Difference between pages "Masterkey Linux" and "Windows Shadow Volumes"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(Created page with '{{Infobox_Software | name = Masterkey Linux | maintainer = Dr. Q. Zhou - Coventry University | os = {{Linux}} | genre = {{Live CD}} | license = {{GPL}} | website = [h…')
 
(Shadow Volumes in depth)
 
Line 1: Line 1:
{{Infobox_Software |
+
{{expand}}
  name = Masterkey Linux |
+
  maintainer = Dr. Q. Zhou - Coventry University |
+
  os = {{Linux}} |
+
  genre = {{Live CD}} |
+
  license = {{GPL}} |
+
  website = [http://masterkeylinux.com http://masterkeylinux.com]
+
}}
+
  
'''Masterkey Linux''' (or simply Masterkey) is a [[Live CD]] built on top of [[Slackware]] developed by Dr. Qin Zhou of Coventry University. It focuses on [[Incident Response|incident response]] and [[computer forensics]].
+
==Volume Shadow Copy Service==
 +
Windows has included the Volume Shadow Copy Service in it's releases since Windows XP. The Shadow Copy Service creates differential backups periodically to create restore points for the user. Windows 7 Professional and Ultimate editions include tools to work with and manage the Volume Shadow Copy Service, including the ability to [[mount shadow volumes on disk images]].
  
Whilst designed for use by students entering the field of Computer Forensics, Masterkey contains a diverse range of free and open source tools that both students, computer forensics professionals and system administrators alike can use.
+
In Windows 8 the shadow volumes seem to have been superseded by File History. For now it looks like it uses similar structures as its predecessors.
  
== Tools Included ==
+
== Also see ==
 +
* [[Windows]]
 +
* [[Windows File History | File History]]
 +
* How to: [[Mount shadow volumes on disk images]]
  
In addition to standard unix/linux tools, a suite of editors, office applications and multimedia tools have been included, as well as the following specialised tools in the Masterkey Linux distribution:
+
== External Links ==
  
* '''[[AIR]]''' 1.2.8
+
=== How to analyze Shadow Volumes ===
 +
* [http://computer-forensics.sans.org/blog/2008/10/10/shadow-forensics/ VISTA and Windows 7 Shadow Volume Forensics], by [[Rob Lee]], October 2008
 +
* [http://windowsir.blogspot.ch/2011/01/accessing-volume-shadow-copies.html Accessing Volume Shadow Copies], by [[Harlan Carvey]], January 2011
 +
* [http://windowsir.blogspot.ch/2011/01/more-vscs.html More VSCs], by [[Harlan Carvey]], January 2011
 +
* [http://journeyintoir.blogspot.ch/2011/04/little-help-with-volume-shadow-copies.html A Little Help with Volume Shadow Copies], by [[Corey Harrell]], April 2011
 +
* [http://toorcon.techpathways.com/uploads/VolumeShadowCopyWithProDiscover-0511.pdf Volume Shadow Copy with ProDiscover], May 2011
 +
* [http://windowsir.blogspot.ch/2011/09/howto-mount-and-access-vscs.html HowTo: Mount and Access VSCs], by [[Harlan Carvey]], September 2011
 +
* [http://computer-forensics.sans.org/blog/2011/09/16/shadow-timelines-and-other-shadowvolumecopy-digital-forensics-techniques-with-the-sleuthkit-on-windows/ Shadow Timelines And Other VolumeShadowCopy Digital Forensics Techniques with the Sleuthkit on Windows], by [[Rob Lee]], September 2011
 +
* [http://journeyintoir.blogspot.ch/2012/01/ripping-volume-shadow-copies.html Ripping Volume Shadow Copies – Introduction], by [[Corey Harrell]], January 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-practitioner-method.html Ripping VSCs – Practitioner Method], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-practitioner-examples.html Ripping VSCs – Practitioner Examples], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-developer-method.html Ripping VSCs – Developer Method], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-developer-examples.html Ripping VSCs – Developer Examples], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/examining-vscs-with-gui-tools.html Examining VSCs with GUI Tools], by [[Corey Harrell]], February 2012
 +
* [http://dfstream.blogspot.ch/2012/03/vsc-toolset-gui-tool-for-shadow-copies.html VSC Toolset: A GUI Tool for Shadow Copies], by [[Jason Hale]], March 2012
 +
* [http://encase-forensic-blog.guidancesoftware.com/2012/06/examining-volume-shadow-copies-easy-way.html Examining Volume Shadow Copies – The Easy Way!], by [[Simon Key]], June 2012
 +
* [http://justaskweg.com/?p=351 Getting Ready for a Shadow Volume Exam], by [[Jimmy Weg]], June 2012
 +
* [http://justaskweg.com/?p=466 Mounting Shadow Volumes], by [[Jimmy Weg]], July 2012
 +
* [http://justaskweg.com/?p=518 Examining the Shadow Volumes with X-Ways Forensics], by [[Jimmy Weg]], July 2012
 +
* [http://justaskweg.com/?p=710 “Weg, I’m afraid that I don’t have VMware. How do I Examime Shadow Volumes?”], by [[Jimmy Weg]], August 2012
 +
* [http://sandersonforensics.com/forum/content.php?168-Reconnoitre "Examining shadow copies with Reconnoitre (and without vssadmin), it's as easy as 1, 2, 3"], by [[Paul Sanderson]], January 2013
  
AIR is a GUI front-end to dd/dcfldd designed for easily creating forensic bit images.
+
=== Shadow Volumes in depth ===
 +
* [http://www.qccis.com/docs/publications/WP-VSS.pdf Reliably recovering evidential data from Volume Shadow Copies in Windows Vista and Windows 7], by [[James Crabtree]] and [[Gary Evans]], 2010
 +
* [http://forensic4cast.com/2010/04/19/into-the-shadows/ Into The Shadows] and [http://www.forensic4cast.com/2010/04/presentation-into-the-shadows/ Presentation], by [[Lee Whitfield]], April 2010
 +
* [https://googledrive.com/host/0B3fBvzttpiiSZDZXRFVMdnZCeHc/Volume%20Shadow%20Snapshot%20(VSS)%20format.pdf Volume Shadow Snapshot format], by the [[libvshadow|libvshadow project]], March 2011
 +
* [https://googledrive.com/host/0B3fBvzttpiiSZDZXRFVMdnZCeHc/Paper%20-%20Windowless%20Shadow%20Snapshots.pdf Windowless Shadow Snapshots - Analyzing Volume Shadow Snapshots (VSS) without using Windows] and [http://www.basistech.com/about-us/events/open-source-forensics-conference/ OSDFC 2012] [https://googledrive.com/host/0B3fBvzttpiiSZDZXRFVMdnZCeHc/Slides%20-%20Windowless%20Shadow%20Snapshots.pdf Slides], by [[Joachim Metz]], October 2012
  
* '''[[Autopsy]]''' 2.21
+
=== Other ===
 +
* [http://lanmaster53.com/talks/#hack3rcon2 Lurking in the Shadows – Hack3rcon II]
 +
* [http://pauldotcom.com/2012/10/volume-shadow-copies---the-los.html Volume Shadow Copies - The Lost Post], [[Mark Baggett]], October 2012
  
The Autopsy Forensic Browser is a graphical interface to the command line digital investigation tools in The Sleuth Kit.
+
== Tools ==
 
+
* [[EnCase]] with VSS Examiner Enscript (available from the downloads section of the GSI Support Portal)
* '''[[ClamAV]]''' for Unix 0.91.2
+
* [[libvshadow]]
 
+
* [[ProDiscover]]
Clam AntiVirus is an anti-virus toolkit for UNIX
+
* [http://www.shadowexplorer.com/ ShadowExplorer]
 
+
* [http://dfstream.blogspot.ch/p/vsc-toolset.html VSC Toolset]
* '''[[chkrootkit]]''' 0.47
+
* [[X-Ways AG|X-Ways Forensics]]
 
+
* [http://sandersonforensics.com/forum/content.php?168-Reconnoitre Reconnoitre]
chkrootkit is a tool to locally check for signs of a rootkit.
+
 
+
* '''[[chntpw]]''' 070923
+
 
+
chntpw is an Offline password and Registry Editor
+
 
+
* '''[[dcfldd]]''' 1.3.4-1
+
 
+
dcfldd is an enhanced version of GNU dd (also included in this distribution) with features useful for forensics and security
+
 
+
* '''[[dd_rescue]]''' 1.14
+
 
+
dd_rescue copies data from one file or block device to another. It is intended for error recovery.
+
 
+
* '''[[GParted]]''' 0.3.3
+
 
+
GParted is the Gnome Partition Editor application
+
 
+
* '''[[Foremost]]''' 1.5
+
 
+
Foremost is a console program to recover files based on their headers, footers, and internal data structures. It is a data carving tool.
+
 
+
* '''[[mac-robber]]''' 1.00
+
 
+
mac-robber is a digital investigation tool that collects data from allocated files in a mounted file system.
+
 
+
* '''[[md5deep]]''' 1.12
+
 
+
md5deep is a cross-platform set of programs to compute MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digests on an arbitrary number of files.
+
 
+
* '''[[memdump]]''' 1.01
+
 
+
memory dumper for UNIX-like systems
+
 
+
* '''[[Rootkit Hunter]]''' 1.3.0
+
 
+
Rootkit Hunter is a rootkit scanner.
+
 
+
* '''[[Scalpel]]''' 1.60
+
 
+
Scalpel is a fast file carver that reads a database of header and footer definitions and extracts matching files from a set of image files or raw device files.
+
 
+
* '''[[The Sleuth Kit]]''' 3.01
+
 
+
The Sleuth Kit (previously known as TASK) is a collection of UNIX-based command line file and volume system forensic analysis tools.
+
 
+
* '''[[Stegdetect]]''' 0.6-4
+
 
+
Stegdetect is an automated tool for detecting steganographic content in images.
+
 
+
* '''[[Wipe]]''' 2005-05-09
+
 
+
Wipe is a file and block device wiping utility.
+
 
+
* '''[[Wireshark]]''' 0.99.6
+
 
+
Wireshark is a network protocol analyzer.
+
 
+
== Forensic Features ==
+
 
+
* Disk partitions and USB storage devices found by Masterkey are mounted read-only automatically. Icons for these mounted devices are displayed on the user's Desktop. This facilitates access and prevents a user from accidentally writing to the devices and contaminating evidence.
+
 
+
* Mounting and use of swap partitions is not allowed. This prevents a user from destroying any evidence present on swap partitions.
+
 
+
* Root privilege. The user works with the system as a super user (administrator) so that tools requiring root privilege can be used straightaway.
+
 
+
* Console login. The Desktop environment (graphic user interface) does not start automatically during bootup. This makes it possible to work with Masterkey on older computers. The user can choose to start either the KDE or Fluxbox desktops if they wish.
+
 
+
== See Also ==
+
 
+
* [[Live Forensic Toolkit]] - [http://masterkeylinux.com/index.php/lft]
+
 
+
== External Links ==
+
  
* [http://masterkeylinux.com Masterkey Web Site]
+
[[Category:Volume Systems]]
* [http://masterkeylinux.com/community Masterkey Community Forum]
+
[[Category:Incident response tools]]
+

Revision as of 08:47, 2 February 2014

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Contents

Volume Shadow Copy Service

Windows has included the Volume Shadow Copy Service in it's releases since Windows XP. The Shadow Copy Service creates differential backups periodically to create restore points for the user. Windows 7 Professional and Ultimate editions include tools to work with and manage the Volume Shadow Copy Service, including the ability to mount shadow volumes on disk images.

In Windows 8 the shadow volumes seem to have been superseded by File History. For now it looks like it uses similar structures as its predecessors.

Also see

External Links

How to analyze Shadow Volumes

Shadow Volumes in depth

Other

Tools