Foreword |
|
xvii | |
|
Introduction |
|
xix | |
Why I Wrote This Book |
|
xix | |
How This Book Is Different |
|
xx | |
Why Use the Command Line? |
|
xx | |
Target Audience and Prerequisites |
|
xxii | |
Who Should Read This Book? |
|
xxii | |
Prerequisite Knowledge |
|
xxii | |
Preinstalled Platform and Software |
|
xxii | |
How the Book Is Organized |
|
xxii | |
The Scope of This Book |
|
xxv | |
Conventions and Format |
|
xxv | |
|
0 Digital Forensics Overview |
|
|
1 | (10) |
|
Digital Forensics History |
|
|
1 | (3) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
Forensic Acquisition Trends and Challenges |
|
|
4 | (1) |
|
Shift in Size, Location, and Complexity of Evidence |
|
|
4 | (1) |
|
Multijurisdictional Aspects |
|
|
5 | (1) |
|
Industry, Academia, and Law Enforcement Collaboration |
|
|
5 | (1) |
|
Principles of Postmortem Computer Forensics |
|
|
5 | (6) |
|
Digital Forensic Standards |
|
|
6 | (1) |
|
|
7 | (1) |
|
Industry Regulations and Best Practice |
|
|
8 | (1) |
|
Principles Used in This Book |
|
|
9 | (2) |
|
|
11 | (36) |
|
|
12 | (3) |
|
|
12 | (1) |
|
|
13 | (2) |
|
|
15 | (1) |
|
|
15 | (4) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (2) |
|
Legacy Non-Volatile Memory |
|
|
19 | (1) |
|
|
19 | (3) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
Interfaces and Physical Connectors |
|
|
22 | (12) |
|
|
22 | (3) |
|
Serial Attached SCSI and Fibre Channel |
|
|
25 | (2) |
|
Non-Volatile Memory Express |
|
|
27 | (2) |
|
|
29 | (1) |
|
|
30 | (2) |
|
|
32 | (2) |
|
Commands, Protocols, and Bridges |
|
|
34 | (5) |
|
|
34 | (2) |
|
|
36 | (1) |
|
|
37 | (1) |
|
Bridging, Tunneling, and Pass-Through |
|
|
38 | (1) |
|
|
39 | (7) |
|
|
39 | (1) |
|
Drive Service and Maintenance Areas |
|
|
40 | (1) |
|
USB Attached SCSI Protocol |
|
|
40 | (1) |
|
|
41 | (3) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
2 Linux As A Forensic Acquisition Platform |
|
|
47 | (12) |
|
Linux and OSS in a Forensic Context |
|
|
48 | (2) |
|
Advantages of Linux and OSS in Forensics Labs |
|
|
48 | (1) |
|
Disadvantages of Linux and OSS in Forensics Labs |
|
|
49 | (1) |
|
Linux Kernel and Storage Devices |
|
|
50 | (2) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
Linux Kernel and Filesystems |
|
|
52 | (3) |
|
Kernel Filesystem Support |
|
|
52 | (1) |
|
Mounting Filesystems in Linux |
|
|
53 | (1) |
|
Accessing Filesystems with Forensic Tools |
|
|
54 | (1) |
|
Linux Distributions and Shells |
|
|
55 | (2) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (2) |
|
|
59 | (10) |
|
|
60 | (2) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
SquashFS as a Forensic Evidence Container |
|
|
63 | (4) |
|
|
63 | (1) |
|
SquashFS Forensic Evidence Containers |
|
|
64 | (3) |
|
|
67 | (2) |
|
4 Planning And Preparation |
|
|
69 | (32) |
|
|
70 | (6) |
|
|
70 | (3) |
|
|
73 | (2) |
|
|
75 | (1) |
|
|
76 | (1) |
|
Organize Collected Evidence and Command Output |
|
|
76 | (7) |
|
Naming Conventions for Files and Directories |
|
|
76 | (3) |
|
Scalable Examination Directory Structure |
|
|
79 | (2) |
|
Save Command Output with Redirection |
|
|
81 | (2) |
|
Assess Acquisition Infrastructure Logistics |
|
|
83 | (10) |
|
Image Sizes and Disk Space Requirements |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
85 | (1) |
|
Reported File and Image Sizes |
|
|
86 | (1) |
|
Moving and Copying Forensic Images |
|
|
87 | (1) |
|
Estimate Task Completion Times |
|
|
87 | (1) |
|
Performance and Bottlenecks |
|
|
88 | (3) |
|
Heat and Environmental Factors |
|
|
91 | (2) |
|
Establish Forensic Write-Blocking Protection |
|
|
93 | (7) |
|
|
94 | (3) |
|
|
97 | (2) |
|
|
99 | (1) |
|
Media with Physical Read-Only Modes |
|
|
100 | (1) |
|
|
100 | (1) |
|
5 Attaching Subject Media To An Acquisition Host |
|
|
101 | (40) |
|
Examine Subject PC Hardware |
|
|
101 | (1) |
|
Physical PC Examination and Disk Removal |
|
|
102 | (1) |
|
Subject PC Hardware Review |
|
|
102 | (1) |
|
Attach Subject Disk to an Acquisition Host |
|
|
102 | (5) |
|
View Acquisition Host Hardware |
|
|
103 | (2) |
|
Identify the Subject Drive |
|
|
105 | (2) |
|
Query the Subject Disk for Information |
|
|
107 | (11) |
|
Document Device Identification Details |
|
|
107 | (1) |
|
Query Disk Capabilities and Features with hdparm |
|
|
108 | (4) |
|
Extract SMART Data with smartctl |
|
|
112 | (6) |
|
Enable Access to Hidden Sectors |
|
|
118 | (7) |
|
|
118 | (3) |
|
|
121 | (1) |
|
Drive Service Area Access |
|
|
122 | (3) |
|
ATA Password Security and Self-Encrypting Drives |
|
|
125 | (7) |
|
Identify and Unlock ATA Password-Protected Disks |
|
|
126 | (2) |
|
Identify and Unlock Opal Self-Encrypting Drives |
|
|
128 | (3) |
|
Encrypted Flash Thumb Drives |
|
|
131 | (1) |
|
|
132 | (4) |
|
|
132 | (1) |
|
|
133 | (3) |
|
|
136 | (1) |
|
|
136 | (4) |
|
|
137 | (1) |
|
|
138 | (2) |
|
Other Devices with Block or Character Access |
|
|
140 | (1) |
|
|
140 | (1) |
|
6 Forensic Image Acquisition |
|
|
141 | (46) |
|
Acquire an Image with dd Tools |
|
|
142 | (3) |
|
Standard Unix dd and GNU dd |
|
|
142 | (2) |
|
The dcfldd and dc3dd Tools |
|
|
144 | (1) |
|
Acquire an Image with Forensic Formats |
|
|
145 | (5) |
|
|
145 | (2) |
|
|
147 | (2) |
|
SquashFS Forensic Evidence Container |
|
|
149 | (1) |
|
Acquire an Image to Multiple Destinations |
|
|
150 | (1) |
|
Preserve Digital Evidence with Cryptography |
|
|
150 | (9) |
|
Basic Cryptographic Hashing |
|
|
151 | (1) |
|
|
152 | (2) |
|
Sign an Image with PGP or S/MIME |
|
|
154 | (3) |
|
|
157 | (2) |
|
Manage Drive Failure and Errors |
|
|
159 | (7) |
|
Forensic Tool Error Handling |
|
|
160 | (2) |
|
|
162 | (1) |
|
|
163 | (1) |
|
Other Options for Failed Drives |
|
|
164 | (1) |
|
|
165 | (1) |
|
Image Acquisition over a Network |
|
|
166 | (6) |
|
Remote Forensic Imaging with rdd |
|
|
166 | (2) |
|
Secure Remote Imaging with ssh |
|
|
168 | (1) |
|
Remote Acquisition to a SquashFS Evidence Container |
|
|
169 | (2) |
|
Acquire a Remote Disk to EnCase or FTK Format |
|
|
171 | (1) |
|
Live Imaging with Copy-On-Write Snapshots |
|
|
172 | (1) |
|
|
172 | (6) |
|
|
173 | (1) |
|
|
174 | (2) |
|
|
176 | (2) |
|
RAID and Multidisk Systems |
|
|
178 | (7) |
|
Proprietary RAID Acquisition |
|
|
178 | (1) |
|
JBOD and RAID-0 Striped Disks |
|
|
179 | (2) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (2) |
|
|
185 | (2) |
|
7 Forensic Image Management |
|
|
187 | (42) |
|
|
187 | (4) |
|
Standard Linux Compression Tools |
|
|
188 | (1) |
|
EnCase EWF Compressed Format |
|
|
189 | (1) |
|
FTK SMART Compressed Format |
|
|
190 | (1) |
|
AFFlib Built-in Compression |
|
|
190 | (1) |
|
SquashFS Compressed Evidence Containers |
|
|
191 | (1) |
|
|
191 | (6) |
|
|
192 | (1) |
|
Split Images During Acquisition |
|
|
192 | (2) |
|
Access a Set of Split Image Files |
|
|
194 | (1) |
|
|
195 | (2) |
|
Verify the Integrity of a Forensic Image |
|
|
197 | (5) |
|
Verify the Hash Taken During Acquisition |
|
|
197 | (1) |
|
Recalculate the Hash of a Forensic Image |
|
|
198 | (1) |
|
Cryptographic Hashes of Split Raw Images |
|
|
199 | (1) |
|
Identify Mismatched Hash Windows |
|
|
199 | (1) |
|
Verify Signature and Timestamp |
|
|
200 | (2) |
|
Convert Between Image Formats |
|
|
202 | (9) |
|
|
202 | (3) |
|
Convert from EnCase/E01 Format |
|
|
205 | (3) |
|
|
208 | (1) |
|
|
209 | (2) |
|
Secure an Image with Encryption |
|
|
211 | (8) |
|
|
211 | (2) |
|
|
213 | (1) |
|
Forensic Format Built-in Encryption |
|
|
214 | (2) |
|
General Purpose Disk Encryption |
|
|
216 | (3) |
|
Disk Cloning and Duplication |
|
|
219 | (2) |
|
|
219 | (1) |
|
Use HPA to Replicate Sector Size |
|
|
219 | (1) |
|
Write an Image File to a Clone Disk |
|
|
220 | (1) |
|
Image Transfer and Storage |
|
|
221 | (3) |
|
|
221 | (2) |
|
Inexpensive Disks for Storage and Transfer |
|
|
223 | (1) |
|
Perform Large Network Transfers |
|
|
223 | (1) |
|
Secure Wiping and Data Disposal |
|
|
224 | (4) |
|
Dispose of Individual Files |
|
|
224 | (1) |
|
Secure Wipe a Storage Device |
|
|
225 | (1) |
|
Issue ATA Security Erase Unit Commands |
|
|
226 | (1) |
|
Destroy Encrypted Disk Keys |
|
|
227 | (1) |
|
|
228 | (1) |
|
8 Special Image Access Topics |
|
|
229 | (30) |
|
Forensically Acquired Image Files |
|
|
230 | (7) |
|
Raw Image Files with Loop Devices |
|
|
230 | (3) |
|
Forensic Format Image Files |
|
|
233 | (2) |
|
Prepare Boot Images with xmount |
|
|
235 | (2) |
|
|
237 | (6) |
|
|
237 | (2) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
241 | (2) |
|
|
243 | (15) |
|
|
243 | (5) |
|
|
248 | (3) |
|
|
251 | (3) |
|
|
254 | (4) |
|
|
258 | (1) |
|
9 Extracting Subsets Of Forensic Images |
|
|
259 | (16) |
|
Assess Partition Layout and Filesystems |
|
|
259 | (5) |
|
|
260 | (1) |
|
|
261 | (2) |
|
Filesystem Identification |
|
|
263 | (1) |
|
|
264 | (7) |
|
Extract Individual Partitions |
|
|
264 | (2) |
|
Find and Extract Deleted Partitions |
|
|
266 | (3) |
|
Identify and Extract Inter-Partition Gaps |
|
|
269 | (1) |
|
Extract HPA and DCO Sector Ranges |
|
|
269 | (2) |
|
Other Piecewise Data Extraction |
|
|
271 | (3) |
|
Extract Filesystem Slack Space |
|
|
271 | (1) |
|
Extract Filesystem Unallocated Blocks |
|
|
272 | (1) |
|
Manual Extraction Using Offsets |
|
|
272 | (2) |
|
|
274 | (1) |
Closing Remarks |
|
275 | (2) |
Index |
|
277 | |