DF Unit-5
DF Unit-5
• File system
– Gives OS a road map to data on a disk
• Type of file system an OS uses determines how
data is stored on the disk
• A file system is usually directly related to an OS
• When you need to access a suspect’s computer to
acquire or inspect data
– You should be familiar with the computer’s platform
Understanding the Boot Sequence
• Bootstrap process
– Contained in ROM, tells the computer how to
proceed
– Displays the key or keys you press to open the
CMOS setup screen
• Could be Delete, F2, F10, Ctrl+Alt+Insert, Ctrl+A,
Ctrl+S, Ctrl+F1, or something else
• CMOS should be modified to boot from a forensic
floppy disk or CD
BIOS Setup Utility
Understanding Disk Drives
A.Head
B.Track
C.Cylinder
D.Sector
E.Cluster
Which of these has a capacity
that varies with partition size?
A.Head
B.Track
C.Cylinder
D.Sector
E.Cluster
Which file system has a
maximum partition size of 2 GB?
A.FAT12
B.FAT16
C.FAT32
D.FATX
E.VFAT
Examining NTFS Disks
• Registry
– A database that stores hardware and software
configuration information, network connections, user
preferences, and setup information
• For investigative purposes, the Registry can
contain valuable evidence
• To view the Registry, you can use:
– Regedit (Registry Editor) program for Windows 9x
systems
– Regedt32 for Windows 2000 and XP
Exploring the Organization of the
Windows Registry
• Registry terminology:
– Registry
– Registry Editor
– HKEY
– Key
– Subkey
– Branch
– Value
– Default value
– Hives
Exploring the Organization of the
Windows Registry (continued)
Exploring the Organization of the
Windows Registry (continued)
Understanding Microsoft
Startup Tasks
Understanding Microsoft Startup
Tasks
• NT Loader (NTLDR)
• Boot.ini
• BootSect.dos
• NTDetect.com
• NTBootdd.sys
• Ntoskrnl.exe
• Hal.dll
• Pagefile.sys
• Device drivers
Startup in Windows NT and Later
(continued)
• Virtual machine
– Allows you to create a representation of another
computer on an existing physical computer
• A virtual machine is just a few files on your hard
drive
– Must allocate space to it
• A virtual machine recognizes components of the
physical machine it’s loaded on
– Virtual OS is limited by the physical machine’s OS
Understanding Virtual Machines
(continued)
• In computer forensics
– Virtual machines make it possible to restore a
suspect drive on your virtual machine
• And run nonstandard software the suspect might have
loaded
• From a network forensics standpoint, you need to
be aware of some potential issues, such as:
– A virtual machine used to attack another system or
network
Creating a Virtual Machine