25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.2.2 Tools used in Forensic Computing<br />

During an investigation, tools play an important part in obtaining and analysing<br />

data; anything an analyst uses to assist him during a case can be thought of as<br />

a tool. Tools could be physical or software, however it is beyond the scope of<br />

this research to discuss physical tools in depth. There are two categories of<br />

software used by an analyst: those for researching the behaviour and structure<br />

of an object and those used for identifying evidence; some tools may be used<br />

for both purposes. This section examines software tools that are currently<br />

available and discusses the requirements for creating a new forensic tool.<br />

A virtual machine is a software version of a computer; it enables a virtual<br />

instance of a computer to be customised and used like a standard machine.<br />

Within a virtual machine it is possible to customise the hardware and software.<br />

It is also possible to limit how the virtual machine interacts with its environment,<br />

For example by restricting input devices or network access. Virtual machines<br />

are commonly used by forensic analysts to determine the behaviour and<br />

structure of files and software [Penhallurick, 2005], as they provide a safe test<br />

environment where the analyst can monitor and control the variables being<br />

assessed. One of the main advantages of using a virtual machine is the ability<br />

to easily replicate the machine, which assists an analyst in ensuring the same<br />

basic configuration is used throughout an experiment. A virtual machine can<br />

also be used to obtain a live view of a hard drive image that has been acquired<br />

[Bem, 2007]; this can provide an analyst with information about the layout of the<br />

system that may not be immediately obvious from the image alone.<br />

Live boot CDs can allow an analyst to view and analyse a hard drive without<br />

altering it, specific forensic versions of the Linux operating system, such as<br />

Penguin Sleuth and Helix, have been created [Forensics Wiki, 2013].Such CDs<br />

provide appropriate tools for an analyst in a live boot format to enable them to<br />

Page 17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!