A Pilot study on issues and complexity of digital forensics and how digital forensics can be applied in a live environment without the loss or spoilage of valuable data and evidence
6. Index.DAT Contains all of the Web sites Every URL Every Web page All email sent or received through Outlook or Outlook Express All internet temp files All pictures viewed
7. Commands Dir: Lists all files and directories in the directory that you are currently in. Ls: List the contents of your home directory by adding a tilde after the ls command. Ps: Displays the currently-running processes. Fdisk: A utility that provides disk partitioning functions, and information.
8. Traditional Forensics Hardware Write Block/Software Write Block Cell Phones Digital Forensics Programs Hex Editor FTK EnCase ProDiscover
29. FTK/EnCase Live? Older versions no. EnCase 4.6 no. FTK 1.8 no. New versions yes EnCase 6 supports network and live digital forensics. FTK 3 supports live digital forensics
31. Anti-Digital Forensics Steganography Encryption Data Wiping Metadata Spoilage Alternative Data Streams Index.Dat Thumbs.db Death of digital forensics
32. Steganography Detection WetStone Technologies' Gargoyle Niels Provos' Stegdetect Hiding StegoMagic wbStego HIP (Hide In Picture)
45. Alternative data streams Data fork Resource fork old Macintosh Hierarchical File System Impossible to protect your system against ADS. Cannot be disabled No way to limit this capability redirect [>] and colon [:] to fork one file into another. C:est> type c:indowsotepad.exe > ads.txt:hidden.exe
47. Locations of Index.DAT files VISTA serslt;Username>ppDataoamingicrosoftindowsookiesndex.datserslt;Username>ppDataoamingicrosoftindowsookiesowndex.datserslt;Username>ppDataocalicrosoftindowsemporary Internet Filesontent.IE5ndex.datC:serslt;UserName>ppDataocalicrosoftindowsistoryontent.IE5ndex.dat
50. Death of Digital Forensics SSDs are much like memory Smallest part written too is a sector Erases data in a block Anything changes physical placement of data Logical placement stays the same. Black boxes from a system's point of view Property
51. Conclusion We can see the live digital forensics is best used for starting an investigation. Traditional Digital forensics is best for collecting the data And knowing the techniques of Anti-digital forensics can help the investigator find data that he/she might not other wise be able to find.