Difference between pages "Upcoming events" and "Carver 2.0 Planning Page"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (Conferences)
 
(Validator Construction)
 
Line 1: Line 1:
Here is a BY DATE listing of '''upcoming conferences and training events''' that pertain to [[digital forensics]]. Some of these duplicate the generic [[conferences]], but have specific dates/locations for the upcoming conference/training event.
+
This page is for planning Carver 2.0.
  
<b> The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv</b>
+
Please, do not delete text (ideas) here. Use something like this:
<i> (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST)</i>
+
<b> Any requests for additions, deletions or corrections to this list should be sent by email to David Baker <i>(bakerd AT mitre.org)</i>. </b>
+
  
 +
<pre>
 +
<s>bad idea</s>
 +
:: good idea
 +
</pre>
  
 +
This will look like:
  
== Conferences ==
+
<s>bad idea</s>
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
:: good idea
|- style="background:#bfbfbf; font-weight: bold"
+
! Title
+
! Date/Location
+
! Website
+
|-
+
|CONFERENCES
+
|-
+
|E-Crime and Computer Evidence 2006
+
|Sep 12-14, Nottingham, UK
+
|http://www.ecce-conference.com
+
|-
+
|Security OPUS Information Security Conference
+
|Oct 02-05, San Francisco, CA
+
|http://www.securityopus.com/index.php
+
|-
+
|BlackHat Japan 2006 Briefings & Training
+
|Oct 05-06, Tokyo, Japan
+
|http://japan.blackhat.com/
+
|-
+
|IACIS Training - Germany 2006
+
|Oct 09-20, Ilmenau (Thuringer Wald), Germany
+
|http://www.iacis.com/iacisv2/pages/training.php
+
|-
+
|International Conference on IT-Incident Management & IT-Forensics
+
|Oct 18-19, Stuttgart, Germany
+
|http://www.imf-conference.org
+
|-
+
|HTCIA 2006 International Training Conference and Expo
+
|Oct 29-Nov 01, Cleveland, OH
+
|http://www.ohiohtcia.org/conf_main.html
+
|-
+
|2006 Techno Forensics Conference
+
|Nov 6-8, Gaithersburg, MD
+
|http://www.techsec.com/html/TechnoForensics2006.htm
+
|-
+
|PacSec 2006 Conference
+
|Nov 27-30, Tokyo, Japan
+
|http://pacsec.jp/
+
|-
+
|4th Australian Digital Forensics Conference
+
|Dec 04, Edith Cowan University (ECU) Mount Lawley Campus, Western Australia
+
|http://scissec.scis.ecu.edu.au/conferences2006/index.php?cf=3
+
|-
+
|2007
+
|-
+
|Department of Defense CyberCrime Conference 2007
+
|Jan 21-26, St. Louis, MO
+
|http://www.technologyforums.com/7cc/
+
|-
+
|59th Annual Meeting of American Academy of Forensic Science
+
|Feb 19-24, San Antonio, TX
+
|http://www.aafs.org/default.asp?section_id=meetings&page_id=aafs_annual_meeting
+
|-
+
|BlackHat Federal 2007 Briefings & Training
+
|Feb 26-Mar 01, Arlington, VA
+
|http://www.blackhat.com/html/bh-link/briefings.html
+
|-
+
|CyberCrime Summit 2007
+
|Mar 19-23, Atlanta, GA
+
|http://www.cybercrimesummit.com/index.htm
+
|-
+
|CanSecWest 2007
+
|Apr 16-20, Vancouver, BC, Canada
+
|http://cansecwest.com/
+
|-
+
|ADFSL 2007
+
|Apr 18-20, Arlington, VA
+
|http://www.digitalforensics-conference.org
+
|-
+
|IACIS Computer Forensic Training Event 2007
+
|Apr 23-May 04, Orlando, FL
+
|http://www.iacis.com/iacisv2/pages/training.php
+
|-
+
|Computer and Enterprise Investigations Conference (CEIC)
+
|May 06-09, Las Vegas, NV
+
|http://www.ceic2007.com/
+
|-
+
|22nd IFIP International Information Security Conference
+
|May 14-16, Sandton, South Africa
+
|http://www.sbs.co.za/ifipsec2007/
+
|-
+
|2007 Techno-Security Conference
+
|Jun 03-06, Myrtle Beach, SC
+
|http://www.techsec.com/html/Techno2007.html
+
|-
+
|Computer Security Institute NetSec '07
+
|Jun 11-13, Scottsdale, AZ
+
|http://www.gocsi.com/netsec/
+
|-
+
|2007 USENIX Annual Technical Conference
+
|Jun 17-22, Santa Clara, CA
+
|http://www.usenix.org/events/
+
|-
+
|Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2007
+
|Jul 12-13, Lucerne, Switzerland
+
|http://www.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/
+
|-
+
|16th USENIX Security Symposium
+
|Aug 06-10, Boston, MA
+
|http://www.usenix.org/events/
+
|-
+
|}
+
  
