Introduction to the Sleuth Kit(TSK) by Vinay Gurram
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
IBM Systems, Consult the Latest IBM System/370, 30Xx, and 4300 Processors Bibliography, GC20-0001, for the Editions That Are Applicable and Current
---- MVS/Extended Architecture Licensed --------- --- ---,--------- --- Data Facility Product: Program ( Planning Guide c- Order Number Data Facility Product Version 1 GC26-4040-3 5665-284 Release 1.2 o I~ourth Edition (.January 1987) This is a major revision of, and makes obsolete, GC26-4040-2. This edition applies to Version I Release 1.2 of MVSiExtended Architecture Data Facility Product, Licensed Program 5665-284, and to ariy subsequent releases until otherwise indicated in new editions or technical newsletters. The changes for this edition are summarized under "Summary of Changes" following the preface. Specific changes are indicated by' a vertical bar to the left of the change. These bars will be deleted at any subsequent republication of the page affected. Editorial changes that have no technical significance are not noted. Changes are made periodically to this publication; before using this publication in connection with the operation of IBM systems, consult the latest IBM System/370, 30xx, and 4300 Processors Bibliography, GC20-0001, for the editions that are applicable and current. References in this publication to IBM products, programs, or services do not imply that IBM intends to make these available in all countries in which IHM operates. Any reference to an IBM licensed program in this publication is not intended .to state or imply that only IHM's program may be used. Any functionally equivalent program may be used instead. Requests for IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. If you request publications from the address given below, your order will be delayed because publications are not stocked there. -
Abcs of IBM Z/OS System Programming Volume 3
Front cover ABCs of IBM z/OS System Programming Volume 3 Jose Gilberto Biondo Jr. Redbooks International Technical Support Organization ABCs of IBM z/OS System Programming Volume 3 January 2018 SG24-6983-04 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. Fifth Edition (January 2018) This edition applies to version 2 release 3 of IBM z/OS (product number 5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2004, 2018. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team who wrote this book . xi Now you can become a published author, too! . xii Comments welcome. xii Stay connected to IBM Redbooks . xiii Chapter 1. DFSMS introduction . 1 1.1 Introduction to DFSMS . 2 1.1.1 DFSMS components. 2 1.2 DFSMSdfp base element . 3 1.2.1 Managing storage . 3 1.3 DFSMSdss optional feature . 5 1.4 DFSMSrmm optional feature. 5 1.4.1 Library management . 5 1.4.2 Shelf management . 6 1.4.3 Volume management . 6 1.4.4 Data set management. 6 1.5 DFSMShsm optional feature . 6 1.5.1 Storage and space management . 6 1.5.2 Tape mount management. 7 1.5.3 Availability management . 7 1.6 DFSMStvs optional feature . 7 1.6.1 VSAM record-level sharing . 7 1.6.2 Recoverable resource management services. -
Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO
Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO..........................................................................................................................................1 Martin Hinner < [email protected]>, http://martin.hinner.info............................................................1 1. Introduction..........................................................................................................................................1 2. Volumes...............................................................................................................................................1 3. DOS FAT 12/16/32, VFAT.................................................................................................................2 4. High Performance FileSystem (HPFS)................................................................................................2 5. New Technology FileSystem (NTFS).................................................................................................2 6. Extended filesystems (Ext, Ext2, Ext3)...............................................................................................2 7. Macintosh Hierarchical Filesystem − HFS..........................................................................................3 8. ISO 9660 − CD−ROM filesystem.......................................................................................................3 9. Other filesystems.................................................................................................................................3 -
A Usability Analysis of the Autopsy Forensic Browser
