SlideShare a Scribd company logo
9
Most read
11
Most read
20
Most read
RecuperaBit: Forensic File System
Reconstruction Given Partially
Corrupted Metadata
C A N D I D AT E Andrea Lazzarotto
S U P E RV I S O R Ch. Prof. Riccardo Focardi
—
Ca’ Foscari
Dorsoduro 3246
30123 Venezia
Università
Ca’Foscari
Venezia
F I L E S Y S T E M R E C O N S T R U C T I O N
Work:
• File system reconstruction from damaged metadata
• Detection of partition geometry
• Tests against similar software
Motivation:
• File system analysis is used in many investigations
• Carving does not provide context
• File systems may be damaged
C O N T E N T S
1. F O R E N S I C F I L E S Y S T E M A N A LY S I S
Problem definition and N T F S features
2. F I L E S Y S T E M R E C O N S T R U C T I O N A L G O R I T H M
Tree reconstruction and partition detection
3. S O F T WA R E I M P L E M E N TAT I O N
Test results
F O R E N S I C F I L E S Y S T E M
A N A LY S I S
P R O B L E M D E F I N I T I O N
Problem (Forensic File System Reconstruction). Develop an algo-
rithm that reconstructs the directory structure of one or more
types of file systems.
I N P U T
1. Bitstream copy of drive
2. File system types to search
O U T P U T
Files divided in Root and Lost Files, for each detected file system.
FILE SYSTEM STRUCTURE
5 Root
0 $MFT
1 $MFTMirr
2 $LogFile
3 $Volume
4 $AttrDef
6 $Bitmap
7 $Boot
8 $BadClus
8:$Bad $BadClus:$Bad
9:$SDS $Secure:$SDS
9 $Secure
10 $UpCase
11 $Extend
25 $ObjId
24 $Quota
26 $Reparse
66 bbb.txt
64 interesting
65 aaa.txt
−1 LostFiles
67 Dir_67
68 another
N T F S
Interesting artifacts:
• B O O T S E C TO R S → partition geometry
• M F T E N T R I E S → identifier, name, timestamps of files
• I N D E X R E C O R D S → contents of directories
C O R R U P T E D M E TA D ATA (E X A M P L E )
Hard drive
New file system
Old file system
Boot sector
MFT MFT mirror
Backup boot sector
Result
F I L E S Y S T E M R E C O N S T R U C T I O N
A L G O R I T H M
D I S K S C A N N I N G
• The disk is S C A N N E D for artifacts (metadata carving)
• File records are C L U S T E R E D in partitions
• For N T F S: p = y − sx where s = 2
Hard drive
Sector y
Entry number x
3014 3016 3018 3020 3022 3024 3026 3028
29 30 31 32 33 102 103 104
Value of p2956 2956 2956 2956 2956 2820 2820 2820
D I R E C TO RY T R E E R E C O N S T R U C T I O N
Each node is linked to its parent (bottom-
up reconstruction).
When the parent is not available, a ghost
entry is created under Lost Files.
linked to parent
↑
PA RT I T I O N G E O M E T RY
Needed for extracting file contents and accessing external at-
tributes in N T F S (including index records).
Parameters:
• S P C (Sectors per Cluster)
• C B (Cluster Base) → where the file system starts
I N F E R E N C E O F PA RT I T I O N G E O M E T RY
Procedure:
1. Fingerprinting index records
2. Generation of text (from disk)
3. Generation of patterns (from partitions and S P C
enumeration)
4. Matching
T E X T G E N E R AT I O N (E X A M P L E )
The following index records are found on disk:
S E C TO R O W N E R I D
54 14
62 23
78 14
The resulting T E X T is:
. . . ∅ ∅ 14 ∅ ∅ ∅ ∅ ∅ ∅ ∅ 23 ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14
54 62 78
PAT T E R N G E N E R AT I O N (E X A M P L E )
Given the file records:
M F T E N T RY
P O I N T E R S TO
R E C O R D S (R U N L I S T )
14 11, 17
23 13
S P C = 1 → ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14 ∅ 23 ∅ ∅ ∅ 14
0 11 13 17
S P C = 2 → . . . ∅ ∅ 14 ∅ ∅ ∅ 23 ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14
22 26 34
A P P R O X I M AT E S T R I N G M AT C H I N G
Each pattern is matched against the text.
The best match provides both the C B and S P C parameters.
We use an optimized version of the Baeza-Yates–Perleberg algo-
rithm for approximate string matching.
S O F T WA R E I M P L E M E N TAT I O N
R E C U P E R A B I T
RecuperaBit is the software implementation of our
reconstruction algorithm:
• Modular program written in Python
• Full implementation for N T F S reconstruction
• Extensible by adding additional plug-ins
E X P E R I M E N T S
Test results:
• RecuperaBit was tested against 9 existing programs
• 4 different hard drive images were considered
• The final test involves increasing damage on one drive
F I L E S Y S T E M D E T E C T I O N
S O F T WA R E #1 #2 #3 #4
Gpart OK OK Nothing Partial
TestDisk OK OK Nothing OK (+1)
Autopsy OK Partial Nothing OK
Scrounge-NTFS OK OK Nothing OK
Restorer Ultimate OK OK OK OK
DMDE OK OK OK OK (+3)
Recover It All Now OK Nothing Nothing OK
GetDataBack OK OK Nothing OK (+1)
SalvageRecovery OK OK Nothing OK (+1)
RecuperaBit OK OK OK OK × 2 (+302)
D I R E C TO RY T R E E A C C U R A C Y
S O F T WA R E #1 #2 #3 #4
TestDisk Perfect Error — Error
Autopsy Perfect No files — Good
Scrounge-NTFS Partial Terrible Terrible Terrible
Restorer Ultimate Perfect Partial Perfect Good
DMDE Perfect Error Perfect Good
Recover It All Now Terrible — — No files
GetDataBack Perfect Good — Good
SalvageRecovery Perfect Terrible — Perfect
RecuperaBit Perfect Perfect Perfect Perfect
R E C O V E R E D F I L E C O N T E N T S
S O F T WA R E S PA R S E C O M P R E S S E D E N C RY P T E D
TestDisk OK OK Empty
Autopsy Empty OK OK
Scrounge-NTFS OK Unsupported OK
Restorer Ultimate OK OK OK
DMDE OK OK Unsupported
Recover It All Now OK Wrong OK
GetDataBack Empty OK OK
SalvageRecovery Empty Wrong OK
RecuperaBit OK Unsupported OK
O U T P U T Q U A L I T Y V S C O R R U P T I O N L E V E L
0% 20% 40% 60% 80% 100%
Damaged sectors
0
5000
10000
15000
19399
Numberoffiles
All detected files
Unreachable from Root
C O N C L U S I O N
Contributions:
• Generic bottom-up reconstruction algorithm
• Strategy for partition geometry detection (N T F S)
Results:
• Successful reconstruction in all tested cases
• Sometimes better than commercial programs

More Related Content

PDF
Ricostruzione forense di NTFS con metadati parzialmente danneggiati
PDF
The State of Go - Andrew Gerrand
PDF
Linux Administration (Revised Syllabus) [QP / October - 2012]
PPT
Live Forensics
DOCX
เทคนิคการค้นหาด้วย Google
PDF
Doing Horrible Things with DNS - Web Directions South
PPTX
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
Ricostruzione forense di NTFS con metadati parzialmente danneggiati
The State of Go - Andrew Gerrand
Linux Administration (Revised Syllabus) [QP / October - 2012]
Live Forensics
เทคนิคการค้นหาด้วย Google
Doing Horrible Things with DNS - Web Directions South
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell

What's hot (13)

PDF
Hide and seek - interesting uses of forensics and covert channels.
PDF
FSB: TreeWalker - SECCON 2015 Online CTF
PPTX
File management
PDF
Auscert Finding needles in haystacks (the size of countries)
PDF
BOSH deploys distributed systems, and Diego runs any containers
PDF
(130105) #fitalk trends in d forensics (dec, 2012)
PDF
00-Review of Linux Basics
PPTX
Linux files
PDF
OREO - Hack.lu CTF 2014
PPT
Repl internals
PDF
A couple of things about PostgreSQL...
PDF
10 more-things-you-can-do-with-python
PPTX
File Commands - R.D.Sivakumar
Hide and seek - interesting uses of forensics and covert channels.
FSB: TreeWalker - SECCON 2015 Online CTF
File management
Auscert Finding needles in haystacks (the size of countries)
BOSH deploys distributed systems, and Diego runs any containers
(130105) #fitalk trends in d forensics (dec, 2012)
00-Review of Linux Basics
Linux files
OREO - Hack.lu CTF 2014
Repl internals
A couple of things about PostgreSQL...
10 more-things-you-can-do-with-python
File Commands - R.D.Sivakumar
Ad