== On-going / Continuous Training ==
+
= License =
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
|- style="background:#bfbfbf; font-weight: bold"
+
! Title
+
! Date/Location or Venue
+
! Website
+
|-
+
|Basic Computer Examiner Course
+
|Computer Forensic Training Online
+
|http://www.cftco.com
+
|-
+
|MaresWare Suite Training
+
|First full week every month, Atlanta, GA
+
|http://www.maresware.com/maresware/training/maresware.htm
+
|-
+
|Linux Data Forensics Training
+
|Distance Learning Format
+
|http://www.crazytrain.com/training.html
+
|-
+
|}
+
  
== Scheduled Training Courses ==
+
BSD-3.
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
 
|- style="background:#bfbfbf; font-weight: bold"
+
= OS =
! Title
+
 
! Date/Location
+
Linux/FreeBSD/MacOS
! Website
+
: (shouldn't this just match what the underlying afflib & sleuthkit cover? [[User:RB|RB]])
! Limitation
+
:: Yes, but you need to test and validate on each. Question: Do we want to support windows? [[User:Simsong|Simsong]] 21:09, 30 October 2008 (UTC)
|-
+
:: [[User:Joachim Metz|Joachim]] I think we would do wise to design with windows support from the start this will improve the platform independence from the start
|Certified Wireless Network Administrator CWNA
+
 
|Aug 19-21, McLean, VA
+
= Requirements =
|http://www.securityuniversity.net/classes_wireless_CWAP.php
+
 
|-
+
* [[User:Joachim Metz|Joachim]] A name for the tooling I propose coldcut
|Advanced SMART Linux Data Forensics Training
+
 
|Aug 21-24, Austin, TX
+
[[User:Joachim Metz|Joachim]] Could we do a MoSCoW evaluation of these.
|http://www.asrdata.com/training/training2.html
+
 
|-
+
* AFF and EWF file images supported from scratch. ([[User:Joachim Metz|Joachim]] I would like to have raw/split raw and device access as well)
|Forensic Digital Imaging, Phase I
+
* [[User:Joachim Metz|Joachim]] volume/partition aware layer (what about carving unpartioned space)
|Aug 21-24, Indianapolis, IN
+
* File system aware layer.  
|http://www.ifi-indy.org/ifi%20training/train.html
+
** By default, files are not carved. (clarify: only identified? [[User:RB|RB]]; I guess that it operates like [[Selective file dumper]] [[User:.FUF|.FUF]] 07:00, 29 October 2008 (UTC))
|-
+
* Plug-in architecture for identification/validation.
|Intermediate MacIntosh Forensics
+
** [[User:Joachim Metz|Joachim]] support for multiple types of validators
|Aug 21-25, Santa Clara, CA
+
*** dedicated validator
|http://www.blackbagtech.com/trainingintermediate.html
+
*** validator based on file library (i.e. we could specify/implement a file structure for these)
|-
+
*** configuration based validator (Can handle config files,like Revit07, to enter different file formats used by the carver.)
|CEH Ethical Hacking Certification Class
+
* Ship with validators for:
|Aug 21-25, McLean, VA
+
[[User:Joachim Metz|Joachim]] I think we should distinguish between file format validators and content validators
|http://www.securityuniversity.net/classes_CEH.php
+
** JPEG
|-
+
** PNG
|Cyber Counterterrorism Investigations Training Program (CCITP)
+
** GIF
|Aug 21-30, FLETC, Glynco, GA
+
** MSOLE
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
** ZIP
|Limited to Law Enforcement
+
** TAR (gz/bz2)
|-
+
 
|AccessData Windows Forensics
+
[[User:Joachim Metz|Joachim]] For a production carver we need at least the following formats
|Aug 22-24, Philadelphia, PA
+
** Grapical Images
|http://www.accessdata.com/training
+
*** JPEG (the 3 different types with JFIF/EXIF support)
|-
+
*** PNG
|Certified Wireless Security Professional CWSP
+
*** GIF
|Aug 22-25, McLean, VA
+
*** BMP
|http://www.securityuniversity.net/classes_wireless_CWSP.php
+
*** TIFF
|-
+
** Office documents
|EnCase Field Intelligence Model/Mobile EE Live Network Investigations -Phase I
+
*** OLE2 (Word/Excell content support)
|Aug 22-25, Washington DC
+
*** PDF
|http://www.guidancesoftware.com/training/schedule.asp
+
*** Open Office/Office 2007 (ZIP+XML)
|-
+
** Archive files
|EnCase Intermediate Analysis and Reporting
+
*** ZIP
|Aug 22-25, Los Angeles, CA and Washington, DC
+
** E-mail files
|http://www.guidancesoftware.com/training/schedule.asp
+
*** PFF (PST/OST)
|-
+
*** MBOX (text based format, base64 content support)
|Computer Network Investigations Training Program (CNITP)
+
** Audio/Video files
|Aug 22-Sep 01, FLETC, Glynco, GA
+
*** MPEG
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
*** MP2/MP3
|Limited to Law Enforcement
+
*** AVI
|-
+
*** ASF/WMV
|EnCase Field Intelligence Model/Mobile EE Live Network Investigations -Phase II
+
*** QuickTime
|Aug 28-31, Washington DC
+
** Printer spool files
|http://www.guidancesoftware.com/training/schedule.asp
+
*** EMF (if I remember correctly)
|-
+
** Internet history files
|EnCase Advanced Computer Forensics
+
*** index.dat
|Aug 29-Sep 01, Washington DC
+
*** firefox (sqllite 3)
|http://www.guidancesoftware.com/training/schedule.asp
+
** Other files
|-
+
*** thumbs.db
|EnCase Advanced Internet Examinations
+
 
|Aug 29-Sep 01, Los Angeles, CA
+
* Simple fragment recovery carving using gap carving.
|http://www.guidancesoftware.com/training/schedule.asp
+
** [[User:Joachim Metz|Joachim]] have hook in for more advanced fragment recovery?
|-
+
* Recovering of individual ZIP sections and JPEG icons that are not sector aligned.
|EnCase Intermediate Analysis and Reporting
+
** [[User:Joachim Metz|Joachim]] I would propose a generic fragment detection and recovery
|Aug 29-Sep 01, Los Angeles, CA and Toronto, Canada
+
* Autonomous operation (some mode of operation should be completely non-interactive, requiring no human intervention to complete [[User:RB|RB]])
|http://www.guidancesoftware.com/training/schedule.asp
+
** [[User:Joachim Metz|Joachim]] as much as possible, but allow to be overwritten by user
|-
+
* Tested on 500GB-sized images. Should be able to carve a 500GB image in roughly 50% longer than it takes to read the image.
|SMART Linux Data Forensics Training
+
** Perhaps allocate a percentage budget per-validator (i.e. each validator adds N% to the carving time)
|Sep 04-07, Austin, TX
+
** [[User:Joachim Metz|Joachim]] have multiple carving phases for precision/speed trade off?
|http://www.asrdata.com/training/training2.html
+
* Parallelizable
|-
+
** [[User:Joachim Metz|Joachim]] tunable for different architectures
|EnCase Advanced Internet Examinations
+
* Configuration:
|Sep 05-08, Washington DC
+
** Capability to parse some existing carvers' configuration files, either on-the-fly or as a one-way converter.
|http://www.guidancesoftware.com/training/schedule.asp
+
** Disengage internal configuration structure from configuration files, create parsers that present the expected structure
|-
+
** [[User:Joachim Metz|Joachim]] The validator should deal with the file structure the carving algorithm should not know anything about the file structure (as in revit07 design)
|EnCase Intermediate Analysis and Reporting
+
**  Either extend Scalpel/Foremost syntaxes for extended features or use a tertiary syntax ([[User:Joachim Metz|Joachim]] I would prefer a derivative of the revit07 configuration syntax which already has encountered some problems of dealing with defining file structure in a configuration file)
|Sep 05-08, Melbourne, Australia
+
* Can output audit.txt file.
|http://www.guidancesoftware.com/training/schedule.asp
+
* [[User:Joachim Metz|Joachim]] Can output database with offset analysis values i.e. for visualization tooling
|-
+
* [[User:Joachim Metz|Joachim]] Can output debug log for debugging the algorithm/validation
|EnCase Network Intrusion Investigations - Phase I
+
* Easy integration into ascription software.
|Sep 05-08, The Netherlands
+
** [[User:Joachim Metz|Joachim]] I'm no native speaker what do you mean with "ascription software"?
|http://www.guidancesoftware.com/training/schedule.asp
+
 
|-
+
= Ideas =
|Computer Forensics (First Responder)
+
* Use as much TSK if possible. Don't carry your own FS implementation the way photorec does.
|Sep 06, Indianapolis, IN
+
** [[User:Joachim Metz|Joachim]] using TSK as much as possible would not allow to add your own file system support (i.e. mobile phones, memory structures, cap files)
|http://www.ifi-indy.org/ifi%20training/train.html
+
I would propose wrapping TSK and using it as much as possible but allow to integrate own FS implementations.
|-
+
* Extracting/carving data from [[Thumbs.db]]? I've used [[foremost]] for it with some success. [[Vinetto]] has some critical bugs :( [[User:.FUF|.FUF]] 19:18, 28 October 2008 (UTC)
|Video Capture and Enhancement
+
* Carving data structures. For example, extract all TCP headers from image by defining TCP header structure and some fields (e.g. source port > 1024, dest port = 80). This will extract all data matching the pattern and write a file with other fields. Another example is carving INFO2 structures and URL activity records from index.dat [[User:.FUF|.FUF]] 20:51, 28 October 2008 (UTC)
|Sep 11-13, Indianapolis, IN
+
** This has the opportunity to be extended to the concept of "point at blob FOO and interpret it as BAR"
|http://www.ifi-indy.org/ifi%20training/train.html
+
 
|-
+
.FUF added:
|CEH Ethical Hacking Certification Class
+
The main idea is to allow users to define structures, for example (in pascal-like form):
|Sep 11-14, Sunnyvale, CA
+
 
|http://www.securityuniversity.net/classes_CEH.php
+
<pre>
|-
+
Field1: Byte = 123;
|Windows Client Email Data Structures-EMAIL
+
SomeTextLength: DWORD;
|Sep 11-15, Miami, FL (Florida Department of Law Enforcement (FDLE))
+
SomeText: string[SomeTextLength];
|http://nw3c.org/ocr/courses_desc.cfm?cn=EMAIL
+
Field4: Char = 'r';
|Limited to Law Enforcement
+
...
|-
+
</pre>
|First Responder to Digital Evidence Program (FRDE)
+
 
|Sep 12-14, FLETC, Glynco, GA
+
This will produce something like this:
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
<pre>
|Limited to Law Enforcement
+
Field1 = 123
|-
+
SomeTextLength = 5
|EnCase Advanced Computer Forensics
+
SomeText = 'abcd1'
|Sep 12-15, Centennial, CO and The Netherlands
+
Field4 = 'r'
|http://www.guidancesoftware.com/training/schedule.asp
+
</pre>
|-
+
 
|EnCase Enterprise - Phase I
+
(In text or raw forms.)
|Sep 12-15, Los Angeles, CA
+
 
|http://www.guidancesoftware.com/training/schedule.asp
+
Opinions?
|-
+
 
|EnCase Essentials
+
Opinion: Simple pattern identification like that may not suffice, I think Simson's original intent was not only to identify but to allow for validation routines (plugins, as the original wording was). As such, the format syntax would need to implement a large chunk of some programming language in order to be sufficiently flexible. [[User:RB|RB]]
|Sep 12-15, Los Angeles, CA and Washington, DC
+
 
|http://www.guidancesoftware.com/training/schedule.asp
+
=File System Awareness =
|-
+
==Background: Why be File System Aware?==
|EnCase Intermediate Analysis and Reporting
+
Advantages of being FS aware:
|Sep 12-15, Toronto, Canada
+
* You can pick up sector allocation sizes ([[User:Joachim Metz|Joachim]] do you mean file system block sizes?)
|http://www.guidancesoftware.com/training/schedule.asp
+
* Some file systems may store things off sector boundaries. (ReiserFS with tail packing)
|-
+
* Increasingly file systems have compression (NTFS compression)
|EnCase Network Intrusion Investigations - Phase I
+
* Carve just the sectors that are not in allocated files.
|Sep 12-15, Washington DC
+
 
|http://www.guidancesoftware.com/training/schedule.asp
+
==Tasks that would be required==
|-
+
 
|Cell Seizure Advanced Forensics
+
==Discussion==
|Sep 18-20, Santa Maria, CA
+
:: As noted above, TSK should be utilized as much as possible, particularly the filesystem-aware portion. If we want to identify filesystems outside of its supported set, it would be more worth our time to work on implementing them there than in the carver itself. [[User:RB|RB]]
|http://www.paraben-training.com/schedule.html
+
 
|-
+
[[User:Joachim Metz|Joachim]] I would like to have the carver (recovery tool) also do recovery using file allocation data or remainders of file allocation data.
|Advanced SMART Linux Data Forensics Training
+
 
|Sep 18-21, Austin, TX
+
:::: I guess this tool operates like [[Selective file dumper]] and can recover files in both ways (or not?). Recovering files by using carving can recover files in situations where sleuthkit does nothing (e.g. file on NTFS was deleted using ntfs-3g, or filesystem was destroyed or just unknown). And we should build the list of filesystems supported by carver, not by TSK. [[User:.FUF|.FUF]] 07:08, 29 October 2008 (UTC)
|http://www.asrdata.com/training/training2.html
+
 
|-
+
:: This tool is still in the early planning stages (requirements discovery), hence few operational details (like precise modes of operation) have been fleshed out - those will and should come later. The justification for strictly using TSK for the filesystem-sensitive approach is simple: TSK has good filesystem APIs, and it would be foolish to create yet another standalone, incompatible implementation of filesystem(foo) when time would be better spent improving those in TSK, aiding other methods of analysis as well.  This is the same reason individuals that have implemented several other carvers are participating: de-duplication of effort. [[User:RB|RB]]
|EnCase Enterprise - Phase II
+
 
|Sep 18-21, Los Angeles, CA
+
[[User:Joachim Metz|Joachim]]
|http://www.guidancesoftware.com/training/schedule.asp
+
I would go as far to ask you all to look beyond the carver as a tool and look from the perspective of the carver as part of the forensic investigation process. In my eyes certain information needed/acquired by the carver could be also very useful investigative information i.e. what part of a hard disk contains empty sectors.
|-
+
 
|EnCase Network Intrusion Investigations - Phase II
+
[[User:Joachim Metz|Joachim]]
|Sep 18-21, Washington DC
+
I'm missing a part on the page about the carving challenges (scenarios)
|http://www.guidancesoftware.com/training/schedule.asp
+
* normal file (file structure, loose text based structure (more a content structure?))
|-
+
* fragmented file (the file entirely exist)
|AccessData Windows Forensics
+
* a file fragment (the file does not entirely exist)
|Sep 19-21, Frankfurt, Germany-auf DEUTSCH
+
* intertwined file
|http://www.accessdata.com/training
+
* encapsulated file (MPEG/network capture)
|-
+
* embedded file (JPEG thumbnail)
|ProDiscover Tool Certification Course
+
 
