- Design to allow data capture and Analysis and those tests can benefit from powerful multi-core CPU and plenty of RAM
Digital Forensic Workstation
Forensic Investigation Suite or Forensic Software
Write blockers
Forensic Drive Duplicators
- Large SSDs, USB thumb drives, or flash media make it easier to capture and transport multiple forensic images
Wiped drives and wiped removable media
Chain of custody form
Hashing utilities
Packers
What’s the forensic process?
Measures how easily data is to lose (the top being the most volatile to lose)
Order of validity
- Information about files and services, locations of deleted files, evidence of applications being run
Windows registry
- Program set to run at startup (often associated with malware or compromise)
Auto run keys
- Details of an active / removed records
Master file table
- Logins, service start / stop, evidence of applications being run
Event logs
- Evidence of deleted files, MAC timestamps
INDX files and change logs
- Point-in-time information from prior actions
Volume Shadow copies
- Login user artifacts
User directories and files
- Files that were intended to be deleted but forgotten
Recycle bin contents
- Memory artifacts of commands run
Hibernation files and memory dumps
- Artifacts of software installation, user temporary file storage or other limited lifespan data
Temporary directories
- Application specific data
Application logs
- System logs may indicate drives were plugged in; data may be relevant to investigations
Removable drives
Linux utility used to clone drives in raw format, a bit-by-bit format
DD utility
A full forensic suite and provides imaging capabilities from many types of devices
FTK