30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the images or the clone copy created are exact duplicates <strong>of</strong> the original drive (Wang,<br />

Lai, Feng, Chen, & Yu, 2005, p.123). Comparing the hash value generated from the<br />

original content and the hash value derived from the image files will certain that the<br />

two copies <strong>of</strong> data are identical. In other words, the integrity <strong>of</strong> the original and<br />

imaged data is ensured. The most popular Hash functions adopted by disk imaging<br />

tools are Message Digest 5 (MD5), Secure Hash Algorithm version 1, 256 and 512<br />

(SHA-1, SHA-256, SHA-512).<br />

Hash function is built on the concept <strong>of</strong> collision-resistant. However, Wang,<br />

Feng, Lai, & Yu (2004) and Wang et al. (2005) have presented some popular hash<br />

functions that could generate same hash value on two different inputs. Malinowski &<br />

Noble (2007) referred the collision problem or hashing attack as “pigeon-hole<br />

problem” and that the problem exists in any algorithm. What are the ramifications <strong>of</strong><br />

this problem to digital <strong>for</strong>ensics? Thompson (2005) presents three arguments that the<br />

research <strong>of</strong> hash function collision problem should have little impact in computer<br />

<strong>for</strong>ensics where the hash function is being used as method <strong>of</strong> evidence authentication.<br />

Firstly, the collision problem presented by Wang et al. (2004) can only be produced in<br />

a very particular piece <strong>of</strong> input content. Secondly, the hash function MD5 is not<br />

vulnerable to a brute <strong>for</strong>ce attack. It is still infeasible to alter the content <strong>of</strong> an input<br />

message and the hash value <strong>of</strong> the new message still to match the pre-calculated hash<br />

value on the original content. Furthermore, the chance <strong>of</strong> the collision attack is<br />

incredibly small and the problem presented by Wang et al. (2004) requires specific<br />

type <strong>of</strong> data and environment to occur.<br />

2.4 THE FUNCTIONALITIES OF SELECTED DISK IMAGING TOOLS<br />

Three disk imaging tools are selected <strong>for</strong> per<strong>for</strong>mance testing and their functionalities<br />

and advantages are discussed below and summarised in Table 2.6.<br />

FTK Imager is a disk imaging tool provided by Access<strong>Data</strong> as a freeware. FTK<br />

Imager is an important component <strong>of</strong> the FTK toolkit, a world-class digital <strong>for</strong>ensic<br />

tool. <strong>Evaluating</strong> FTK Imager will create a comparison baseline to the CFTT program<br />

to determine the accuracy <strong>of</strong> the project testing environment.<br />

37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!