Difference between pages "Tools:Data Recovery" and "Memory analysis"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (Data Recovery)
 
 
Line 1: Line 1:
= Partition Recovery =
+
'''Memory Analysis''' is the science of using a [[Tools:Memory Imaging|memory image]] to determine information about running programs, the [[operating system]], and the overall state of a computer. Because the analysis is highly dependent on the operating system, we have broken it into subpages:
  
*[http://www.stellarinfo.com/recover-windows-nt.htm NTFS Partition Recovery]
+
* [[Windows Memory Analysis]]
: Stellar NTFS Data Recovery Software to recover data from Windows based NTFS/NTFS5 file systems
+
* [[Linux Memory Analysis]]
  
*[http://www.infinadyne.com/cddvd_diagnostic.html CD/DVD Diagnostic]
+
== OS-Independent Analysis ==
: Recover data and video from CDs/DVDs/Blu-Ray.  This is specifically not for forensic purposes but for data recovery.  A different tool called CD/DVD Inspector is for forensic examination of optical media.
+
  
*[http://www.ptdd.com/index.htm Partition Table Doctor]
+
At the IEEE Security and Privacy conference in May 2011, Brendan Dolan-Gavitt presented a novel system,[http://www.cc.gatech.edu/~brendan/Virtuoso_Oakland.pdf Virtuoso], that was able to perform operating-system independent memory analysis. Using virtual machine introspection accompanied by a number of formal program analysis techniques, his system was able to monitor the machine-level instructions and behavior of application actions (listing processes, network connections, etc) and then automatically generate Volatility plugins that replicated this analysis.  
: Recover deleted or lost partitions (FAT16/FAT32/NTFS/NTFS5/EXT2/EXT3/SWAP).
+
  
*[http://www.diskinternals.com/ntfs-recovery/ NTFS Recovery]
+
== Encryption Keys ==
: DiskInternals NTFS Recovery is a fully automatic utility that recovers data from damaged or formatted disks.
+
  
*[http://www.stud.uni-hannover.de/user/76201/gpart/ gpart]
+
Various types of encryption keys can be extracted during memory analysis.
: Gpart is a tool which tries to guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted.
+
You can use [[AESKeyFinder]] to extract 128-bit and 256-bit [[AES]] keys and [[RSAKeyFinder]] to extract all private and public [[RSA]] keys from a memory dump [http://citp.princeton.edu/memory/code/]. [http://jessekornblum.com/tools/volatility/cryptoscan.py cryptoscan.py] ([[List of Volatility Plugins|plugin for the Volatility memory analysis framework]]) scans a memory image for [[TrueCrypt]] passphrases.
  
*[http://www.cgsecurity.org/wiki/TestDisk TestDisk]
+
== See Also ==
: [[TestDisk]] is an OpenSource software and is licensed under the GNU Public License (GPL).
+
  
*[http://www.stellarinfo.com/partition-recovery.htm Partition Recovery Software]
+
* [[Tools:Memory Imaging]]
: Partition Recovery software for NTFS & FAT system that examines lost windows partition of damaged and corrupted hard drive.
+
* [[Tools:Memory Analysis]]
  
== See Also ==
+
[[Category:Memory Analysis]]
 
+
* [http://support.microsoft.com/?kbid=166997 Using Norton Disk Edit to Backup Your Master Boot Record]
+
 
+
== Notes ==
+
 
+
* "fdisk /mbr" restores the boot code in the [[Master Boot Record]], but not the partition itself. On newer versions of Windows you should use fixmbr, bootrec, mbrfix, or [[MBRWizard]]. You can also extract a copy of the specific standard MBR code from tools like bootrec.exe and diskpart.exe in Windows (from various offsets) and copy it to disk with dd (Use bs=446 count=1). For Windows XP SP2 c:\%WINDIR%\System32\diskpart.exe the MBR code is found between offset 1b818h and 1ba17h.
+
 
+
= Data Recovery =
+
The term "Data Recovery" is frequently used to mean forensic recovery, but the term really should be used for recovering data from damaged media.
+
 
+
* [http://www.cnwrecovery.com/  CnW Recovery]
+
: Data recovery sofware for all file and media types.  Recovers corrupted, formatted, repartitioned and deleted files.  RAID option and tools for HP MediaVault.  Optional forensic logging.
+
 
