30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

circumstances is unrealistic. Also, even the most popular tools can have flaws that<br />

cannot be discovered easily. Ayers (2009a) discovered flaws in EnCase when the dates<br />

and time values were handled and the problems were confirmed by the developer<br />

Guidance S<strong>of</strong>tware. Ayers (2009) also commented that the ability to gain insight into<br />

how the commercial tools are operating is very limited. Sometimes, open-source<br />

s<strong>of</strong>tware may be required when the commercial tools fail to fulfil the tasks in certain<br />

parts <strong>of</strong> the investigation. Despite the fact that some types <strong>of</strong> the open-source s<strong>of</strong>tware<br />

are well built and well documented, some <strong>of</strong> the tools are out-<strong>of</strong>-date and poorly<br />

documented. There is no doubt that <strong>for</strong>ensic tools with varied quality and<br />

documentation must be validated and verified thoroughly. Comprehensive <strong>for</strong>ensic<br />

tool validation is an important research topic suggested by many researchers (Peterson,<br />

Shenoi, & Beebe, 2009; Garfinkel, 2010; Ayers, 2009).<br />

1.2 RESEARCH FINDINGS<br />

The research has summarised some findings pertinent to different aspects <strong>of</strong> <strong>for</strong>ensic<br />

tool per<strong>for</strong>mance testing. In terms <strong>of</strong> the testing environment, Windows and Linux<br />

plat<strong>for</strong>ms were chosen as the target validation environment. In order to evaluate the<br />

disk imaging tools extensively, the research is required to develop customised disk<br />

configuration tools to fulfil the requirements if the resources are allowed. The testers<br />

may not be able to comprehend fully knowledge <strong>of</strong> how the tools operate when using<br />

configuration tools that are developed by third-party developers. Details <strong>of</strong> the test<br />

environment setup and testing procedure are presented in Sections 4.2.1 and 5.1.1.<br />

A disk imaging tools testing procedure has been adopted from NIST and<br />

redefined to suit the research. Be<strong>for</strong>e the start <strong>of</strong> every new test case, the test drive<br />

must be reset or wiped with some proven mechanisms. The test drive can be<br />

configured using various methods according to the test specifications. Hardware or<br />

tested s<strong>of</strong>tware write blocker must be used consistently to prevent any alterations to<br />

the test drive. Hardware write blocker was not used in some pre-specified test cases.<br />

The reason why the hardware write blocker was not used is discussed in Section<br />

5.1.7.3. <strong>Disk</strong> imaging tools must be operated according to the user manual to avoid<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!