Methodology and Automated Metadata Extraction from Multiple Volume Shadow Copies Henri Michael Van Goethem James Madison University
Total Page:16
File Type:pdf, Size:1020Kb
James Madison University JMU Scholarly Commons Masters Theses The Graduate School Fall 2012 Methodology and automated metadata extraction from multiple volume shadow copies Henri Michael van Goethem James Madison University Follow this and additional works at: https://commons.lib.jmu.edu/master201019 Part of the Computer Sciences Commons Recommended Citation van Goethem, Henri Michael, "Methodology and automated metadata extraction from multiple volume shadow copies" (2012). Masters Theses. 354. https://commons.lib.jmu.edu/master201019/354 This Thesis is brought to you for free and open access by the The Graduate School at JMU Scholarly Commons. It has been accepted for inclusion in Masters Theses by an authorized administrator of JMU Scholarly Commons. For more information, please contact [email protected]. Methodology and Automated Metadata Extraction from Multiple Volume Shadow Copies Henri M. van Goethem A thesis submitted to the Graduate Faculty of JAMES MADISON UNIVERSITY In Partial Fulfillment of the Requirements for the degree of Master of Science Department of Computer Science December 2012 Dedication This work is dedicated to my family for their unwavering commitment and patience throughout my studies for the JMU InfoSec program and this Thesis research effort. ii Acknowledgements I would like to acknowledge the following: Tim Leschke for his amazing vision, support, and insight throughout this Thesis research effort as well as for the DC3 Research Mentoring Program sponsorship that initially led to this research concept. Rob Lee, Mark McKinnon, Mike Hom, Troy Larson, Harlan Carvey, and the many other extremely talented ―digital investigator‖ trailblazers, who continuously innovate methods of analyzing and unveiling new sources of digital forensics data that reside in the systems we use each and every day. Many thanks for the expert guidance and support these individuals provided throughout this Thesis research. They are the true ―shadow warriors.‖ Steve Mead and Eric Eifert who provided immeasurable guidance and support throughout the process of completing multiple iterations of peer review and subsequent edits. Here‘s to ―FINAL‖.doc! The JMU InfoSec faculty and staff, who provided outstanding thought leadership, direction, and support throughout my memorable learning experience at JMU. Many thanks for ensuring the InfoSec program focused on proving the theoretical using concrete examples. iii Preface This Thesis research effort discusses the advancement of digital investigative and analysis techniques, resulting in the ability to generate more comprehensive timelines using historical system activity. It is assumed that in conjunction with proper digital investigative techniques, no evidentiary copy of a disk image, volume, etc, would be accessed directly in an investigation, including for the extraction of metadata/data. A suitable working copy should first be made from the evidentiary copy (using appropriate hardware write-blocking technology or approved techniques to safeguard the evidentiary copy). The working copy should then be used for the actual analysis and metadata/data extraction. iv Table of Contents Dedication ...................................................................................................................................................... ii Acknowledgements ....................................................................................................................................... iii Preface ............................................................................................................................................................iv Table of Contents ............................................................................................................................................ v List of Tables ............................................................................................................................................... viii List of Figures ................................................................................................................................................ix Abstract ........................................................................................................................................................ xii I. Introduction ............................................................................................................................................ 1 II. Background ............................................................................................................................................. 3 Timelines and Time Attributes in Digital Investigations ............................................................................ 3 Visualization of Change-Over-Time ........................................................................................................... 4 Windows Volume Shadow Copy Service ................................................................................................... 5 Windows Volume Shadow Copies............................................................................................................ 12 Rendering VSC Contents .......................................................................................................................... 13 III. Digital Investigations Using VSCs ....................................................................................................... 19 Accessing VSC metadata and data ............................................................................................................ 19 Using Windows Previous Versions ...................................................................................................... 20 Using vssadmin with mklink or net share ............................................................................................. 21 Restoring and accessing ........................................................................................................................ 23 Parsing VSCs ........................................................................................................................................ 24 VSC metadata/data extraction ................................................................................................................... 25 Using fls and mactime to extract timestamp metadata .......................................................................... 25 Using specialized utilities/methods ...................................................................................................... 27 IV. Achieving Automation for VSC Metadata/Data Extraction ................................................................. 30 Scripting manual tools .............................................................................................................................. 30 Using robocopy ......................................................................................................................................... 32 Using LogParser........................................................................................................................................ 34 v Using shadowcopy.py ............................................................................................................................... 36 Commercial & Open Source GUI Utilities ............................................................................................... 39 Using ShadowExplorer ......................................................................................................................... 39 Using ProDiscover ............................................................................................................................... 41 V. Merits and Limitations Analysis Confirms Requirements and Drives Enhancements ......................... 47 Merits and Limitations Analysis ............................................................................................................... 47 VI. Custom Modifications Extend Automation .......................................................................................... 53 Exploration of Advancements ................................................................................................................... 53 Utilities Used ........................................................................................................................................ 53 Automating Disk Image Mounting ....................................................................................................... 54 Enhancing Automated Metadata Extraction ......................................................................................... 58 Storage Format/Method ........................................................................................................................ 63 Metadata Storage in Database Format (SQLite)............................................................................... 63 Enhancement Results Summary ................................................................................................................ 67 VII. Conclusion ............................................................................................................................................ 72 Overview ................................................................................................................................................... 72 Research Activities ..................................................................................................................................