30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

tools. For instance, the test case TC-04 could not be per<strong>for</strong>med because the tools that<br />

could manipulate a faulty data sector were not available.<br />

5.1.1 <strong>Disk</strong> Imaging <strong>Tools</strong> Testing Procedures<br />

The disk imaging tool testing procedures are summarised in Table 5.1. The first step<br />

needed to reset the test drive at the beginning to ensure that no data from previous use<br />

still remained in the hard drive. Normal re<strong>for</strong>matting <strong>of</strong> the storage device does not<br />

guarantee that all the data in the device are completely removed. A program called<br />

Darik's Boot and Nuke were used in order to wipe the test drive securely to a clean<br />

state.<br />

The second step <strong>of</strong> the tool evaluation procedure was the configuration <strong>of</strong> the<br />

test drive. After the configuring the test drive to the appropriate test state, the entire<br />

drive was hashed with the utilisation <strong>of</strong> EnCase and the computed hash values (MD5<br />

and SHA1) were considered as source hashes. Hardware write blocker was used after<br />

the source hashes had been computed. This tactic ensured that no change would be<br />

made on the test drive after they had been configured to the proper testing state. In<br />

some cases, SHA512 could be used instead <strong>of</strong> SHA1 and this should not affect the end<br />

result. The concern in this procedure was that hashing was not computed <strong>for</strong> the entire<br />

drive in the HPA or DCO active test drives. Only the accessible areas were hashed.<br />

The removal <strong>of</strong> the HPA or DCO active areas was inconsistent with the testing<br />

purpose <strong>of</strong> the test. Standardised <strong>for</strong>ensic procedures were followed when the test<br />

drive was acquired or imaged. Segmented image files were generated and stored in the<br />

designated destination. The hardware write blocker was utilised consistently with pre-<br />

specified test cases as the exception (to prevent any tampering <strong>of</strong> the test drive).<br />

Hashes were calculated after every acquisition and the acquisition logs were properly<br />

stored and documented.<br />

Step 4 was specifically designed in this research to verify the accuracy <strong>of</strong> the<br />

acquired images. The hash values <strong>of</strong> the acquired images were verified again by the<br />

use <strong>of</strong> EnCase to assure that the values generated by the disk imaging tools were<br />

accurate.<br />

98

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!