Disk Forensics
Storage Device Investigation and Analysis
What is Disk Forensics?
Disk Forensics: The process of examining storage devices (hard drives, SSDs, USB drives) to recover, analyze, and preserve digital evidence while maintaining data integrity and legal admissibility.
- Storage Analysis: Examining various storage media types
- Data Recovery: Retrieving deleted or hidden information
- Evidence Preservation: Maintaining forensic soundness
- File System Examination: Understanding data organization
Storage Device Types
Hard Disk Drives (HDD)
- Magnetic storage technology
- Mechanical read/write heads
- Traditional forensic target
- Data remnants in unallocated space
Solid State Drives (SSD)
- Flash memory technology
- No mechanical components
- TRIM command challenges
- Wear leveling complexities
Optical Media
- CD, DVD, Blu-ray discs
- Write-once or rewritable
- Session-based writing
- Physical damage assessment
External Storage
- USB flash drives
- External hard drives
- Memory cards (SD, microSD)
- Portable storage devices
File System Analysis
Common File Systems:
- NTFS: Windows NT File System with security features
- FAT32/exFAT: File Allocation Table systems
- ext4: Fourth extended filesystem for Linux
- HFS+/APFS: Apple file systems for macOS
- UFS: Unix File System variants
File System Components:
• Boot sector - Contains file system information
• File Allocation Table - Tracks file locations
• Directory structure - Organizes files and folders
• Data area - Stores actual file content
• Metadata - File attributes and timestamps
Data Acquisition Process
Acquisition Methods:
- Physical Imaging: Bit-by-bit copy of entire drive
- Logical Imaging: Copy of file system and allocated data
- Sparse Imaging: Copy only allocated data blocks
- Live Imaging: Acquisition from running system
Write Blockers:
- Hardware Write Blockers: Physical devices preventing writes
- Software Write Blockers: OS-level write protection
- Purpose: Prevent evidence contamination
- Validation: Test before and after use
Disk Structure and Organization
Physical Disk Layout:
Cylinder → Head → Sector (CHS addressing)
OR
Logical Block Addressing (LBA)
Typical Structure:
• Master Boot Record (MBR) or GUID Partition Table (GPT)
• Partition tables
• File system boot sectors
• Data areas
Partition Analysis
- Primary and extended partitions
- Hidden partitions
- Deleted partition recovery
- Partition table reconstruction
Slack Space
- RAM slack space
- Drive slack space
- Data hiding locations
- Evidence remnants
Deleted File Recovery
File Deletion Process: When files are deleted, the data typically remains on disk until overwritten, with only the file system metadata being modified to mark the space as available.
Recovery Techniques:
- Undelete Utilities: Recover recently deleted files from file system
- File Carving: Search for file signatures in unallocated space
- Journal Analysis: Examine file system journals for deleted entries
- Shadow Copy Analysis: Recover from Windows Volume Shadow copies
- Recycle Bin Forensics: Analyze deleted file metadata