Viewers also liked (6)

PDF
Recuperare dati da partizioni NTFS danneggiate
PDF
Come si creano le app Android
PDF
Italy... in pictures
PDF
Network Forensics
PDF
Why Zsh is Cooler than Your Shell
PPTX
ELSA France "Teaching is us!"
Recuperare dati da partizioni NTFS danneggiate
Come si creano le app Android
Italy... in pictures
Network Forensics
Why Zsh is Cooler than Your Shell
ELSA France "Teaching is us!"
Ad

Similar to RecuperaBit: Forensic File System Reconstruction Given Partially Corrupted Metadata (20)

PDF
Code GPU with CUDA - Identifying performance limiters
DOCX
ITC 360Professor John CovingtonSystem Administration And Managemen.docx
PDF
Consistency, Availability, Partition: Make Your Choice
PPTX
Fast updating GG.pptx
PDF
Windows Forensics
PPTX
2016 bioinformatics i_database_searching_wimvancriekinge
PDF
Open Source Systems Performance
PDF
Bristol Uni - Use Cases of NoSQL
PPTX
Python pandas Library
PPTX
Bioinformatics t5-databasesearching v2014
PDF
Lec03-CS110 Computational Engineering
PPT
Bioinformatica 10-11-2011-t5-database searching
PPTX
Topological Data Analysis.pptx
PPTX
Data structures and algorithms
PDF
Question 1- List five types of authentication vulnerabilities that.pdf
PDF
Spring scala - Sneaking Scala into your corporation
PDF
Introduction to Compiler Development
PPT
Improving Software Reliability via Mining Software Engineering Data
PDF
PyData Paris 2015 - Track 3.2 Serge Guelton et Pierrick Brunet
PPT
6조
Code GPU with CUDA - Identifying performance limiters
ITC 360Professor John CovingtonSystem Administration And Managemen.docx
Consistency, Availability, Partition: Make Your Choice
Fast updating GG.pptx
Windows Forensics
2016 bioinformatics i_database_searching_wimvancriekinge
Open Source Systems Performance
Bristol Uni - Use Cases of NoSQL
Python pandas Library
Bioinformatics t5-databasesearching v2014
Lec03-CS110 Computational Engineering
Bioinformatica 10-11-2011-t5-database searching
Topological Data Analysis.pptx
Data structures and algorithms
Question 1- List five types of authentication vulnerabilities that.pdf
Spring scala - Sneaking Scala into your corporation
Introduction to Compiler Development
Improving Software Reliability via Mining Software Engineering Data
PyData Paris 2015 - Track 3.2 Serge Guelton et Pierrick Brunet
6조

More from Andrea Lazzarotto (10)

PDF
Abel, il sistema di build della nuova CAINE
PDF
Reverse Engineering per dispositivi IoT
PDF
Come sviluppo le applicazioni web
PDF
Pubblicità invasiva e spiona: come proteggersi su Android
PDF
Come funziona Internet e perché il software libero è fondamentale
PDF
Dallo scatto al volantino
PDF
Presentazione del progetto Itis Linux
PDF
Data Visualization — Le funzionalità matematiche di Sage per la visualizzazio...
PDF
Matematica di base e avanzata con Sage
PDF
Presentazioni di qualità professionale con Impress
Abel, il sistema di build della nuova CAINE
Reverse Engineering per dispositivi IoT
Come sviluppo le applicazioni web
Pubblicità invasiva e spiona: come proteggersi su Android
Come funziona Internet e perché il software libero è fondamentale
Dallo scatto al volantino
Presentazione del progetto Itis Linux
Data Visualization — Le funzionalità matematiche di Sage per la visualizzazio...
Matematica di base e avanzata con Sage
Presentazioni di qualità professionale con Impress

Recently uploaded (20)

PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Digital Systems & Binary Numbers (comprehensive )
PPTX
assetexplorer- product-overview - presentation
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
medical staffing services at VALiNTRY
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
ai tools demonstartion for schools and inter college
PDF
Nekopoi APK 2025 free lastest update
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
history of c programming in notes for students .pptx
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Softaken Excel to vCard Converter Software.pdf
Designing Intelligence for the Shop Floor.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Digital Systems & Binary Numbers (comprehensive )
assetexplorer- product-overview - presentation
Adobe Illustrator 28.6 Crack My Vision of Vector Design
2025 Textile ERP Trends: SAP, Odoo & Oracle
Odoo Companies in India – Driving Business Transformation.pdf
medical staffing services at VALiNTRY
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
How to Choose the Right IT Partner for Your Business in Malaysia
ai tools demonstartion for schools and inter college
Nekopoi APK 2025 free lastest update
Computer Software and OS of computer science of grade 11.pptx
history of c programming in notes for students .pptx
Which alternative to Crystal Reports is best for small or large businesses.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
wealthsignaloriginal-com-DS-text-... (1).pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Softaken Excel to vCard Converter Software.pdf

RecuperaBit: Forensic File System Reconstruction Given Partially Corrupted Metadata

  • 1. RecuperaBit: Forensic File System Reconstruction Given Partially Corrupted Metadata C A N D I D AT E Andrea Lazzarotto S U P E RV I S O R Ch. Prof. Riccardo Focardi — Ca’ Foscari Dorsoduro 3246 30123 Venezia Università Ca’Foscari Venezia
  • 2. F I L E S Y S T E M R E C O N S T R U C T I O N Work: • File system reconstruction from damaged metadata • Detection of partition geometry • Tests against similar software Motivation: • File system analysis is used in many investigations • Carving does not provide context • File systems may be damaged
  • 3. C O N T E N T S 1. F O R E N S I C F I L E S Y S T E M A N A LY S I S Problem definition and N T F S features 2. F I L E S Y S T E M R E C O N S T R U C T I O N A L G O R I T H M Tree reconstruction and partition detection 3. S O F T WA R E I M P L E M E N TAT I O N Test results
  • 4. F O R E N S I C F I L E S Y S T E M A N A LY S I S
  • 5. P R O B L E M D E F I N I T I O N Problem (Forensic File System Reconstruction). Develop an algo- rithm that reconstructs the directory structure of one or more types of file systems. I N P U T 1. Bitstream copy of drive 2. File system types to search O U T P U T Files divided in Root and Lost Files, for each detected file system.
  • 6. FILE SYSTEM STRUCTURE 5 Root 0 $MFT 1 $MFTMirr 2 $LogFile 3 $Volume 4 $AttrDef 6 $Bitmap 7 $Boot 8 $BadClus 8:$Bad $BadClus:$Bad 9:$SDS $Secure:$SDS 9 $Secure 10 $UpCase 11 $Extend 25 $ObjId 24 $Quota 26 $Reparse 66 bbb.txt 64 interesting 65 aaa.txt −1 LostFiles 67 Dir_67 68 another
  • 7. N T F S Interesting artifacts: • B O O T S E C TO R S → partition geometry • M F T E N T R I E S → identifier, name, timestamps of files • I N D E X R E C O R D S → contents of directories
  • 8. C O R R U P T E D M E TA D ATA (E X A M P L E ) Hard drive New file system Old file system Boot sector MFT MFT mirror Backup boot sector Result
  • 9. F I L E S Y S T E M R E C O N S T R U C T I O N A L G O R I T H M
  • 10. D I S K S C A N N I N G • The disk is S C A N N E D for artifacts (metadata carving) • File records are C L U S T E R E D in partitions • For N T F S: p = y − sx where s = 2 Hard drive Sector y Entry number x 3014 3016 3018 3020 3022 3024 3026 3028 29 30 31 32 33 102 103 104 Value of p2956 2956 2956 2956 2956 2820 2820 2820
  • 11. D I R E C TO RY T R E E R E C O N S T R U C T I O N Each node is linked to its parent (bottom- up reconstruction). When the parent is not available, a ghost entry is created under Lost Files. linked to parent ↑
  • 12. PA RT I T I O N G E O M E T RY Needed for extracting file contents and accessing external at- tributes in N T F S (including index records). Parameters: • S P C (Sectors per Cluster) • C B (Cluster Base) → where the file system starts
  • 13. I N F E R E N C E O F PA RT I T I O N G E O M E T RY Procedure: 1. Fingerprinting index records 2. Generation of text (from disk) 3. Generation of patterns (from partitions and S P C enumeration) 4. Matching
  • 14. T E X T G E N E R AT I O N (E X A M P L E ) The following index records are found on disk: S E C TO R O W N E R I D 54 14 62 23 78 14 The resulting T E X T is: . . . ∅ ∅ 14 ∅ ∅ ∅ ∅ ∅ ∅ ∅ 23 ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14 54 62 78
  • 15. PAT T E R N G E N E R AT I O N (E X A M P L E ) Given the file records: M F T E N T RY P O I N T E R S TO R E C O R D S (R U N L I S T ) 14 11, 17 23 13 S P C = 1 → ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14 ∅ 23 ∅ ∅ ∅ 14 0 11 13 17 S P C = 2 → . . . ∅ ∅ 14 ∅ ∅ ∅ 23 ∅ ∅ ∅ ∅ ∅ ∅ ∅ 14 22 26 34
  • 16. A P P R O X I M AT E S T R I N G M AT C H I N G Each pattern is matched against the text. The best match provides both the C B and S P C parameters. We use an optimized version of the Baeza-Yates–Perleberg algo- rithm for approximate string matching.
  • 17. S O F T WA R E I M P L E M E N TAT I O N
  • 18. R E C U P E R A B I T RecuperaBit is the software implementation of our reconstruction algorithm: • Modular program written in Python • Full implementation for N T F S reconstruction • Extensible by adding additional plug-ins
  • 19. E X P E R I M E N T S Test results: • RecuperaBit was tested against 9 existing programs • 4 different hard drive images were considered • The final test involves increasing damage on one drive
  • 20. F I L E S Y S T E M D E T E C T I O N S O F T WA R E #1 #2 #3 #4 Gpart OK OK Nothing Partial TestDisk OK OK Nothing OK (+1) Autopsy OK Partial Nothing OK Scrounge-NTFS OK OK Nothing OK Restorer Ultimate OK OK OK OK DMDE OK OK OK OK (+3) Recover It All Now OK Nothing Nothing OK GetDataBack OK OK Nothing OK (+1) SalvageRecovery OK OK Nothing OK (+1) RecuperaBit OK OK OK OK × 2 (+302)
  • 21. D I R E C TO RY T R E E A C C U R A C Y S O F T WA R E #1 #2 #3 #4 TestDisk Perfect Error — Error Autopsy Perfect No files — Good Scrounge-NTFS Partial Terrible Terrible Terrible Restorer Ultimate Perfect Partial Perfect Good DMDE Perfect Error Perfect Good Recover It All Now Terrible — — No files GetDataBack Perfect Good — Good SalvageRecovery Perfect Terrible — Perfect RecuperaBit Perfect Perfect Perfect Perfect
  • 22. R E C O V E R E D F I L E C O N T E N T S S O F T WA R E S PA R S E C O M P R E S S E D E N C RY P T E D TestDisk OK OK Empty Autopsy Empty OK OK Scrounge-NTFS OK Unsupported OK Restorer Ultimate OK OK OK DMDE OK OK Unsupported Recover It All Now OK Wrong OK GetDataBack Empty OK OK SalvageRecovery Empty Wrong OK RecuperaBit OK Unsupported OK
  • 23. O U T P U T Q U A L I T Y V S C O R R U P T I O N L E V E L 0% 20% 40% 60% 80% 100% Damaged sectors 0 5000 10000 15000 19399 Numberoffiles All detected files Unreachable from Root
  • 24. C O N C L U S I O N Contributions: • Generic bottom-up reconstruction algorithm • Strategy for partition geometry detection (N T F S) Results: • Successful reconstruction in all tested cases • Sometimes better than commercial programs