data character representationathena.ecs.csus.edu/~cookd/116/notes/csc 116 - summer 2018 - 1 - part 2...

17
1 Data Representation & Hard Drives Week 1 – Part 2 Character Sets How Text is Stored Represents text Punctuation & symbols Numerals 0 – 9 Letters Each has a value computers think in numbers characters and their matching values are a character set 7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 3 Characters ASCII 7 bits – 128 characters uses a full byte, one bit is not used created in the 1967 EBCDIC Alternative system used by old IBM systems Not used much anymore Unicode – we'll cover this in a few slides 7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 4 Character Sets NUL SOH STX ETX EOT ENQ ACK BEL BS HT LF VT FF CR SO SI DLE DC1 DC2 DC3 DC4 NAK SYN ETB CAN EM SUB ESC FS GS RS US sp !"#$%&'()*+,-./ 0123456789:;<=>? @ABCDEFGHIJKLMNO PQRSTUVWXYZ[\]^_ `abcdefghijklmno pqrstuvwxyz{|}~ DEL 7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 5 ASCII Chart Control characters Each character has a unique value The following is how "Moe" is stored in ASCII Char Binary Value Decimal Value M 0100 1101 77 o 0110 1111 111 e 0110 0101 101 7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 6 ASCII Codes

Upload: others

Post on 15-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

1

Data

Representation

& Hard Drives

Week 1 – Part 2

Character

Sets

How Text is Stored

Represents text

• Punctuation & symbols

• Numerals 0 – 9

• Letters

Each has a value

• computers think in numbers

• characters and their matching values are a character set

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 3

Characters

ASCII

• 7 bits – 128 characters

• uses a full byte, one bit is not used

• created in the 1967

EBCDIC

• Alternative system used by old IBM systems

• Not used much anymore

Unicode – we'll cover this in a few slides

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 4

Character Sets

NUL SOH STX ETX EOT ENQ ACK BEL BS HT LF VT FF CR SO SI

DLE DC1 DC2 DC3 DC4 NAK SYN ETB CAN EM SUB ESC FS GS RS US

sp ! " # $ % & ' ( ) * + , - . /

0 1 2 3 4 5 6 7 8 9 : ; < = > ?

@ A B C D E F G H I J K L M N O

P Q R S T U V W X Y Z [ \ ] ^ _

` a b c d e f g h i j k l m n o

p q r s t u v w x y z { | } ~ DEL

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 5

ASCII ChartControl characters

Each character has a unique value

The following is how "Moe" is stored in ASCII

Char Binary Value Decimal Value

M 0100 1101 77

o 0110 1111 111

e 0110 0101 101

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 6

ASCII Codes

Page 2: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

2

ASCII is only good for the United States

• Other languages need additional characters

• Multiple competing character sets were created

Unicode was created to support everyspoken language

Developed in Mountain View, California

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 7

Unicode Character Set

Originally used 16 bits

• that's over 65,000 characters!

• includes every character used in the World

Expanded to 21 bits

• 2 million characters!

• now supports every character ever created

Unicode can be stored in different formats

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 8

Unicode Character Set

UTF-8 users 1 byte per character

• can use "override" chars to get up to 4 bytes

• backwards compatible with ASCII systems

UTF-16 uses 2 bytes per character

• can use "override" chars to get up to 4 bytes

• most common format in use

UCS-4 always uses 4 bytes. Rarely used.

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 9

Unicode Formats

Inside a

Computer

Not for the Squeamish

Memory

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 11

Basic Operation of Computers

Mother Board Processor

Hard Disk CPU is core of any computer

Executes instructions

Performs calculations & logic• why computers were invented!

• registers hold data

Controls your computer• talks to other components

• talks to ports

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 12

Central Processing Unit (CPU)

Page 3: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

3

Mother board connects all the components together

BIOS is a collection of chips

that control the motherboard

• controls how information is

moved into or out of the computer

• loads a boot program from ROM

• provides a user interface for configuration

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 13

Basic Input & Output System (BIOS)

CMOS is used by the BIOS to store configuration information – sometimes called "BIOS Settings"

Saves settings if computer is unplugged

Settings include (but not limited to):• boot order – the order the system checks

drives looking for an operating system

• information about the drives

• system clock time

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 14

CMOS

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 15

Some BIOS programs contain a password

and the system will not run until the password has been entered

If the BIOS is password protected

• it may require resetting the CMOS memory to change the boot order to acquire evidence

• should only be used as last resort!

• the best practice is to remove the hard drive

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 16

CMOS and Passwords

Most computers expect the operating

system to be found on floppy disk, hard disk, optical disc – CD, DVD, etc...

Some are now able to boot an OS from a flash drive

The order of examining these devices is stored in the CMOS

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 17

Disk Boot

Warning: allowing a computer to boot the OS can change evidentiary data on the drive

One way to prevent this

• boot an OS from CD or DVD that only uses RAM

• then copy the hard disk to a external disk

• then perform forensic analysis on the copy

NEVER PERFORM ANALYSIS ON THE

ORIGINAL DRIVE!

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 18

Disk Boot

Page 4: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

4

During the trial, a question arose on the settings of the CMOS

By the time the trial had started, the laptop had lost all power -including CMOS battery

The loss of all power meant:• original date/time was lost

• type of port and peripherals enabled were lost

• hard drives settings were lost – did he change hard drives?

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 19

U.S. v. Zacarias Moussaoui (2003)

This made it difficult to

authenticate associated digital evidence

Fortunately, CMOS settings were recorded when the

laptop was first processed by

Secret Service Agency on 9/11, 2001

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 20

U.S. v. Zacarias Moussaoui (2003)

Booting Your

Computer

What Happens Below the Surface

Starting your computer is a

complex process

When it is first turned on...

• it doesn't know about its drives, ports, etc....

• and it has no idea how to load the operating system

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 22

Booting Your Computer

There are two distinct phases

that happen:

1. motherboard checks and finds hardware

2. operating system loads itself

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 23

Booting Your Computer

Performs a Power On Self Test (POST)

• check memory – both size and functionality

• find devices and check if they work

Then find the operating system

• Boot ROM reads CMOS

• finds the location of the operating system

• loads and executes the hard drive’s Boot Sector

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 24

Phase 1: Motherboard

Page 5: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

5

Often the computer displays a logo

• stored on the motherboard in ROM

• company's or the maker of the motherboard

As hardware is "discovered"...

• hard drives speed up

• CD / DVD drives might speed up or blink

Beeps after POST is complete - “all is okay”

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 25

Phase 1: What You See & Hear

The Bootstrap Program is executed

• this is also known as the "Bootstrap Loader" and "Boot Loader"

• instructions needed to load the kernel

The Kernel

• the bare minimum part of operating system

• required to load the rest of the system

• communicates with drivers, etc…

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 27

Phase 2: Operating System

The operating system often has a fancy

boot image

Sometimes it includes a progress bar and

boot information

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 28

Phase 2: What You See & Hear

Storage

Media

How Those Little Bits Are Stored

Page 6: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

6

In a binary computer we say...• that it knows ones and zeros

• ...but, in fact, that is only for humans to believe

Computer memory is…• electrical power on/off (some voltage charge)

• wired networks might use electrical pulse or photons (light in the case of glass fiber)

• wireless might use radio frequency (RF)

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 31

Storage Media Basics

Uses laser refraction to store data

Data Representation• disk surface stores bits

• light spots are called lands

• dark spots are called pits

Data Transfer• read using laser refraction

• written by burning pits

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 32

Optical Storage

Uses iron oxide and the property of magnetization

Used by floppy and hard disks

Bits are stored using magnetized

and unmagnetized spots on a magnetic surface

DANGER: Magnets cause data loss!

