{"id":361,"date":"2015-10-19T00:04:00","date_gmt":"2015-10-18T16:04:00","guid":{"rendered":"http:\/\/note.systw.net\/note\/?p=361"},"modified":"2023-10-31T00:08:05","modified_gmt":"2023-10-30T16:08:05","slug":"data-acquisition","status":"publish","type":"post","link":"https:\/\/systw.net\/note\/archives\/361","title":{"rendered":"Data Acquisition"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Disk Acquisition Concept<\/strong><\/h2>\n\n\n\n<p><strong>Data Acquisition<\/strong><br>A process of imaging or otherwise obtaining information from a digital device and its peripheral equipment and media<\/p>\n\n\n\n<p><br><strong>Image format<\/strong><br>raw format:&nbsp;ex: output of dd<br>advanced forensics format: opensource format, like afk and afd<br>proprietary format: like e01 of encase format<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>Acquisition Method<\/strong><br>Bit-stream disk copy<br>Sparse data copy<br>ps:<br>Bit-stream copy should always be performed first<\/p>\n\n\n\n<p><strong>Bit-stream disk copy<\/strong><br>to-image file, Most common method<br>ex: EnCase, FTK, SMART, Sleuth Kit, X-Ways, iLook, DD<br>to-disk<br>ex: SafeBack, SnapCopy, Norton Ghost 2002<\/p>\n\n\n\n<p><strong>Sparse\/logical data copy<\/strong><br>Creates exact copies of folders and files<br>Pros:&nbsp;it is good for large disks like 10 TB network data or specific file like email files<br>Cons:copy will not include deleted files, file slack and other information<br><br>refer<br>http:\/\/www.bk.psu.edu\/faculty\/bowers\/ist454\/PowerPoint\/Nelson\/ch09.pdf<\/p>\n\n\n\n<p><br>&#8230;.<\/p>\n\n\n\n<p><strong>Data acquisition mistakes<\/strong><br>wrong solution<br>wrong cable<br>insufficient time<br>wrong connections<br>poor knowledge of the instrument<\/p>\n\n\n\n<p><br><strong>\u9632\u6b62\u8cc7\u6599\u62bd\u53d6\u7684\u610f\u5916\u767c\u751f<\/strong><br>1.\u8981\u6709\u9810\u9632\u610f\u5916\u7684\u8a08\u756b<br>2.\u70ba\u4e86\u4fdd\u5b58\u6578\u4f4d\u8b49\u64da,\u8981\u5c0d\u8b49\u64da\u8cc7\u6599\u505a\u5099\u4efd<br>3.\u5982\u679c\u6015\u7b2c\u4e00\u4efdco\u51fa\u4f86\u7684\u8cc7\u6599\u640d\u6bc0 \u9084\u53ef\u4ee5\u6709\u7b2c\u4e8c\u4efdcopy<br>4.\u4f7f\u7528\u81f3\u5c11\u5169\u7a2e\u62bd\u53d6\u5de5\u5177\u4e26\u6bd4\u5c0d\u62bd\u53d6\u7d50\u679c\u662f\u5426\u76f8\u540c<br>refer<br>http:\/\/wenku.baidu.com\/view\/da7fbcd0360cba1aa811da11.html?re=view<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>Type of data acquisition<\/strong><br>static: hard disk<br>live: memory<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Disk Acquisition Tool Requirements<\/strong><\/h2>\n\n\n\n<p><br><strong>Tool requirements<\/strong><br>The tool should not change the original content \/Prevent Contamination.<br>The tool should log I\/O errors in an accessible and readable form, including the type and location of the error.<br>The tool must have the ability to be held up to scientific and peer review.&nbsp;<br>The tool should compute a hash value for the complete bit stream copy generated from an image file of the source.<br>ex:<br>using a well-tested hardware write-blocking device to Prevent that the evidence drive is changed<\/p>\n\n\n\n<p>ps<br><strong>hardware write blocker device<\/strong><br>a devices that allow acquisition of information on a drive without creating the possibility of accidentally damaging the drive contents.<br>the device is used to prevent the system from recording data on an evidence disk.<br>ex: write blockers,forensic bridges<br>refer<br>http:\/\/forensicswiki.org\/wiki\/Write_Blockers<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>Common Windows tool<\/strong><br>AccessData FTK<br>DD for windows<br>Snapback exact<br>Snapshot<br>DatArrest<br>Safeback<br>Encase<br>R-Drive Image \u53ef\u4ee5\u5728\u4e0d\u505c\u4e0bWindows\u7684\u72c0\u614b\u4e0b\u5099\u4efd<br>Disk Explorer<br>drive spy<\/p>\n\n\n\n<p><strong>accessdata FTK<\/strong><br>support source: memory, registry, pyshical disk<br>ps: when it finish acquisiisiton, hash will be made<br>output image support: dd,afk, e01<\/p>\n\n\n\n<p><strong>drive Spy<\/strong><br>1.Savesect \u5c07disk\u8907\u88fd\u6210\u6a94\u6848<br>2.WriteSect \u5c07\u6a94\u6848\u5beb\u56dedisk<br>3.SavePart \u5c07\u7279\u5b9aPartition\u4f5c\u6210image<br>4.WritePart \u5c07image\u8cc7\u6599\u5beb\u56de<\/p>\n\n\n\n<p>refer<br>http:\/\/wenku.baidu.com\/view\/da7fbcd0360cba1aa811da11.html?re=view<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>dd<\/strong><br>convert and copy a file, linux build-in tool\u3000<br>supporting Bit-stream disk-to-image file<br>\u5e38\u898b\u53c3\u6578\uff1a<br>if :input file,\u8868\u793a\u6307\u5b9a\u8b80\u53d6\u4f86\u6e90<br>of : output file,\u8868\u793a\u6307\u5b9a\u5beb\u5165\u76ee\u7684<br>bs : block size,\u8868\u793a\u8b80\u5165\u8207\u5beb\u5165\u7684\u5927\u5c0f,\u9810\u8a2d\u4ee5byte\u70ba\u55ae\u4f4d. bs\u8d8a\u5927\u8655\u7406\u901f\u5ea6\u8d8a\u5feb<br>count : \u8868\u793a\u8655\u7406\u7684\u6b21\u6578<br>conv: \u8f49\u63db\u53c3\u6578,\u5e38\u898b\u7684\u6709\u4ee5\u4e0b<br>\u3000notrunc&nbsp;\u4e0d\u622a\u65b7\u8f38\u51fa\u6587\u4ef6<br>\u3000noerror&nbsp;\u767c\u751f\u8b80\u932f\u8aa4\u6642\uff0c\u7e7c\u7e8c\u9032\u884c<br>\u3000sync&nbsp;\u628a\u6bcf\u500b\u8f38\u5165\u8a18\u9304\u7684\u5927\u5c0f\u90fd\u8abf\u5230ibs\u7684\u5927\u5c0f(\u7528NUL\u586b\u5145)<br>\u5e38\u898b\u7528\u9014<br><strong>Copy a partition to an image file<\/strong><br>ex:<br>block\u70ba10m\u800c\u4e14\u8981\u986f\u793a\u9032\u5ea6<br>dd if=.d: of=demo.dd bs=10m &#8211;progress<br>ex:<br>\u6a94\u6848\u5927\u65bc650m\u5c31\u5207\u5272<br>dd if=\/dev\/sdb | split -b 650m -image_sdb<br><strong>Copy the running memory to a file<\/strong><br>ex:<br>\u5c07memory\u8907\u88fd\u5230men.bin<br>dd if=\/dev\/mem of=\/root\/mem.bin bs=1024<br><strong>Restore a disk from an image file<\/strong><br>ex:<br>dd if=\/usr\/home\/partition.image of=\/dev\/sda2 bs=4096<\/p>\n\n\n\n<p>ps:<br>fciv can make hash from file that is made by dd<\/p>\n\n\n\n<p>refer<br>http:\/\/nathan-inlinux.blogspot.tw\/2013\/05\/linux-dd.html<br>http:\/\/fanqiang.chinaunix.net\/a1\/b5\/20010917\/1200021305_b.html<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>ddfldd<\/strong><br>\u9451\u8b58\u7b49\u7d1a\u7684DD\u5de5\u5177<br>\u53c3\u6578\u8207dd\u5dee\u4e0d\u591a<br>\u5e38\u7528\u53c3\u6578\u5982\u4e0b<br>\u3000vf: verify file<br>\u3000hash: \u9078\u64c7hash\u65b9\u5f0f<br>\u3000hashlog: log\u8a18\u9304\u4f4d\u7f6e<br>ex:<br><strong>Bit-stream disk-to-image file with hash verification<\/strong><br>ddfldd if=\/dev\/sda split=2m of=usbimg hash=md5 hashlog=usbhash.log<br>ex:<br><strong>fill the disk with zeros<\/strong><br>ddfldd if=\/dev\/zero of=\/dev\/sda bs=4096 conv=noerror,sync<\/p>\n\n\n\n<p>refer<br>http:\/\/blogger.gtwang.org\/2015\/01\/dd-command-examples.html<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Validation Methods<\/strong><\/h2>\n\n\n\n<p><strong>Validating data acquisitions<\/strong><br>hash is general method,<br>well-known hash is like md5,sha1<br>it is useful in before and after evidence examination<\/p>\n\n\n\n<p><strong>A method of use hash<\/strong><br>1.Make hashes of the evidence and compare it with the original hash that was taken<br>when the evidence first entered the lab<br>2.if someone suspects wheather evidence has been changed while at the lab, investigator can prove the evidence is the same as it was when it first entered the lab<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Disk Acquisition Concept Data  &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11],"tags":[],"class_list":["post-361","post","type-post","status-publish","format-standard","hentry","category-forensics"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/comments?post=361"}],"version-history":[{"count":0,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/361\/revisions"}],"wp:attachment":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/media?parent=361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/categories?post=361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/tags?post=361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}