30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.2.4, <strong>for</strong>ensic s<strong>of</strong>tware validation and verification methodology, techniques and<br />

frameworks do exist but the tools to support the process are yet to be developed.<br />

5.1.6.2 HPA or DCO<br />

As reviewed in section 2.3.3, hidden areas such as HPA and DCO are one <strong>of</strong> the<br />

challenging subjects <strong>for</strong> disk imaging tools. Problems have been encountered during<br />

the configuration <strong>of</strong> the testing environment. Windows and Linux are the two<br />

execution environments in the tool evaluation. The disk imaging tool AIR is run in<br />

Linux environment. At the beginning <strong>of</strong> the environment configuration, Ubuntu 10.04<br />

distribution was used as the Linux environment. However, it was soon found that<br />

Linux disabled HPA temporarily (although it was restored after a complete power<br />

down) during the booting process and this contradicted the purpose <strong>of</strong> the evaluation.<br />

HPA had to be preserved to test the responses <strong>of</strong> the disk imaging tools. Removing<br />

HPA by default can create problems in some cases. For example, some motherboard<br />

manufacturers may set up a HPA at the end <strong>of</strong> the hard drive to store a backup copy <strong>of</strong><br />

the BIOS to use <strong>for</strong> restoring corrupted BIOS. Removing the HPA would increase the<br />

likelihood <strong>of</strong> the backup BIOS being overwritten over time. The data might not be<br />

overwritten immediately but it will be corrupted eventually if the same operating<br />

system has been used <strong>for</strong> a long period <strong>of</strong> time. If the disk imaging tool AIR was used<br />

to image the evidence hard disk and Ubuntu automatically removed the HPA area in<br />

the drive, the HPA would be exposed and the data contained, which may be a key<br />

piece <strong>of</strong> evidence, would be destroyed.<br />

In a hypothetical case, a server is collected from a crime scene as evidence and<br />

the data storage <strong>of</strong> the server is constructed with Redundant Arrays <strong>of</strong> Inexpensive<br />

<strong>Disk</strong>s (RAID). Some <strong>of</strong> the RAIDs were built based on the something called Firmware<br />

RAID or Fake RAID. This kind <strong>of</strong> RAID does not have the full RAID functionality<br />

and relies on dedicated drivers to operate properly (AtlanticLinux, 2009). It should be<br />

noted that many users might encounter problems when HPA is removed (during the<br />

boot process) and RAID is used simultaneously. An active bug in Ubuntu involves<br />

data loss due to HPA being disabled by default (Whitcr<strong>of</strong>t, 2009). The problem stems<br />

from the RAID metadata stored in HPA. When the HPA is disabled during the boot<br />

process, the data or configuration <strong>of</strong> the RAID is lost, leading to an unbootable RAID.<br />

108

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!