Cyber Crime and Cyber Terrorism


RECOVERING DELETED INFORMATION



Download 5,67 Mb.
Pdf ko'rish
bet91/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   87   88   89   90   91   92   93   94   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

RECOVERING DELETED INFORMATION
The deletion of files, folders, and partitions is not necessarily permanent and can 
often be recovered. Recovery of files, folders, and partitions is briefly discussed here.


84
CHAPTER 7
Seizing, imaging, and analyzing digital evidence
RECOVERING DELETED FILES AND FOLDERS
The deletion process for files and folders involves simply marking the clusters used 
by the deleted file or folder as unallocated in the file table. Until the clusters are phys-
ically overwritten the data in the file or folder remains accessible in the unallocated 
clusters. Most forensic tools will allow for identification and recovery of deleted files 
where the clusters have not yet been overwritten.
RECOVERING DELETED PARTITIONS
Deleting partitions makes the data inside them unavailable to the operating system; 
however the data itself is not destroyed at the point of deletion and can often be re-
covered. Information concerning which sectors the deleted partition used to occupy 
are recorded in the partition table held in the MBR. Most tools will parse the infor-
mation in the partition table, allowing the examiner to see the names of partitions, 
deleted or otherwise, and which sector they start and end at. Using this information 
the VBR, or backup VBR, for any individual partition can be located. The location 
differs depending on the file system used, but is well documented for all common file 
systems. Once located, most tools will parse the information in a VBR allowing the 
examiner to rebuild the deleted partition.
WHERE EVIDENCE HIDES
The following sections will discuss some of the more intricate hiding places that 
exist within Microsoft Windows operating systems. Some of these places may get 
overlooked in a forensic examination, and yet they frequently hold much sort after 
forensic evidence.
REGISTRY
The registry is responsible for holding system settings and configuration information 
for all aspects of the Windows operating system and installed software. In modern 
Windows operating systems the registry is composed of five files stored in the folder 
Winnt\system32\config\
, namely Default, System, Security, Software and Sam, 
with another file Ntuser.dat being present for each user of the system (
Nelson, et al. 
2010
). Their purpose is shown in 
Table 7.2
.
On a live system the registry can be examined and modified using the registry edi-
tor regedit. Regedit combines the information stored in the files into hives, a format 
designed to make their information more accessible to the user. This information is or-
ganized within handle keys, referred to as HKEY’s which in turn contain sub-keys and 
associated values (name, type, and data). These keys are HKEY_LOCAL_MACHINE 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   87   88   89   90   91   92   93   94   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish