SlideShare a Scribd company logo
Computer Forensics Tool Testing at NIST Jim Lyle  Information Technology Laboratory Phone: (301) 975-3207 E-mail:  [email_address] WWW: http://www.cftt.nist.gov
Computers &The Internet Marvelous tools Improve quality of life Enable global communication Improve productivity Makes many activities easer, faster, … … even criminal activity
A Shocking Revelation . . . Computers can be involved in crime … As a victim As a weapon As a witness As a record As contraband
Outline of an Investigation Get proper authorization Seize evidence (Hard drives, floppies …) Create duplicates for analysis Analyze the duplicates Exclude known benign files Examine obvious files Search for hidden evidence Report results
Investigators Need … Computer forensic investigators need tools that … Work as they should Produce results admissible in court
Admissible Results Software tools must meet Daubert criteria Tested: accurate, reliable & repeatable Peer reviewed Generally accepted methodology
Response to Problem Independent testing of forensic tools Public review of results  Apply black box testing theory to tools
Goals of CF at NIST Establish methodology for testing computer forensic tools (CFTT) Provide international standard reference data that tool makers and investigators can use in an investigations (NSRL)
Why NIST/ITL is involved Mission: Assist federal, state & local agencies NIST is a neutral organization – not law enforcement or vendor NIST provides an open, rigorous process
Project Sponsors NIST/OLES (Program management) NIJ (Major funding) FBI (Additional funding) DOD (Equipment and support) Homeland Security (Technical input) State & Local agencies (Technical input)
Project Tasks Identify forensics functions e.g.,  Disk imaging,  Hard drive write protect,  Deleted file recovery String searching Develop specification for each function Peer review of specification Test methodology for each function Test Tools (by function) & Report results
Current Activities Hard drive imaging tools Software hard drive write protect Hardware hard drive write protect Deleted file recovery String Searching
Challenges No standards or specifications for tools Arcane knowledge domain (e.g. DOS, Windows drivers) Reliably faulty hardware Many versions of each tool
Overview of Methodology CFTT directed by Steering Committee Functionality driven Specifications developed for specific categories of activities, e.g., disk imaging, hard drive write protect, etc. Test methodology developed for each category
Developing a Specification After tool function selected by SC … Focus group (law enforcement + NIST) develop tool function specification Spec posted to web for public comment Comments incorporated Develop test environment
Tool Test Process After SC selects a tool … Acquire tool & review documentation Select test cases Execute test cases Produce test report
Disk Imaging Test Parameters Value Parameter Yes, no Remote access Disk, FAT12/16/32, NT, Ext2 Object type None, Src Rd, Dst Wt, Img R/W/C Errors Src=Dst, Src<Dst, Src>Dst Relative size Dst interface   BIOS to IDE, BIOS to SCSI, ATA, ASPI, Legacy BIOS Source interface   Copy, Image, Verify   Functions
Capabilities to test disk imaging Accuracy of copy Compare disks Initialize disk sectors to unique content Verify source disk unchanged Corrupt an image file Error handling: reliably faulty disk
Test Case Structure: Setup 1.       Record details of source disk setup. 2.       Initialize the source disk to a known value. 3.       Hash the source disk and save hash value. 4.       Record details of test case setup. 5.       Initialize a destination disk. 6.       If the test requires a partition, create and format a partition on the destination disk. 7.       If the test uses an image file, partition and format a disk for the image file.
Test Case Structure: Run Tool If required, setup I/O error If required, create image file If required, corrupt image file Create destination
Test Case Structure: Measure Compare Source to Destination Rehash the Source
Test Logging Log everything, automatically if practical Hardware, Software, Versions Time/date Operator
Legacy BIOS Quirks Some may under report drive size Example, Quantum SIROCCO1700A has 3335472 sectors 3309/16/63 spc 1008 BIOS:  3,330,432  sectors with geometry  826/64/63 spc 4032 BIOS under reports by 1.25 logical cyls and 5 physicals
Evaluating Test Results If a test exhibits an anomaly … Look for hardware or procedural problem Anomaly seen before If unique, look at more cases Examine similar anomalies
Refining the Test Procedure During  dd  testing some results seemed to indicate that the Linux environment was making a change to the source disk.  After investigation we found that the problem was actually the test procedure.
Hard Drive Write Protect Can be done either in hardware or software Software write protection limited to specific environment: BIOS access or device driver Hardware write protection more general
Hard Drive BIOS Access
SWB Tool Operation
Test Harness Operation
HWB Testing CPU Device Send I/O CMD to Device Return result to CPU BUS1 BUS 2 PROTOCOL ANALYZER Monitor Bus Traffic BUS HWB
Impact Release 18 (Feb 2001) - A US government organization was doing some testing and uncovered an issue under a specific set of circumstances.  Linux doesn’t use the last sector if odd Several vendors have made product or documentation changes CFTT cited in some high profile court cases
Available Specifications Hard Drive Imaging (e.g., Safeback, EnCase, Ilook, Mares imaging tool) Write Block Software Tools (e.g., RCMP HDL, Pdblock, ACES) Write Block Hardware Devices (A-Card, FastBlock, NoWrite) – not final
Specifications Under Development String Searching Deleted File Recovery Revised Disk Imaging
Available Test Reports Sydex SafeBack 2.0 NTI Safeback 2.18 EnCase 3.20 GNU dd 4.0.36 (RedHat 7.1) FreeBSD 4.4 dd  RCMP HDL V0.8
Test Reports in Production RCMP HDL V0.4 RCMP HDL V0.5 RCMP HDL V0.7
Available Testing Software FS-TST – tools to test disk imaging: drive wipe, drive compare, drive hash (SHA1), partition compare. (DCCI uses these tools) SWBT – tools to test interrupt 13 software write blockers
Benefits of CFTT Benefits of a forensic tool testing program Users can make informed choices Neutral test program (not law enforcement) Reduce challenges to admissibility of digital evidence Tool creators make better tools
Contacts Jim Lyle Doug White www.cftt.nist.gov www.nsrl.nist.gov [email_address] [email_address] Mark Skall Chief, Software Diagnostics & Conformance Testing Div. www.itl.nist.gov/div897 [email_address] Sue Ballou, Office of Law Enforcement Standards Steering Committee Rep. For State/Local Law Enforcement susan.ballou@nist.gov

