30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.1 DISCUSSION OF THE FINDINGS FROM TOOLS TESTING<br />

This section discusses the findings from the testing <strong>of</strong> three disk imaging tools in the<br />

present research. The section first discusses the settings, configurations and problems<br />

<strong>of</strong> the testing environment and then describes the tool testing procedures. The findings<br />

<strong>for</strong> each tested disk imaging tool are discussed and reviewed in separate sections,<br />

followed by the discussion <strong>of</strong> the research challenges and how the research differs<br />

from other related studies.<br />

As a result <strong>of</strong> the review <strong>of</strong> some previous studies in this domain, a group <strong>of</strong><br />

programs were selected and adopted as configuration tools to create an appropriate<br />

testing environment <strong>for</strong> testing the disk imaging tools. The selected configuration tools<br />

were the best possible tools that were available in the research. However, most <strong>of</strong> the<br />

configuration tools were not meant to be used <strong>for</strong> the purpose <strong>of</strong> configuring<br />

environments <strong>for</strong> digital <strong>for</strong>ensic s<strong>of</strong>tware testing. Programs such as MHDD and<br />

HDAT2 have been designed to test or to diagnose storage devices. These tools were<br />

utilised as hard drive manipulation tools to configure a proper testing environment.<br />

Both MHDD and Hdat2 were used to configure Hidden areas HPA. However, when<br />

Hdat2 was utilised to create HPA, the HPA could not be recognised by MHDD and<br />

vice versa. The reason was unknown and the developer has been in<strong>for</strong>med <strong>of</strong> the<br />

problem. Un<strong>for</strong>tunately, the developer could not determine the exact cause <strong>for</strong> this<br />

problem. Hex editor UltraEdit was used as a verification tool to ensure that the disk<br />

imaging tools had replaced the inaccessible data with a specified value. EnCase was<br />

also used as a verification tool to verify the hash values <strong>of</strong> the image files acquired by<br />

the disk imaging tools that were subjected to test.<br />

Both CFTT programs from NIST and research from Byers & Shahmehri<br />

(2009) have developed their own configuration tools to meet the requirements <strong>of</strong> their<br />

tool testing. However, the tools developed by other researchers could not fully meet<br />

the requirements <strong>of</strong> this research. Resources were also limited <strong>for</strong> the development <strong>of</strong><br />

customised configuration and verification tools that could fully fulfil the research<br />

requirements. The type and number <strong>of</strong> tests that could be ran on the tested tools were<br />

constrained by the availability and functionality <strong>of</strong> the configuration and verification<br />

97

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!