS volume; other record positions in the MFT are allocated if more space is needed. $MftMirr MFT 2 1 The first four records of the MFT are saved in this position. If a single sector fails in the first MFT, the records can be restored, allowing recovery of the MFT. $LogFile Log file 2 Previous transactions are stored here to allow recovery after a system failure in the NTFS volume. $Volume Volume 3 Information specific to the volume, such as label and version, is stored here. $AttrDef Attribute definitions 4 A table listing attribute names, numbers, and definitions. $ (^) Root filename index 5 This is the root folder on the NTFS volume. $Bitmap Boot sector 6 A map of the NTFS volume showing which
MFT Structures for File Data When viewing an MFT record with a hexadecimal editor, such as WinHex, the data is displayed in little endian format, meaning it’s read from right to left. For example, the hexadecimal value 400 is displayed as 00 04 00 00, and the number 0x40000 is displayed as 00 00 04 00. The first section of an MFT record is the header that defines the size and starting position of the first attribute. Following the header are the attributes that are specific for the file type, such as an application file or a data file. MFT records for directories and system files have additional attributes that don’t appear in a file MFT record. The following sections explain how data files are configured in the MFT. MFT Header Fields For the header of all MFT records, the record fields of interest are as follows:
NTFS Encrypting File System (EFS) When Microsoft introduced Windows 2000, it added built-in encryption to NTFS called Encrypting File System (EFS). EFS implements a public key and private key method of encrypting files, folders, or disk volumes (partitions). Only the owner or user who encrypted the data can access encrypted files. The owner holds the private key, and the public key is held by a certificate authority, such as a global registry, network server, or company such as VeriSign. When EFS is used in Windows Vista Business Edition or higher, XP Professional, or 2000, a recovery certificate is generated and sent to the local Windows administrator account. The purpose of the recovery certificate is to provide a mechanism for recovering encrypted files under EFS if there’s a problem with the user’s original private key. The recovery key is stored in one of two places. When the user of a network workstation initiates EFS, the recovery key is sent to the local domain server’s administrator account. If the workstation is standalone, the recovery key is sent to the workstation’s administrator account. EFS Recovery Key Agent The Recovery Key Agent implements the recovery certificate, which is in the Windows administrator account. Windows administrators can recover a key in two ways: through Windows or from an MS-DOS command prompt. These three commands are available from the MS-DOS command prompt:
When Microsoft created Windows 95, it consolidated initialization (.ini) files into the Reg- istry, a database that stores hardware and software configuration information, network con- nections, user preferences (including usernames and passwords), and setup information. The Registry has been updated and is still used in Windows Vista. For investigative purposes, the Registry can contain valuable evidence. To view the Registry, you can use the Regedit (Registry Editor) program for Windows 9x and Regedt32 for Windows 2000, XP, and Vista. For more information on how to use Regedit and Regedt32, see the Microsoft Windows Resource Kit documentation for the OS. Exploring the Organization of the Windows Registry The Windows Registry is organized in a specific way that has changed slightly with each new version of Windows. However, the major Registry sections have been consistent, with some minor changes, since Windows 2000; they’re slightly different in Windows 9x/Me. Before proceeding, review the following list of Registry terminology:
Startup Files for Windows Vista When Microsoft developed Vista, it updated the boot process to use the new Extensible Firmware Interface (EFI) as well as the older BIOS sys- tem. The EFI boot firmware is designed to provide better protection against malware than BIOS does. EFI Vista’s boot processes have also changed since Windows XP. The Ntldr program in Windows XP used to load the OS has been replaced with these three boot utilities:
Like Windows XP, system files in Windows 9x/Me containing valuable information can be altered easily during startup, which affects their evidentiary value and integrity. Windows 9x OSs have similar boot processes. Windows Me is similar, too, with one important exception: You can’t boot to a true MS-DOS mode. When you’re conducting a computing investigation, being able to boot to MS-DOS is preferred, especially if you’re running a later version of Windows 95 OEM SR2 (version 4.00.1111) or a newer one in which the MS-DOS boot mode can read and write to a FAT32 disk. Windows 9x OSs has two modes: DOS protected-mode interface (DPMI) and protected- mode GUI (serves the same purpose as Config.sys in MS-DOS). Many older computer forensics tools use DPMI mode and can’t be run from a Windows command prompt window because they use certain disk accesses that conflict with the GUI. The system files Windows 9x uses have their origin in MS-DOS. The Io.sys file communicates between a computer’s BIOS, the hardware, and the OS kernel. During the boot phase of a Windows 9x system, Io.sys monitors the keyboard for an F8 keystroke. If F8 is pressed during startup, Io.sys loads the Windows Startup menu, which has options such as booting to Windows normally and running in Safe mode to perform maintenance.
MS-DOS uses three files when starting, with the same names as in Windows 9x/Me: Io.sys, Msdos.sys, and Command.com. Two other files are then used to configure MS-DOS at startup: Config.sys and Autoexec.bat. Although MS-DOS and Windows 9x use some of the same startup filenames, there are some important differences between the files in these OSs. Io.sys is the first file loaded after the ROM bootstrap loader finds the disk drive. Io.sys then resides in RAM and provides the basic input and output service for all MS-DOS functions. Msdos.sys is the second program to load into RAM immediately after Io.sys. As mentioned, this file is the actual OS kernel, not a text file as in Windows 9x and Me. After Msdos.sys finishes setting up DOS services, it looks for the Config.sys file to configure device drivers and other
New versions of OSs and applications are released frequently, but older versions are still widely used. As an investigator, you’ll be faced with the challenge of having enough resources to support the variety of software you’re likely to encounter. More companies are turning to virtualization to reduce the cost of hardware purchases, so the number of investigations involving virtual machines will increase as this practice continues. As an investigator, you might need a virtual server to view legacy systems, and you might need to forensically examine suspects’ virtual machines. Virtual machines enable you run another OS on an existing physical computer (known as the host computer) by emulating a computer’s hardware environment VMware Server virtual machine running Windows XP Professional on the desktop of a host computer. Typically, a virtual machine consists of several files. The two main files are the configuration file containing hard- ware settings, such as RAM, network configurations, port settings, and so on, and the virtual hard disk file, which contains the boot loader program, OS files, and users’ data files. A virtual machine acts like any other file but with a twist: It performs all the tasks the OS running on the physical computer can, up to a certain point. The virtual machine recognizes hardware components of the host computer it’s loaded on, such as the mouse, keyboard, and CD/DVD drive. However, the guest OS (the one running on a virtual machine) is limited by the host computer’s OS, which might block certain operations. For example, most virtual machines recognize a CD/DVD drive because the host computer defaults to auto-detect. Some virtual machines don’t recognize a USB drive; this capability varies with the virtualization software. Although networking capabilities are beyond the scope of this book, be aware that virtual machines can use bridged, Network Address Translation (NAT), or other network configurations to determine how they access the Internet and communicate with systems on the local network. Creating a Virtual Machine Some common applications for creating virtual machines are VMware Server and VMware Workstation, Sun Microsystems Virtual Box, and Microsoft Virtual PC, although others are available. Virtual Box is an open-source program that can be downloaded at www. virtualbox.org. Consult with your instructor before doing the following activity. You must download and install Virtual PC first, and you need an ISO image of an OS because no OSs are provided with Virtual PC. Follow these steps to create a virtual machine: