SlideShare a Scribd company logo
1 of 24
Download to read offline
RecuperaBit: Forensic File System
Reconstruction Given Partially
Corrupted Metadata
C A N D I D AT E Andrea Lazzarotto
S U P E RV I S O R Ch. Prof. Riccardo Focardi
—
Ca’ Foscari
Dorsoduro 3246
30123 Venezia
Università
Ca’Foscari
Venezia
F I L E S Y S T E M R E C O N S T R U C T I O N
Work:
• File system reconstruction from damaged metadata
• Detection of partition geometry
• Tests against similar software
Motivation:
• File system analysis is used in many investigations
• Carving does not provide context
• File systems may be damaged
C O N T E N T S
1. F O R E N S I C F I L E S Y S T E M A N A LY S I S
Problem definition and N T F S features
2. F I L E S Y S T E M R E C O N S T R U C T I O N A L G O R I T H M
Tree reconstruction and partition detection
3. S O F T WA R E I M P L E M E N TAT I O N
Test results
F O R E N S I C F I L E S Y S T E M
A N A LY S I S
P R O B L E M D E F I N I T I O N
Problem (Forensic File System Reconstruction). Develop an algo-
rithm that reconstructs the directory structure of one or more
types of file systems.
I N P U T
1. Bitstream copy of drive
2. File system types to search
O U T P U T
Files divided in Root and Lost Files, for each detected file system.
FILE SYSTEM STRUCTURE
5 Root
0 $MFT
1 $MFTMirr
2 $LogFile
3 $Volume
4 $AttrDef
6 $Bitmap
7 $Boot
8 $BadClus
8:$Bad $BadClus:$Bad
9:$SDS $Secure:$SDS
9 $Secure
10 $UpCase
11 $Extend
25 $ObjId
24 $Quota
26 $Reparse
66 bbb.txt
64 interesting
65 aaa.txt
−1 LostFiles
67 Dir_67
68 another
N T F S
Interesting artifacts:
• B O O T S E C TO R S → partition geometry
• M F T E N T R I E S → identifier, name, timestamps of files
• I N D E X R E C O R D S → contents of directories
C O R R U P T E D M E TA D ATA (E X A M P L E )
Hard drive
New file system
Old file system
Boot sector
MFT MFT mirror
Backup boot sector
Result
F I L E S Y S T E M R E C O N S T R U C T I O N
A L G O R I T H M
D I S K S C A N N I N G
• The disk is S C A N N E D for artifacts (metadata carving)
• File records are C L U S T E R E D in partitions
• For N T F S: p = y − sx where s = 2
Hard drive
Sector y
Entry number x
3014 3016 3018 3020 3022 3024 3026 3028
29 30 31 32 33 102 103 104
Value of p2956 2956 2956 2956 2956 2820 2820 2820
D I R E C TO RY T R E E R E C O N S T R U C T I O N
Each node is linked to its parent (bottom-
up reconstruction).
When the parent is not available, a ghost
entry is created under Lost Files.
linked to parent
↑
PA RT I T I O N G E O M E T RY
Needed for extracting file contents and accessing external at-
tributes in N T F S (including index records).
Parameters:
• S P C (Sectors per Cluster)
• C B (Cluster Base) → where the file system starts
I N F E R E N C E O F PA RT I T I O N G E O M E T RY
Procedure:
1. Fingerprinting index records
2. Generation of text (from disk)
3. Generation of patterns (from partitions and S P C
enumeration)
4. Matching
T E X T G E N E R AT I O N (E X A M P L E )
The following index records are found on disk:
S E C TO R O W N E R I D
54 14
62 23
78 14
The resulting T E X T is:
. . . ∅ ∅ 14 ∅ ∅ ∅ ∅ ∅ ∅ ∅ 23 ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14
54 62 78
PAT T E R N G E N E R AT I O N (E X A M P L E )
Given the file records:
M F T E N T RY
P O I N T E R S TO
R E C O R D S (R U N L I S T )
14 11, 17
23 13
S P C = 1 → ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14 ∅ 23 ∅ ∅ ∅ 14
0 11 13 17
S P C = 2 → . . . ∅ ∅ 14 ∅ ∅ ∅ 23 ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14
22 26 34
A P P R O X I M AT E S T R I N G M AT C H I N G
Each pattern is matched against the text.
The best match provides both the C B and S P C parameters.
We use an optimized version of the Baeza-Yates–Perleberg algo-
rithm for approximate string matching.
S O F T WA R E I M P L E M E N TAT I O N
R E C U P E R A B I T
RecuperaBit is the software implementation of our
reconstruction algorithm:
• Modular program written in Python
• Full implementation for N T F S reconstruction
• Extensible by adding additional plug-ins
E X P E R I M E N T S
Test results:
• RecuperaBit was tested against 9 existing programs
• 4 different hard drive images were considered
• The final test involves increasing damage on one drive
F I L E S Y S T E M D E T E C T I O N
S O F T WA R E #1 #2 #3 #4
Gpart OK OK Nothing Partial
TestDisk OK OK Nothing OK (+1)
Autopsy OK Partial Nothing OK
Scrounge-NTFS OK OK Nothing OK
Restorer Ultimate OK OK OK OK
DMDE OK OK OK OK (+3)
Recover It All Now OK Nothing Nothing OK
GetDataBack OK OK Nothing OK (+1)
SalvageRecovery OK OK Nothing OK (+1)
RecuperaBit OK OK OK OK × 2 (+302)
D I R E C TO RY T R E E A C C U R A C Y
S O F T WA R E #1 #2 #3 #4
TestDisk Perfect Error — Error
Autopsy Perfect No files — Good
Scrounge-NTFS Partial Terrible Terrible Terrible
Restorer Ultimate Perfect Partial Perfect Good
DMDE Perfect Error Perfect Good
Recover It All Now Terrible — — No files
GetDataBack Perfect Good — Good
SalvageRecovery Perfect Terrible — Perfect
RecuperaBit Perfect Perfect Perfect Perfect
R E C O V E R E D F I L E C O N T E N T S
S O F T WA R E S PA R S E C O M P R E S S E D E N C RY P T E D
TestDisk OK OK Empty
Autopsy Empty OK OK
Scrounge-NTFS OK Unsupported OK
Restorer Ultimate OK OK OK
DMDE OK OK Unsupported
Recover It All Now OK Wrong OK
GetDataBack Empty OK OK
SalvageRecovery Empty Wrong OK
RecuperaBit OK Unsupported OK
O U T P U T Q U A L I T Y V S C O R R U P T I O N L E V E L
0% 20% 40% 60% 80% 100%
Damaged sectors
0
5000
10000
15000
19399
Numberoffiles
All detected files
Unreachable from Root
C O N C L U S I O N
Contributions:
• Generic bottom-up reconstruction algorithm
• Strategy for partition geometry detection (N T F S)
Results:
• Successful reconstruction in all tested cases
• Sometimes better than commercial programs

