Sophie Chen
ResumeLinkedInGitHubBluesky
Work
Work
  • Work
  • Digital Forensics Lab
    • 1 Setting Up
    • 2 Basic Computer Skills for Digital Forensics
      • 2.1 Number Systems
      • 2.2 PC Introduction
      • 2.3 Windows Command Line Tutorial
      • 2.4 Linux Command Line Tutorial
      • 2.5 Advanced Linux Command Line Tutorial
    • 3 Basic Networking Skills for Digital Forensics
      • 3.1 HTTP Analysis using Wireshark 1
      • 3.2 HTTP Analysis using Wireshark 2
      • 3.3 SYN Flood Attack Investigation using tshark
      • 3.4 SMTP Forensics
      • 3.5 ARP Poisoning Forensics
      • 3.6 Firewall
      • 3.7 DNS Introduction
      • 3.8 DNS Spoofing Forensics
      • 3.9 WEP40 Wireless Aircrack
    • 4 Computer and Digital Forensics
      • 4.1 Introduction to Digital Forensics
      • 4.2 Sleuth Kit Tutorial
      • 4.3 USB Image Acquisition
      • 4.4 Evidence Search - A Pattern Match Game
      • 4.5 Evidence Search - File Metadata
      • 4.6 Data Carving
      • 4.7 Steganography
      • 4.8 Forensic Report Template
    • 5 Computer Forensics Case Studies
      • 5.1 Investigating NIST Data Leakage
        • 5.1.1 Environment Setting Up
        • 5.1.2 Windows Registry
        • 5.1.3 Windows Event and XML
        • 5.1.4 Web History and SQL
        • 5.1.5 Email Investigation
        • 5.1.6 File Change History and USN Journal
        • 5.1.7 Network Evidence and shellbag
        • 5.1.8 Network Drive and Cloud
        • 5.1.9 Master File Table ($MFT) and Log File ($logFile) Analysis
        • 5.1.10 Windows Search History
        • 5.1.11 Windows Volume Shadow Copy Analysis/SQL database carving
        • 5.1.12 Recycle Bin and Anti-Forensics
        • 5.1.13 Data Carving
        • 5.1.14 Crack Windows Passwords
      • 5.2 Investigating P2P Data Leakage
        • 5.2.1 Lab Environment Setting Up
        • 5.2.2 Disk Image and Partitions
        • 5.2.3 Windows Registry and File Directory
        • 5.2.4 MFT Timeline
        • 5.2.5 USN Journal Timeline
        • 5.2.6 uTorrent Log File
        • 5.2.7 File Signature
        • 5.2.8 Emails
        • 5.2.9 Web History
        • 5.2.10 Website Analysis
        • 5.2.11 Timeline (Summary)
      • 5.3 Investigating Illegal Possession of Images
        • 5.3.1 Review HTTP Analysis using Wireshark (text)
        • 5.3.2 Rhion Possession Investigation 1: File recovering
        • 5.3.3 Rhion Possession Investigation 2: Steganography
        • 5.3.4 Rhion Possession Investigation 3: Extract Evidence from FTP Traffic
        • 5.3.5 Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic
      • 5.4 Investigating Email Harassment
        • 5.4.1 Investigating Harassment Email using Wireshark
        • 5.4.2 t-shark Forensic Introduction
        • 5.4.3 Investigating Harassment Email using t-shark
      • 5.5 Investigating Illegal File Transferring
      • 5.6 Investigating Hacking Case
      • 5.7 Investigating Morris Worm Attack
        • 5.7.1 Morris Worm Attack
        • 5.7.2 Investigating Morris Worm Attack
    • 6 Mobile/IoT Forensics Case Studies
      • 6.1 Investigating Echo Show 8
        • 6.1.1 Echo Show Introduction
        • 6.1.2 Echo Show Evidence Planting
        • 6.1.3 Device Teardown and eMMC Chip-off
        • 6.1.4 Image Acquisition and Mounting
        • 6.1.5 Specifications: Device and OS Info
        • 6.1.6 Specifications: User Info
        • 6.1.7 Specifications: Network Connectivity Info
        • 6.1.8 Web Activity
        • 6.1.9 Phone Communication
        • 6.1.10 Multimedia: Photos and related Data
        • 6.1.11 Multimedia: Videos and related Data
        • 6.1.12 Multimedia: Audio and related Data
      • 6.2 Investigating Android 10
        • 6.2.1 Intro Pixel 3
        • 6.2.2 Pixel 3 Image
        • 6.2.3 Pixel 3 Device
        • 6.2.4 Pixel 3 System Setting
        • 6.2.5 Overview: App Life Cycle
        • 6.2.6 AOSP App Investigations: Messaging
        • 6.2.7 AOSP App Investigations: Contacts
        • 6.2.8 AOSP App Investigations: Calendar
        • 6.2.9 GMS App Investigations: Messaging
        • 6.2.10 GMS App Investigations: Dialer
        • 6.2.11 GMS App Investigations: Maps
        • 6.2.12 GMS App Investigations: Photos
        • 6.2.13 Third-Party App Investigations: Kik
        • 6.2.14 Third-Party App Investigations: textnow
        • 6.2.15 Third-Party App Investigations: whatapp
        • 6.2.16 Pixel 3 Rooting
      • 6.3 Investigating iPhone iOS 13.4.1
        • 6.3.1 Intro Intro iPhone iOS 13
        • 6.3.2 iOS 13.4.1 Image
        • 6.3.3 iPhone Device Investigation
        • 6.3.4 iOS System Settings
        • 6.3.5 Overview of App Life Cycle
        • 6.3.6 Messages Investigations
        • 6.3.7 Contacts Investigations
        • 6.3.8 Calendar Investigations
        • 6.3.9 Safari Investigations
        • 6.3.10 Photo Investigations
        • 6.3.11 KnowledgeC Investigations
        • 6.3.12 Health Investigations
        • 6.3.13 Location Investigations
        • 6.3.14 Cellebrite Investigations
        • 6.3.15 Magnet Axiom Investigations
        • 6.3.16 Jailbreak Investigations
      • 6.4 Investigating Drone DJI
        • 6.4.1 DJI Mavic Air Mobile
        • 6.4.2 DJI Mavic Air MicroSD Raw
        • 6.4.3 DJI Mavic Air MicroSD Encase Format
  • CTF Walkthroughs
    • Hack The Box
      • Linux Fundamentals
      • Windows Fundamentals
    • TryHackMe
      • Linux Fundamentals Part 1
      • Linux Fundamentals Part 2
      • Linux Fundamentals Part 3
      • Introductory Networking
      • HTTP in Detail
      • DNS in Detail
      • Intro to Cyber Threat Intel
      • Threat Intelligence Tools
      • MAL: Malware Introductory
      • Intro to Digital Forensics
      • Digital Forensics Case B4DM755
  • Multithreaded Network File Server
  • Thread Library
  • Virtual Memory Pager
Powered by GitBook
On this page
  • Computer Systems
  • Computer Forensics Challenges
  • Hard Disk Drives
  • Sectors
  • Disk Partitions
  • PC Boot Process
  • File Systems
  1. Digital Forensics Lab
  2. 2 Basic Computer Skills for Digital Forensics

