Forensics and
Investigations,
Second Edition
Chapter 4
Current Computer Forensics Tools
Objectives
Understand how to identify needs for computer
forensics tools, jgn beli semua tools, beli yang
dibutuhkan utk kasus saja.
Evaluate the requirements and expectations for
computer forensics tools
Understand how computer forensics hardware and
software tools integrate
Validate and test your computer forensics tools,
agar hasil yg diperoleh bisa diterima di pengadlan
Guide to Computer Forensics and Investigations, 2e
Acquisition
Validation and discrimination
Extraction
Reconstruction
Reporting
Acquisition
Akuisisi: mengambil alih, copy, mrp kategori pertama.
Acquisition categories:
Acquisition (continued)
Acquisition categories (continued):
Remote acquisition
Verification
Acquisition (continued)
salah satu tools yg digunakan: hexa, mengambil
data dr physical, hexa: bisa liat perubahan2
Filtering
Based on hash value sets
Analyzing file headers: hrs pintar2 baca hexa, jd tahu format2 file tsb,
bisa tahu file yg tersembunyi dlm file lain
Extraction
Termasuk kategori yg penting. Setelah 2, harus bisa extract (mengambil).
Teknik yg cukup urgent, harus bisa ditampilkan datanya, jgn tampilkan
bilangan hexa nya.
Data viewing
Keyword searching
Decompressing
10
Extraction (continued)
Carving
11
Reconstruction
Utk mengetahui proses2/langkah2 kejadian, dr barang bukti, data2 yg
terhapus, dan kemudian buat kesimpulan: valid, tdk ada yg terlewatkan.
12
Reporting
Dlm bentuk laporan ini mencerminkan investigasi
Configure your forensic tools to:
Log activities
Generate reports
13
Tool Comparisons
14
15
Flexibility
Reliability
Expandability
Keep a library with older version of your tools
16
Disadvantages
Cannot search inside archive and cabinet files
Most of them only work on FAT file systems
Guide to Computer Forensics and Investigations, 2e
17
SMART
The Coroners Toolkit (TCT)
Autopsy
SleuthKit
18
19
Disadvantages
Excessive resource requirements
Produce inconsistent results
Create tool dependencies
20
21
22
23
Disadvantages
Hard to find support for problems
Can become expensive if careless, karena coba2
24
25
Using a Write-Blocker
Prevents data writes (penulisan data) to a hard disk
Software options:
Software write-blockers are OS-dependent
PDBlock
Hardware options
Ideal for GUI forensic tools
Act as a bridge between the disk and the workstation
Tujuan: agar hd tdk mengalami perubahan di os yg
baru.
Guide to Computer Forensics and Investigations, 2e
26
27
28
29
30
31
32
33
34
35
36
Summary
Create a business plan to get the best hardware
and software
Computer forensics tools functions
Acquisition
Validation and discrimination
Extraction
Reconstruction
Reporting
37
Summary (continued)
Maintain a software library on your lab
Computer forensics tools types:
Software
Hardware
Forensics software:
Command-line
GUI
38
Summary (continued)
Forensics hardware:
Customized equipment
Commercial options
Include workstations and write-blockers
39