More Related Content

What's hot

Postcolonialism and Midnight's Children
Postcolonialism and Midnight's ChildrenPostcolonialism and Midnight's Children
Postcolonialism and Midnight's ChildrenDilip Barad
 
Lord of the flies - Analysis
Lord of the flies - AnalysisLord of the flies - Analysis
Lord of the flies - AnalysisPaulo Arieu
 
King Arthur and the Knights of the Round Table
King Arthur and the Knights of the Round TableKing Arthur and the Knights of the Round Table
King Arthur and the Knights of the Round TablePamela Garcia
 
North and South (1854).pptx
North and South (1854).pptxNorth and South (1854).pptx
North and South (1854).pptxPaulinaOdeth
 
Alienation and Feminism in Shakespeare’s Macbeth and Lessing’s The Grass Is ...
 Alienation and Feminism in Shakespeare’s Macbeth and Lessing’s The Grass Is ... Alienation and Feminism in Shakespeare’s Macbeth and Lessing’s The Grass Is ...
Alienation and Feminism in Shakespeare’s Macbeth and Lessing’s The Grass Is ...English Literature and Language Review ELLR
 
The reluctant fundamentalist
The reluctant fundamentalistThe reluctant fundamentalist
The reluctant fundamentalistjpinnuck
 
Shakespearean tragedy with special reference to hamlet
Shakespearean tragedy with special reference to  hamletShakespearean tragedy with special reference to  hamlet
Shakespearean tragedy with special reference to hamletKetan Pandya
 
Q1 L2 the origin of this world(maranao)
Q1 L2 the origin of this world(maranao)Q1 L2 the origin of this world(maranao)
Q1 L2 the origin of this world(maranao)Jareleny Nava
 
Introduction to Mythology
Introduction to MythologyIntroduction to Mythology
Introduction to MythologyNicoleHoffmann
 
The Trojan War and The Fall of Troy
The Trojan War and The Fall of TroyThe Trojan War and The Fall of Troy
The Trojan War and The Fall of TroyJanice Dollosa
 
Post structuralism and Death of the Author
Post structuralism and Death of the AuthorPost structuralism and Death of the Author
Post structuralism and Death of the AuthorRohitVyas25
 
Intro to Orpheus Greek Myth
Intro to Orpheus Greek MythIntro to Orpheus Greek Myth
Intro to Orpheus Greek MythMissMayfield
 
Is Satan a hero
Is Satan a heroIs Satan a hero
Is Satan a heroSaima Gul
 
Critical Interpretation of a literary text using the story dead star by paz b...
Critical Interpretation of a literary text using the story dead star by paz b...Critical Interpretation of a literary text using the story dead star by paz b...
Critical Interpretation of a literary text using the story dead star by paz b...WELLAFERNANDEZ
 
Moral & philosophical criticism of hamlet real
Moral & philosophical criticism of hamlet realMoral & philosophical criticism of hamlet real
Moral & philosophical criticism of hamlet realwardah azhar
 

What's hot (20)

Postcolonialism and Midnight's Children
Postcolonialism and Midnight's ChildrenPostcolonialism and Midnight's Children
Postcolonialism and Midnight's Children
 
Lord of the flies - Analysis
Lord of the flies - AnalysisLord of the flies - Analysis
Lord of the flies - Analysis
 
King Arthur and the Knights of the Round Table
King Arthur and the Knights of the Round TableKing Arthur and the Knights of the Round Table
King Arthur and the Knights of the Round Table
 
North and South (1854).pptx
North and South (1854).pptxNorth and South (1854).pptx
North and South (1854).pptx
 
Alienation and Feminism in Shakespeare’s Macbeth and Lessing’s The Grass Is ...
 Alienation and Feminism in Shakespeare’s Macbeth and Lessing’s The Grass Is ... Alienation and Feminism in Shakespeare’s Macbeth and Lessing’s The Grass Is ...
Alienation and Feminism in Shakespeare’s Macbeth and Lessing’s The Grass Is ...
 
John keats
John keatsJohn keats
John keats
 
The reluctant fundamentalist
The reluctant fundamentalistThe reluctant fundamentalist
The reluctant fundamentalist
 
Elements of Comedy
Elements of Comedy Elements of Comedy
Elements of Comedy
 
Nibelungenlied
NibelungenliedNibelungenlied
Nibelungenlied
 
Shakespearean tragedy with special reference to hamlet
Shakespearean tragedy with special reference to  hamletShakespearean tragedy with special reference to  hamlet
Shakespearean tragedy with special reference to hamlet
 
Q1 L2 the origin of this world(maranao)
Q1 L2 the origin of this world(maranao)Q1 L2 the origin of this world(maranao)
Q1 L2 the origin of this world(maranao)
 
Introduction to Mythology
Introduction to MythologyIntroduction to Mythology
Introduction to Mythology
 
Feminism in A Doll's House
Feminism in A Doll's HouseFeminism in A Doll's House
Feminism in A Doll's House
 
The Trojan War and The Fall of Troy
The Trojan War and The Fall of TroyThe Trojan War and The Fall of Troy
The Trojan War and The Fall of Troy
 
Post structuralism and Death of the Author
Post structuralism and Death of the AuthorPost structuralism and Death of the Author
Post structuralism and Death of the Author
 
Intro to Orpheus Greek Myth
Intro to Orpheus Greek MythIntro to Orpheus Greek Myth
Intro to Orpheus Greek Myth
 
Is Satan a hero
Is Satan a heroIs Satan a hero
Is Satan a hero
 
Critical Interpretation of a literary text using the story dead star by paz b...
Critical Interpretation of a literary text using the story dead star by paz b...Critical Interpretation of a literary text using the story dead star by paz b...
Critical Interpretation of a literary text using the story dead star by paz b...
 
Moral & philosophical criticism of hamlet real
Moral & philosophical criticism of hamlet realMoral & philosophical criticism of hamlet real
Moral & philosophical criticism of hamlet real
 
Role of Fate
Role of Fate Role of Fate
Role of Fate
 

Viewers also liked

Ricostruzione forense di NTFS con metadati parzialmente danneggiati
Ricostruzione forense di NTFS con metadati parzialmente danneggiatiRicostruzione forense di NTFS con metadati parzialmente danneggiati
Ricostruzione forense di NTFS con metadati parzialmente danneggiatiAndrea Lazzarotto
 
Recuperare dati da partizioni NTFS danneggiate
Recuperare dati da partizioni NTFS danneggiateRecuperare dati da partizioni NTFS danneggiate
Recuperare dati da partizioni NTFS danneggiateAndrea Lazzarotto
 
Come si creano le app Android
Come si creano le app AndroidCome si creano le app Android
Come si creano le app AndroidAndrea Lazzarotto
 
Why Zsh is Cooler than Your Shell
Why Zsh is Cooler than Your ShellWhy Zsh is Cooler than Your Shell
Why Zsh is Cooler than Your Shelljaguardesignstudio
 
ELSA France "Teaching is us!"
ELSA France "Teaching is us!" ELSA France "Teaching is us!"
ELSA France "Teaching is us!" Adrian Scarlett
 

Viewers also liked (7)

Ricostruzione forense di NTFS con metadati parzialmente danneggiati
Ricostruzione forense di NTFS con metadati parzialmente danneggiatiRicostruzione forense di NTFS con metadati parzialmente danneggiati
Ricostruzione forense di NTFS con metadati parzialmente danneggiati
 
Recuperare dati da partizioni NTFS danneggiate
Recuperare dati da partizioni NTFS danneggiateRecuperare dati da partizioni NTFS danneggiate
Recuperare dati da partizioni NTFS danneggiate
 
Come si creano le app Android
Come si creano le app AndroidCome si creano le app Android
Come si creano le app Android
 
Italy... in pictures
Italy... in picturesItaly... in pictures
Italy... in pictures
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Why Zsh is Cooler than Your Shell
Why Zsh is Cooler than Your ShellWhy Zsh is Cooler than Your Shell
Why Zsh is Cooler than Your Shell
 
ELSA France "Teaching is us!"
ELSA France "Teaching is us!" ELSA France "Teaching is us!"
ELSA France "Teaching is us!"
 

Similar to RecuperaBit: Forensic File System Reconstruction Given Partially Corrupted Metadata

Code GPU with CUDA - Identifying performance limiters
Code GPU with CUDA - Identifying performance limitersCode GPU with CUDA - Identifying performance limiters
Code GPU with CUDA - Identifying performance limitersMarina Kolpakova
 
ITC 360Professor John CovingtonSystem Administration And Managemen.docx
ITC 360Professor John CovingtonSystem Administration And Managemen.docxITC 360Professor John CovingtonSystem Administration And Managemen.docx
ITC 360Professor John CovingtonSystem Administration And Managemen.docxchristiandean12115
 
Consistency, Availability, Partition: Make Your Choice
Consistency, Availability, Partition: Make Your ChoiceConsistency, Availability, Partition: Make Your Choice
Consistency, Availability, Partition: Make Your ChoiceAndrea Giuliano
 
2016 bioinformatics i_database_searching_wimvancriekinge
2016 bioinformatics i_database_searching_wimvancriekinge2016 bioinformatics i_database_searching_wimvancriekinge
2016 bioinformatics i_database_searching_wimvancriekingeProf. Wim Van Criekinge
 
Open Source Systems Performance
Open Source Systems PerformanceOpen Source Systems Performance
Open Source Systems PerformanceBrendan Gregg
 
Bristol Uni - Use Cases of NoSQL
Bristol Uni - Use Cases of NoSQLBristol Uni - Use Cases of NoSQL
Bristol Uni - Use Cases of NoSQLDavid Simons
 
Bioinformatics t5-databasesearching v2014
Bioinformatics t5-databasesearching v2014Bioinformatics t5-databasesearching v2014
Bioinformatics t5-databasesearching v2014Prof. Wim Van Criekinge
 
