30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.1 SUMMARY OF THE RESEARCH FINDINGS<br />

The findings <strong>of</strong> this research are pertinent to three areas: the testing environment,<br />

evaluation procedures and the per<strong>for</strong>mance <strong>of</strong> each tool. The main issue related to<br />

testing environment is the availability <strong>of</strong> tools used to configure the testing<br />

environment. The evaluation procedure involves the utilisation <strong>of</strong> <strong>for</strong>ensically sound<br />

methods to evaluate these tools. The per<strong>for</strong>mance <strong>of</strong> each tool in each test case is<br />

compared and contrasted.<br />

The research has found that the disk configuration tools available on the<br />

market are not adequate <strong>for</strong> conducting comprehensive evaluation tests on disk<br />

imaging tools. The prototypes <strong>of</strong> the tools used by this research are not the tools<br />

(Gavrila, 2005; Carrier, 2005) used in the CFTT and DFTT program. These tools have<br />

been developed exclusively <strong>for</strong> the evaluation <strong>of</strong> digital <strong>for</strong>ensic tools. It is important<br />

to note that the tools used in this research are not special-built <strong>for</strong> digital <strong>for</strong>ensic tool<br />

testing. What the tools actually do can be uncertain. Specialised tools must be<br />

developed to configure a proper testing environment. The limited availability <strong>of</strong><br />

configuration tools has posed some constraints on the types <strong>of</strong> test cases that can be<br />

conducted <strong>for</strong> evaluating disk imaging tools. A set <strong>of</strong> <strong>for</strong>ensically sound testing<br />

procedures are constructed. The test drive is wiped with <strong>for</strong>ensically proven method<br />

be<strong>for</strong>e being used in a test case. Then the test drive is configured according to the test<br />

specifications <strong>for</strong> that particular test case. Once the drive is configured, data is<br />

acquired using the selected tools. Extra image files verification is executed again to<br />

ensure their integrity. Finally, the test drive is wiped and any effects from the<br />

configuration on the drive are removed to ensure that no data are left to affect the<br />

following test cases. The research also finds that HPA or DCO hidden areas can be<br />

overridden be<strong>for</strong>e the data can be acquired when these areas are connected to some <strong>of</strong><br />

the <strong>for</strong>ensic write blockers. In the test cases that involve hidden areas, no write blocker<br />

is used and only the visible data are hashed and verified after the data has been<br />

acquired.<br />

The research has found that FTK Imager has no longer the problem that existed<br />

previously and was reported by NIST regarding version 2.5.3.14. It is also found that<br />

the actual report <strong>of</strong> the data acquired when scanning corrupted image files is<br />

115

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!