Alty said:HOLY THREAD REVIVAL BATMAN!11!1!one!1!
It wasn't too bad, he is offering help to the OP. Not like some revivals where people bring back a 2 month old topics just to spam.
Alty said:HOLY THREAD REVIVAL BATMAN!11!1!one!1!
Riiya said:I was going to do a Forensics Degree, but I opted for MGeoscience instead; that was after realising that Forensics seems to be the new Psychology fab. Huge numbers of people are studying it now, making job opportunities quite scarce for the present time and future
Business Man said:NHTCU can only do so much though from what ive heard, with encryption available free off the net these days how do you get around it ? brute force or demand the person hand over the passphrase ?
you have truecrypt and drivecrpyt which encrypts the whole hdd and i've heard these are uncrackable.
MoratJG said:I was lucky, I landed a job in the military police CCT and had all the training and courses I could wish for, previous to that the only experience I had was home use and basic system administrators course. I then moved into the private sector and did contract work for the Met and later moved to the Serious Fraud Office for a short while. There would have been no way in hell I would have got either of those jobs without the police background and experience I got in the Army, I would strongly suggest you get yourself in some government role (also, many of the best courses are only open to law enforcement or government agencies).
Gimme a job!The Mad Rapper said:I seem to recall you also had an incredibly talented boss as well, now, who was that again? Oh yes, it was me!![]()
Business Man said:NHTCU can only do so much though from what ive heard, with encryption available free off the net these days how do you get around it ? brute force or demand the person hand over the passphrase ?
you have truecrypt and drivecrpyt which encrypts the whole hdd and i've heard these are uncrackable.
platypus said:Gimme a job!
Una said:You can attack the key phrase using certain characteristics built up from profiling the person. A lot of people use the same or similar passwords for different authentication.
Practically your not going to crack AES in the length of the universe with brute force so unless there is a flaw with the implementation / algorithm is discovered in future it will remain safe for a long time. I feel safe investing my trust in AES256.
The only really unbreakable encryption is one time pads with truly random data.
Your best bet is to get a key logger onto the machine and log their keystokes in plaintext and get their keyphrase from that. Either in hardware or software.
As mentioned above under the RIPA act you legally have to have over your keys to the authorities if requested anyhow.
Alty said:Realistaically working in the private sector, salaries can vary from £25k to thru the roof (literally £100ks) depending of course on your ersonally, position and experience.
doublehelix2 said:You can earn multiples of 100k? Seriously?
It should be fairly obvious to you that in any situation where the data has not actually been overwritten it will be trivial to recover it.Kronologic said:I'm doing my final year dissertation on Ways and means of destroying data on a HDD prior to selling/recyleing the disk, in order to prevent Identity theft.
I was wondering if you Forensics chaps could point me in the direction of a few things.
I'm looking for some statistics on computer related fraud (particularly as a result of the loss/sale/theft/disposal of a computer hard disk).
I'm going to attempt to recover a HDD from various scenarios.
HDD recovery data untampered
HDD recovery after file deletion (but not emptying the recycle bin)
HDD recovery after emptying the recycle bin
HDD recovery after emptying Recycle bin and a Defrag
HDD recovery after a quick format
HDD recovery after a full format
HDD recovery after dropping a partition
HDD recovery after a repartition
HDD recovery after a Low level format
HDD recovery recovery after a datascrub
HDD recovery after an encryption
All tests will be performed on FAT32 and NTFS file systems.
I appreciate some of these things will show the same results or are not recoverable but I'm doing it for thoroughness. Are there any other tests I'm missing?
What sorts of tools should I use? (I'm looking for Freeware or trialware)
My method for performing this was going to be:
Take bit level image of HDD,
Take Checksum of image
Copy image to other PC
Take checksum of copied image and compare to original checksum
Use recovery software to identify data attempted to be destroyed.
Use auditing software to try to identify any information that could be used maliciously.
Document findings.
Am I heading in the right direction can you give me any pointers?
bam0 said:It should be fairly obvious to you that in any situation where the data has not actually been overwritten it will be trivial to recover it.
For example dropping a partition or repartitioning only affects the partition table, the data on the drive that marks where the filesystem starts will still be there along with the MFT/FATs.
Not to belittle your idea but when your result is going to be encrypt/overwrite the data I just wonder if you can make a worthwhile dissertation out of it.
As a counter suggestion a dissertation on Ways and Means of hiding data and methods to try and discover it could be more interesting and useful.
Kronologic said:I'm doing my final year dissertation on Ways and means of destroying data on a HDD prior to selling/recyleing the disk, in order to prevent Identity theft.
I was wondering if you Forensics chaps could point me in the direction of a few things.
I'm looking for some statistics on computer related fraud (particularly as a result of the loss/sale/theft/disposal of a computer hard disk).
I'm going to attempt to recover a HDD from various scenarios.
HDD recovery data untampered
HDD recovery after file deletion (but not emptying the recycle bin)
HDD recovery after emptying the recycle bin
HDD recovery after emptying Recycle bin and a Defrag
HDD recovery after a quick format
HDD recovery after a full format
HDD recovery after dropping a partition
HDD recovery after a repartition
HDD recovery after a Low level format
HDD recovery recovery after a datascrub
HDD recovery after an encryption
All tests will be performed on FAT32 and NTFS file systems.
I appreciate some of these things will show the same results or are not recoverable but I'm doing it for thoroughness. Are there any other tests I'm missing?
What sorts of tools should I use? (I'm looking for Freeware or trialware)
My method for performing this was going to be:
Take bit level image of HDD,
Take Checksum of image
Copy image to other PC
Take checksum of copied image and compare to original checksum
Use recovery software to identify data attempted to be destroyed.
Use auditing software to try to identify any information that could be used maliciously.
Document findings.
Am I heading in the right direction can you give me any pointers?
knowlesy said:what imiging software will you be using ..... might be an idea to use "recuva" and compare it from a freeware .... just as a mention even though i doubt "recuva" would actualy stand up in court for evidence ....