Hello,
Â
Could you confirm to me that to prove a data exfiltration on a windows 7
towards a usb support, you have to analyze the $mft and the shellbags,
as well as the event.
A copy of a folder or file, for example, would leave
traces in the shellbags, because opening a logical volume.
Are you looking for other artifacts?
thank you
Before that I would check for the connection of the USB device, the drive letter and GUID assigned to the volume (that in case of a "first time connected USB" provides a definite timestamp), etc.
jaclaz
Could you confirm to me that to prove a data exfiltration on a windows 7Â
towards a usb support, you have to analyze the $mft and the shellbags,
as well as the event.A copy of a folder or file, for example, would leave
traces in the shellbags, because opening a logical volume.
There are copy jobs possible without leaving traces as shellbags. Connecting a USB device and copying files via commandline would not generate shellbags entries.Â
In most cases the Windows Explorer is really used, so shellbags analysis makes sense. Do not forget to check .lnk files from "recent" and prefetch entries for explorer.exe, too.
regards,
Robin
We had a recent case in which the computer user installed Seagate's Toolkit (Toolkit Support | Seagate Support US) software in order to copy files from the computer to an external USB drive.
None of our forensic tools could identify any USB drive connection artifacts at all, but a specific log file within the Toolkit installation folder on the computer recorded details of all files and folders copied to the external USB drive and on which dates.
So one technique is to generate a searchable index of the computer being investigated, and then run key word search terms reasonably calculated to lead to positive hits. The aforementioned technique is what led us to the Seagate Toolkit log file.
Checking the USB Device ID, last connected date-time stamp along with a correlation with .lnk files (windows system) for the same date-time stamp may also suggest or throw some light on files transferred to USB, if any. In my career experience as Digital Forensic Expert, I have found Magnet AxioM (Connection option) useful in such cases of suspected data transfer to USB files.
Ok thanks all for your replies.
Ok thanks all for your replies.
Â
Well, the company, if the security issues are so relevant, could issue power-only USB cables.
jaclaz