More Related Content

PDF
Accessing Forensic Images
PPTX
Forensic imaging
PDF
Forensics of a Windows System
PPTX
Forensic imaging tools
ODP
Introduction to forensic imaging
PPTX
Open Source Forensics
PPTX
Unmasking Careto through Memory Forensics (video in description)
PDF
SACON - Windows Forensic (Dr. Phil Polstra)
Accessing Forensic Images
Forensic imaging
Forensics of a Windows System
Forensic imaging tools
Introduction to forensic imaging
Open Source Forensics
Unmasking Careto through Memory Forensics (video in description)
SACON - Windows Forensic (Dr. Phil Polstra)

What's hot (20)

PDF
(SACON) Dr. Phil Polstra - windows & linux forensics
PPTX
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
PPTX
The Forensic Lab
PPTX
Msra 2011 windows7 forensics-troyla
ODP
File carving tools
PDF
SANS Windows Artifact Analysis 2012
PDF
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
PPT
Digital Forensics in the Archive
PPTX
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
PPTX
Forensic Memory Analysis of Android's Dalvik Virtual Machine
PPT
Live data collection_from_windows_system
PPT
PDF
Memory Analysis of the Dalvik (Android) Virtual Machine
PDF
File000173
PPTX
Scan disk
PPT
Live Memory Forensics on Android devices
PDF
Next Generation Memory Forensics
PPT
Forensics of a Windows Systems
PPTX
Remnux tutorial-1 Statically Analyse Portable Executable(PE) Files
PDF
Dfrws eu 2014 rekall workshop
(SACON) Dr. Phil Polstra - windows & linux forensics
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
The Forensic Lab
Msra 2011 windows7 forensics-troyla
File carving tools
SANS Windows Artifact Analysis 2012
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
Digital Forensics in the Archive
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Live data collection_from_windows_system
Memory Analysis of the Dalvik (Android) Virtual Machine
File000173
Scan disk
Live Memory Forensics on Android devices
Next Generation Memory Forensics
Forensics of a Windows Systems
Remnux tutorial-1 Statically Analyse Portable Executable(PE) Files
Dfrws eu 2014 rekall workshop
Ad

Viewers also liked (20)

PPT
CóMo Escribir Un Texto Escrito
PPT
Evaluation
PPT
G R U P O V I R T U A L
PPT
Present
PPT
GoogleSky Status at Google
PPT
Peligroso Plastico
PPT
Introdução ao marketing de busca
PDF
Diploma Project - Poster
PPT
PPT
D I G I T A L B E T A
PDF
PáGina Crianças7 03 09 Pdf[1].Asp
PPS
Abortion - Sensetive
PPT
Reflexionmauriciovelasco
PDF
Informations Management
PPT
Cogigo De Barras Mily
PPT
3 Sesion
PPT
Grupo3 Henrike 8ºB
PPT
Fotos de España
CóMo Escribir Un Texto Escrito
Evaluation
G R U P O V I R T U A L
Present
GoogleSky Status at Google
Peligroso Plastico
Introdução ao marketing de busca
Diploma Project - Poster
D I G I T A L B E T A
PáGina Crianças7 03 09 Pdf[1].Asp
Abortion - Sensetive
Reflexionmauriciovelasco
Informations Management
Cogigo De Barras Mily
3 Sesion
Grupo3 Henrike 8ºB
Fotos de España
Ad

