It seems that the majority of people use Encase as there forensic software, however what are the disadvantages using Encase ?
I watched the presentation from Paul Henry and he give a few examples what Encase (and FTK) couldn't even pick up (therefore they should be really picking up on these things).
However if anyone can help from there personal experience that would be great.
Thanks! )
I haven't seen the presentation you mention, do you have a link?
What particular examples did he mention that forensic software doesn't pick up?
verified may be referring to the following
http//
Not the best quality video, but Mr. Henry discusses anti-forensics. Anti-forensics techniques are used to target analysts, not forensic applications or tools.
So what Mr Henry explained about the Timestmop 30.37, Timestomp on FTK 32.33, Timestomp on Encase 33.45. Where the dates were changed which he explains is a problem, in my view thats a problem for FTK and Encase.
So I just wondered if there were any more bugs in these commerical forensic software?
So what Mr Henry explained about the Timestmop 30.37, Timestomp on FTK 32.33, Timestomp on Encase 33.45. Where the dates were changed which he explains is a problem, in my view thats a problem for FTK and Encase.
Couple of things…
First off, what is "Timestmop 30.37, Timestomp on FTK 32.33, Timestomp on Encase 33.45."??
Second of all, the application known as "timestomp" is not a problem for FTK or EnCase…because timestomp changes the file MAC times, and FTK and EnCase (and other forensic analysis apps) simply read the data.
So I just wondered if there were any more bugs in these commerical forensic software?
Yes, there are a number of bugs…as with any software. However, applications like timestomp do not exploit these bugs.
Couple of things…
First off, what is "Timestmop 30.37, Timestomp on FTK 32.33, Timestomp on Encase 33.45."??
Timestomp is a program to modify the timestamp values modified, accessed, created, and entry modified of any file.
Download it here http//
verified may be referring to the following
http//
www.youtube.com/watch?v=q9VUbiFdx7w&mode=related&search= Not the best quality video, but Mr. Henry discusses anti-forensics. Anti-forensics techniques are used to target analysts, not forensic applications or tools.
There's also a "High-Quality" version in http//
And btw, the PDF is also available http//
Couple of things…
First off, what is "Timestmop 30.37, Timestomp on FTK 32.33, Timestomp on Encase 33.45."??
Timestomp is a program to modify the timestamp values modified, accessed, created, and entry modified of any file.
Download it here http//metasploit.com/research/projects/antiforensics/
I'm aware of what Timestomp is…what I asked is, what are "Timestmop 30.37" and "Timestomp on FTK 32.33", and "Timestomp on Encase 33.45."?
I reckon 30.37 et al are timestamps in the vid he posted.
I don't think the software really "misses" any of the things mentioned in the video. Some of the automated processes that are features of the software may miss it, but any properly trained examiner should know that no automated process can be considered 100% reliable.
As far as Encase not showing dates and times after timestomp is used… If that feature was not put in intentionally it should have been. That is a CLUE that something is wrong with the dates and times. I am not going to look for Timestomp on every analysis. But I certainly would if I encountered this.
I think that the term "anti-forensics" is a misnomer. We are looking at the data that is there in it's current state. Manipulation of that data is part of the bigger picture. Most automated forensic tools still allow you to work at the disk level. While the automated features are nice, a competent examiner needs to understand where the data comes from.
Maybe I just don't expect enough from my forensic software, but I don't consider the inability to recover wiped data or to defeat strong encryption as deficiencies.
I consider the automated steps performed by the forensics software as the starting point in an examination, not the ending point.
I gather a lot of information from computers that is not captured by automated tools made by anyone.
Anyone who depends on just what the tool can do, is not doing a very thorough job.