Reader small image

You're reading from  Windows Forensics Cookbook

Product typeBook
Published inAug 2017
Publisher
ISBN-139781784390495
Edition1st Edition
Concepts
Right arrow
Authors (2):
Scar de Courcier
Scar de Courcier
author image
Scar de Courcier

Scar de Courcier is Senior Editor at digital forensics website Forensic Focus. She also works as an independent consultant on online and offline child protection projects. In her spare time, she enjoys swimming, pretending she lives on the USS Voyager, and hanging out with her cat.
Read more about Scar de Courcier

Oleg Skulkin
Oleg Skulkin
author image
Oleg Skulkin

Oleg Skulkin is the Head of Digital Forensics and Malware Analysis Laboratory at Group-IB. Oleg has worked in the fields of digital forensics, incident response, and cyber threat intelligence and research for over a decade, fueling his passion for uncovering new techniques used by hidden adversaries. Oleg has authored and co-authored multiple blog posts, papers, and books on related topics and holds GCFA and GCTI certifications.
Read more about Oleg Skulkin

View More author details
Right arrow

Troubleshooting in Windows Forensic Analysis

In this chapter, we will cover the following recipes:

  • Troubleshooting in commercial tools
  • Troubleshooting in free and open source tools
  • Troubleshooting when processes fail
  • False positives during data processing with digital forensics software
  • Taking your first steps in digital forensics
  • Advanced further reading

Introduction

We would all like our cases to be one hundred percent perfect all the time, but unfortunately things do go wrong sometimes. Whether its because of a technical fault with a product you're using, a mistake made by an investigator, a faulty dataset in the first place, or some kind of legislative issue encountered when a case goes to court, it is all too common to come up against obstacles in your investigations.

In this chapter, we highlight some of the most common things that can go wrong with popular forensic suites and how to fix them. We will then take a look at what you can do when processes fail, and when you come up against legislative or jurisdictional challenges.

Finally, we will provide you with a short guide to taking your first steps in digital forensics, and recommend some advanced further reading - if you haven't been put off yet!

...

Troubleshooting in commercial tools

Digital forensics is a very complex field. This means that you are likely to face different problems while working on your cases. Problems may be of different natures: you could fail to install a tool because your workstation doesn't have additional third-party software (usually it's included in the package by the developers); you could fail to process the data source properly because it's damaged or the format or file system is unsupported; you could fail to parse some forensic artifacts because their format has been changed and isn't supported by your piece of software yet, and so on.

Thanks to the developers of commercial forensic software, including EnCase, FTK, AXIOM, Evidence Center, Intella, and so on, you can solve almost any problem quickly and easily (most of the time) with the help of their customer support services...

Troubleshooting in free and open source tools

Of course, free and open source tools don't have customer support services, but they have developers. Often, you can contact the developer directly and ask your questions, or even share (if possible) the data source problems you have with them. This helps developers to improve their tools and help the community.

Some tools, such as The Sleuth Kit and Autopsy for example, have mailing lists: you can ask your question and the developer or active users will answer it, as shown in the following screenshot:

Figure 12.2. Subscribing to the sleuthkit-users list

Troubleshooting when processes fail

Since investigative and judicial processes are put together by humans, from time to time they fail; sometimes quite spectacularly. In this section, we will look at a couple of common examples and discuss what to do when situations like these arise.

Soundness of evidence

One of the most frequent criticisms levelled at digital forensic investigators comes in the form of a challenge to the soundness of the evidence they are presenting. This includes the common It wasn't me defense, wherein a defendant insists that they were not the one using the device in question; the suggestion that the evidence itself is somehow faulty; either because of a virus or malware having infected a device before...

False positives during data processing with digital forensics software

During your computer forensic examination with different tools, both commercial and free or open source, you will face so-called false positives, especially if you are planning to use data carving techniques.

So why do we all face them? No, it's not bugs in your forensic software. The thing is, these false positives just match the criteria used by your piece of software to carve data from, for example, unallocated space of the hard drive or its forensic image.

You will most likely face false positives working with tools which support a large number of different apps, for example Magnet AXIOM. But you must understand, it's better to have a number of false positives than one false negative!

Figure 12.3. False positives in Magnet AXIOM

As you can see in the preceding figure, it's not difficult...

Taking your first steps in digital forensics

If you've read this far and you're not yet a digital forensics practitioner but are thinking about it as a potential career path, congratulations! You're looking at working in a growing industry with a wealth of opportunities and a lot of different areas to pursue.

Your next steps in digital forensics will depend how far along the journey you are right now, and what you'd ultimately like to get into.

Ask yourself the following questions:

  • Do I like working on practical solutions with a physically interactive element, such as taking apart pieces of machinery to find out what's wrong with them?
  • Do I enjoy technical challenges, such as mind games, puzzles, video games, and technology?
  • Do I prefer to work alone or as part of a team?
  • Is it more important to me to earn a lot of money, or to work in an area where I...

Advanced further reading

The following books and websites will prove useful to anyone with an interest in the digital forensics field.

Books

For an advanced, in-depth, yet accessible introduction to the topic, Eoghan Casey's Digital Evidence and Computer Crime is a must-read.

Other good general introductions to the subject area include:

  • Forensic Computing by Anthony Sammes and Brian Jenkinson
  • The Basics of Digital Forensics by John Sammons
  • File System Forensic Analysis by Brian Carrier

For more in-depth reading on specific topics, you could try some of the following:

  • Practical Forensic Imaging: Securing Digital Evidence with Linux Tools by Bruce Nikkel, for a discussion on why correct image acquisition processes are...
lock icon
The rest of the chapter is locked
You have been reading a chapter from
Windows Forensics Cookbook
Published in: Aug 2017Publisher: ISBN-13: 9781784390495
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Authors (2)

author image
Scar de Courcier

Scar de Courcier is Senior Editor at digital forensics website Forensic Focus. She also works as an independent consultant on online and offline child protection projects. In her spare time, she enjoys swimming, pretending she lives on the USS Voyager, and hanging out with her cat.
Read more about Scar de Courcier

author image
Oleg Skulkin

Oleg Skulkin is the Head of Digital Forensics and Malware Analysis Laboratory at Group-IB. Oleg has worked in the fields of digital forensics, incident response, and cyber threat intelligence and research for over a decade, fueling his passion for uncovering new techniques used by hidden adversaries. Oleg has authored and co-authored multiple blog posts, papers, and books on related topics and holds GCFA and GCTI certifications.
Read more about Oleg Skulkin