Similar to Digital Forensic Tools - Application Specific. (20)

PPT
Lecture 8 comp forensics 03 10-18 file system
PDF
kbrgwillis.pdf
PDF
Foundation of Digital Forensics
PDF
Guide to Computer Forensics'.pdf
PPT
1234567NeFX-10-lyle-CFTT-test-strategy.ppt
PPTX
computer forensic tools-Hardware & Software tools
PPTX
First Responder Course - Session 10 - Static Evidence Collection [2004]
PPT
Current Computer Forensics Tools in Cyber forensics.ppt
PPT
Forensic Lab Development
DOCX
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
PDF
CNIT 121: 11 Analysis Methodology
PDF
Workshop 2 revised
PPS
intro to forensics
PDF
the Cyber - Forensics - Lab - Manual . pdf
PDF
Debian Linux as a Forensic Workstation
PPTX
CSE4004_Module4_1.pptx
DOCX
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
PPTX
The design of forensic computer workstations
PPTX
Digital Forensics by William C. Barker (NIST)
PDF
What the Heck Just Happened?
Lecture 8 comp forensics 03 10-18 file system
kbrgwillis.pdf
Foundation of Digital Forensics
Guide to Computer Forensics'.pdf
1234567NeFX-10-lyle-CFTT-test-strategy.ppt
computer forensic tools-Hardware & Software tools
First Responder Course - Session 10 - Static Evidence Collection [2004]
Current Computer Forensics Tools in Cyber forensics.ppt
Forensic Lab Development
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
CNIT 121: 11 Analysis Methodology
Workshop 2 revised
intro to forensics
the Cyber - Forensics - Lab - Manual . pdf
Debian Linux as a Forensic Workstation
CSE4004_Module4_1.pptx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
The design of forensic computer workstations
Digital Forensics by William C. Barker (NIST)
What the Heck Just Happened?

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
MIND Revenue Release Quarter 2 2025 Press Release
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Big Data Technologies - Introduction.pptx
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf

Digital Forensic Tools - Application Specific.