2.2 PC Introduction


Computer Systems

A computer system can be broken down into four layers.

  1. User: The person or program that interacts with the computer

  2. Applications: Software built on the operating system that allow for user interaction

  3. Operating system: The software layer between application programs and the hardware

  4. Device or computer hardware: The physical computer

When a user takes an action, the effects of that action trickles down to the other three layers. As a result, evidence of that action is generated at each layer.

An operating system is a type of system software that manages hardware and software resources on a computer. Common features of operating systems include:

  • Process management

  • Memory management

  • File system

  • Device drivers

  • Networking

  • Security

  • Input-output (I/O)

A computer can be broken down into many parts, as shown in the diagram below. The most important parts of a computer for digital forensic practitioner are the drive bayes, RAM, and CPU.

We can check out information about a Windows system in the command line using the systeminfo command.

A process is an instance of a computer program. On a multi-core computer, a process can create child processes as well. A process may be made up of multiple threads, or sub-tasks, of execution that execute instructions of the computer program concurrently.

On Windows, the task manager allows us to view the processes associated with an application.

Computer Forensics Challenges

Computer forensics is difficult and complex because of technical complexities and ever-advancing technology. Computer forensics professionals works with different types and versions of operating systems, different types and versions of applications, and a variety of hardware. The need to analyze non-traditional devices such as Internet of Things (IoT) devices pose an additional challenge.

Computer forensics practitioners may work with malware, OS and application logs, memory, application processes, CPU execution, etc. With such a large quantity of varied information, we need to be able to collect, analyze, and verify evidence in a systematic manner.

Skilled computer forensic practitioners understand not only computer science and security, but also criminal justice and law.

Hard Disk Drives

A hard disk consists of a set of magnetic platters. Data is stored in the polarity of the platters.

Each platter, or plate, consists of a surface many tracks. A track is a concentric circle made of a ring of magnets. Each track can be subdivided into sections called a sector. All tracks with a certain radial distance from the center is called a cylinder.

The platters spin around, and the arm moves and reads data through its heads.

Sectors

A sector is the minimum storage unit of a hard drive. Regardless of a file's actual size, files occupy an integral number of sectors.

We can calculate the number of sectors in a disk calculated as such:

numSectors=numTracksâ‹…numHeadsâ‹…sectorsPerTracknumSectors = numTracks \cdot numHeads \cdot sectorsPerTracknumSectors=numTracksâ‹…numHeadsâ‹…sectorsPerTrack

For example, if there are 400 sectors per track, 12 heads, and 17,000 tracks, then there are 8,1600,000 sectors.

We can calculate the size of a disk as such:

diskSize=numSectorsâ‹…bytesPerSectordiskSize = numSectors \cdot bytesPerSectordiskSize=numSectorsâ‹…bytesPerSector

For example, if each sector is 512 bytes and there are 8,1600,000, then the disk is 41779200000 bytes or 38.91GB. Notice that because we work in powers of 2, 1KB is 1024 bytes, not 1000. Likewise, 1MB is 1024KB, and 1GB is 1024MB.

Disk Partitions

A disk partition is a region of a disk. We can view partitions on a Windows device in Disk Management.

PC Boot Process

A PC boot sequence is governed by Basic Input/Output System (BIOS) ROM. BIOS parameters are stored in CMOS. A PC boot process includes these steps:

  1. The computer runs the power-on self-test (POST).

  2. Control passes to the Master Boot Record (MBR) partition table.

  3. The MBR points to the boot record of a selected operating system.

  4. The operating system takes control.

The MBR partition table is used by legacy BIOS systems. GUID Partition Table (GPT) is an alternative partition used by UEFI systems. While MBR allows for a maximum of 2TB, GPT allows for a maximum of 9.4ZB.

The GPT scheme is as follows:

File Systems

A file system is an operating system abstraction of storage. A file system how files are named, stored, and retrieved from a storage device. A file, really just a bunch of bytes, is a storage object and disk abstraction that is created and destroyed on demand.

We often think of file systems as a hierarchical tree where the nodes of the tree are directories, or folders, and files.

Different operating systems use different file systems:

  • Linux uses XFS, JFS, and btrfs.

  • macOS uses the Hierarchical File System (HFS).

  • Microsoft Windows uses File Allocation Table (FAT) and New Technology File System (NTFS).

There are many types of file systems. A virtual file system (VFS) allows clients applications to access different types of concrete file systems in a uniform way.


Last updated 2 months ago

Up Next:

â‹… â‹…

Windows Command Line Tutorial
Home
Work
Thoughts
The output of systeminfo includes the various system information, including the operating system name and version.
The task manager shows the Arc application, which has a "(37)" next to its name, and its associated processes in the drop down menu.
Partitions on a Windows computer can be viewed with Disk Management.
Parts of a computer include the power supply, network cards, RAM, CPU, and peripherals.
Programs, processes and threads differ. Malware analysis can occur on the disk, in RAM, or using the program instructions. .
Hard disk drives consist of an arm assembly and stack of platters. .
The Primary GPT section of the scheme describes each partition while the Secondary GPT section of the scheme backs up the Primary GPT header and entries. .
The Linux file system is organized in a hierarchical tree. .
Source
Source
Source
Source
Source