SlideShare a Scribd company logo
Module XLIX - Investigating Search
Keywords
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Logicube Launches Digital
Forensic Data Capture Device
Logicube® Inc., the industry’s leader in hard drive duplication technology, has launched the Forensic Dossier™, the newest
addition to its line of eForensics data capture solutions.
The Dossier is the fastest digital forensic data capture device on the market today, allowing investigators to capture and
authenticate at speeds approaching 6GB/min. Users can capture data from one or two suspect drives to one or two evidence
drives. This sophisticated solution provides built-in support for capture from a RAID drive pair (0, 1, JBOD) and can capture
data from a variety of flash media devices with a built-in media reader.
The versatile Dossier features built-in support for SATA and IDE drives with optional support for SCSI and SAS drives
scheduled to be available in late spring of this year. The Dossier also provides built-in USB and firewire connectivity and
features support for most solid state drives and supports microSATA and eSATA drives with optional cables.
“Developed to meet the complex challenges of digital forensic investigators, the Dossier is the cornerstone of a future-
focused platform of forensic products from Logicube. Sophisticated but easy to use, the Dossier’s design ensures
investigators will keep pace with advanced digital technology used in criminal activities”, commented Farid Emrani, Vice
President and COO of Logicube.
The Dossier features the highest level of authentication with the ability to compute MD5 and SHA-256 hash concurrently.
The Dossier also includes a drive spanning feature (scheduled to be available in spring 2009) that allows users to capture
from one large suspect drive to two smaller evidence drives. Other features include DD image files, keyword search, audit
trail reporting, and an internal flash memory to store keyword lists, software updates and reports and a touch screen display
for easy navigation.
The Dossier will be featured in the Logicube booth (#73640) at the 2009 International CES show held in Las Vegas, Nevada
January 8th through January 11th.
Source: http://pr-usa.net/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
• Keyword Search
• Keyword Search List
• Index-Based Keyword Searching
• Bitwise Searching
• Keyword Search Techniques
• Odyssey Keyword Search
This module will familiarize you with:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Odyssey Keyword Search
Bitwise SearchingKeyword Search
Index-Based Keyword Searching
Keyword Search List Keyword Search Techniques
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Keyword Search
Keywords are also known as Seed Information as they are the starting
point of the investigation
Keyword searching for terms relating to a case can be an important source
for experts charged with uncovering digital clues in a forensic
investigation
Experts frequently conduct keyword searches of active files, deleted files,
unallocated space, cookies, logs, temporary Internet files, etc. to search
for evidence
Crafting a keyword search term list that will help pinpoint relevant
information is crucial to successful keyword search results
Crafting the best keyword search may require trial and error, and the list
may need to be refined as the expert begins to uncover virtual clues
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Keyword Search (cont’d)
An experienced investigator usually maintains a collection of
search lists from his previous cases
Keyword search list can be built on an existing list
Keyword list can be re-used for a similar case directly
Search list is a part of systematic mechanism for knowledge
collection, management, sharing, and reuse that offer decision
support for the investigators
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Developing a Keyword Search
List
• The number of keywords in a given list will vary depending upon the type of the
forensic investigation and the facts of the case
• When choosing which words to incorporate in the list, concentrate on the terms
that are at the heart of the case
• Focusing on the most relevant terms will avoid being over inclusive of the
irrelevant data while offering the greatest likelihood of finding responsive
information
Select keywords with care:
• Searching for “whole words,” which match exact instances of a word, will
significantly cut down on search time
• For example, the term Sally (instead of Sal) will avoid finding irrelevant words
like salmon, salamander or salt
Reduce search time using “whole words”:
When formulating a keyword search list, consider the following tips:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Developing a Keyword Search
List (cont’d)
• When looking for a particular document, isolating specific phrases likely to be
found in the document can help achieve good results
Consider multiple word phrases:
• Noise words, such as “it, a, an, and, the,” initials, numbers, and acronyms can
result in an unreasonably high number of matches being returned
Avoid noise words, initials, numbers, and acronyms:
• In addition to sorting through gigabytes of information during a keyword search,
a computer forensic expert can assist users in selecting a set of keywords most
likely to yield relevant results
Engage expert assistance:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Index-Based Keyword Searching
Indexing is the process of pre-calculating the location
of keywords in advance of the search in order to