  • 1. Computer Forensics Tool Testing at NIST Jim Lyle Information Technology Laboratory Phone: (301) 975-3207 E-mail: [email_address] WWW: http://www.cftt.nist.gov
  • 2. Computers &The Internet Marvelous tools Improve quality of life Enable global communication Improve productivity Makes many activities easer, faster, … … even criminal activity
  • 3. A Shocking Revelation . . . Computers can be involved in crime … As a victim As a weapon As a witness As a record As contraband
  • 4. Outline of an Investigation Get proper authorization Seize evidence (Hard drives, floppies …) Create duplicates for analysis Analyze the duplicates Exclude known benign files Examine obvious files Search for hidden evidence Report results
  • 5. Investigators Need … Computer forensic investigators need tools that … Work as they should Produce results admissible in court
  • 6. Admissible Results Software tools must meet Daubert criteria Tested: accurate, reliable & repeatable Peer reviewed Generally accepted methodology
  • 7. Response to Problem Independent testing of forensic tools Public review of results Apply black box testing theory to tools
  • 8. Goals of CF at NIST Establish methodology for testing computer forensic tools (CFTT) Provide international standard reference data that tool makers and investigators can use in an investigations (NSRL)
  • 9. Why NIST/ITL is involved Mission: Assist federal, state & local agencies NIST is a neutral organization – not law enforcement or vendor NIST provides an open, rigorous process
  • 10. Project Sponsors NIST/OLES (Program management) NIJ (Major funding) FBI (Additional funding) DOD (Equipment and support) Homeland Security (Technical input) State & Local agencies (Technical input)
  • 11. Project Tasks Identify forensics functions e.g., Disk imaging, Hard drive write protect, Deleted file recovery String searching Develop specification for each function Peer review of specification Test methodology for each function Test Tools (by function) & Report results
  • 12. Current Activities Hard drive imaging tools Software hard drive write protect Hardware hard drive write protect Deleted file recovery String Searching
  • 13. Challenges No standards or specifications for tools Arcane knowledge domain (e.g. DOS, Windows drivers) Reliably faulty hardware Many versions of each tool
  • 14. Overview of Methodology CFTT directed by Steering Committee Functionality driven Specifications developed for specific categories of activities, e.g., disk imaging, hard drive write protect, etc. Test methodology developed for each category
  • 15. Developing a Specification After tool function selected by SC … Focus group (law enforcement + NIST) develop tool function specification Spec posted to web for public comment Comments incorporated Develop test environment
  • 16. Tool Test Process After SC selects a tool … Acquire tool & review documentation Select test cases Execute test cases Produce test report
  • 17. Disk Imaging Test Parameters Value Parameter Yes, no Remote access Disk, FAT12/16/32, NT, Ext2 Object type None, Src Rd, Dst Wt, Img R/W/C Errors Src=Dst, Src<Dst, Src>Dst Relative size Dst interface BIOS to IDE, BIOS to SCSI, ATA, ASPI, Legacy BIOS Source interface Copy, Image, Verify Functions
  • 18. Capabilities to test disk imaging Accuracy of copy Compare disks Initialize disk sectors to unique content Verify source disk unchanged Corrupt an image file Error handling: reliably faulty disk
  • 19. Test Case Structure: Setup 1.      Record details of source disk setup. 2.      Initialize the source disk to a known value. 3.      Hash the source disk and save hash value. 4.      Record details of test case setup. 5.      Initialize a destination disk. 6.      If the test requires a partition, create and format a partition on the destination disk. 7.      If the test uses an image file, partition and format a disk for the image file.
  • 20. Test Case Structure: Run Tool If required, setup I/O error If required, create image file If required, corrupt image file Create destination
  • 21. Test Case Structure: Measure Compare Source to Destination Rehash the Source
  • 22. Test Logging Log everything, automatically if practical Hardware, Software, Versions Time/date Operator
  • 23. Legacy BIOS Quirks Some may under report drive size Example, Quantum SIROCCO1700A has 3335472 sectors 3309/16/63 spc 1008 BIOS: 3,330,432 sectors with geometry 826/64/63 spc 4032 BIOS under reports by 1.25 logical cyls and 5 physicals
  • 24. Evaluating Test Results If a test exhibits an anomaly … Look for hardware or procedural problem Anomaly seen before If unique, look at more cases Examine similar anomalies
  • 25. Refining the Test Procedure During dd testing some results seemed to indicate that the Linux environment was making a change to the source disk. After investigation we found that the problem was actually the test procedure.
  • 26. Hard Drive Write Protect Can be done either in hardware or software Software write protection limited to specific environment: BIOS access or device driver Hardware write protection more general
  • 27. Hard Drive BIOS Access
  • 30. HWB Testing CPU Device Send I/O CMD to Device Return result to CPU BUS1 BUS 2 PROTOCOL ANALYZER Monitor Bus Traffic BUS HWB
  • 31. Impact Release 18 (Feb 2001) - A US government organization was doing some testing and uncovered an issue under a specific set of circumstances. Linux doesn’t use the last sector if odd Several vendors have made product or documentation changes CFTT cited in some high profile court cases
  • 32. Available Specifications Hard Drive Imaging (e.g., Safeback, EnCase, Ilook, Mares imaging tool) Write Block Software Tools (e.g., RCMP HDL, Pdblock, ACES) Write Block Hardware Devices (A-Card, FastBlock, NoWrite) – not final
  • 33. Specifications Under Development String Searching Deleted File Recovery Revised Disk Imaging
  • 34. Available Test Reports Sydex SafeBack 2.0 NTI Safeback 2.18 EnCase 3.20 GNU dd 4.0.36 (RedHat 7.1) FreeBSD 4.4 dd RCMP HDL V0.8
  • 35. Test Reports in Production RCMP HDL V0.4 RCMP HDL V0.5 RCMP HDL V0.7
  • 36. Available Testing Software FS-TST – tools to test disk imaging: drive wipe, drive compare, drive hash (SHA1), partition compare. (DCCI uses these tools) SWBT – tools to test interrupt 13 software write blockers
  • 37. Benefits of CFTT Benefits of a forensic tool testing program Users can make informed choices Neutral test program (not law enforcement) Reduce challenges to admissibility of digital evidence Tool creators make better tools
  • 38. Contacts Jim Lyle Doug White www.cftt.nist.gov www.nsrl.nist.gov [email_address] [email_address] Mark Skall Chief, Software Diagnostics & Conformance Testing Div. www.itl.nist.gov/div897 [email_address] Sue Ballou, Office of Law Enforcement Standards Steering Committee Rep. For State/Local Law Enforcement susan.ballou@nist.gov

Editor's Notes

  • #2: It is my pleasure to be here with you today to describe some of the significant work ongoing at NIST involving information technology and the fairly new concept of computer forensics. NIST is attempting to introduce science into the computer forensics arena by basing our work on first principles of computer science, accepted practice, peer review, and publication of results. &lt;click&gt;