Proceedings of the Second International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008) A Usability Analysis of the Autopsy Forensic Browser D.J. Bennett and P. Stephens Department of Computing (Academic), Canterbury Christ Church University, Canterbury, United Kingdom e-mail: {david.bennett, paul.stephens}@canterbury.ac.uk Abstract This paper reviews the usability of the Autopsy Forensic Browser. Two expert-based usability review techniques are used: Cognitive Walkthrough and Heuristic Evaluation. The results of the evaluation indicate that there are many areas where usability could be improved and these are classified into areas of eight overlapping areas. Examples from each area are presented, with suggestions as to methods to alleviate them. The paper concludes with a future work proposal to effect the changes suggested and retest the current and the replacement system with a user-based evaluation. Keywords Usability, Human-Computer Interaction, Interface Design, Autopsy Forensic Browser, The Sleuth Kit, Cognitive Walkthrough, Heuristic Evaluation 1. Introduction This paper reviews the usability of the Autopsy Forensic Browser tool. The reasoning for this is to improve future versions of the tool. In many ways forensic analysis tools are no different to any other mission critical software in terms of the need for usability. However, failure in usability in such tools could lead to outcomes which deny liberty to innocent persons, or enable criminals to continue with criminal activity should an investigation fail in some way. 1.1. Forensics and the Autopsy Forensic Browser Gottschalk et al. (2005) define computer forensics as the identification, preservation, investigation, and documentation of computer systems data used in criminal activity. -
24 File System
24 File System Directories, Links, FS Implementation February 4 2009 Winter Term 2008/09 Gerd Liefländer Recommended Reading Bacon, J.: Operating Systems (5) Silberschatz, A.: Operating System Concepts (10,11) Stallings, W.: Operating Systems (12) Tanenbaum, A.: Modern Operating Systems (6) Nehmer, J.: Systemsoftware (9) Solomon, D.A.: Inside Windows NT, 1998 … Distributed File-Systems related Papers Summary on some commodity OSes http://www.wsfprojekt.de/index.html © 2009 Universität Karlsruhe (TH), System Architecture Group 2 Overview Roadmap for Today Directories Pathname Link, Shortcut, Alias File Sharing Access Rights we focus on Unix/Linux Implementation of a FS Files Directories Shared Files Protected Files Storage Management Disk Space Management Study of your own and apply concepts of RAM-Management Block Size FS Reliability not in this course FS Performance © 2009 Universität Karlsruhe (TH), System Architecture Group 3 Directories Disk Structure Disk can be subdivided into partitions 1 Disks, partitions can be RAID protected against failure Disk or partition can be used raw – without a file system, or formatted with a file system (FS) Entity containing a FS known as a volume Each volume containing a FS also tracks that FS’s info in device directory or volume table of contents As well as general-purpose FSs there are many special- purpose FSs, frequently all within the same operating system or computer 1Partitions also known as minidisks, slices 5 © 2009 Universität Karlsruhe (TH) System Architecture -
Extending the Sleuth Kit and Its Underlying Model for Pooled Storage File System Forensic Analysis
Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Fraunhofer Institute for Communication, Information Processing and Ergonomics Jan-Niclas Hilgert* [email protected] Martin Lambertz [email protected] Daniel Plohmann [email protected] © Fraunhofer FKIE Digital Forensic Analysis Slide 2 August 8th, 2017 © Cyber Analysis & Defense Department, Fraunhofer FKIE File Systems n Define how data is read from and written to a storage device n Utilize metadata to keep order of the data stored n File systems differ in many aspects EXT2FS HFS NTFS n Extensive background knowledge is required for a forensic analysis n But not always existent Slide 3 August 8th, 2017 © Cyber Analysis & Defense Department, Fraunhofer FKIE File System Forensic Analysis De-Facto Standard Model Physical Storage Media Sectors of Data Device Analysis Volume Volume n Universal model for a file system Analysis forensic analysis n Presented by Brian Carrier in 2005 File System n Consists of four interdependent steps File Analysis n Implemented in The Sleuth Kit Application Analysis Slide 4 August 8th, 2017 © Cyber Analysis & Defense Department, Fraunhofer FKIE File System Forensic Analysis De-Facto Standard Model Physical Storage Media Sectors of Data Device Analysis n Works great on a lot of established file systems Volume Volume Analysis EXT2FS NTFS File System HFS File Analysis n Problem: It hasn’t been reviewed or changed since its publication Application Analysis Slide -
Digital Forensics Tutorials – Analyzing a Disk Image in Kali Autopsy
