The Magic of Raw Data Carving

Поділитися
Вставка
  • Опубліковано 9 лип 2024
  • You have used all of the utilities in your expensive forensic suite, and other programs to carve files from unallocated file space. Do you think you have found everything? If you answered yes, guess again. The typical way that carving utilities are able to recover deleted data automatically is through file header and footer identification, and this recovers an intact file. In other words, a file has been deleted, but not yet overwritten by new data. What happens if part of the deleted file is now overwritten, but some of the old data still exists? What about file fragments from slack space? This informative and easy to follow lecture show attendees how they can manually carve data from unallocated file space, and also what to do with it so that it is useful. We also discuss data recognition. This means being able to not only see the search hit but identify the context in which it is being seen. Drawing on case studies and real-world examples from our lab, you can immediately apply these techniques once you return to yours.
    Speaker Bio
    Kevin Ripa
    An investigator at heart, Kevin Ripa bought his first computer as a tool for writing reports for his private investigation agency. As he worked through typical user issues, the "why" of what was going wrong in his machine kept him up at night. So Kevin turned his investigative skills toward his computer and quickly became fascinated by the world inside of it. Now a 25-year veteran of the digital investigations field, Kevin's enthusiasm has not waned: "IT security and digital forensics still inspire me every day, and I can't wait to wake up in the morning and get to work!"
    Kevin currently serves as president of The Grayson Group of Companies, which consists of Computer Evidence Recovery, Pro Data Recovery Inc., and J.S. Kramer & Associates, Inc. He is also a SANS FOR500: Windows Forensics Analysis course ( www.sans.org/FOR500) instructor He provides investigative services to various levels of law enforcement, Fortune 500 companies, and the legal community. He is past president of the Alberta Association of Private Investigators and a former member of the Canadian Department of National Defence, where he served in both foreign and domestic postings.
    Kevin has assisted in many complex cyber-forensics and hacking response investigations around the world. He's a sought-after resource for his expertise in information technology investigations and frequently serves as an expert witness.
    Kevin has designed, produced, hosted, and taught numerous industry-related courses, and has had over 100 speaking and training engagements with industry and law enforcement around the world. He has also authored dozens of articles, as well as chapters in a number of manuals, books, and training texts on the subjects of computer security and forensics. Kevin holds a number of industry certifications, including four GIAC certifications (GCFE, GCFA, GSEC, GISF), EnCase Certified Examiner, Certified Data Recovery Professional, and Licensed Private Investigator, and he previously held the Certified Penetration Tester and Certified Ethical Hacker certifications.
  • Наука та технологія

КОМЕНТАРІ • 17

  • @jowga
    @jowga Рік тому +1

    This is better than some classes I've been to

  • @andrewsquest628
    @andrewsquest628 Рік тому +1

    Deeply appreciate your lecture! I prepare myself for job in cybersecurity and seek out useful stuff to buff my overall understanding and you helped me greatly!

  • @noblegold2223
    @noblegold2223 3 роки тому

    Changing a .docx to .zip ----> MIND BLOWN

  • @ryanhorton9594
    @ryanhorton9594 5 років тому

    Fantastic overview of manual analysis.

  • @med253
    @med253 4 роки тому

    Awesome explanation, thanks for the video

  • @ivanocampo4374
    @ivanocampo4374 4 роки тому

    Excellent presentation. Thanks for share your knowledge with that kind of quality, detail and clearly explained. !!! "...Who share his knowledge, leave footprints in this world..."

  • @datagrizzly1027
    @datagrizzly1027 4 роки тому +3

    Fantastic presentation - you truly helped me with this video!

  • @xenoliva1963
    @xenoliva1963 3 роки тому

    Excellent video, thank you

  • @justzarkolys.3649
    @justzarkolys.3649 2 роки тому

    Really good presentation, very interesting

  • @Hezekiah.602.
    @Hezekiah.602. 4 роки тому +1

    Can you data carve a partially overwrittten video file

  • @SteveMacSticky
    @SteveMacSticky 6 місяців тому

    Always look at raw data

  • @sandraledger2612
    @sandraledger2612 3 роки тому

    repair .tib files?

  • @Zestypanda
    @Zestypanda 4 роки тому

    I already knew most of this. What other videos regarding digital forensics and data carving do you have?

  • @vietld5500
    @vietld5500 5 років тому

    Could you give me slide ? Thanks so much video.

    • @vietld5500
      @vietld5500 5 років тому

      ldviet1211@gmail.com