+
* [http://www.stellarinfo.com/ Stellar Data Recovery]
+
: Data recovery software services & tools to recover lost data from hard drive.
+
 
+
* [http://www.datarecoverytools4u.com/ DDL Data Recovery Tools]
+
: Advanced data recovery tools for recovering data from logically and physically damaged hard drives.
+
 
+
*[http://www.salvationdata.com/data-recovery-equipment/hd-doctor.htm HD Doctor Suite]
+
: HD Doctor Suite is a set of professional tools used to fix firmware problem
+
 
+
*[http://www.salvationdata.com SalvationDATA]
+
: Claims to have a program that can read the "bad blocks" of Maxtor drives with proprietary commands.
+
 
+
*[http://www.toolsthatwork.com/bringback.htm BringBack]
+
: BringBack offers easy to use, inexpensive, and highly successful data recovery for Windows and Linux (ext2) operating systems and digital images stored on memory cards, etc.
+
 
+
*[http://www.runtime.org/raid.htm RAID Reconstructor]
+
: Runtime Software's RAID Reconstructor will reconstruct RAID Level 0 (Striping) and RAID Level 5 drives.
+
 
+
* [http://www.e-rol.com/en/ e-ROL]
+
: Erol allows you to recover through the internet files erased by mistake. Recover your files online for free.
+
 
+
* [http://www.recuva.com/ Recuva]
+
: Recuva is a freeware Windows tool that will recover accidentally deleted files.
+
 
+
* [http://www.datarecoverytools4u.com/dfl-wdii-review/ DFL-WDII]
+
: DFL-WDII is one advanced WD HDD firmware repair hardware tool.
+
 
+
* [http://www.snapfiles.com/get/restoration.html Restoration]
+
: Restoration is a freeware Windows software that will allow you to recover deleted files
+
 
+
* [http://www.undelete-plus.com/ Undelete Plus]
+
: Undelete Plus is a free deleted file recovery tool that works for all versions of Windows (95-Vista), FAT12/16/32, NTFS and NTFS5 filesystems and can perform recovery on various solid state devices.
+
 
+
* [http://www.data-recovery-software.net/ R-Studio]
+
: R-Studio is a data recovery software suite that can recover files from FAT(12-32), NTFS, NTFS 5, HFS/HFS+, FFS, UFS/UFS2 (*BSD, Solaris), Ext2/Ext3 (Linux) and so on.
+
 
+
* [http://www.deepspar.com/ DeepSpar Disk Imager]
+
: DeepSpar Disk Imager is a dedicated disk imaging device built to handle disk-level problems and to recover bad sectors on a hard drive.
+
 
+
* [http://digital-assembly.com/products/adroit-photo-recovery/ Adroit Photo Recovery]
+
: Adroit Photo Recovery is a photo recovery tool that uses validated carving and is able to recover fragmented photos. Adroit Photo Recovery is able
+
: to recover high definition RAW images from Canon, Nikon etc.
+
 
+
* [http://sourceforge.net/projects/freerecover/ FreeRecover]
+
: FreeRecover is a small program that can recover deleted files from NTFS drives.
+
 
+
See also [[Data Recovery Stories]]
+
 
+
=Carving=
+
 
+
*[http://www.digitalforensics.at/wordpress/?page_id=162&lang=en Multimedia File Carver]
+
: File carver that is specialized on the recovery of digital movies. Recovery is possible from fragmented files. Current status of this (open-source) program is a proof-of-concept that is suitable for smaller images. In the future much more improved performance can be expected. Further this carver will be extended to support the recovery of fragmented digital images.
+
 
+
*[http://www.cnwrecovery.com/ CnW Recovery]
+
: Data carving tools and will recover most know file types.  For some formats the files are verified and intelligent names added based on file metadata.  Several video formats can be reconstructed from isolated fragments.
+
 
+
*[http://www.datalifter.com/products.htm DataLifter® - File Extractor Pro]
+
: Data carving runs on multiple threads to make use of modern processors
+
 
+
* [http://sourceforge.net/projects/defraser/ NFI Defraser]
+
: "Defraser is a forensic analysis application that can be used to detect full and partial multimedia files in datastreams. It is typically used to find (and restore) complete or partial video files in datastreams (for instance, unallocated diskspace)." Written in C#; runs on Windows.
+
 