speed up the search process
Indexing allows the time consuming task of keyword
searching to be divided into an indexing phase which
may run unattended and an interactive searching
phase where the index is used to rapidly locate
keywords
An index is in a sense simply a list of offsets for
occurrences of keywords
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Bitwise Searching
Bitwise searching looks for simple text strings or regular expression matches in any
sectors on a drive including both unallocated and slack space
A full bitwise search may be more relevant if a hard disk is being searched for deleted
files or residual fragments of their content and when searching for complex regular
expressions(for example, looking for all strings that match a credit card number or
phone number)
The ability to perform regular expression searches enables the examiner to search for
non-text (binary) values such as file headers as well as complex text terms
The criminal might change the extension of files to hide the files but the investigator
can find all files of the given type even if someone has changed his name by searching
for files based on signatures in his header
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Keyword Search Techniques
• Regular expressions provide a more expressible language for describing objects
of interest than keywords
• Apart from formulating keyword searches, regular expressions can be used to
specify searches for Internet e-mail addresses and files of specific type
• Forensic utilities such as EnCase can be used for regular expression searches
• Regular expression searches suffer from false positives and false negatives
because not all types of data can be adequately defined using regular expressions
Regular expression search:
• It uses matching algorithm that permits character mismatches when searching
for keyword or pattern
• User must specify the degree of mismatches allowed
• Approximate matching can detect misspelled words, but mismatches also
increase the number of false positives
Approximate matching search:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Keyword Search Techniques
(cont’d)
• Custom searches are programmed using a general purpose programming
language for satisfying more complex criteria
Custom searches:
• Search of modification is an automated search for data objects that have
been modified since specified moments in the past
• Modification of data objects that are not usually modified, such as
operating system utilities, can be detected by comparing their current
hash with their expected hash
• A library of expected hashes must be built prior to the search
• Modification of a file can also be inferred from modification of its
timestamp
• Investigator assumes that a file is always modified simultaneously with its
timestamp, and since the timestamp is modified, he infers that the file
was modified too
Search of modifications:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Choice of Searching
Methodology
Investigations require a combination of context specific searching techniques and the
methodology
Factors affecting the choice and order of searching include:
• If the suspect is aware that he is under investigation, file-based content may have
been deleted, which leans toward bitwise searching
• If the content is likely to be present on the drive intact, index-based searching may
be more effective
Awareness of suspect:
• If there is a chance that the content resides in PDF, XLS, or HWP file, index-based
searching will be more thorough
• A preliminary bitwise search for the header bytes from these file types and
subsequent recovery of deleted files before the index-based search will combine
both techniques for the maximum effectiveness
Likely data format:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Issues with Keyword Searching
Keywords are rarely sufficient to specify the desired type of data objects
precisely
Output of keyword search can contain false positives and negatives
Encryption, compression, or inability of the search utility to interpret certain
data format lead to false negative
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Odyssey Keyword Search
http://basistech.com/
Odyssey Digital Forensics is software that finds all keyword variations with one search
Odyssey combines industry-leading language technology from Basis Technology, the
Rosette® Linguistics Platform, with a high-performance search system that can analyze
disk image files acquired from standard forensic tools
• Displayed left to right or right to left (as in Middle-Eastern languages)
• Stored with bits aligned left to right or right to left (“little Endian” or
“big Endian”)
• Encoded in UTF-8, UTF-16, or UTF-32 Unicode or any of dozens of
legacy text encoding systems
Odyssey recognizes text regardless of whether the text:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Keywords are also known as Seed Information as they are the starting point of the
investigation
Keyword search list can be built on an existing list
Indexing is the process of pre-calculating the location of keywords in advance of the search
in order to speed up the search process
Bitwise searching looks for simple text strings or regular expression matches in any sectors
on a drive including both unallocated and slack space
Investigations require a combination of context specific searching techniques, and the
methodology
Odyssey Digital Forensics is software that finds all keyword variations with one search
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

More Related Content

PDF
File000163
PDF
File000169
PDF
File000176
PDF
File000168
PDF
File000166
PDF
File000172
PDF
File000116

What's hot (20)

PDF
File000118
PDF
File000117
PDF
File000114
PDF
File000113
PDF
File000120
PDF
File000167
PDF
File000119
PDF
Chfi V3 Module 01 Computer Forensics In Todays World
PDF
CS6004 Cyber Forensics - UNIT IV
PPTX
Case study on Physical devices used in Computer forensics.
PPT
Introduction to computer forensic
PPTX
Cyber Incident Response & Digital Forensics Lecture
PDF
File000175
PPT
Forensic Lab Development
PDF
An introduction to cyber forensics and open source tools in cyber forensics
PDF
CS6004 Cyber Forensics - UNIT V
PPTX
Lect 6 computer forensics
DOCX
Forensic laboratory setup requirements
PPTX
Computer forensics
PPT
Digital Forensics
File000118
File000117
File000114
File000113
File000120
File000167
File000119
Chfi V3 Module 01 Computer Forensics In Todays World
CS6004 Cyber Forensics - UNIT IV
Case study on Physical devices used in Computer forensics.
Introduction to computer forensic
Cyber Incident Response & Digital Forensics Lecture
File000175
Forensic Lab Development
An introduction to cyber forensics and open source tools in cyber forensics
CS6004 Cyber Forensics - UNIT V
Lect 6 computer forensics
Forensic laboratory setup requirements
Computer forensics
Digital Forensics
Ad

Similar to File000162 (20)

PPTX
Rightsizing Open Source Software Identification
PDF
II-SDV 2017: Localizing International Content for Search, Data Mining and Ana...
PPT
Technical skills in multimedia for odl learners
PPTX
Routine Maintenance of Computer Systems and Basic Internet Search Skills
PPTX
FAIRDOM data management support for ERACoBioTech Proposals
PPTX
ERA CoBioTech Data Management Webinar
PPTX
Improving your team’s source code searching capabilities
PPTX
Improving your team's source code searching capabilities - Voxxed Thessalonik...
PDF
CS6007 information retrieval - 5 units notes
PDF
PatSeer Overview
PPTX
Eureka, I found it! - Special Libraries Association 2021 Presentation
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
PDF
Enterprise Search Share Point2009 Best Practices Final
PPTX
Reveal - An Enterprise Clinical Data Search Solution
PPTX
Research Data (and Software) Management at Imperial: (Everything you need to ...
PPTX
Securing APIs with Open Policy Agent
PPTX
Securing APIs with Open Policy Agent
PPTX
CSC315_LECTURE on database design and management
PPTX
Introduction to Information Retrieval (concepts and principles)
PPTX
What is Document Indexing? A tutorial for intelligent data capture.
Rightsizing Open Source Software Identification
II-SDV 2017: Localizing International Content for Search, Data Mining and Ana...
Technical skills in multimedia for odl learners
Routine Maintenance of Computer Systems and Basic Internet Search Skills
FAIRDOM data management support for ERACoBioTech Proposals
ERA CoBioTech Data Management Webinar
Improving your team’s source code searching capabilities
Improving your team's source code searching capabilities - Voxxed Thessalonik...
CS6007 information retrieval - 5 units notes
PatSeer Overview
Eureka, I found it! - Special Libraries Association 2021 Presentation
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Enterprise Search Share Point2009 Best Practices Final
Reveal - An Enterprise Clinical Data Search Solution
Research Data (and Software) Management at Imperial: (Everything you need to ...
Securing APIs with Open Policy Agent
Securing APIs with Open Policy Agent
CSC315_LECTURE on database design and management
Introduction to Information Retrieval (concepts and principles)
What is Document Indexing? A tutorial for intelligent data capture.
Ad

More from Desmond Devendran (20)

PDF
Siam key-facts
PDF
Siam foundation-process-guides
PDF
Siam foundation-body-of-knowledge
PDF
Enterprise service-management-essentials
PDF
Service Integration and Management
PDF
Diagram of iso_22301_implementation_process_en
PDF
File000174
PDF
File000173
PDF
File000171
PDF
File000170
PDF
File000165
PDF
File000164
PDF
File000161
PDF
File000160
PDF
File000159
PDF
File000158
PDF
File000157
PDF
File000156
PDF
File000155
Siam key-facts
Siam foundation-process-guides
Siam foundation-body-of-knowledge
Enterprise service-management-essentials
Service Integration and Management
Diagram of iso_22301_implementation_process_en
File000174
File000173
File000171
File000170
File000165
File000164
File000161
File000160
File000159
File000158
File000157
File000156
File000155

Recently uploaded (20)

PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Touch Screen Technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
1. Introduction to Computer Programming.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
project resource management chapter-09.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
A Presentation on Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cloud_computing_Infrastucture_as_cloud_p
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Tartificialntelligence_presentation.pptx
Approach and Philosophy of On baking technology
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Touch Screen Technology
MIND Revenue Release Quarter 2 2025 Press Release
1. Introduction to Computer Programming.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
project resource management chapter-09.pdf
Encapsulation_ Review paper, used for researhc scholars
Group 1 Presentation -Planning and Decision Making .pptx
Heart disease approach using modified random forest and particle swarm optimi...
OMC Textile Division Presentation 2021.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
DP Operators-handbook-extract for the Mautical Institute
A Presentation on Artificial Intelligence
Chapter 5: Probability Theory and Statistics
Univ-Connecticut-ChatGPT-Presentaion.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

File000162

  • 1. Module XLIX - Investigating Search Keywords
  • 2. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Logicube Launches Digital Forensic Data Capture Device Logicube® Inc., the industry’s leader in hard drive duplication technology, has launched the Forensic Dossier™, the newest addition to its line of eForensics data capture solutions. The Dossier is the fastest digital forensic data capture device on the market today, allowing investigators to capture and authenticate at speeds approaching 6GB/min. Users can capture data from one or two suspect drives to one or two evidence drives. This sophisticated solution provides built-in support for capture from a RAID drive pair (0, 1, JBOD) and can capture data from a variety of flash media devices with a built-in media reader. The versatile Dossier features built-in support for SATA and IDE drives with optional support for SCSI and SAS drives scheduled to be available in late spring of this year. The Dossier also provides built-in USB and firewire connectivity and features support for most solid state drives and supports microSATA and eSATA drives with optional cables. “Developed to meet the complex challenges of digital forensic investigators, the Dossier is the cornerstone of a future- focused platform of forensic products from Logicube. Sophisticated but easy to use, the Dossier’s design ensures investigators will keep pace with advanced digital technology used in criminal activities”, commented Farid Emrani, Vice President and COO of Logicube. The Dossier features the highest level of authentication with the ability to compute MD5 and SHA-256 hash concurrently. The Dossier also includes a drive spanning feature (scheduled to be available in spring 2009) that allows users to capture from one large suspect drive to two smaller evidence drives. Other features include DD image files, keyword search, audit trail reporting, and an internal flash memory to store keyword lists, software updates and reports and a touch screen display for easy navigation. The Dossier will be featured in the Logicube booth (#73640) at the 2009 International CES show held in Las Vegas, Nevada January 8th through January 11th. Source: http://pr-usa.net/
  • 3. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • Keyword Search • Keyword Search List • Index-Based Keyword Searching • Bitwise Searching • Keyword Search Techniques • Odyssey Keyword Search This module will familiarize you with:
  • 4. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Odyssey Keyword Search Bitwise SearchingKeyword Search Index-Based Keyword Searching Keyword Search List Keyword Search Techniques
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Keyword Search Keywords are also known as Seed Information as they are the starting point of the investigation Keyword searching for terms relating to a case can be an important source for experts charged with uncovering digital clues in a forensic investigation Experts frequently conduct keyword searches of active files, deleted files, unallocated space, cookies, logs, temporary Internet files, etc. to search for evidence Crafting a keyword search term list that will help pinpoint relevant information is crucial to successful keyword search results Crafting the best keyword search may require trial and error, and the list may need to be refined as the expert begins to uncover virtual clues
  • 6. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Keyword Search (cont’d) An experienced investigator usually maintains a collection of search lists from his previous cases Keyword search list can be built on an existing list Keyword list can be re-used for a similar case directly Search list is a part of systematic mechanism for knowledge collection, management, sharing, and reuse that offer decision support for the investigators
  • 7. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Developing a Keyword Search List • The number of keywords in a given list will vary depending upon the type of the forensic investigation and the facts of the case • When choosing which words to incorporate in the list, concentrate on the terms that are at the heart of the case • Focusing on the most relevant terms will avoid being over inclusive of the irrelevant data while offering the greatest likelihood of finding responsive information Select keywords with care: • Searching for “whole words,” which match exact instances of a word, will significantly cut down on search time • For example, the term Sally (instead of Sal) will avoid finding irrelevant words like salmon, salamander or salt Reduce search time using “whole words”: When formulating a keyword search list, consider the following tips:
