---
title: '03 Data Acquisition'
disqus: hackmd
---
03 Data Acquisition
===
<style>
img{
/* border: 2px solid red; */
margin-left: auto;
margin-right: auto;
width: 90%;
display: block;
}
</style>
## Table of Contents
[TOC]
Data Acquisition
---
- before analyse data, need to secure
- goal of forensic data acquisition is to create forensic copy of piece of media that is suitable to use as evi in court of law
### Storage Formats for Digital Evidence
- data in forensics acquisition tool stored as **image file**
- image file in 1 of 3 formats
- raw format
- proprietary formats
- advanced forensics format (AFF) - newer
#### Raw Format
- possible to write bit stream data to files
- sequence flat file
- in past only do bit by bit copy to media same size or bigger to create evi
- advantages
- fast data transfers
- ignores minor data read errors on src drive
- most comp forensics tools can read raw format
- eg. .dd
- disadvantages
- need same storage amt as orig disk/data
- tools may not collect marginal (bad) sectors
- due to low threshold of retry reads on weak media spots on drive
#### Proprietary Formats
- features
- can compress image files
- save space
- can split img into smaller segmented files
- provide integrity check for split data
- can integrate metadata into img file
- disadvantages
- cannot share img between diff tools/vendors
- file size limit for ea segmented volume
- usually 650mb
- can adjust up/down at limit of 2gb
- expoer witness format is unofficial standard
- default for guidance software encase
- eg. ex01, e01
#### Advanced Forensics Format (AFF)
- open src acquisition format
- design goals
- compressed or uncompressed img files
- no size restriction for disk to img files
- provide space in img/segmented file for metadata
- simple design with extensibility
- open src for multiple platforms and OS
- vendors have no implementation restrictions on this format
- possible future standard
- internal consistency checks for self auth
- file ext use `.afd` for segmented img and `.afm` for AFF metadata
### Determining Best Acquisition Method
- types of acquisitions
- static
- live
- 4 methods of data collection
- disk to img file
- disk to disk
- logical disk to disk
- sparse data copy of file/folder
- when making copy, consider
- size of src disk
- lossless compression can be useful
- dont permenantly remove data
- orig data can be reconstructed
- target dont need to be so big
- use digital sig for verification
- with large drives, alt is to use tape backup systems
- eg. SDLT
- can be slow if data large
- whether can retain disk
- sometime after copy, orig disk may need to be returned
#### Disk-to-Image File
- most common method
- most flexible
- can make more than 1 copy
- copies are bit for bit replications of orig drive
- prodiscover, encase, ftk, SMART, sleuth kit, x-ways, ilookIX
- tools that perform disk to img
- read disk to img file as if orig disk
#### Disk to Disk
- when disk to img copy not possible
- tools can adjust disk's geometry config
- eg. track, sectors etc.
- encase, snapcopy, safeback
#### Logical or Sparse Acquisition
- collecting evi from large device can take several hours
- reasons to use these methods
- time limited
- logical acq. captures only specific files of interest to case
- eg. only investigate outlook
- sparse acq. collects fragments of unallocated/deleted data
- for large disks
- for PST or OST mail files, RAID servers
- up to several tb
### Contingency Planning for Image Acquisitions
- create duplicate copy of evi img file
- in case failure
- but time consuming
- make at least 2 imgs of digital evi
- use diff tools or techniques
- copy host protected area (HPA - area not visible for os on drive) of disk too
- consider using hardware acq. tool that can access drive at BIOS lvl to access HPA
- be prepared to deal with encrypted drives
- whole disk encryption feature in windows called **BitLocker** makes static acq. difficult
- may need user to provide decryption key
- suspect might not cooperate
### Using Acquisition Tools
- advantages
- acquiring evi from suspect drive more convenient
- many tools for windows
- especially with hot-swappable devices
- eg. usb, fireware
- disadvantages
- must protect acquired data with well-tested write-blocking hardware device
- tools cant acquire data from disk's host protected area
- host protected area (HPA - area not visible for os on drive)
- some countries havent accept use of write-blocking devices for data acquisition
- need check with legal
### Capturing Image with ProDiscover Basic
- connecting with suspect's drive to your workstation
- document chain of evi for drive
- remove drive from suspect's pc
- config suspect's drive jumpers as needed
- connect suspect drive to write blker device
- create storage folder on target drive
- using prodiscover's proprietary acq. format
- pd creates img files with `.eve` ext
- log file with `.log`
- special inventory file `.pds`
- if compression option selected, pd uses `.cmp` instead of `.eve` on all segmented volumes
### Capturing Data with AccessData FTK Imager Lite
- ftk imager is windows acq. tool included with accessdata forensic toolkit
- designed for viewing evi disks and disk to img files
- makes disk to img copies of evi drives
- at logical partition and phy drive lvl
- can segment img file
- evi drive must have hardware write blking device
- or run from live cd like mini-winfe
- ftk imager cannot acquire drive's HPA
- use write blking device and follow
- boot to windows
- connect evi disk to write blker
- connect target disk to write blker
- start ftk imager lite
- create disk img
- use phy drive option



Validating Data Acquisitions
---
- validating evi is most critical aspect of comp forensics
- needs **hashing algo utility**
- validation techniques
- CRC-32
- MD5
- SHA-1
- SHA-512
### Windows Validation Methods
- windows have no builtin algo tools
- use 3rd pt utilities
- hex editors like win hex
- commercial comp forensics programs have builtin validation features
- ea program has own technique
- prodiscover's .eve files contain metadata in acq. file or segmented files including hash val for suspect drive/partition
- raw format img files dont have metadata
- separate manual validation recommended for all raw acquisitions
### Remote Network Acquisition Tools
- can remotely connect to suspect comp via network conn and copy data from it
- remote acq. tools vary in config and capabilities
- some need manual intervention on remote suspect comps to initiate data copy
- tools like encase, prodiscover allow remote acq.
- drawbacks
- antivirus, antispyware and firewall tools can be configed to ignore remote access programs
- access can be blked
- suspects can easily install own security tools that trigger alarm to notify them of remote access intrusions
- connecting remotely allows to
- preview suspect's drive remotely while in use or powered on
- perform live acq. (AKA smear as disk data being altered while comp active) while comp's comp powered on
- encrypt conn between suspect and examiner
- copy suspect's comp ram while comp on
- use optional stealth mode to hide remote conn from suspect while data previewed/acquired
- other funcs
- capture volatile system state info
- analyse current running processes on remote system
- locate unseen files and processes that might be running malware/spyware
- remotely listen and view ip ports
- run hash comparisons on remote system to search for trojans and rootkits
- create hash inventory of all files on system remotely to establish baseline if it gets attacked
- negative hash search capability
### Other Forensics Acquisition Tools
- magnet axiom
- passmark software imageusb
- asrdata smart
- runtime software
- ilookix investigator iximager
- sourceforge projects repository
#### Magnet Axiom
- able to recover digital evi from most sources including smartphones, cloud services, comps, iot devices and 3rd party images
- examination tool help forensics professionals find most relevant data and visualise for better analysis
- gaining popularity as user base increases
#### PassMark Software ImageUSB
- has acq. tool called imageusb for its os forensics analysis product
- imageusb downloaded from osforensics website
- imageusb is free utility
- can write img concurrently to multiple usb drives
#### Runtime Software
- offers shareware programs for data acq. and recovery
- diskexplorer for FAT and NTFS
- features
- create raw format img file
- segment raw format or compressed img for achiving purposes
- acces network comp drives
#### SourceForge
- provides several applications for security, analysis and investigations
- preferred sc code repo and distribution platform for free and open src software (FOSS) projects
- [list of current tools](http://sourceforge.net/directory/security-utilities/storage/archiving/os:windows/freshness:recently-updated)
Summary
---


###### tags: `DFI` `DISM` `School` `Notes`