SlideShare a Scribd company logo
Dark DataandMissing EvidenceRob ZirnsteinPresidentForensic InnovationsJanuary 13th, 2011
Darth Vader?No, “Dark Data”, but they bothAre often associated with evilKeep secrets (“Luke, I’m your father”)Are potentially harmful
Dark Matter?No, “Dark Data”!  But they bothGo undetectedAre surrounded by    detectable stuffAffect things around them
What is Dark Data?Dark Data in our digital devicesEveryone creates it (unintentionally)Criminals may hide it (Anti-Forensics)Forensic tools can’t see itBut it is there!Data that we can’t seeOn our hard drivesOn out flash drivesIn our computer files
Where is Dark Data?DCO & HPAUnformatted Disk SpaceDeleted FilesUnknown FilesBetween FilesInside Common FilesDeleted Data Objects
Hard Drive LayoutDevice Configuration   Overlay (DCO)http://www.forensicswiki.org/wiki/SAFE_Block_XPData Cleaner+ http://www.mp3cdsoftware.com/blancco---data-cleaner--download-16317.htmhttp://www.utica.edu/academic/institutes/ecii/publications/articles/EFE36584-D13F-2962-67BEB146864A2671.pdfHost Protected   Area (HPA)http://www.thinkwiki.org/wiki/Hidden_Protected_AreaForensic Duplicatorhttp://www.tableau.com/pdf/en/Tableau_TD1_Product_Brief.pdfHDD Capacity Restore Tool http://hddguru.com/software/2007.07.20-HDD-Capacity-Restore-Tool/Unformatted Disk Space
Deleted FilesDeleted Files aren’t really gone?Unused Disk Space (in a volume)Disk Caches / Swap FilesWindows Recycle BinAre they hard to recover?Fragmentation is deadlyLarge databases tend to be   heavily fragmentedEven DFRWS Researchers find   that fragmentation can make   some file types impossible to   recover (http://www.dfrws.org/2007/challenge/results.shtml)
Unknown Files (1)500 types of files handled by eDiscovery, Document Management & Computer Forensics Tools50,000+* types of files in the world5,000 types of files typically in use*http://filext.com
Unknown Files (2) Typical ToolsFI Tools (23 wrong files)	   (26 Correct Files)
Between FilesAlternate Data Streams (ADS)Files hiding behind files (on NTFS)RAM SlackPadding between the end of a file and the end of the current sectorTypically zeros, sometimes random contentFile/Cluster/Residual/Drive SlackPadding between sectors used   & the end of the current clusterPrevious sector content that   should be used in File Carvinghttp://www.forensics-intl.com/def6.html
Inside Common FilesDeleted ObjectsEx: Adobe PDF & MS Office 2003 (OLE)	not removing deleted data (change tracking)Smuggled ObjectsEx: MS Office 2007 (Zip) and MS Wave	(RIFF) formats ignore foreign objectsObject / Stream SlackEx: OLE objects have sector size issues,	just like with disk sectorsField SlackEx: Image files that don’t use the whole	palette, and/or less than 8/16/32/48 bppSteganography
Smuggled ObjectsSome formats ignore	foreign objectsMS Office 2007 (Zip)MS Wave (RIFF)This exampleI added a file to a	Word 2007 document.The document opens	without any error.
Deleted Data in Slack  Deleted Data that evades Redaction
SteganographyIntentional Data Hiding
Is Dark Data Important?Cases are won or lost based on the ability to find the evidence.The strongest evidence may be hidden accidentally or intentionally.Corporate Digital Assets may be lost, but recoverable.Employee misconduct is tracked by the hidden trail of improper acts.Intellectual Property theft can	put a company out of business.Identify in-house criminals by detect-ing smuggled data before it leaves.
Dark Data Can Be FragileLive Forensics software tools run on the live system.The RAM that they use affects the memory cache files on the hard drive.The running computer deletes, fragments & over writes files on the hard drive constantly.Hard drive activity can destroy Dark Data!Dark Data must be collected first!Before other tools interfere with the data.Image RAMImage Hard Drive (when possible)Analyze Unallocated Disk SpaceAnalyze File Slack SpaceCollect relevant file types
What Does FI Do?Create Technologies to Capture Dark DataFile InvestigatorFile ExpanderFile HarvesterEquip Law Enforcement with ToolsFI TOOLSFI Object ExplorerFI Data Profiler Portable
FI TechnologiesFile InvestigatorDiscovers Files Masquerading as Other TypesIdentifies 3,953+ File TypesHigh Accuracy & SpeedFile ExpanderDiscovers Hidden Data within filesData missed by all forensic toolsFile Harvester (Under Development)Recovers deleted/lost files the	rest of the industry can’tWill eventually rebuild partial files
Thank youContactRob ZirnsteinRob.Zirnstein@ForensicInnovations.comwww.ForensicInnovations.com(317) 430-6891