Lec03-CS110 Computational Engineering
Lec03-CS110 Computational EngineeringLec03-CS110 Computational Engineering
Lec03-CS110 Computational EngineeringSri Harsha Pamu
 
Bioinformatica 10-11-2011-t5-database searching
Bioinformatica 10-11-2011-t5-database searchingBioinformatica 10-11-2011-t5-database searching
Bioinformatica 10-11-2011-t5-database searchingProf. Wim Van Criekinge
 
Topological Data Analysis.pptx
Topological Data Analysis.pptxTopological Data Analysis.pptx
Topological Data Analysis.pptxColleen Farrelly
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithmsJulie Iskander
 
Question 1- List five types of authentication vulnerabilities that.pdf
Question 1-    List five types of authentication vulnerabilities that.pdfQuestion 1-    List five types of authentication vulnerabilities that.pdf
Question 1- List five types of authentication vulnerabilities that.pdfChristopherkUzHunter
 
Spring scala - Sneaking Scala into your corporation
Spring scala  - Sneaking Scala into your corporationSpring scala  - Sneaking Scala into your corporation
Spring scala - Sneaking Scala into your corporationHenryk Konsek
 
Introduction to Compiler Development
Introduction to Compiler DevelopmentIntroduction to Compiler Development
Introduction to Compiler DevelopmentLogan Chien
 
Improving Software Reliability via Mining Software Engineering Data
Improving Software Reliability via Mining Software Engineering DataImproving Software Reliability via Mining Software Engineering Data
Improving Software Reliability via Mining Software Engineering DataTao Xie
 
PyData Paris 2015 - Track 3.2 Serge Guelton et Pierrick Brunet
PyData Paris 2015 - Track 3.2 Serge Guelton et Pierrick Brunet PyData Paris 2015 - Track 3.2 Serge Guelton et Pierrick Brunet
PyData Paris 2015 - Track 3.2 Serge Guelton et Pierrick Brunet Pôle Systematic Paris-Region
 

Similar to RecuperaBit: Forensic File System Reconstruction Given Partially Corrupted Metadata (20)

Code GPU with CUDA - Identifying performance limiters
Code GPU with CUDA - Identifying performance limitersCode GPU with CUDA - Identifying performance limiters
Code GPU with CUDA - Identifying performance limiters
 
ITC 360Professor John CovingtonSystem Administration And Managemen.docx
ITC 360Professor John CovingtonSystem Administration And Managemen.docxITC 360Professor John CovingtonSystem Administration And Managemen.docx
ITC 360Professor John CovingtonSystem Administration And Managemen.docx
 
Consistency, Availability, Partition: Make Your Choice
Consistency, Availability, Partition: Make Your ChoiceConsistency, Availability, Partition: Make Your Choice
Consistency, Availability, Partition: Make Your Choice
 
Fast updating GG.pptx
Fast updating GG.pptxFast updating GG.pptx
Fast updating GG.pptx
 
Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
2016 bioinformatics i_database_searching_wimvancriekinge
2016 bioinformatics i_database_searching_wimvancriekinge2016 bioinformatics i_database_searching_wimvancriekinge
2016 bioinformatics i_database_searching_wimvancriekinge
 
Open Source Systems Performance
Open Source Systems PerformanceOpen Source Systems Performance
Open Source Systems Performance
 
Bristol Uni - Use Cases of NoSQL
Bristol Uni - Use Cases of NoSQLBristol Uni - Use Cases of NoSQL
Bristol Uni - Use Cases of NoSQL
 
Python pandas Library
Python pandas LibraryPython pandas Library
Python pandas Library
 
Bioinformatics t5-databasesearching v2014
Bioinformatics t5-databasesearching v2014Bioinformatics t5-databasesearching v2014
Bioinformatics t5-databasesearching v2014
 
Lec03-CS110 Computational Engineering
Lec03-CS110 Computational EngineeringLec03-CS110 Computational Engineering
Lec03-CS110 Computational Engineering
 
Bioinformatica 10-11-2011-t5-database searching
Bioinformatica 10-11-2011-t5-database searchingBioinformatica 10-11-2011-t5-database searching
Bioinformatica 10-11-2011-t5-database searching
 
