Forensic Examination of Digital Evidence

28.06.2016 Views

SPECIAL REPORT / APR. 04 Hard Drive Evidence Worksheet Case Number: Laboratory Number: Exhibit Number: Control Number: Hard Drive #1 Label Information [Not Available ] Hard Drive #2 Label Information [Not Available ] Manufacturer: Manufacturer: Model: Model: Serial Number: Serial Number: Capacity: Cylinders: Capacity: Cylinders: Heads: Sectors: Heads: Sectors: Controller Rev. Controller Rev. IDE 50 Pin SCSI IDE 50 Pin SCSI 68 Pin SCSI 80 Pin SCSI Other 68 Pin SCSI 80 Pin SCSI Other Jumper: Master Slave Jumper: Master Slave Cable Select Undetermined Cable Select Undetermined Hard Drive #1 Parameter Information DOS FDisk PTable PartInfo Linux FDisk SafeBack EnCase Other: Capacity: Cylinders: Heads: Sectors: LBA Addressable Sectors: Formatted Drive Capacity: Volume Label: Partitions Name: Bootable? Start: End: Type: Hard Drive #2 Parameter Information DOS FDisk PTable PartInfo Linux FDisk SafeBack EnCase Other: Capacity: Cylinders: Heads: Sectors: LBA Addressable Sectors: Formatted Drive Capacity: Volume Label: Partitions Name: Bootable? Start: End: Type: Hard Drive Evidence Worksheet Page 1 of 2 46

FORENSIC EXAMINATION OF DIGITAL EVIDENCE: A GUIDE FOR LAW ENFORCEMENT Image Archive Information Archive Method: Direct to Tape NTBackup Tar Other :* Compressed? Attach appropriate worksheet for backup method used. Tape Type: DAT 24 Dat 40 DLT * Other *: Number Used: *Requires Lab Director Approval Analysis Platform Information Operating Systems Used: DOS Windows Mac *nix Other: Version: Analysis Software Base: I-Look EnCase DOS Utilities *nix Utilities Other:* Version: Restored Work Copy/Image Validated: Yes No List of utilities used other than base Utility Version Purpose Analysis Milestones Milestone Remarks Initials Run Anti-Virus Scan Full File List with Meta Data Identify Users/Logons/ISP Accounts, etc. Browse File System Keyword/String Search Web/E-mail Header Recovery Recover & Examine Free/Slack Space Examine Swap Unerase/Recover Deleted Files Execute Programs as Needed Examine/Recover Mail/Chat Crack Passwords Hard Drive Evidence Worksheet Page 2 of 2 47

FORENSIC EXAMINATION OF DIGITAL EVIDENCE: A GUIDE FOR LAW ENFORCEMENT<br />

Image Archive Information<br />

Archive Method: Direct to Tape NTBackup Tar Other :* Compressed?<br />

Attach appropriate worksheet for backup method used.<br />

Tape Type: DAT 24 Dat 40 DLT * Other *: Number Used:<br />

*Requires Lab Director Approval<br />

Analysis Platform Information<br />

Operating Systems Used: DOS Windows Mac *nix Other:<br />

Version:<br />

Analysis S<strong>of</strong>tware Base: I-Look EnCase DOS Utilities *nix Utilities Other:*<br />

Version:<br />

Restored Work Copy/Image Validated: Yes No<br />

List <strong>of</strong> utilities used other than base<br />

Utility Version Purpose<br />

Analysis Milestones<br />

Milestone Remarks Initials<br />

Run Anti-Virus Scan<br />

Full File List with Meta Data<br />

Identify Users/Logons/ISP Accounts, etc.<br />

Browse File System<br />

Keyword/String Search<br />

Web/E-mail Header Recovery<br />

Recover & Examine Free/Slack Space<br />

Examine Swap<br />

Unerase/Recover Deleted Files<br />

Execute Programs as Needed<br />

Examine/Recover Mail/Chat<br />

Crack Passwords<br />

Hard Drive <strong>Evidence</strong> Worksheet Page 2 <strong>of</strong> 2<br />

47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!