Lecture 6 CSNC4583
Lecture 6 CSNC4583
FARAZ ALI
FarazAli@ucp.edu.pk
+92-321-404-1740
OBJECTIVES
• Physical Characteristics of Hard Drive
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
TYPES OF HARD DRIVE
• There are four different time of hard drives used in computers
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
HARD DRIVE
• A device which can store and retrieve large
number of data for a long period of time.
• It has ability to retain data without power for long
period of time.
• It has metal enclosure holding logic board, head
and platter.
• Having 3.5” and 2.5” enclosure.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
PHYSICAL CHARACTERISTICS OF
HARD DRIVE
HDD SSD
• Platters • Cache
• Spindle • NAND Flash Memory
• R/W Head • Controller
• Actuator Arm
• Actuator Axis
• Actuator
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
HOW HARD DRIVE WORKS
DISK PLATTER
• Platter is made of a magnetic material.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
HOW HARD DRIVE WORKS
STEPPER MOTOR
• Stepper motor is used to control read and write head position.
• It usually use +12v power.
• Newer stepper motors use low power drives +5V power
SPINDLE MOTOR
• Spindle motor controls the Platter.
• Speed on which motor rotates can very from 3600 r.p.m to 10,000 r.p.m
R/W HEAD
• It reads or writes the information to the drive platter.
• Head writes magnetic information on the platter.
HEAD ARM
• Only purpose of head arm is to perform reads and writes operations.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
HOW HARD DRIVE WORKS
DISK STRUCTURE
• Track
• Sector
• Cylinder
• Storage Capacity
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
LOGICAL PARTITIONING AND
FORMATTING OF HARD DRIVE
The logical structure of hard drive is composed of:
• Start-Up Sector
• Partitioned Space
• No-Partitioned Space
START-UP SECTOR
It contains the information about partition and MBR (Master Boot Record)
PARTITIONED SPACE
It is a part of the hard drive that has been assigned to any partition.
• Extended Partition
PRIMARY PARTITION
•The active logic units that can contain an operating system.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
LOGICAL PARTITIONING AND
FORMATTING OF HARD DRIVE
EXTENDED PARTITION
•Logic unit that can not contain operating systems.
•User can create different logic units in windows which can be D,E,F etc
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
LOGICAL PARTITIONING AND
FORMATTING OF HARD DRIVE
EXTENDED PARTITION
•Logic unit that can not contain operating systems.
•User can create different logic units in windows which can be D,E,F etc
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
FAT 16 & FAT 32
FAT 16:
• FAT16 was Primary file system for MS-DOS 4.0 & 6.22.
FAT 32
• Support larger volumes, better performance and flexibility.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS
• NTFS “New Technology File System”
• NTFS volume to that addressable with 32 bit clusters, which is 128 TB.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS
NTFS Supports: -
•Large file size and disk.
•Reliability
•Security
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS
Overcome Limitations present in FAT
•FAT does not support large disks very well.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS
• NTFS “New Technology File System”
• NTFS volume to that addressable with 32 bit clusters, which is 128 TB.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS
• NTFS I/O operations alter structure in change of directory structures.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS SECURITY
• NTFS security is derived from Windows object model.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS
• NTFS has maximum file size: 264 bytes
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS FEATURES
• Multiple data streams
• Hard links
• Change logging
• Better encryption
• Defragmentation
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS FEATURES
Multiple data streams
•In NTFS each unit of information associated with a file including
•Name
•Owner information
•Contents of file
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS FEATURES
Hard links
•A hard link allows multiple pats to refer to the same file or directory.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS FEATURES
Compression and sparse files
•Many types of applications, such as incremental backup utilities, need to
monitor a volume fir changes.
•To watch changes is to perform a full scan.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS FEATURES
• Change logging
• With windows 2000, NTFS interduces the change log, which is sparse
metadata file that records file system events.
• An application uses WIN32 APIs to read events.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS FEATURES
Per user volume quotas
•Quota management support allows for per user specification of quota
enforcement.
•If a user attempts to use more volume storage then his/her assigned quota
system event log will fail the application that have caused the quota violation
with a disk full error.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS FEATURES
• Link tracking is easy
• Windows has link tracking service “TrkWks “it runs in services.exe” it tags
link sources with a unique object ID.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS FEATURES
Better encryption
•NTFS implements security for files and directories.