|Sep 19-21, Washington, DC
+
=Validator Construction=
|http://www.techpathways.com
+
Options:
|-
+
* Write validators in C/C++
|EnCase EnScript Programming - Phase I
+
* Have a scripting language for writing them (python? Perl?) our own?
|Sep 19-22, Los Angeles, CA
+
** [[User:Joachim Metz|Joachim]] use easy to embed programming languages i.e. Phyton or Lua
|http://www.guidancesoftware.com/training/schedule.asp
+
* Use existing programs (libjpeg?) as plug-in validators?
|-
+
** [[User:Joachim Metz|Joachim]] define a file structure api for this
|EnCase Intermediate Analysis and Reporting
+
 
|Sep 19-22, Washington DC
+
=Existing Code that we have=
|http://www.guidancesoftware.com/training/schedule.asp
+
 
|-
+
[[User:Joachim Metz|Joachim]]
|EnCase NTFS I : NTFS Artifacts and File Systems
+
* DFRWS2006/2007 carving challenge results
|Sep 19-22, The Netherlands
+
* photorec
|http://www.guidancesoftware.com/training/schedule.asp
+
* revit06 and revit07
|-
+
* s3/scarve
|SIM Card Seizure Advanced Forensics
+
 
|Sep 21-22, Santa Maria, CA
+
=Implementation Timeline=
|http://www.paraben-training.com/schedule.html
+
# gather the available resources/ideas/wishes/needs etc. (I guess we're in this phase)
|-
+
# start discussing a high level design (in terms of algorithm, facilities, information needed)
|DataLifter Training
+
## input formats facility
|Sep 21-22, Phoenix, AZ
+
## partition/volume facility
|http://www.datalifter.com/training.htm
+
## file system facility
|-
+
## file format facility
|Fundamentals of Computer Forensics
+
## content facility
|Sep 25-27, Indianapolis, IN
+
## how to deal with fragment detection (do the validators allow for fragment detection?)
|http://www.ifi-indy.org/ifi%20training/train.html
+
## how to deal with recombination of fragments
|-
+
## do we want multiple carving phases in light of speed/precision tradeoffs
|EnCase NTFS II : Windows Networking Investigations
+
# start detailing parts of the design
|Sep 25-28, The Netherlands
+
## Discuss options for a grammar driven validator?
|http://www.guidancesoftware.com/training/schedule.asp
+
## Hard-coded plug-ins?
|-
+
## Which exsisting code can we use?
|EnCase Advanced Computer Forensics
+
# start building/assembling parts of the tooling for a prototype
|Sep 26-29, Washington, DC and Sydney, Australia
+
## Implement simple file carving with validation.
|http://www.guidancesoftware.com/training/schedule.asp
+
## Implement gap carving
|-
+
# Initial Release
|EnCase Intermediate Analysis and Reporting
+
# Implement the ''threaded carving'' that [[User:.FUF|.FUF]] is describing above.
|Sep 26-29, Los Angeles, CA and Washington, DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|AccessData Windows Forensics
+
|Oct 03-05, San Jose, CA
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Internet Forensics
+
|Oct 03-05, Washington, DC
+
|http://www.accessdata.com/training
+
|-
+
|EnCase Advanced Computer Forensics
+
|Oct 03-06, The Netherlands
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|SMART Linux Data Forensics Training
+
|Oct 09-12, Austin, TX
+
|http://www.asrdata.com/training/training2.html
+
|-
+
|Applied Computer Forensics Business Boot Camp
+
|Oct 09-13 , Norman, OK
+
|http://www.vigilar.com/training_cce.html?mc=ggaw_Forensics_training
+
|-
+
|AccessData Windows Forensics
+
|Oct 10-12, Austin, TX
+
|http://www.accessdata.com/training
+
|-
+
|AccessData BootCamp
+
|Oct 10-12, New York, NY
+
|http://www.accessdata.com/training
+
|-
+
|Digital Images--Camera to the Courtroom
+
|Oct 10-12, Indianapolis, IN
+
|http://www.ifi-indy.org/ifi%20training/train.html
+
|-
+
|EnCase Field Intelligence Model/Mobile EE Live Network Investigations -Phase I
+
|Oct 10-13, The Netherlands
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|Oct 11-13, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|PDA Seizure Forensic Course
+
|Oct 16-18, Birmingham, AL
+
|http://www.paraben-training.com/schedule.html
+
|-
+
|EnCase Field Intelligence Model/Mobile EE Live Network Investigations -Phase II
+
|Oct 16-19, The Netherlands
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Basic Data Recovery and Aquisition-BDRA
+
|Oct 16-20, Jacksonville, FL (Florida Department of Law Enforcement(FDLE))
+
|http://nw3c.org/ocr/courses_desc.cfm?cn=BDRA
+
|Limited to Law Enforcement
+
|-
+
|ILook
+
|Oct 16-20, Lanham, MD
+
|http://nw3c.org/ocr/courses_desc.cfm?cn=ILook%C2%AE
+
|Limited to Law Enforcement
+
|-
+
|Advanced MacIntosh Forensics
+
|Oct 16-20, Santa Clara, CA
+
|http://www.blackbagtech.com/trainingadvanced.html
+
|-
+
|AccessData Windows Forensics
+
|Oct 17-19, Los Angeles/El Segundo, CA
+
|http://www.accessdata.com/training
+
|-
+
|ProDiscover Tool Certification Course
+
|Oct 17-19, San Diego, CA
+
|http://www.techpathways.com
+
|-
+
|EnCase Intermediate Analysis and Reporting
+
|Oct 17-20, Victoria, B.C.
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Advanced SMART Linux Data Forensics Training
+
|Oct 23-26, Austin, TX
+
|http://www.asrdata.com/training/training2.html
+
|-
+
|Forensic Digital Imaging, Phase I
+
|Oct 23-26, Indianapolis, IN
+
|http://www.ifi-indy.org/ifi%20training/train.html
+
|-
+
|Digital Evidence Acquisition Specialist Training Program (DEASTP)
+
|Oct 23-Nov 03, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData BootCamp
+
|Oct 24-26, Burlington, MA
+
|http://www.accessdata.com/training
+
|-
+
|EnCase Advanced Internet Examinations
+
|Oct 24-27, Toronto, Canada
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Cell Seizure Forensic Course
+
|Oct 26-27, Nashville, TN
+
|http://www.paraben-training.com/schedule.html
+
|-
+
|EnCase NTFS I : NTFS Artifacts and File Systems
+
|Oct 31- Nov 03, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Fundamentals of Computer Forensics
+
|Nov 06-08, Indianapolis, IN
+
|http://www.ifi-indy.org/ifi%20training/train.html
+
|-
+
|Advanced Data Recovery and Analysis, Internet Trace Evidence-ADRA-INET
+
|Nov 06-09, Orlando, FL (Florida Department of Law Enforcement (FDLE))
+
|http://nw3c.org/ocr/courses_desc.cfm?cn=INET
+
|Limited to Law Enforcement
+
|-
+
|SMART Linux Data Forensics Training
+
|Nov 06-09, Austin, TX
+
|http://www.asrdata.com/training/training2.html
+
|-
+
|EnCase NTFS II : Windows Networking Investigations
+
|Nov 06-09, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase Advanced Computer Forensics
+
|Nov 06-10, Geneva, Switzerland
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|AccessData Internet Forensics
+
|Nov 07-09, Chicago, IL
+
|http://www.accessdata.com/training
+
|-
+
|EnCase Intermediate Analysis and Reporting
+
|Nov 07-10, Austin, TX and Toronto, Canada
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase Network Intrusion Investigations - Phase I
+
|Nov 07-10, The Netherlands
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Forensic Digital Imaging, Phase II
+
|Nov 13-16, Indianapolis, IN
+
|http://www.ifi-indy.org/ifi%20training/train.html
+
|-
+
|Cyber Counterterrorism Investigations Training Program (CCITP)
+
|Nov 13-17, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData Windows Forensics
+
|Nov 14-16, Denver, CO
+
|http://www.accessdata.com/training
+
|-
+
|EnCase Introduction to Computer Forensics
+
|Nov 14-17, Melbourne, Australia
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Advanced SMART Linux Data Forensics Training
+
|Nov 20-23, Austin, TX
+
|http://www.asrdata.com/training/training2.html
+
|-
+
|AccessData BootCamp
+
|Nov 20-22, Redwood City, CA
+
|http://www.accessdata.com/training
+
|-
+
|Video Capture and Enhancement
+
|Nov 27-29, Indianapolis, IN
+
|http://www.ifi-indy.org/ifi%20training/train.html
+
|-
+
|AccessData Windows Forensics
+
|Nov 28-30, St. Paul, MN
+
|http://www.accessdata.com/training
+
|-
+
|AccessData BootCamp
+
|Nov 28-30, Stockholm, Sweden
+
|http://www.accessdata.com/training
+
|-
+
|EnCase Advanced Computer Forensics
+
|Nov 28-Dec 01, Melbourne, Australia
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase Network Intrusion Investigations - Phase I
+
|Nov 28-Dec 01, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Basic Data Recovery and Aquisition-BDRA
+
|Dec 04-08, Tallahassee, FL (Florida Department of Law Enforcement(FDLE))
+
|http://nw3c.org/ocr/courses_desc.cfm?cn=BDRA
+
|Limited to Law Enforcement
+
|-
+
|Seized Computer Evidence Recovery Specialist (SCERS)
+
|Dec 04-15, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData Windows Forensics
+
|Dec 05-07, Dallas/Addison, TX
+
|http://www.accessdata.com/training
+
|-
+
|EnCase NTFS I : NTFS Artifacts and File Systems
+
|Dec 05-08, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase NTFS II : Windows Networking Investigations
+
|Dec 11-14, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|ILook
+
|Dec 11-15, Springdale, AR
+
|http://nw3c.org/ocr/courses_desc.cfm?cn=ILook%C2%AE
+
|Limited to Law Enforcement
+
|-
+
|Computer Forensics (First Responder)
+
|Dec 12, Indianapolis, IN
+
|http://www.ifi-indy.org/ifi%20training/train.html
+
|-
+
|EnCase Intermediate Analysis and Reporting
+
|Dec 12-15, The Netherlands
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Forensic Digital Imaging - Advanced Topics
+
|Dec 13-15, Indianapolis, IN
+
|http://www.ifi-indy.org/ifi%20training/train.html
+
|-
+
|AccessData BootCamp
+
|Dec 18-20, Washington, DC
+
|http://www.accessdata.com/training
+
|-
+
|AccessData BootCamp
+
|Dec 27-29, New York, NY
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Windows Forensics
+
|Dec 27-29, New York, NY
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Internet Forensics
+
|Dec 27-29, New York, NY
+
|http://www.accessdata.com/training
+
|-
+
|2007
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|Jan 09-11, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Cyber Counterterrorism Investigations Training Program (CCITP)
+
|Jan 22-Jan 26, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|DataLifter Training
+
|Feb 05-06, Chicago, IL
+
|http://www.datalifter.com/training.htm
+
|-
+
|Computer Network Investigations Training Program (CNITP)
+
|Mar 06-16, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|Mar 20-22, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Cyber Counterterrorism Investigations Training Program (CCITP)
+
|Apr 02-06, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Digital Evidence Acquisition Specialist Training Program (DEASTP)
+
|Apr 02-13, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Seized Computer Evidence Recovery Specialist (SCERS)
+
|Apr 23-May 04, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Computer Network Investigations Training Program (CNITP)
+
|May 15-25, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|May 30-Jun 01, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Digital Evidence Acquisition Specialist Training Program (DEASTP)
+
|Jun 11-22, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Cyber Counterterrorism Investigations Training Program (CCITP)
+
|Jul 09-13, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Seized Computer Evidence Recovery Specialist (SCERS)
+
|Jul 16-27, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|Jul 31-Aug 02, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Computer Network Investigations Training Program (CNITP)
+
|Aug 14-24, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|Sep 11-13, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|}
+