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 33

Magnetic Storage

Hard disks contain a number of circular hard disks called platters

These spin at a high revolution (RPMs)

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 34

Hard Disk Technology

The arm that moves over the disk platter has a device that can read or write to the surface and we call it the head

The platters and head are encased in an air-tight sealed container. A piece of dust can destroy the disk.

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 35

Hard Disk Technology

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 36

Hard Disk Platter

Magnetic

surface of platter

Center connects

to motor

Page 7: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

7

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 37

Storage Media: Hard Disk

Read-Write head The data is stored in a series of concentric

circles called tracks

If the disk has more that one platter, the

tracks that are directly above each other are called a cylinder

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 38

Tracks and Cylinders

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 39

Hard Disk: Track

Track

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 40

Hard Disk: Cylinder

The hard drive platter is also divided into

pie wedges called physical sectors

The number of physical sectors on a typical

hard drive numbers into the billions

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 41

Physical Sectors

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 42

Hard Disk: Physical Sector

Physical Sector

Page 8: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

8

The intersection of a track and a physical

sector is called a track sector

When people talk about the hard drives,

they usually just shorten the term to "sector"

Number bytes stored in each sector is small

• traditionally, disks use sectors of 512 bytes

• some new disks use sectors of 4KB

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 43

Track Sectors

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 44

Hard Disk: Track Sector

Track Sector

Location of data can be

referred to using CHS:

Cylinder – group of tracks the

data is stored

Head – the actual track by

referencing a specific head

Sector – exact location on the

track

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 45

Location of Data

The number of sectors can be huge!

Operating systems, when they save CHS,

can't store such large sector numbers

For example:

• a hard drive has 8 billion sectors

• it would require 33 bits to store sector #s

• cannot be stored by 32-bit operating systems

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 46

Clusters / Blocks

To better organize sectors, operating

systems group sectors into clusters

UNIX systems call a cluster a "block"

The larger the hard drive, the larger

clusters tend to get

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 47

Clusters / Blocks

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 48

Hard Disk: Clusters

Sector

Cluster

Page 9: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

9

Maintenance track is the first

cylinder on the disk

Contains information about:

• drive geometry

• bad sectors (breakdown data)

• possible to change this to hide information

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 49

Maintenance Track

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 50

Hard Disk: Maintenance Track

Maintenance Track

Disk drives are attached in several

types

Each has different a

speed of data transfer, capacity size and costs

The main ones are ATA and SATA

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 51

Hard Disk Connections

Serial Advanced Technology

Attachment (SATA)

Created in 2003

Uses a cable rather than a

ribbon (typically red)

There is also eSATA which is

designed for external

connections

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 52

SATA Hard Drive Connector

Advanced Technology

Attachment (ATA)

Uses a ribbon cable (typically

gray)

Older design – first created in

the 1980's

Being replaced by SATA

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 53

ATA Hard Drive Connector

Synonymous with Integrated

Disk Electronics (IDE)

• also called Parallel ATA (PATA)

• so… ATA = IDE = PATA

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 54

ATA Hard Drive Connector

Page 10: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

10

Small Computer System Interface (SCSI)

• has a wide number of connectors – some look like old P.C. parallel ports, IDE, etc…

• used by Macintosh computers prior to iMac. Macintosh then went to ATA

Serial Attached SCSI (SAS)

• almost identical to SATA

• actually, SAS cables can talk to SATA hard drives, but not vice-versa

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 55

Other Connectors

File Systems

Keeping Track of Data

A file system is used to

organize the data stored in a medium – such as a hard

drive, thumb drive, CD, etc…

Each operating system has

their own approach

• FAT, NTFS (Windows)

• HFS (Macintosh)

• Ext2 (Linux)7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 57

File System

The nice hierarchical way we

organize our files is an illusion

Folders are, in fact, a special type of file used internally by

the file system

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 58

Folders are Files

Folders are also called "directories"

They predate the graphical user interface

Two are typically synonymous

However, generally…

• folder: the desktop metaphor icons you click on

• directory: list of files/folders in a folder

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 59

Folders vs. Directories

Folder's store information

about each file that it "contains"

Includes where the file is located on the hard drive

(cluster #'s)

Also includes: name, creation

date, last access, size, etc...

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 60

What a Folder "File" Stores

Page 11: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

11

The first sector of the hard disk is called the

Master Boot Record (MBR).

Can divide the disk up into partitions

• the different parts of the hard disk are treated different – like they are different disks!

• once a partition has been created it can be formatted with any file system

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 61

Master Boot Records

A volume is the area occupied by a file system

First sector on volume called the boot sector

In DOS/Windows…

• each volume is assigned a letter

• A: used to be the main floppy disk

• B: a second floppy disk (often optional)

• C: was the hard drive (and remains the standard)

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 62

Volumes

File System may not use all the partition

• the unused space is called volume slack

• this can be used to hide data

File may not use all the sectors in a cluster

• the extra sectors are called file slack space

• can contain parts of a deleted file (partially overwritten)

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 63

Slack Space

Even part of a sector may not be used

• in that case, it might contain zeros

• or even part of the computer's RAM (at the

time of save) called RAM slack

• what is stored depends on the operating

system

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 64

Slack Space

When a file is deleted, the OS

merely (and simply) marks the space, occupied by the

file, as unallocated

The file still remains!

• can stay, unaltered, forever

• but, when a new file is saved, it may overwrite the old data

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 65

File Deletion

If an old file's clusters are

overwritten, the new file maynot fill all the sectors

If so, not some of the old file's data remains in the file slack

space

This can be recovered!

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 66

File Deletion and File Slack

Page 12: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

12

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 67

Hard Disk: File Slack

Original File

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 68

Hard Disk: File Slack

Part of original

file remains

New file

overwrites part of cluster

File systems that use large

cluster sizes results in large file slack spaces

Most forensic tools can search slack space to reveal

any data that might be hidden

there

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 69

Bigger the Cluster…the Better the Slack

Not all devices have file systems

• for example: back up tape

• UNIX machines use a partition of the disk as

swap space. Swap partition is like virtual memory and contains data that was in memory at one time. But it is not accessed like a file.

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 70

Bigger the Cluster…the Better the Slack

Formatting a volume

• creates a new, empty, file system

• all the prior data remains

• it is like destroying a card catalog in a library but leaving all the books on the shelves. It is

possible to find a book but it takes longer

Hard disks can be "low level formatted"

• effectively destroys all data

• but takes a program from the vendor7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 71

Formatting

Windows File

Systems

Microsoft’s Ways of Organizing Data

Page 13: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

13

Windows supports a variety of file systems

To successfully examine Windows media:• must know what a ‘normal’ file

structure looks like

• must know where data can be hidden in each file system

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 73

Windows File Systems

Floppy disks • formatted in FAT12

• each entry in the FAT is 12 bits

Hard drives• may FAT16 or FAT32

• nowadays, most often formatted in NTFS

Flash drives can be any of these – often FAT

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 74

Windows File Systems

Used by DOS, Windows 3.1, 95, 98, ME

It was replaced by NTFS on hard drives

However, it is still used by memory cards

Strengths

• simple – why it was implemented on early systems

• uses the disk surface equally – great idea on old floppy disks which would wear out

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 75

FAT File System

Weaknesses

• does not store the last access date or creation date – only the last edit date

• inefficient – requires the hard drive to look in many different locations to read a file

• files and FAT entries are updated only when the file is changed or deleted

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 76

FAT File System

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 77

FAT Directory Entry

1. Find the file's directory entry (start in the

root directory and follow the path)

2. If successful, read the directory entry: file

size and start/end cluster

3. Read the file's data:

• read cluster and check the File Allocation Table for the next cluster

• ends when it contains a EOC (end of cluster)

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 78

The Steps

Page 14: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

14

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 79

FAT File System Example

cat.doc 184

notes.txt 229

ToDo.txt 227

Directory

Cluster 184

Data

184

185

186

File Allocation Table

187 0

185

186

EOC

Cluster 185

Data

Cluster 186

Data

When a file is deleted, only a

few things are changed

The original directory entry is

still there – only slightly changed

As a result, recovery can be

quite easy

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 80

FAT: Deleting a File

Step 1: Remove the filename

from the directory

• first character of the filename is simply replaced with E5

• rest of the filename, its size,

start cluster, etc… is still there

• so, restored files will lack the

first letter – be careful!

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 81

FAT: Deleting a File

Step 2: Update the FAT table

• system follows the table links like it is reading a file

• however, it sets all the links to zero (available)

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 82

FAT: Deleting a File

Used in Windows NT, 2000, XP, 7, 8, 10

The "NT" File System is far more efficient

than FAT

Stores more forensic data

However, there are some major drawbacks for investigators

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 83

NTFS File System

File information is stored in the Master File

Table (MFT) using a binary tree structure

Entries contain more date evidence:

• when first created

• last modified

• last accessed

This gives more information to the forensics

examiner

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 84

NTFS: File Entries

Page 15: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

15

Deleted files may be more difficult to

recover because NTFS creates entries as needed

NTFS reuses entries before creating new

ones it more likely that a new file will

overwrite a deleted one

The data may be intact, but the file system

references may be lost

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 85

NTFS: Deleted Files

UNIX &

Macintosh

File Systems

Keeping Track of Data

UNIX was developed at

AT&T’s Bell Labs in 1969

Design goals:

• operating system for mainframes

• stable and powerful

• but not exactly easy to use –

GUI hadn’t been invented yet

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 87

UNIX

UNIX evolved into several

competing versions

Two major branches:

• HP UNIX

• BSD UNIX

Became the standard OS for all mainframes

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 88

UNIX

By 1991, personal computers

were as powerful as mainframes 20 years ago

Linus Torvalds decided to port UNIX to x86 PCs

… but gave it a nice graphical

user interface

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 89

UNIX and Linux

Released as General Public License (GPL)

• which allowed anyone to use and expand upon it original code

• it, just like UNIX, evolved into several competing versions - Red Hat, Ubuntu, etc....

Where used:• popular as a Windows alternative

• mostly used for small servers & workstations

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 90

Linux

Page 16: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

16

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 91

Red Hat Linux

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 92

Ubuntu Linux

Pronounced "Mac-OS TEN”

Created by the Apple

Corporation using the version

of UNIX developed at NeXT

It became the default

operating system on all Macintosh computers

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 93

Mac-OS X

Mac-OS X did not evolve

from Linux

However, both evolved from

BSD UNIX

As a result, they are very

similar “under the hood”

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 94

Mac-OS X

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 95

UNIX has many different types of file systems

• UFS – UNIX File System

• ext3 (Extended File System 3) – Linux

• HFS+ (Hierarchical File Structure) – Mac-OS

• … and more

Each, however, shares the same structure

• data is organized using index nodes (inode)

• these are like "links" in a logical chain

• these link to other inodes or, finally, the file itself

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 96

UNIX File Systems

Page 17: Data Character Representationathena.ecs.csus.edu/~cookd/116/notes/CSc 116 - Summer 2018 - 1 - Part 2 - Data...Representation & Hard Drives Week 1 – Part 2 Character Sets How Text

17

Each inode is a directory or file

Directories

• contains a list of filenames and links to inodes

Files

• contains links to the "blocks" (aka clusters)

• it also contains information about the file (owner, permissions, dates, etc.)

• inode doesn’t contain the file name

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 97

UNIX INodes

7/10/2018 Sacramento State - Cook - CSc 116 - Summer 2018 98

UNIX File System Example

C:/Files/Cat.doc

Files 1184

System 265

Log.txt 1337

C: Root

notes.txt 4527

cat.doc 2297

ToDo.txt 628

inode 1184

Owner

Permission

File Type

inode 2297

Time Stamps

Blocks

Block 185

Data

Block 186

Data