30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Rebuilding the RAID to analyse the drives may become unfeasible if an investigator<br />

has used a Live CD with similar HPA issue to boot the drive. Because <strong>of</strong> all this,<br />

another Linux distribution called BackTrack was used in this research to avoid the<br />

problem <strong>of</strong> HPA being disabled by default. The Linux kernel used in BackTrack has<br />

been patched to fix the problem.<br />

5.1.6.3 Issue Of Hardware Write Blocker<br />

Another problem that involved HPA hidden areas was with Tableau T35es Write<br />

Blocker, the only write blocker that was available in the research laboratory. In test<br />

cases that had HPA or DCO hidden areas, no write blocker was used. The standardised<br />

<strong>for</strong>ensic acquisition procedure requires a write blocker to be used at all time to prevent<br />

any intentional or unintentional tampering with the evidence drive that would be<br />

subsequently used in court. The Tableau T35es write blocker is able to detect and<br />

override both HPA and DCO hidden areas but this defies the purpose <strong>of</strong> the testing<br />

which is to analyse the behaviour <strong>of</strong> disk imaging tools when HPA and/or DCO are<br />

present. The research made some ef<strong>for</strong>ts to prevent any tampering with the test drive.<br />

As indicated in Step 3 and 5 shown in Table 5.1, the test drive would be hashed be<strong>for</strong>e<br />

and after the <strong>for</strong>ensic acquisition. The hash values computed be<strong>for</strong>e and after the<br />

acquisition had to be matched to verify if data tampering on the test drive had<br />

occurred.<br />

5.1.6.4 Linux <strong>Forensic</strong>s Live CDs<br />

Helix 3 Pro is a Linux <strong>Forensic</strong> toolkit in the Live CD. AIR is also a constituent part<br />

<strong>of</strong> another <strong>for</strong>ensics Live CD toolkit called CAINE. Moll, Prokop, & Morgenstern<br />

(2009) argued that Linux <strong>for</strong>ensic toolkits are required to satisfy various requirements.<br />

Firstly, the File system <strong>of</strong> the evidence device should not be automatically mounted at<br />

boot up. The swap space (if any) in the evidence drive is not activated. S<strong>of</strong>tware RAID<br />

arrays on evidence drives is not automatically activated at the operating system boot<br />

up process (Maxim, 2009). Maxim (2009) also suggests that all the block devices are<br />

set to read-only mode to avoid any write attempts to the evidence drive. Maxim (2009)<br />

conducted the testing to assess whether the Linux <strong>Forensic</strong> Live CDs mount file<br />

system during the start-up process. The testing results indicate that BackTrack 4 Pre-<br />

109

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!