More Related Content

PPTX
Dark Data Hiding in your Records: Opportunity or Danger?
PPTX
Dark Data In Live Forensics
PDF
Anti forensics-techniques-for-browsing-artifacts
PPTX
Anti forensic
PDF
Computer Forensics – What Every Lawyer Needs to Know
PDF
Foundation of Digital Forensics
PPTX
Computer Forensics
PDF
HLT 2013 - Triaging Foreign Language Documents for MEDEX by Brian Carrier
Dark Data Hiding in your Records: Opportunity or Danger?
Dark Data In Live Forensics
Anti forensics-techniques-for-browsing-artifacts
Anti forensic
Computer Forensics – What Every Lawyer Needs to Know
Foundation of Digital Forensics
Computer Forensics
HLT 2013 - Triaging Foreign Language Documents for MEDEX by Brian Carrier

What's hot (13)

PPTX
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
PPTX
Defcon 17 Tactical Fingerprinting using Foca
PPTX
Metadata Security: MetaShield Protector
PDF
Watching the Detectives: Using digital forensics techniques to investigate th...
PPS
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
PPTX
Dama - Protecting Sensitive Data on a Database
PPT
Cyber Crimes & Cyber Forensics
PPTX
Digital Forensics Overview
PDF
Trying to bottle the cloud forensic challenges with cloud computing
PPT
Anti-Forensic Rootkits
PPT
File Carving
PDF
Stop pulling the plug
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Defcon 17 Tactical Fingerprinting using Foca
Metadata Security: MetaShield Protector
Watching the Detectives: Using digital forensics techniques to investigate th...
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Dama - Protecting Sensitive Data on a Database
Cyber Crimes & Cyber Forensics
Digital Forensics Overview
Trying to bottle the cloud forensic challenges with cloud computing
Anti-Forensic Rootkits
File Carving
Stop pulling the plug
Ad

Similar to Dark Data and Missing Evidence (20)

PPTX
Latest presentation
PDF
CNIT 121: 11 Analysis Methodology
PDF
11 Analysis Methodology
PPT
Role of a Forensic Investigator
PDF
Reverse engineering-microsoft-exfat-file-system 33274
PDF
Digital forensics
PDF
Digital forensics.abdallah
PDF
CNIT 152 11 Analysis Methodology
PPTX
First Responders Course- Session 1 - Digital and Other Evidence [2004]
PPTX
Digital forensics lessons
PPTX
Data recovery techniques for delete images files.pptx
PPTX
3170725_Unit-4.pptx
PDF
AntiForensics - Leveraging OS and File System Artifacts.pdf
PPTX
Data Recovery techniques explained with examples
PDF
F1805023942
PDF
Digital Forensics
PPT
Basics of Digital Forensics, techniques and tools
PPT
DigitalForensicsDigitalForensics.pptDigitalForensics.ppt
PPT
DigitalForensicDigitalForensicDigitalForensic
PPTX
Computer forensics libin
Latest presentation
CNIT 121: 11 Analysis Methodology
11 Analysis Methodology
Role of a Forensic Investigator
Reverse engineering-microsoft-exfat-file-system 33274
Digital forensics
Digital forensics.abdallah
CNIT 152 11 Analysis Methodology
First Responders Course- Session 1 - Digital and Other Evidence [2004]
Digital forensics lessons
Data recovery techniques for delete images files.pptx
3170725_Unit-4.pptx
AntiForensics - Leveraging OS and File System Artifacts.pdf
Data Recovery techniques explained with examples
F1805023942
Digital Forensics
Basics of Digital Forensics, techniques and tools
DigitalForensicsDigitalForensics.pptDigitalForensics.ppt
DigitalForensicDigitalForensicDigitalForensic
Computer forensics libin
Ad