+
*[http://www.simplecarver.com/ Simple Carver Suite]
+
: Simple Carver Suite is a collection of unique tools designed for a number of purposes including data recovery, forensic computing and eDiscovery. The suite was originally designed for data recovery and has since expanded to include unique file decoding, file identification and file classification.
+
 
+
*[http://foremost.sourceforge.net/ Foremost]
+
: Foremost is a console program to recover files based on their headers, footers, and internal data structures.
+
 
+
*[http://www.digitalforensicssolutions.com/Scalpel/ Scalpel]
+
: Scalpel is a fast file carver that reads a database of header and footer definitions and extracts matching files from a set of image files or raw device files. Scalpel is filesystem-independent and will carve files from FATx, NTFS, ext2/3, or raw partitions.
+
 
+
*[[EnCase]]
+
: EnCase comes with some enScripts that will do carving.
+
 
+
*[[CarvFs]]
+
: A virtual file system (fuse) implementation that can provide carving tools with the possibility to do recursive multi tool zero-storage carving (also called in-place carving). Patches and scripts for scalpel and foremost are provided. Works on raw and encase images.
+
 
+
*[[LibCarvPath]]
+
: A shared library that allows carving tools to use zero-storage carving on carvfs virtual files.
+
 
+
*[http://greg-kennedy.com/nwserver/?p=10 midi-carver]
+
: midi-carver is a data carver for MIDI files.
+
 
+
*[http://www.cgsecurity.org/wiki/PhotoRec PhotoRec]
+
: PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from Hard Disks and CDRom and lost pictures (thus, its 'Photo Recovery' name) from digital camera memory.
+
 
+
*[http://www.datarescue.com/photorescue/ PhotoRescue]
+
: Datarescue PhotoRescue Advanced is picture and photo data recovery solution made by the creators of IDA Pro. PhotoRescue will undelete, unerase and recover pictures and files lost on corrupted, erased or damaged compact flash (CF) cards, SD Cards, Memory Sticks, SmartMedia and XD cards.
+
 
+
* [http://sourceforge.net/projects/revit/ ReviveIt]
+
: Revive It (RevIt) is an experimental carving tool, initially developed for the DFRWS 2006 carving challenge. It uses 'file structure based carving'. Note that RevIt currently is a work in progress.
+
 
+
* [http://jbj.rapanden.dk/magicrescue/ Magic Rescue]
+
: Magic Rescue is a file carving tool that uses "magic bytes" in a file contents to recover data.
+
 
+
* [[FTK]]
+
: FTK2 includes some file carvers
+
 
+
* [[X-Ways]]
+
: X-Ways Forensic provides a robust list of file types as well as the ability to specific custom file headers/trailers.  File types are available for carving, identification and filtering.
+
 
+
*[[Adroit Photo Forensics]]
+
: Adroit Photo Forensics supports data carving of popular image formats. Also supports fragmented carving using [[File_Carving:SmartCarving|SmartCarving]] and [[File_Carving:GuidedCarving|GuidedCarving]].
+
 
+
*[http://belkasoft.com/bfc/en/forensic_carver.asp Belkasoft Forensic Carver], [http://belkasoft.com/bec/en/evidence_center.asp Belkasoft Evidence Center]
+
: Belkasoft Forensic Carver and Belkasoft Evidence Center support data carving for Instant Messenger and Browser artifacts. These tools support carving of physical or logical Windows drives as well as popular forensic image formats like Encase Evidence Files, DD or SMART.
+

Revision as of 04:26, 27 July 2012

Memory Analysis is the science of using a memory image to determine information about running programs, the operating system, and the overall state of a computer. Because the analysis is highly dependent on the operating system, we have broken it into subpages:

OS-Independent Analysis

At the IEEE Security and Privacy conference in May 2011, Brendan Dolan-Gavitt presented a novel system,Virtuoso, that was able to perform operating-system independent memory analysis. Using virtual machine introspection accompanied by a number of formal program analysis techniques, his system was able to monitor the machine-level instructions and behavior of application actions (listing processes, network connections, etc) and then automatically generate Volatility plugins that replicated this analysis.

Encryption Keys

Various types of encryption keys can be extracted during memory analysis. You can use AESKeyFinder to extract 128-bit and 256-bit AES keys and RSAKeyFinder to extract all private and public RSA keys from a memory dump [1]. cryptoscan.py (plugin for the Volatility memory analysis framework) scans a memory image for TrueCrypt passphrases.

See Also