  • 8. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Developing a Keyword Search List (cont’d) • When looking for a particular document, isolating specific phrases likely to be found in the document can help achieve good results Consider multiple word phrases: • Noise words, such as “it, a, an, and, the,” initials, numbers, and acronyms can result in an unreasonably high number of matches being returned Avoid noise words, initials, numbers, and acronyms: • In addition to sorting through gigabytes of information during a keyword search, a computer forensic expert can assist users in selecting a set of keywords most likely to yield relevant results Engage expert assistance:
  • 9. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Index-Based Keyword Searching Indexing is the process of pre-calculating the location of keywords in advance of the search in order to speed up the search process Indexing allows the time consuming task of keyword searching to be divided into an indexing phase which may run unattended and an interactive searching phase where the index is used to rapidly locate keywords An index is in a sense simply a list of offsets for occurrences of keywords
  • 10. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Bitwise Searching Bitwise searching looks for simple text strings or regular expression matches in any sectors on a drive including both unallocated and slack space A full bitwise search may be more relevant if a hard disk is being searched for deleted files or residual fragments of their content and when searching for complex regular expressions(for example, looking for all strings that match a credit card number or phone number) The ability to perform regular expression searches enables the examiner to search for non-text (binary) values such as file headers as well as complex text terms The criminal might change the extension of files to hide the files but the investigator can find all files of the given type even if someone has changed his name by searching for files based on signatures in his header
  • 11. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Keyword Search Techniques • Regular expressions provide a more expressible language for describing objects of interest than keywords • Apart from formulating keyword searches, regular expressions can be used to specify searches for Internet e-mail addresses and files of specific type • Forensic utilities such as EnCase can be used for regular expression searches • Regular expression searches suffer from false positives and false negatives because not all types of data can be adequately defined using regular expressions Regular expression search: • It uses matching algorithm that permits character mismatches when searching for keyword or pattern • User must specify the degree of mismatches allowed • Approximate matching can detect misspelled words, but mismatches also increase the number of false positives Approximate matching search:
  • 12. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Keyword Search Techniques (cont’d) • Custom searches are programmed using a general purpose programming language for satisfying more complex criteria Custom searches: • Search of modification is an automated search for data objects that have been modified since specified moments in the past • Modification of data objects that are not usually modified, such as operating system utilities, can be detected by comparing their current hash with their expected hash • A library of expected hashes must be built prior to the search • Modification of a file can also be inferred from modification of its timestamp • Investigator assumes that a file is always modified simultaneously with its timestamp, and since the timestamp is modified, he infers that the file was modified too Search of modifications:
  • 13. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Choice of Searching Methodology Investigations require a combination of context specific searching techniques and the methodology Factors affecting the choice and order of searching include: • If the suspect is aware that he is under investigation, file-based content may have been deleted, which leans toward bitwise searching • If the content is likely to be present on the drive intact, index-based searching may be more effective Awareness of suspect: • If there is a chance that the content resides in PDF, XLS, or HWP file, index-based searching will be more thorough • A preliminary bitwise search for the header bytes from these file types and subsequent recovery of deleted files before the index-based search will combine both techniques for the maximum effectiveness Likely data format:
  • 14. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Issues with Keyword Searching Keywords are rarely sufficient to specify the desired type of data objects precisely Output of keyword search can contain false positives and negatives Encryption, compression, or inability of the search utility to interpret certain data format lead to false negative
  • 15. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Odyssey Keyword Search http://basistech.com/ Odyssey Digital Forensics is software that finds all keyword variations with one search Odyssey combines industry-leading language technology from Basis Technology, the Rosette® Linguistics Platform, with a high-performance search system that can analyze disk image files acquired from standard forensic tools • Displayed left to right or right to left (as in Middle-Eastern languages) • Stored with bits aligned left to right or right to left (“little Endian” or “big Endian”) • Encoded in UTF-8, UTF-16, or UTF-32 Unicode or any of dozens of legacy text encoding systems Odyssey recognizes text regardless of whether the text:
  • 16. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Screenshot
  • 17. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Summary Keywords are also known as Seed Information as they are the starting point of the investigation Keyword search list can be built on an existing list Indexing is the process of pre-calculating the location of keywords in advance of the search in order to speed up the search process Bitwise searching looks for simple text strings or regular expression matches in any sectors on a drive including both unallocated and slack space Investigations require a combination of context specific searching techniques, and the methodology Odyssey Digital Forensics is software that finds all keyword variations with one search
  • 18. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 19. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited