Product Group Tests
Media forensics (2008)May 01, 2008
Our Best Buy goes to Access Data's Forensic Toolkit 2.0, a great product that is well put together and worth several times the price.
We rate Gargoyle Investigator Enterprise Recommended for being a unique product that can be used to search for some of the most difficult-to-find malware.
Forensics has become a much-maligned discipline in the information security realm. To quote forensics expert Thomas Rude: "have dongle, am expert". As tools get more advanced, the need for true understanding appears to become less but, in reality, there is no substitute for knowledge and experience. Many vendors are offering certifications on their products, but this often requires purchasing the tools and the certification is not just based on knowledge alone.
There are several vendor-neutral certifications coming on to the market, led perhaps by the Certified Hacking Forensic Investigator from the EC-Council. However, the crucial need here is not for certification but for knowledge of forensics. There is a shortage of qualified investigators as college campuses, local police departments, and even private citizens in civil lawsuits all need to have forensic analysis performed. This has led to a growth in available tools, which have become much easier to use.
This review focuses not on the knowledge of the investigators but the quality of the tools they use. Another twist in the world of forensics is the multitude of changes in where data resides. The smartphone of 2008 was the laptop of 2001. Storage in the GB range can come in various formats.
As phones and PDAs continue to increase in processing power and storage capacity, the need for forensic analysis of these devices becomes more critical. There are several challenges to performing forensics on a hand-held device, and most of the trouble is due to the difficulty of capturing data in a way that is forensically sound. Most forensic packages now include - or are planning to in their next release - capabilities to analyse hand-held devices. When it comes to gathering forensic data from a phone you might wonder how much data there can possibly be on this type of device. Mobiles store data of interest to the forensic analyst in places such as contacts, call history, calendar, SMS, images and videos, expansion cards and SIM cards.
Since most of these non-computer devices use dynamic storage, one of the most critical steps is to block USB write access from your forensic machine. A little unheralded change, which was part of Windows XP Service Pack Two (SP2), can make the process of performing forensic analysis of hand-held devices easier. With SP2, Windows XP has the ability to change USB ports from the standard read/write mode to a new read-only mode. This feature is simple to integrate and only requires a registry change.
This process helps protect the evidence from modification and allows you to use less expensive digital media readers to collect evidence. Software takes greater configuration than a hardware device write blocker. For more information about the Windows XP SP2 USB write block, check out the knowledge base entry located at: technet.microsoft.com/en-us/library/bb457157.aspx.
A graphical interface USB write blocking tool is available at www.m2cfg.com/usb_writeblock.htm. If you prefer hardware blockers there are several on the market.
How we tested
To truly test the software packages that were specific to mobile phone forensics we used either a Palm Treo 755p or a Motorola RAZR V3. To test hard-drive forensic machines we used a 1GB flash drive loaded with office files, zip files, pictures and executables. We password-protected some zip files, as well as some of the Office files, and also deleted files and directories. In addition we used steganographic tools to hide an image in another image file and to hide text inside a picture file.
Buying media forensic tools
As always, the first step to buying tools is deciding how they will be used. In this case, the task is relatively easy. If you need to analyse mobile phones and PDAs, you need a specific tool
to do that. The tools should be comprehensive and should cover all the data capture and analysis tasks that you will need to perform. In that regard, you will need to compare general-purpose tools and specific offerings for these small devices.
In some cases you may benefit financially from putting all your forensic eggs in one basket and buying a generic tool with lots of capabilities. That may or may not be a good idea depending upon the product. We recommend purchasing specialised tools even if the general purpose ones cover most of your bases.
It never hurts to have more than one computer forensic tool. Many organisations are opting
for a commercial tool and an open-source tool. We cover both in this review.
- For details on how we test and score products, visit http://www.scmagazineus.com/How-We-Test/section/114/
All products in this group test
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry