29.10.2014 Views

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<str<strong>on</strong>g>Five</str<strong>on</strong>g> <strong>on</strong> <strong>Forensics</strong><br />

© 2002-2008 <strong>Craig</strong> <strong>Ball</strong> All Rights Reserved<br />

the deleted data—stays <strong>on</strong> the drive until it is magnetically overwritten by new data (and can<br />

even survive overwriting to some extent—but we’re getting ahead of ourselves).<br />

If we return to our library card catalogue analogy, pulling an index card out of the card<br />

catalogue doesn’t remove the book from the shelves, though c<strong>on</strong>sulting the card catalog,<br />

al<strong>on</strong>e, you’d think it’s g<strong>on</strong>e. Deleting a computer file <strong>on</strong>ly removes the card. The file (the<br />

“book” in our analogy) hangs around until the librarian needs the shelf space for new titles.<br />

Let’s assume there is a text file called secrets.txt <strong>on</strong> your computer and it c<strong>on</strong>tains the<br />

account numbers and access passwords to your Cayman Islands numbered account. Let’s<br />

assume that the bloom has g<strong>on</strong>e off the rose for you, marriage-wise, and you decide that<br />

maybe it would be best to get this file out of the house. So, you copy it to a thumb drive and<br />

then delete the original. Now, you’re aware that though the file no l<strong>on</strong>ger appears in its<br />

folder, it’s still accessible in the Recycle Bin. C<strong>on</strong>sequently, you open the Recycle Bin and<br />

execute the “Empty Recycle Bin” command, thinking you can now rest easy. In fact, the file<br />

is not g<strong>on</strong>e. All that has occurred is that Windows has flipped a bit in the Master File Table to<br />

signal that the space <strong>on</strong>ce occupied by the file is now available for reuse. The file, and all of<br />

the passwords and account numbers it holds, is still <strong>on</strong> the drive and, until the physical space<br />

the data occupies is overwritten by new data, it’s not that hard to read the c<strong>on</strong>tents of the old<br />

file or undelete it. Even if the file’s overwritten, there’s a chance that part of its c<strong>on</strong>tents can<br />

be read if the new file is smaller in size than the file it replaces. This is true for your text files,<br />

financial files, images, Internet pages you’ve visited and your e-mail.<br />

If a computer has been in use for a while, odds are that it c<strong>on</strong>tains a substantial volume of<br />

unallocated file space and slack<br />

space c<strong>on</strong>taining “deleted” data. To The BIG Lie<br />

illustrate, the old laptop computer <strong>on</strong> Since the dawn of the pers<strong>on</strong>al computer, if you<br />

which this paper was originally asked Microsoft, IBM, Compaq, Dell or others how<br />

written had 1.8 gigabytes of free to guard your privacy when selling or giving away<br />

space available <strong>on</strong> its 30-gigabyte a PC, chances are you’d be told to “delete the files<br />

hard drive, and 98.56% of that and format your hard drive.” If you followed this<br />

space c<strong>on</strong>tained deleted files: advice, DOS or Windows would solemnly warn<br />

474,457 clusters of “deleted” data. you that formatting “will erase ALL data” <strong>on</strong> the<br />

How l<strong>on</strong>g that data remains disk.” Trouble is, formatting doesn’t erase all data.<br />

retrievable depends <strong>on</strong> may factors, Not even close. This is the big lie. Formatting<br />

but <strong>on</strong>e thing is certain: unless the erases less than 1/10 th of <strong>on</strong>e percent of the<br />

computer user has g<strong>on</strong>e to data <strong>on</strong> the disk, such that any<strong>on</strong>e with<br />

extraordinary lengths to eradicate rudimentary computer forensic skills can recover<br />

every trace of the deleted data, bits your private, privileged and c<strong>on</strong>fidential data. If it’s<br />

and pieces--or even giant chunks of not overwritten or physically destroyed, it’s not<br />

it--can be found if you know where g<strong>on</strong>e. For a fine article <strong>on</strong> this issue, see the<br />

and how to look for it.<br />

Jan/Feb 2003 issue of IEEE Security and Privacy<br />

Magazine or visit:<br />

What’s this Hex Stuff, Voodoo? http://www.computer.org/security/garfinkel.pdf<br />

Binary numbers get very c<strong>on</strong>fusing<br />

<strong>Page</strong> 25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!