Internal Hard-Disk ...
 
Notifications
Clear all

Internal Hard-Disk removal logs

11 Posts
5 Users
0 Likes
1,184 Views
CopyRight
(@copyright)
Posts: 184
Estimable Member
Topic starter
 

Hey Folks,

Just wanted to ask you guys if there are possibilities of getting the logs of when an internal hard-disk is removed from a windows machine, and when the internal hard disk is returned into the the windows machine.

When i say internal hard disk i mean the hardisk that runs the OS. roll

Is there any log or event that stores these kinds records?

Thnks.

 
Posted : 01/03/2020 8:50 am
AmNe5iA
(@amne5ia)
Posts: 173
Estimable Member
 

If the OS isn't running how do you expect it to log anything?

 
Posted : 01/03/2020 6:53 pm
(@athulin)
Posts: 1156
Noble Member
 

If the OS isn't running how do you expect it to log anything?

A really clever OS might discover that someone is trying to hot-swap the system drive … -) I can't think of a good reason why anyone would want to log that kind of event, though …

Yet, on the principle that you never know until you try, I can only recommend the OP to try it out.

 
Posted : 01/03/2020 7:37 pm
CopyRight
(@copyright)
Posts: 184
Estimable Member
Topic starter
 

If the OS isn't running how do you expect it to log anything?

A really clever OS might discover that someone is trying to hot-swap the system drive … -) I can't think of a good reason why anyone would want to log that kind of event, though …

Yet, on the principle that you never know until you try, I can only recommend the OP to try it out.

There's a strict policy in an entity that a hard-disk should not be removed from the Work "Laptop", it seems a person was suspected to have removed the hard disk and plugged it to an unknown machine and transfer confidential data, so they want to first prove that the hard disk has been removed from the work "Laptop".

Thank everyone for sharing your thoughts

 
Posted : 04/03/2020 5:36 am
jaclaz
(@jaclaz)
Posts: 5133
Illustrious Member
 

If the OS isn't running how do you expect it to log anything?

Of course there is no way, and of course such a log cannot exist, though in theory, the OS could log the SMART data of the hard disk (power on cycles) at shutdown and throw a fit if at next boot it is not increased of only one, and besides, that could well be implemented in the BIOS or UEFI firmware.

jaclaz

 
Posted : 04/03/2020 9:39 am
ArsenalConsulting
(@arsenalconsulting)
Posts: 49
Eminent Member
 

Hey Folks,

Just wanted to ask you guys if there are possibilities of getting the logs of when an internal hard-disk is removed from a windows machine, and when the internal hard disk is returned into the the windows machine.

When i say internal hard disk i mean the hardisk that runs the OS. roll

Is there any log or event that stores these kinds records?

Thnks.

You may find NTFS's security descriptor stream (and file system transactions, keeping an eye on the progression of LSNs/USNs, timestamps, and SIDs) quite enlightening (as we have) in this kind of scenario. In other words, focus on the file system on the drive, not your workstation's operating system. I'm assuming your priority right now is simply determining whether the drive has in fact been removed and returned to your workstation.

I recommend using Joakim Schicht's Secure2Csv, LogFileParser, and UsnJrnl2Csv.

Mark Spencer, President
Arsenal Consulting, Inc.
ArsenalExperts.com
@ArsenalArmed

 
Posted : 04/03/2020 1:33 pm
CopyRight
(@copyright)
Posts: 184
Estimable Member
Topic starter
 

If the OS isn't running how do you expect it to log anything?

Of course there is no way, and of course such a log cannot exist, though in theory, the OS could log the SMART data of the hard disk (power on cycles) at shutdown and throw a fit if at next boot it is not increased of only one, and besides, that could well be implemented in the BIOS or UEFI firmware.

jaclaz

Yes that is possibly correct, but for that i should have the the SMART data before the hard disk is removed.

Thanks for you great contribution !

 
Posted : 05/03/2020 5:45 am
CopyRight
(@copyright)
Posts: 184
Estimable Member
Topic starter
 

Hey Folks,

Just wanted to ask you guys if there are possibilities of getting the logs of when an internal hard-disk is removed from a windows machine, and when the internal hard disk is returned into the the windows machine.

When i say internal hard disk i mean the hardisk that runs the OS. roll

Is there any log or event that stores these kinds records?

Thnks.

You may find NTFS's security descriptor stream (and file system transactions, keeping an eye on the progression of LSNs/USNs, timestamps, and SIDs) quite enlightening (as we have) in this kind of scenario. In other words, focus on the file system on the drive, not your workstation's operating system. I'm assuming your priority right now is simply determining whether the drive has in fact been removed and returned to your workstation.

I recommend using Joakim Schicht's Secure2Csv, LogFileParser, and UsnJrnl2Csv.

Mark Spencer, President
Arsenal Consulting, Inc.
ArsenalExperts.com
@ArsenalArmed

Hey Mark,

Beautiful, this makes perfect sense, so it makes more sense looking at the filesystem data rather than the OS. Will Definitely try it if it comes by to me.

Thanks for your recommendations!

 
Posted : 05/03/2020 5:47 am
jaclaz
(@jaclaz)
Posts: 5133
Illustrious Member
 

Beautiful, this makes perfect sense, so it makes more sense looking at the filesystem data rather than the OS.

NTFS data is of course worth a look at, though - at face value - it fails a logical test (i.e. it is well possible, but not really "making perfect sense")-

I mean, if the user is hypothetically so "smart" as to remove the hard disk from the laptop and "copying data from it on another machine" (in order to leave no traces) why would he/she have actually accessed the filesystem at all [1]?

jaclaz

[1] as opposed to - say - having used a read only distro or making an image?

 
Posted : 05/03/2020 7:31 am
CopyRight
(@copyright)
Posts: 184
Estimable Member
Topic starter
 

Beautiful, this makes perfect sense, so it makes more sense looking at the filesystem data rather than the OS.

NTFS data is of course worth a look at, though - at face value - it fails a logical test (i.e. it is well possible, but not really "making perfect sense")-

I mean, if the user is hypothetically so "smart" as to remove the hard disk from the laptop and "copying data from it on another machine" (in order to leave no traces) why would he/she have actually accessed the filesystem at all [1]?

jaclaz

[1] as opposed to - say - having used a read only distro or making an image?

There are no assumptions that the user is hypothetically "smart", but the head of IT has been told that this person has given the hard disk to someone else, which exposed some classified documents to someone else. Then the hard disk was returned to the same laptop.

The hard disk had also a "safety sticker" that broke if someone opens up the hard disk, but that still isn't enough evidence.

So the scenario here is could we actually "forensically" prove that the hard disk has been removed from the Laptop or not?

as you said, In theory there is no difference between theory and practise, but in practise there is.

 
Posted : 05/03/2020 10:28 am
Page 1 / 2
Share: