what to look for fi...
 
Notifications
Clear all

what to look for first?

7 Posts
6 Users
0 Reactions
768 Views
(@littleme)
Active Member
Joined: 20 years ago
Posts: 5
Topic starter  

Hi,

Due to the size of HDDs, would it be fair to say that first searching for encrypted and compressed files (since it may look a bit suspect if there are encrypted/compressed files/images) will reduce the amount of time spent picking through a hard disk? Are there any "standard" filetypes that you would look for in all cases just to reduce the time it takes to search the hdd?


   
Quote
 Andy
(@andy)
Reputable Member
Joined: 21 years ago
Posts: 357
 

'Standard' picture file types really are .jpg, gif, png, and bmp. Not forgetting movie file types such as avi, mov, mpg, mpeg.

Yes encrypted or compressed files also need some examination, but if you are looking for a quick method of identifying notable (illegal) files or already known (and irrelevant files for filtering), then simply use hash sets.

Andy


   
ReplyQuote
keydet89
(@keydet89)
Famed Member
Joined: 21 years ago
Posts: 3568
 

I'd suggest that not every case involves images or encrypted/compressed files. What you look for depends on your case.

H. Carvey
"Windows Forensics and Incident Recovery"
http//www.windows-ir.com
http//windowsir.blogspot.com


   
ReplyQuote
nickfx
(@nickfx)
Estimable Member
Joined: 20 years ago
Posts: 131
 

Just to be a pain I agree with both posts. Some cases can be very targeted, I worked on a fraud case last week where the whole case focused on just one database file, however I also believe its important to get a wide view of the data you are working on.

At the start of a case I often 'take a walk' through the data and just browse around with the subject matter in mind but not really looking for anything. It is amazing how often pertinent data or patterns of use jump out at you. This is where visual tools like FTK or Encase come into their own.

Cheers

Nick


   
ReplyQuote
markfu14
(@markfu14)
Eminent Member
Joined: 20 years ago
Posts: 14
 

This is where I love FTK. You can use the overview tabs and pretty much start where the needs of case point you. If you want to look at the known bad files, look at the KFF Alert files, or if you want to see pictures, click the graphics tab.


   
ReplyQuote
(@gmarshall139)
Reputable Member
Joined: 21 years ago
Posts: 378
 

Every case is different to be sure, and it is apparent each time what those standard file types should be in a particular case. One thing that's pertinent in nearly every case however is email. Always a good place to start.


   
ReplyQuote
(@gmarshall139)
Reputable Member
Joined: 21 years ago
Posts: 378
 

I tend to look for encrypted files last rather than first however. I don't think there's a 90/10 rule in computer forensics, probably more like 70/30. That is I'll find 70% of what I need in 30% of the time. It's kind of like searching a car for dope. I don't take the tires off the rims right off. I check the glove compartment first.


   
ReplyQuote
Share: