30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table 5.1<br />

Tool Evaluation Procedure<br />

Evaluation Procedure Actions Taken<br />

Step 1. Drive Reset Wipe out the test drive with DoD method<br />

Step 2. Configure Test<br />

Drive<br />

Step 3. Per<strong>for</strong>m <strong>Data</strong><br />

Acquisition<br />

Step 4. Per<strong>for</strong>m Result<br />

Verification<br />

Step 5. Drive Cleanup<br />

Drive (UNC error, HPA and/or DCO) and Partition setup<br />

Write-blocked device will be hashed be<strong>for</strong>e the acquisition.<br />

Windows or Linux data acquisition <strong>of</strong> the test drive.<br />

Verify the correctness <strong>of</strong> the acquired images. Image files are<br />

verified again by using EnCase.<br />

Remove any effect on the test drive and prepare the test drive<br />

<strong>for</strong> the following tests<br />

When testing some special test cases, some other s<strong>of</strong>tware were utilised as verification<br />

tools to confirm the results. In the final steps, any effects that were rendered upon the<br />

test drive would be reversed and the data would be securely wiped out to prepare <strong>for</strong><br />

the execution <strong>of</strong> other test cases.<br />

5.1.2 FTK Imager<br />

FTK Imager achieved the expected results in 11 out <strong>of</strong> 17 test cases in this research.<br />

According to the NIJ (2008a) report, FTK Imager (version 2.5.3.14) was not able to<br />

acquire a completed logical copy <strong>of</strong> the NTFS partition and the last eight sectors <strong>of</strong> the<br />

test drive were omitted from the acquisition. However, a similar problem was not<br />

found in the newer version (2.9.0.1385) <strong>of</strong> FTK Imager that this research evaluated.<br />

In the test case TC-03 where hidden sectors existed, FTK Imager could not<br />

detect and acquire the designed hidden sectors. The findings <strong>of</strong> test case TC-03 do not<br />

contradict the result presented in the NIJ (2008a) report. The matter <strong>of</strong> HPA and DCO<br />

acquisition is not clearly stated in the FTK Imager user manual. Email communication<br />

was established with the Access<strong>Data</strong> support team regarding the matter <strong>of</strong> HPA and/or<br />

DCO acquisition. They responded by stating that FTK Imager is currently not able to<br />

support HPA while DCO acquisition and the function will be added in the future<br />

release.<br />

In the test case TC-10, FTK Imager was able to successfully identify that disk images<br />

were corrupted but was not able to report the location <strong>of</strong> corrupted data to the user. In<br />

99

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!