Revision as of 05:16, 31 October 2008

This page is for planning Carver 2.0.

Please, do not delete text (ideas) here. Use something like this:

<s>bad idea</s>
:: good idea

This will look like:

bad idea

good idea

License

BSD-3.

OS

Linux/FreeBSD/MacOS

(shouldn't this just match what the underlying afflib & sleuthkit cover? RB)
Yes, but you need to test and validate on each. Question: Do we want to support windows? Simsong 21:09, 30 October 2008 (UTC)
Joachim I think we would do wise to design with windows support from the start this will improve the platform independence from the start

Requirements

  • Joachim A name for the tooling I propose coldcut

Joachim Could we do a MoSCoW evaluation of these.

  • AFF and EWF file images supported from scratch. (Joachim I would like to have raw/split raw and device access as well)
  • Joachim volume/partition aware layer (what about carving unpartioned space)
  • File system aware layer.
    • By default, files are not carved. (clarify: only identified? RB; I guess that it operates like Selective file dumper .FUF 07:00, 29 October 2008 (UTC))
  • Plug-in architecture for identification/validation.
    • Joachim support for multiple types of validators
      • dedicated validator
      • validator based on file library (i.e. we could specify/implement a file structure for these)
      • configuration based validator (Can handle config files,like Revit07, to enter different file formats used by the carver.)
  • Ship with validators for:

Joachim I think we should distinguish between file format validators and content validators

    • JPEG
    • PNG
    • GIF
    • MSOLE
    • ZIP
    • TAR (gz/bz2)

Joachim For a production carver we need at least the following formats

    • Grapical Images
      • JPEG (the 3 different types with JFIF/EXIF support)
      • PNG
      • GIF
      • BMP
      • TIFF
    • Office documents
      • OLE2 (Word/Excell content support)
      • PDF
      • Open Office/Office 2007 (ZIP+XML)
    • Archive files
      • ZIP
    • E-mail files
      • PFF (PST/OST)
      • MBOX (text based format, base64 content support)
    • Audio/Video files
      • MPEG
      • MP2/MP3
      • AVI
      • ASF/WMV
      • QuickTime
    • Printer spool files
      • EMF (if I remember correctly)
    • Internet history files
      • index.dat
      • firefox (sqllite 3)
    • Other files
      • thumbs.db
  • Simple fragment recovery carving using gap carving.
    • Joachim have hook in for more advanced fragment recovery?
  • Recovering of individual ZIP sections and JPEG icons that are not sector aligned.
    • Joachim I would propose a generic fragment detection and recovery
  • Autonomous operation (some mode of operation should be completely non-interactive, requiring no human intervention to complete RB)
    • Joachim as much as possible, but allow to be overwritten by user
  • Tested on 500GB-sized images. Should be able to carve a 500GB image in roughly 50% longer than it takes to read the image.
    • Perhaps allocate a percentage budget per-validator (i.e. each validator adds N% to the carving time)
    • Joachim have multiple carving phases for precision/speed trade off?
  • Parallelizable
    • Joachim tunable for different architectures
  • Configuration:
    • Capability to parse some existing carvers' configuration files, either on-the-fly or as a one-way converter.
    • Disengage internal configuration structure from configuration files, create parsers that present the expected structure
    • Joachim The validator should deal with the file structure the carving algorithm should not know anything about the file structure (as in revit07 design)
    • Either extend Scalpel/Foremost syntaxes for extended features or use a tertiary syntax (Joachim I would prefer a derivative of the revit07 configuration syntax which already has encountered some problems of dealing with defining file structure in a configuration file)
  • Can output audit.txt file.
  • Joachim Can output database with offset analysis values i.e. for visualization tooling
  • Joachim Can output debug log for debugging the algorithm/validation
  • Easy integration into ascription software.
    • Joachim I'm no native speaker what do you mean with "ascription software"?

Ideas

  • Use as much TSK if possible. Don't carry your own FS implementation the way photorec does.
    • Joachim using TSK as much as possible would not allow to add your own file system support (i.e. mobile phones, memory structures, cap files)

I would propose wrapping TSK and using it as much as possible but allow to integrate own FS implementations.

  • Extracting/carving data from Thumbs.db? I've used foremost for it with some success. Vinetto has some critical bugs :( .FUF 19:18, 28 October 2008 (UTC)
  • Carving data structures. For example, extract all TCP headers from image by defining TCP header structure and some fields (e.g. source port > 1024, dest port = 80). This will extract all data matching the pattern and write a file with other fields. Another example is carving INFO2 structures and URL activity records from index.dat .FUF 20:51, 28 October 2008 (UTC)
    • This has the opportunity to be extended to the concept of "point at blob FOO and interpret it as BAR"

.FUF added: The main idea is to allow users to define structures, for example (in pascal-like form):

Field1: Byte = 123;
SomeTextLength: DWORD;
SomeText: string[SomeTextLength];
Field4: Char = 'r';
...

This will produce something like this:

Field1 = 123
SomeTextLength = 5
SomeText = 'abcd1'
Field4 = 'r'

(In text or raw forms.)

Opinions?

Opinion: Simple pattern identification like that may not suffice, I think Simson's original intent was not only to identify but to allow for validation routines (plugins, as the original wording was). As such, the format syntax would need to implement a large chunk of some programming language in order to be sufficiently flexible. RB

File System Awareness

Background: Why be File System Aware?

Advantages of being FS aware:

  • You can pick up sector allocation sizes (Joachim do you mean file system block sizes?)
  • Some file systems may store things off sector boundaries. (ReiserFS with tail packing)
  • Increasingly file systems have compression (NTFS compression)
  • Carve just the sectors that are not in allocated files.

Tasks that would be required

Discussion

As noted above, TSK should be utilized as much as possible, particularly the filesystem-aware portion. If we want to identify filesystems outside of its supported set, it would be more worth our time to work on implementing them there than in the carver itself. RB

Joachim I would like to have the carver (recovery tool) also do recovery using file allocation data or remainders of file allocation data.

I guess this tool operates like Selective file dumper and can recover files in both ways (or not?). Recovering files by using carving can recover files in situations where sleuthkit does nothing (e.g. file on NTFS was deleted using ntfs-3g, or filesystem was destroyed or just unknown). And we should build the list of filesystems supported by carver, not by TSK. .FUF 07:08, 29 October 2008 (UTC)
This tool is still in the early planning stages (requirements discovery), hence few operational details (like precise modes of operation) have been fleshed out - those will and should come later. The justification for strictly using TSK for the filesystem-sensitive approach is simple: TSK has good filesystem APIs, and it would be foolish to create yet another standalone, incompatible implementation of filesystem(foo) when time would be better spent improving those in TSK, aiding other methods of analysis as well. This is the same reason individuals that have implemented several other carvers are participating: de-duplication of effort. RB

Joachim I would go as far to ask you all to look beyond the carver as a tool and look from the perspective of the carver as part of the forensic investigation process. In my eyes certain information needed/acquired by the carver could be also very useful investigative information i.e. what part of a hard disk contains empty sectors.

Joachim I'm missing a part on the page about the carving challenges (scenarios)

  • normal file (file structure, loose text based structure (more a content structure?))
  • fragmented file (the file entirely exist)
  • a file fragment (the file does not entirely exist)
  • intertwined file
  • encapsulated file (MPEG/network capture)
  • embedded file (JPEG thumbnail)

Validator Construction

Options:

  • Write validators in C/C++
  • Have a scripting language for writing them (python? Perl?) our own?
    • Joachim use easy to embed programming languages i.e. Phyton or Lua
  • Use existing programs (libjpeg?) as plug-in validators?
    • Joachim define a file structure api for this

Existing Code that we have

Joachim

  • DFRWS2006/2007 carving challenge results
  • photorec
  • revit06 and revit07
  • s3/scarve

Implementation Timeline

  1. gather the available resources/ideas/wishes/needs etc. (I guess we're in this phase)
  2. start discussing a high level design (in terms of algorithm, facilities, information needed)
    1. input formats facility
    2. partition/volume facility
    3. file system facility
    4. file format facility
    5. content facility
    6. how to deal with fragment detection (do the validators allow for fragment detection?)
    7. how to deal with recombination of fragments
    8. do we want multiple carving phases in light of speed/precision tradeoffs
  3. start detailing parts of the design
    1. Discuss options for a grammar driven validator?
    2. Hard-coded plug-ins?
    3. Which exsisting code can we use?
  4. start building/assembling parts of the tooling for a prototype
    1. Implement simple file carving with validation.
    2. Implement gap carving
  5. Initial Release
  6. Implement the threaded carving that .FUF is describing above.