•File which are encrypted can be accessed only by using the private Public or
Private key.
•Private keys are locked using an accounts password.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS FEATURES
Defragmentation
•A file is fragmented if its data occupies discontigous clusters.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
NTFS
File System Driver
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
MASTER BOOT RECORD
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
MASTER BOOT RECORD
• It is the second phase of the booting process that the BIOS contained within
these Intel base computers, it will load the first sector of the Hard Drive into
memory.
• First sector is called the Master boot record (MBR).
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
BOOT LOADER
• The boot loader works by looking for the active partition in the partition
table and load the first sector in that partition.
• Partition Boot Record is the first sector.
• The Partition Boot Record will then start the process of loading the
operating system kernel.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
MASTER BOOT CODE ACTIVITES
• Scan the partition table for the active partition
• Loads a copy of the boot sector from the active partition into memory
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
MBR
• MBR contains 3 components:-
•If the signature bytes are not 0x55AA hard drive will not boot.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
HEARINGS FRYE TEST – PAST METHOD
DAUBERT HEARING – CURRENT METHOD
HEARINGS FRYE TEST
Responsibility on scientific community.
Defined acceptable evidence gathering procedures.
Used Peer Reviewed Journals.
Daubert Hearing
Offers additional methods to test quality of evidence.
“The Frye test originated from Court of Appeals of the District of
Columbia135 in a decision rejecting admissibility of a systolic blood pressure
deception test (a forerunner of the polygraph test).
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
HEARINGS FRYE TEST – PAST METHOD
DAUBERT HEARING – CURRENT METHOD
The court stated that admission of this novel technique was dependent on its
acceptance by the scientific community.
There are three problems with the Frye standard:-
i.At what point is the principle of "sufficiently established"
ii.Determined, at what point is "general acceptance" reached
iii.And what is the proper definition of "the particular field in which it
belongs".
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
DAUBERT HEARING PROCESS
Testing
Is this procedure tested?
Error Rate
What is the error rate of this procedure?
Publication
Has procedure been published and reviewed by peers?
Acceptance
Is the procedure generally accepted within the relevant scientific community?
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
TYPES OF SECURITY SOFTWARES
Security tools are software applications that are used to prevent unauthorized
access and use of digital media.
These tools are in use by Home users, Corporations and small business.
•Antispyware
•Antivirus
•Authentication
•Security Identity & Access Management
•Intrusion Detection
•Intrusion Prevention
•Network Firewall
•Remote Access
•Network Security Management
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
TYPES OF FORENSIC SOFTWARE
These are many standard tools in use by Computer Forensic experts in an
attempt to trace what happened, when it occurred and who the perpetrator may
have been.
•Acquisition Tools
•Data Discovery Tools
•Internet History Tools
•Image Viewers
•Password Cracking Tools
•Open Source Tools
•Mobile Device tools (PDA/Cell Phone)
•Large Storage Analysis Tools
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
ELECTRONIC DATA DISCOVERY TOOLS
Electronic Data Discovery tools, abbreviated DAQ, assist in the recovery of
data that may have been deleted but not completely removed from a computer
system
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
INTERNET HISTORY TOOLS
Internet history tools are useful in tracking how users have used the internet
and sites on the internet that were accessed.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
PASSWORD CRACKING TOOLS
Dictionary Attack
A dictionary file (a text file full of dictionary words) is loaded into a cracking
application, which is run against user accounts located by the application.
Because the majority of passwords are often simplistic, running a dictionary
attack is often sufficient to to the job.
Hybrid Attack
A hybrid attack will add numbers or symbols to the filename to successfully
crack a password. Many people change their passwords by simply adding a
number to the end of their current password. The pattern usually takes this
form: first month password is "cat"; second month password is "cat1"; third
month password is "cat2"; and so on.
Brute Force Attack
A brute force attack is the most comprehensive form of attack, though it may
often take a long time to work depending on the complexity of the password.
Some brute force attacks can take a week depending on the complexity of the
password.
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)
Thank You
Question and Answers
Faraz Ali
(Lecturer FOIT)
(University of Central Punjab)