Digital Forensics Tutorials – Analyzing a Disk Image in Kali Autopsy Explanation Section About Disk Analysis Once the proper steps have been taken to secure and verify the disk image, the actual contents of the image must be analyzed for suspicious or incriminating evidence. When looking at the contents of an image, it is necessary to not only look at the clearly visible contents such as folders on the desktop and images in user files, but the image must also be checked for hidden, encrypted, or deleted files. It is always better to assume that a suspect may have known that they were to be investigated and took steps to hide, delete, or otherwise make it difficult to find the information they had been storing on their USB or computer. About Kali Linux Sleuth Kit and Autopsy Autopsy and Sleuth Kit are open source digital investigation tools that run on Windows, Linux, OS X, and other Unix systems. Autopsy is the custom front-end application of Sleuth Kit. They can be used to analyze disk images and perform in-depth analysis of file systems (such as NTFS, FAT, Ext3) and several volume system types. Examiners and analysts can use the Autopsy graphical interface or the Sleuth Kit command line tools to conduct an investigation. In this case, we will be launching the Autopsy graphical interface via the Sleuth Kit command line. Autopsy/Sleuth Kit allow for an examiner to open a .dd or other type of disk image file, hash the file, and search for files and other information contained within the file. -
The Sleuth Kit (TSK)/Autopsy Software Version: Version 3.2.2/Version 2.24
The Sleuth Kit (TSK) 3.2.2/Autopsy 2.24 Test Results for Deleted File Recovery and Active File Listing Tool July 2, 2014 This report was prepared for the Department of Homeland Security Science and Technology Directorate Cyber Security Division by the Office of Law Enforcement Standards of the National Institute of Standards and Technology. For additional information about the Cyber Security Division and ongoing projects, please visit www.cyber.st.dhs.gov. July 2014 Test Results for Deleted File Recovery and Active File Listing Tool: The Sleuth Kit (TSK) 3.2.2/Autopsy 2.24 Contents Introduction ......................................................................................................................... 1 How to Read This Report .................................................................................................... 1 1 Results Summary .......................................................................................................... 2 1.1 FAT ........................................................................................................................ 3 1.2 ExFat ...................................................................................................................... 3 1.3 NTFS ............................................................................................................................4 1.4 ext ........................................................................................................................... 4 1.5 HFS+ ..................................................................................................................... -
Comprehensive Study of Digital Forensics
ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 COMPREHENSIVE STUDY OF DIGITAL FORENSICS Jatinder kaur, Gurpal Singh SMCA, Thapar University, Patiala-147004, India [email protected], [email protected] Abstract— This paper presenting the review about digital forensics, it consists of techniques as well as various tools used to accomplish the tasks in the digital forensic process. Network forensics is forensics and important technology for network security area. In this paper, we inspect digital evidence collection processes using these tools. From last few decades the Figure 1 : Shows processes to collect digital data digital forensic techniques have been improved appreciably but still we face a lack of effective forensics tools to deal with varied incidents caused by these rising technologies and the advances 2. Collect, observe & preserve. in cyber crime. This article discusses the tools used in network 3. Analyze , identify and forensics , various gaps founds in these tools, and the 4. Rebuild the evidence and verify the result every time [16]. advantages and disadvantages of these tools. In the document describe digital evidence collection process Index Terms— Forensics, Digital evidence, Network forensics, as follows: computer forensics, Cyber crime , Encase, Sleuth Kit. 1. Where is the evidence? List out the systems were involved in the incident and from which evidence will be collected. I. INTRODUCTION 2. Establish what is likely to be relevant and admissible. Forensics is use of science and technology to investigate and When in doubt err on the side of collecting too much rather establish facts in criminal and civil courts of law. -
Taxonomy of Digital Forensics: Investigation Tools and Challenges
