官术网_书友最值得收藏!

  • Windows Forensics Cookbook
  • Oleg Skulkin Scar de Courcier
  • 260字
  • 2021-07-02 20:57:46

Introduction

As mentioned in the introductory section, Windows machines run on NTFS (New Technology File System).

Using the tools that we will discuss in this chapter, you will be able to uncover information not only about the files, but also about the layout of the disk itself, including deleted files and unallocated space. This can be of the utmost importance in a forensic investigation, particularly in cases where a user may have tried to cover up their actions using anti-forensic methods.

Some tools allow you to undelete files as well, thus restoring them, in whole or in part, to how they looked before they were deleted. This does, of course, depend on the extent to which a file has been overwritten, however it can be a useful way to find out about things a suspect doesn't want you to see.

In cases where the metadata about the files has been deleted, file carving is employed as a method of trying to recover the data within the files. This requires several steps, most of which will be performed by your investigative tool set of choice. Generally, it will begin by working out what type of file the item was (usually by looking at the headers), and then building up fragments of the file to form a more accurate picture of what used to be stored on the machine.

There are several solutions which deal with file system analysis, file carving, and the undeleting of files. In this chapter, we will be looking specifically at Autopsy, The Sleuth Kit, ReclaiMe, and PhotoRec.

主站蜘蛛池模板: 德令哈市| 扶余县| 新营市| 陆良县| 雷波县| 通辽市| 行唐县| 平舆县| 临江市| 华容县| 阜新市| 慈溪市| 南投市| 克东县| 肇东市| 景泰县| 县级市| 常山县| 伊宁市| 包头市| 拉萨市| 太原市| 玉山县| 唐河县| 米林县| 东海县| 易门县| 雷州市| 临夏市| 油尖旺区| 普兰店市| 桦川县| 阿克苏市| 贵州省| 鹿泉市| 博乐市| 晴隆县| 嵩明县| 卢氏县| 行唐县| 黄梅县|