Recently uploaded (20)

PDF
Hybrid model detection and classification of lung cancer
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
A Presentation on Touch Screen Technology
PPTX
A Presentation on Artificial Intelligence
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Encapsulation theory and applications.pdf
PDF
project resource management chapter-09.pdf
Hybrid model detection and classification of lung cancer
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Univ-Connecticut-ChatGPT-Presentaion.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Assigned Numbers - 2025 - Bluetooth® Document
Chapter 5: Probability Theory and Statistics
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Zenith AI: Advanced Artificial Intelligence
Unlocking AI with Model Context Protocol (MCP)
Web App vs Mobile App What Should You Build First.pdf
Approach and Philosophy of On baking technology
A Presentation on Touch Screen Technology
A Presentation on Artificial Intelligence
1 - Historical Antecedents, Social Consideration.pdf
A comparative study of natural language inference in Swahili using monolingua...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Encapsulation theory and applications.pdf
project resource management chapter-09.pdf

Dark Data and Missing Evidence

  • 1. Dark DataandMissing EvidenceRob ZirnsteinPresidentForensic InnovationsJanuary 13th, 2011
  • 2. Darth Vader?No, “Dark Data”, but they bothAre often associated with evilKeep secrets (“Luke, I’m your father”)Are potentially harmful
  • 3. Dark Matter?No, “Dark Data”! But they bothGo undetectedAre surrounded by detectable stuffAffect things around them
  • 4. What is Dark Data?Dark Data in our digital devicesEveryone creates it (unintentionally)Criminals may hide it (Anti-Forensics)Forensic tools can’t see itBut it is there!Data that we can’t seeOn our hard drivesOn out flash drivesIn our computer files
  • 5. Where is Dark Data?DCO & HPAUnformatted Disk SpaceDeleted FilesUnknown FilesBetween FilesInside Common FilesDeleted Data Objects
  • 6. Hard Drive LayoutDevice Configuration Overlay (DCO)http://www.forensicswiki.org/wiki/SAFE_Block_XPData Cleaner+ http://www.mp3cdsoftware.com/blancco---data-cleaner--download-16317.htmhttp://www.utica.edu/academic/institutes/ecii/publications/articles/EFE36584-D13F-2962-67BEB146864A2671.pdfHost Protected Area (HPA)http://www.thinkwiki.org/wiki/Hidden_Protected_AreaForensic Duplicatorhttp://www.tableau.com/pdf/en/Tableau_TD1_Product_Brief.pdfHDD Capacity Restore Tool http://hddguru.com/software/2007.07.20-HDD-Capacity-Restore-Tool/Unformatted Disk Space
  • 7. Deleted FilesDeleted Files aren’t really gone?Unused Disk Space (in a volume)Disk Caches / Swap FilesWindows Recycle BinAre they hard to recover?Fragmentation is deadlyLarge databases tend to be heavily fragmentedEven DFRWS Researchers find that fragmentation can make some file types impossible to recover (http://www.dfrws.org/2007/challenge/results.shtml)
  • 8. Unknown Files (1)500 types of files handled by eDiscovery, Document Management & Computer Forensics Tools50,000+* types of files in the world5,000 types of files typically in use*http://filext.com
  • 9. Unknown Files (2) Typical ToolsFI Tools (23 wrong files) (26 Correct Files)
  • 10. Between FilesAlternate Data Streams (ADS)Files hiding behind files (on NTFS)RAM SlackPadding between the end of a file and the end of the current sectorTypically zeros, sometimes random contentFile/Cluster/Residual/Drive SlackPadding between sectors used & the end of the current clusterPrevious sector content that should be used in File Carvinghttp://www.forensics-intl.com/def6.html
  • 11. Inside Common FilesDeleted ObjectsEx: Adobe PDF & MS Office 2003 (OLE) not removing deleted data (change tracking)Smuggled ObjectsEx: MS Office 2007 (Zip) and MS Wave (RIFF) formats ignore foreign objectsObject / Stream SlackEx: OLE objects have sector size issues, just like with disk sectorsField SlackEx: Image files that don’t use the whole palette, and/or less than 8/16/32/48 bppSteganography
  • 12. Smuggled ObjectsSome formats ignore foreign objectsMS Office 2007 (Zip)MS Wave (RIFF)This exampleI added a file to a Word 2007 document.The document opens without any error.
  • 13. Deleted Data in Slack Deleted Data that evades Redaction
  • 15. Is Dark Data Important?Cases are won or lost based on the ability to find the evidence.The strongest evidence may be hidden accidentally or intentionally.Corporate Digital Assets may be lost, but recoverable.Employee misconduct is tracked by the hidden trail of improper acts.Intellectual Property theft can put a company out of business.Identify in-house criminals by detect-ing smuggled data before it leaves.
  • 16. Dark Data Can Be FragileLive Forensics software tools run on the live system.The RAM that they use affects the memory cache files on the hard drive.The running computer deletes, fragments & over writes files on the hard drive constantly.Hard drive activity can destroy Dark Data!Dark Data must be collected first!Before other tools interfere with the data.Image RAMImage Hard Drive (when possible)Analyze Unallocated Disk SpaceAnalyze File Slack SpaceCollect relevant file types
  • 17. What Does FI Do?Create Technologies to Capture Dark DataFile InvestigatorFile ExpanderFile HarvesterEquip Law Enforcement with ToolsFI TOOLSFI Object ExplorerFI Data Profiler Portable
  • 18. FI TechnologiesFile InvestigatorDiscovers Files Masquerading as Other TypesIdentifies 3,953+ File TypesHigh Accuracy & SpeedFile ExpanderDiscovers Hidden Data within filesData missed by all forensic toolsFile Harvester (Under Development)Recovers deleted/lost files the rest of the industry can’tWill eventually rebuild partial files

Editor's Notes

  • #2: This presentation was provided for an ASDFED Indianapolis Chapter meeting.
  • #3: How did I get the term “Dark Data”? Not from Darth Vader, but they do have some things in common.
  • #4: I copied “Dark Matter”, because it also goes undetected yet still affects things (objects/solar systems) around it.This image was created by observing the gravitational effects on light and objects around the matter. No instrument can actually see the dark matter directly.
  • #5: Dark Data is in everything digital that we create, yet we don’t see it.
  • #6: Dark Data is hiding in the most unsuspecting places.
  • #7: DCO – Used to reduce the disk size to exactly match the size of another hard drive. This makes it easier to clone hard drives.HPA – Used to store vendor utilities on a hard drive, where a user can’t delete them.These areas are difficult to access and add or remove.Unformatted Disk Space is the remaining space that has not been allocated to a disk volume that the user can access.
  • #8: Many recovery tools falsely report their recovery success. Many of the successfully recovered files are actually corrupted with other file fragments.
  • #9: Most Forensics Tools keep these files in the Exception Bin. Have you ever seen an investigation with an empty Exception Bin? What if the best evidence was hiding in that Exception Bin?!?Ex: Hidden TrueCrypt volume file, that looks like random data.
  • #10: The list on the left was produced with Windows, as an extreme example. Although, many eDiscovery tools don’t do much better than this.The list on the right was produced by a tool that specializes in accurately identifying thousands of file types.Notice the 3 Alternate Data Streams identified on the right. They weren’t just detected, but analyzed to catch any hidden file types.
  • #11: Many tools combine RAM slack with Drive Slack. This causes confusion when file carving for partial files, because these slacks come from different sources.
  • #12: Common files may contain stowaways.Bpp = Bits Per Pixel
  • #13: Step 1: Rename the file to be smuggled to ‘document.xml’ (I used a simple text file)Step 2: Rename Word.docx to Word.zipStep 3: Open Word.zip with WinZipStep 4: Add the new smuggled ‘document.xml’ to Word.zip (in the root)Step 5: Rename Word.zip to Word.docx
  • #14: This example shows an MS Outlook Form Template that was edited to remove part of a sentence. The deleted content is still there!When the paragraph/object shrank, the Stream Slack inherited the end of the paragraph.Existing Redaction tools use Microsoft libraries that ignore the Stream Slack.
  • #15: Smuggled data is broken down into bits and substituted for picture data that doesn’t effect the visible image enough to be noticed.May just change 1 bit per pixel, or fill the Field Slack.The smuggled data may also be encrypted before insertion.