Taxonomy of Digital Forensics: Investigation Tools and Challenges Nikita Rana1, Gunjan Sansanwal1, Kiran Khatter1,2 and Sukhdev Singh1,2 1Department of Computer Science and Engineering Manav Rachna International University, Faridabad-121004, India 2Accendere Knowledge Management Services Pvt. Ltd., India Abstract In today’s world of computers, any kind of information can be made available within few clicks for different endeavours. The information may be tampered by changing the statistical properties and can be further used for criminal activities. These days, Cybercrimes are happening at a very large scale, and possess big threats to the security of an individual, firm, industry and even to developed countries. To combat such crimes, law enforcement agencies and investment institutions are incorporating supportive examination policies, procedures and protocols to address the complete investigation process. The paper entails a detailed review of several cybercrimes followed by various digital forensics processes involved in the cybercrime investigation. Further various digital forensics tools with detail explanation are discussed with their advantages, disadvantages, challenges, and drawbacks. A comparison among all the selected tools is also presented. Finally the paper recommends the need of training programs for the first responder and judgement of signature based image authentication. 1. INTRODUCTION Computer is a masterpiece made by the human race that has made our lives smooth and effortless. Computers have become the very bedrock of today’s technological environment and we use them in almost every aspect of our customary life. They are everywhere from shopping, banking to school and hospitals, even our own homes. Businesses depend on these devices and the Internet to do their daily transactions, marketing and communications across the globe and given to our desideratum to have the best of everything it has seen noteworthy diversifications. -
Introduction to DOS Logic
File Number 8360-36 Order No. GY24-50l7-l2 Introduction to DOS Logic Program Number 360N-CL-4S3 This reference publication gives an overall view of the Disk Operating System (008), and it briefly describes the associated control and service programs. It is intended for persons who are involved in program maintenance and for system programmers who are altering the program design. Program logic information is not needed for normal use or operation of the system control program. This manual is designed to introduce and to cross-reference the six companion PLMs of the Disk Operating System. These associated PLMs are listed in the Preface of this manual. For titles and abstracts of other associated publications, see the IBM System/360 and System/370 Bibliography, GA22-6822. DOS Release 26 I Thirteenth Edition (October 1971) This publication was formerly titled IBM System/360 Disk Operating System: Introduction to System Control Programs. Although titles of some DOS publications (including this one) have been simplified, the change does not affect the contents of the publications. This edition applies to Release 26 of the IBM Disk Operating System and to all subsequent releases until otherwise indicated in new editions or Technical Newsletters. Changes are continually made to the specifications herein; before . using this publication in connection with the operation of IBM systems, consult the latest System/360 and System/370 SRL Newsletter, GN20-0360, for the editions that are applicable and current. This edition is a major revision of, and obsoletes, GY24-5017-11. Summary of Amendments This edition provides documentation changes for: • Enhancements to OLTEP • Enhancements to PDAID • New problem determination commands ALTER, DSPLY, and DUMP • Maintenance and technical corrections Changes or additions to the text and illustrations are indicated by a vertical line to the left of the change. -
Pc-Based Partitions
Carrier_05.qxd 2/22/05 3:07 PM Page 81 PC-based5 Partitions The last chapter provided an overview of volume analysis and why it’s important. Now we’re going to leave the abstract discussion of volumes and dive into the details of the partition systems used in personal computers. In this chapter, we will look at DOS parti- tions, Apple partitions, and removable media. For each system, we review how it works and look at its data structure. If you are not interested in the data structure details, you can skip those sections. This chapter also covers special considerations that should be made when analyzing these systems. The next chapter will examine server-based partitioning systems. DOS PARTITIONS The most commonly encountered partition system is the DOS-style partition. DOS partitions have been used with Intel IA32 hardware (i.e., i386 / x86) for many years, yet there is no official specification. There are many Microsoft and non-Microsoft documents that discuss the partitions, but there is no standard reference. In addition to there being no standard reference, there is also no standard name. Microsoft now calls disks using this type of partition system Master Boot Record (MBR) disks. This is in comparison to a GUID Partition Table (GPT) disk that is used with the Extensible Firmware Interface (EFI) and the 64-bit Intel Itanium-based systems (IA64), which are discussed in the next chapter[Microsoft 2004a]. Starting with Windows 2000, Microsoft also differentiates between basic and dynamic disks. A basic disk refers to 81 Carrier_05.qxd 2/22/05 3:07 PM Page 82 CHAPTER 5 PC-BASED PARTITIONS either an MBR or a GPT disk, and the partitions in the disk are independent and stand- alone.