As was mentioned earlier, if the evidence is ever going to be used in a
court (or similar venue), you must maintain a good chain of evidence and do
your investigative work with a forensic copy that was made from the
original with a write-protection device (or similar technology) used
between the source and the machine doing the copying.


On Wed, Apr 30, 2014 at 2:29 PM, Matthew W. Ross
<[email protected]>wrote:

> If at all possible, I leave the suspect drive untouched. I have read that
> you can compromise your evidence if you try to do your work on the drive
> itself. This makes sense: any deleted items still exist on the drive until
> the free'd up sectors are overwritten by the drives use.
>
> I will usually make a backup using Redo Backup, which is a nice livecd (Or
> PXE boot... Hrm, I need to work on that...) for making a sector-for-sector
> copy. It allows me to keep a copy of the drive on a server, then create my
> forensics target on a spare drive. I put the spare drive into a different
> computer as a slave to run my tests.
>
> Using this method, I can recover deleted files from the forensics copy of
> the drive.
>
>
> --Matt Ross
> Ephrata School District
>
>
> Mike Tobias <[email protected]> , 4/30/2014 9:49 AM:
>
>  I’m noting these recommendations too, even though I didn’t start the
> thread. Interesting that you would run this on the copy and not the
> original. Are you making sector by sector copies that also somehow copy
> deleted files to the target?
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Matthew W. Ross
> *Sent:* Wednesday, April 30, 2014 12:19 PM
> *To:* [email protected]
> *Subject:* Re: [NTSysADM] Forensic Software Undelete / Recovery
>
>
>
> Pro-active? No idea.
>
>
>
> When we have to collect evidence, we do the following:
>
>
>
> 1. Confiscate the hardware.
>
> 2. Make copies.
>
> 3. Run discovery software. If you can, do this on the copy you made, not
> the original.
>
>
>
> The software we use is OSForensics, the free edition. I'm sure there are
> some much beefier programs out there.
>
>
>
> Also useful (for us in particular) is the BrowsingHistoryView from
> NirSoft. It allows you to quickly create a view of all browsing history on
> a computer broken down by user, which is often what we need to investigate.
>
>
>
>
>
> --Matt Ross
> Ephrata School District
>
>  John Bonner <[email protected]> , 4/29/2014 8:44 PM:
>
> Hello,
>
> I am looking for some recommendations on forensics recovery software. I
> (the company really) am willing to throw some $$$ at it as well. We often
> (not always) have proprietary / patentable information exposed to us by our
> clients and looking for a way to handle a situation should it arise with an
> employee.
>
> I am interested in two things.
>
>
>    1. Postumous recovery. Deleted files / browser cache / history to see
>    what sites were visited / recover deleted files and such.
>    2. Pro-active monitoring that we could incorporate into our base
>    install. Something that runs unbeknownst and perhaps when files are
>    "deleted" really are moved to a secret partition or along those lines.
>
>
> I personally have used r-tools and have been pleased with the results but
> I think the execs are looking for a more enterprise grade product.
>
> Thank You for your thoughts / recommendations
>
> JB
>
>

Reply via email to