[ISN] Book Review: Forensic Discovery
InfoSec News
isn at c4i.org
Wed Jan 19 02:55:46 EST 2005
http://books.slashdot.org/books/05/01/18/2110235.shtml
[ http://www.amazon.com/exec/obidos/ASIN/020163497X/c4iorg - WK]
Author: Dan Farmer & Wietse Venema
Pages: 198
Publisher: Addison Wesley Professional
Rating: 10
Reviewer: Ben Rothke
ISBN: 020163497X
Summary: Forensic Discovery overview
Security luminaries Dan Farmer and Wietse Venema wrote one of the
first vulnerability scanners (SATAN) almost 10 years ago; SATAN was
the precursor to ISS Scanner, Retina and nmap. Venema wrote such
well-known security applications as the TCP Wrapper program and the
Postfix mail server. Farmer and Venema's new book Forensic Discovery
is a valuable book that grounds a computer-savvy reader in the world
of digital forensics.
An image of a pipe by artist René Magritte is on the cover with the
caption Ceci nest pas une pipe. ("This is not a Pipe.") The picture
demonstrates that an object exists on many planes; the simple
recognition of the picture initiates the belief that we are seeing
something, but it is only known in representation. Surrealist painting
and digital forensics coalesce in that the digital forensic
investigator must think broadly and unconventionally in order to
reconstruct an incident, all the time keeping in mind that often what
initially seems obvious is neither real nor correct.
The material in the book is an outgrowth of a one-time seminar the
authors gave in 1999 on digital forensics and analysis. At the
seminar, Farmer and Venema rolled out The Coroner's Toolkit (TCT), a
collection of tools for gathering and analyzing forensic data on a
Unix system. TCT is heavily referenced throughout the book.
The book initially seems thin, at just 198 pages, but there is no
filler and the information is presented in a fast and furious manner.
Part one of the book comprises 35 pages and is an introduction to the
foundations of digital forensics and what to look for in an digital
investigation.
Part two (chapters 3-6) is the nucleus of the book, which quickly gets
into low-level details about file systems and operating system
environments. While other forensics books focus exclusively on the
discovery and gathering of data; Forensic Discovery adds needed
insight on how to judge the trustworthiness of the observation and the
data itself. Again, the idea is that not everything is as obvious as
it may initially seem. An effective investigation often requires
intense analysis, where meaningful conclusions take time.
Chapter 4, "File System Analysis," notes that while computers have
significantly evolved since their inception, little has changed in
last 30 years in the way that file systems actually handle data.
Chapter 5, "Systems and Subversion," is particularly interesting as it
deals with system startup and shutdown, from a forensics perspective.
The chapter shows that there are thousands of possible opportunities
to subvert the integrity of a system without directly changing a file
during startup and shutdown. A crucial decision that must be made
during an incident is whether to shut down the system or let it remain
on-line. There are advantages and disadvantages to each approach, and
the book details them.
Part three (chapters 7-8) is about the persistence of deleted file
information. The authors' research reveals that data can be quite
resistant to destruction. The book shows that a huge amount of data
and metadata can survive intended deletion as well as accidental
damage.
Forensic Discovery is unusual in that other books on forensics are
often nothing more than checklists and step-by-step instructions on
what to do during an incident. Forensic Discovery provides a broad
framework on the nature of data and how it can be recovered for
forensic purposes. By understanding the underlying operating system,
the act of analyzing and dealing with a security breach becomes much
easier.
The book's target reader is anyone who wants to deepen his
understanding of how computer systems work, as well as anyone who is
likely to become involved with the technical aspects of computer
intrusion or system analysis. The topics are too advanced, to make it
the right book for the novice system administrator. For the technical
reader, though, Forensic Discovery is one of the best computer
security books published in the last year. The value of the
information is immense, and the extensive experience that the authors
bring is unmatched.
More information about the ISN
mailing list