Topological Data Analysis.pptx
Topological Data Analysis.pptxTopological Data Analysis.pptx
Topological Data Analysis.pptx
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
 
Question 1- List five types of authentication vulnerabilities that.pdf
Question 1-    List five types of authentication vulnerabilities that.pdfQuestion 1-    List five types of authentication vulnerabilities that.pdf
Question 1- List five types of authentication vulnerabilities that.pdf
 
Spring scala - Sneaking Scala into your corporation
Spring scala  - Sneaking Scala into your corporationSpring scala  - Sneaking Scala into your corporation
Spring scala - Sneaking Scala into your corporation
 
Introduction to Compiler Development
Introduction to Compiler DevelopmentIntroduction to Compiler Development
Introduction to Compiler Development
 
Improving Software Reliability via Mining Software Engineering Data
Improving Software Reliability via Mining Software Engineering DataImproving Software Reliability via Mining Software Engineering Data
Improving Software Reliability via Mining Software Engineering Data
 
PyData Paris 2015 - Track 3.2 Serge Guelton et Pierrick Brunet
PyData Paris 2015 - Track 3.2 Serge Guelton et Pierrick Brunet PyData Paris 2015 - Track 3.2 Serge Guelton et Pierrick Brunet
PyData Paris 2015 - Track 3.2 Serge Guelton et Pierrick Brunet
 
6조
6조6조
6조
 

More from Andrea Lazzarotto

Abel, il sistema di build della nuova CAINE
Abel, il sistema di build della nuova CAINEAbel, il sistema di build della nuova CAINE
Abel, il sistema di build della nuova CAINEAndrea Lazzarotto
 
Reverse Engineering per dispositivi IoT
Reverse Engineering per dispositivi IoTReverse Engineering per dispositivi IoT
Reverse Engineering per dispositivi IoTAndrea Lazzarotto
 
Come sviluppo le applicazioni web
Come sviluppo le applicazioni webCome sviluppo le applicazioni web
Come sviluppo le applicazioni webAndrea Lazzarotto
 
Pubblicità invasiva e spiona: come proteggersi su Android
Pubblicità invasiva e spiona: come proteggersi su AndroidPubblicità invasiva e spiona: come proteggersi su Android
Pubblicità invasiva e spiona: come proteggersi su AndroidAndrea Lazzarotto
 
Come funziona Internet e perché il software libero è fondamentale
Come funziona Internet e perché il software libero è fondamentaleCome funziona Internet e perché il software libero è fondamentale
Come funziona Internet e perché il software libero è fondamentaleAndrea Lazzarotto
 
Presentazione del progetto Itis Linux
Presentazione del progetto Itis LinuxPresentazione del progetto Itis Linux
Presentazione del progetto Itis LinuxAndrea Lazzarotto
 
Data Visualization — Le funzionalità matematiche di Sage per la visualizzazio...
Data Visualization — Le funzionalità matematiche di Sage per la visualizzazio...Data Visualization — Le funzionalità matematiche di Sage per la visualizzazio...
Data Visualization — Le funzionalità matematiche di Sage per la visualizzazio...Andrea Lazzarotto
 
Matematica di base e avanzata con Sage
Matematica di base e avanzata con SageMatematica di base e avanzata con Sage
Matematica di base e avanzata con SageAndrea Lazzarotto
 
Presentazioni di qualità professionale con Impress
Presentazioni di qualità professionale con ImpressPresentazioni di qualità professionale con Impress
Presentazioni di qualità professionale con ImpressAndrea Lazzarotto
 

More from Andrea Lazzarotto (10)

Abel, il sistema di build della nuova CAINE
Abel, il sistema di build della nuova CAINEAbel, il sistema di build della nuova CAINE
Abel, il sistema di build della nuova CAINE
 
Reverse Engineering per dispositivi IoT
Reverse Engineering per dispositivi IoTReverse Engineering per dispositivi IoT
Reverse Engineering per dispositivi IoT
 
Come sviluppo le applicazioni web
Come sviluppo le applicazioni webCome sviluppo le applicazioni web
Come sviluppo le applicazioni web
 
Pubblicità invasiva e spiona: come proteggersi su Android
Pubblicità invasiva e spiona: come proteggersi su AndroidPubblicità invasiva e spiona: come proteggersi su Android
Pubblicità invasiva e spiona: come proteggersi su Android
 
Come funziona Internet e perché il software libero è fondamentale
Come funziona Internet e perché il software libero è fondamentaleCome funziona Internet e perché il software libero è fondamentale
Come funziona Internet e perché il software libero è fondamentale
 
Dallo scatto al volantino
Dallo scatto al volantinoDallo scatto al volantino
Dallo scatto al volantino
 
Presentazione del progetto Itis Linux
Presentazione del progetto Itis LinuxPresentazione del progetto Itis Linux
Presentazione del progetto Itis Linux
 
Data Visualization — Le funzionalità matematiche di Sage per la visualizzazio...
Data Visualization — Le funzionalità matematiche di Sage per la visualizzazio...Data Visualization — Le funzionalità matematiche di Sage per la visualizzazio...
Data Visualization — Le funzionalità matematiche di Sage per la visualizzazio...
 
Matematica di base e avanzata con Sage
Matematica di base e avanzata con SageMatematica di base e avanzata con Sage
Matematica di base e avanzata con Sage
 
Presentazioni di qualità professionale con Impress
Presentazioni di qualità professionale con ImpressPresentazioni di qualità professionale con Impress
Presentazioni di qualità professionale con Impress
 

Recently uploaded

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 

Recently uploaded (20)

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 

RecuperaBit: Forensic File System Reconstruction Given Partially Corrupted Metadata

  • 1. RecuperaBit: Forensic File System Reconstruction Given Partially Corrupted Metadata C A N D I D AT E Andrea Lazzarotto S U P E RV I S O R Ch. Prof. Riccardo Focardi — Ca’ Foscari Dorsoduro 3246 30123 Venezia Università Ca’Foscari Venezia
  • 2. F I L E S Y S T E M R E C O N S T R U C T I O N Work: • File system reconstruction from damaged metadata • Detection of partition geometry • Tests against similar software Motivation: • File system analysis is used in many investigations • Carving does not provide context • File systems may be damaged
  • 3. C O N T E N T S 1. F O R E N S I C F I L E S Y S T E M A N A LY S I S Problem definition and N T F S features 2. F I L E S Y S T E M R E C O N S T R U C T I O N A L G O R I T H M Tree reconstruction and partition detection 3. S O F T WA R E I M P L E M E N TAT I O N Test results
  • 4. F O R E N S I C F I L E S Y S T E M A N A LY S I S
  • 5. P R O B L E M D E F I N I T I O N Problem (Forensic File System Reconstruction). Develop an algo- rithm that reconstructs the directory structure of one or more types of file systems. I N P U T 1. Bitstream copy of drive 2. File system types to search O U T P U T Files divided in Root and Lost Files, for each detected file system.
  • 6. FILE SYSTEM STRUCTURE 5 Root 0 $MFT 1 $MFTMirr 2 $LogFile 3 $Volume 4 $AttrDef 6 $Bitmap 7 $Boot 8 $BadClus 8:$Bad $BadClus:$Bad 9:$SDS $Secure:$SDS 9 $Secure 10 $UpCase 11 $Extend 25 $ObjId 24 $Quota 26 $Reparse 66 bbb.txt 64 interesting 65 aaa.txt −1 LostFiles 67 Dir_67 68 another
  • 7. N T F S Interesting artifacts: • B O O T S E C TO R S → partition geometry • M F T E N T R I E S → identifier, name, timestamps of files • I N D E X R E C O R D S → contents of directories
  • 8. C O R R U P T E D M E TA D ATA (E X A M P L E ) Hard drive New file system Old file system Boot sector MFT MFT mirror Backup boot sector Result
  • 9. F I L E S Y S T E M R E C O N S T R U C T I O N A L G O R I T H M
  • 10. D I S K S C A N N I N G • The disk is S C A N N E D for artifacts (metadata carving) • File records are C L U S T E R E D in partitions • For N T F S: p = y − sx where s = 2 Hard drive Sector y Entry number x 3014 3016 3018 3020 3022 3024 3026 3028 29 30 31 32 33 102 103 104 Value of p2956 2956 2956 2956 2956 2820 2820 2820
  • 11. D I R E C TO RY T R E E R E C O N S T R U C T I O N Each node is linked to its parent (bottom- up reconstruction). When the parent is not available, a ghost entry is created under Lost Files. linked to parent ↑
  • 12. PA RT I T I O N G E O M E T RY Needed for extracting file contents and accessing external at- tributes in N T F S (including index records). Parameters: • S P C (Sectors per Cluster) • C B (Cluster Base) → where the file system starts
  • 13. I N F E R E N C E O F PA RT I T I O N G E O M E T RY Procedure: 1. Fingerprinting index records 2. Generation of text (from disk) 3. Generation of patterns (from partitions and S P C enumeration) 4. Matching
  • 14. T E X T G E N E R AT I O N (E X A M P L E ) The following index records are found on disk: S E C TO R O W N E R I D 54 14 62 23 78 14 The resulting T E X T is: . . . ∅ ∅ 14 ∅ ∅ ∅ ∅ ∅ ∅ ∅ 23 ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14 54 62 78
  • 15. PAT T E R N G E N E R AT I O N (E X A M P L E ) Given the file records: M F T E N T RY P O I N T E R S TO R E C O R D S (R U N L I S T ) 14 11, 17 23 13 S P C = 1 → ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14 ∅ 23 ∅ ∅ ∅ 14 0 11 13 17 S P C = 2 → . . . ∅ ∅ 14 ∅ ∅ ∅ 23 ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14 22 26 34
  • 16. A P P R O X I M AT E S T R I N G M AT C H I N G Each pattern is matched against the text. The best match provides both the C B and S P C parameters. We use an optimized version of the Baeza-Yates–Perleberg algo- rithm for approximate string matching.
  • 17. S O F T WA R E I M P L E M E N TAT I O N
  • 18. R E C U P E R A B I T RecuperaBit is the software implementation of our reconstruction algorithm: • Modular program written in Python • Full implementation for N T F S reconstruction • Extensible by adding additional plug-ins
  • 19. E X P E R I M E N T S Test results: • RecuperaBit was tested against 9 existing programs • 4 different hard drive images were considered • The final test involves increasing damage on one drive
  • 20. F I L E S Y S T E M D E T E C T I O N S O F T WA R E #1 #2 #3 #4 Gpart OK OK Nothing Partial TestDisk OK OK Nothing OK (+1) Autopsy OK Partial Nothing OK Scrounge-NTFS OK OK Nothing OK Restorer Ultimate OK OK OK OK DMDE OK OK OK OK (+3) Recover It All Now OK Nothing Nothing OK GetDataBack OK OK Nothing OK (+1) SalvageRecovery OK OK Nothing OK (+1) RecuperaBit OK OK OK OK × 2 (+302)
  • 21. D I R E C TO RY T R E E A C C U R A C Y S O F T WA R E #1 #2 #3 #4 TestDisk Perfect Error — Error Autopsy Perfect No files — Good Scrounge-NTFS Partial Terrible Terrible Terrible Restorer Ultimate Perfect Partial Perfect Good DMDE Perfect Error Perfect Good Recover It All Now Terrible — — No files GetDataBack Perfect Good — Good SalvageRecovery Perfect Terrible — Perfect RecuperaBit Perfect Perfect Perfect Perfect
  • 22. R E C O V E R E D F I L E C O N T E N T S S O F T WA R E S PA R S E C O M P R E S S E D E N C RY P T E D TestDisk OK OK Empty Autopsy Empty OK OK Scrounge-NTFS OK Unsupported OK Restorer Ultimate OK OK OK DMDE OK OK Unsupported Recover It All Now OK Wrong OK GetDataBack Empty OK OK SalvageRecovery Empty Wrong OK RecuperaBit OK Unsupported OK
  • 23. O U T P U T Q U A L I T Y V S C O R R U P T I O N L E V E L 0% 20% 40% 60% 80% 100% Damaged sectors 0 5000 10000 15000 19399 Numberoffiles All detected files Unreachable from Root
  • 24. C O N C L U S I O N Contributions: • Generic bottom-up reconstruction algorithm • Strategy for partition geometry detection (N T F S) Results: • Successful reconstruction in all tested cases • Sometimes better than commercial programs