Friday, March 4, 2011

Babybottlepop Secrets

recovery of deleted files.

When you delete a file, it really is not cleared even on your hard disk, but the operating system is said that the amount of space it occupies is ready to write new data. This means that until you create new files have a very good chance of recovering your data intact. This becomes much more difficult if the data were deleted or partly overwritten and very complex if the same data were totally overwritten. Click here if you want to learn more about how to safely delete your data.
To be very practical I will propose below some freeware software to recover all deleted data and give some pointers to the data recovery groped parzilmente overwritten. Data completely overwritten require the use of very expensive software that we will not.
Finally let some 'advertising, are a professional who works in security in the workplace but are able to provide assistance with encryption, secure deletion and retrieval as long as we can show that the data are treated of your property.

freeware software for recovering deleted data:
  1. Recuva : Surely the simplest of all and even better appreciated for its network for its clear, clean interface. Recover deleted files from recycle bin or your MP3 player and has the ability retrieve photos and movies from memory cards.
  2. PC Inspector File Recovery : surely the most complete. Allows you to recover damaged partitions or groped to replace damaged boot sectors or even canceled. It allows saving to media in LAN and has the ability to search files by type.
  3. TOKIWA DataRecovery : Its small size enables it to be started on the floppy drive and allows you to recover encrypted files in EFS filesystem
  4. Undelete Plus the file systems are recognized FAT12/16/32, with the possibility NTFS/NTFS5 to look in the floppy drive and in many types of memory card.
  5. Glary Undelete : Supports almost all memory cards, find deleted files from both windows, crash, or from the terminal by the combination of Shift + can. Allows you to recover EFS encrypted files stored in partitions.
  6. NTFS Undelete: scans only on the local hard drives that are NTFS. The only flaw, if we may so call it is that you can burn it to CD or DVD and put it on any computer with Windows installed on it.
  7. PhotoRec : Do not be misled by the name, not only to search for images only. Runs only through the command prompt is one of the largest in terms of file systems supported: FAT, NTFS, ext2/ext3 HFS +, no case is a project that exists for Linux. It allows you to recover deleted files from formatted, by CD and erased from memory card.
  8. Recover Files
  9. Pandora Recovery SoftPerfect File Recovery FreeUndelete
  10. Avira UnErase Personal
  11. ADRC Data Recovery Software Tools
  • EASEUS Data Recovery Wizard Professional : In many ways, the waiting is the simplest and the most powerful. Costs little more than € 60 but worth them all.
  • R-studio : Supports many file systems (including Mac, Linux and frebsd). Definitely the most professional of the previous request is an experienced hand, but offers good performance and its 80dollari are definitely earned.
  • FileScavenger I consider the best product in the category that apart from the recovery, provides an excellent reconstruction of the folders.
Software freeware data recovery for deleted or partially deleted:
Foremost is called and is a small but powerful software program developed by special agents of 'USAF, Kendal Kriss and Jesse Kornblum, who designed this program to support the ever more frequent surveys on recovery of files from personal computers released as free software as a product of the U.S. government for which no copyright protection is available.

Foremost is a great program but unfortunately it only runs on Linux, allows recovery of files deleted or hidden, hard disk or directly from images taken through the main tool of duplication (dd, EnCase, SafeBack etc. ..). Personally, I have successfully tried to retrieve a mistakenly deleted TrueCript archive.

The major Linux distributions-oriented live incident response and security (FIRE, Penguinsleuth and Knoppix STD) include it by default in the precompiled version and this, in addition to being a test of the utility and functionality in forensic applications, it should at least advise those involved in advancing security and incident response.

The operation is based, as most of the tools of recovery, finding a header and footer , ie strings that characterize the beginning and end of a particular file, as well as specified in the configuration file foremost.conf . This system, which seems to increase the cumbersome nature of the system is really the heart and the strength of the program, why on several occasions I decided to put aside most renowned graphics applications. Foremost analyzes the drive or file (read-only, of course) in search of the header and retrieves the data until the first occurrence of the footer or the achievement of the maximum size specified in the configuration file if the footer is not present.
The recovered files are saved in a default directory unless otherwise specified at the command prompt, along with a final report audit.txt . We shall see later some of the configuration file options that allow this behavior to bend slightly.

Using basic

first look at the syntax of the program: #

foremost [-h
-c Set the configuration file to use
  • -s
    Skip specified number of bytes before starting the search
  • -n
    Extracts files without adding the extension

  • The Most parameters are self-explanatory, but it is good to dwell on some options that are critical for the result.

  • Quick mode (-
  • q) requires the program to look only at the beginning of each header field with a total length of the header longer present in the configuration file, ignoring the rest of the data. This greatly speeds up research, but we left behind some interesting files, such as those embedded in other files.
  • If not set an output directory (-o ), foremost saves files in a folder called default-output
  • foremost, contained in the current directory may not have enough space or be destined to another . The output directory must be empty or at least does not exist, think foremost to create a default.

  • The flag -
  • s enables us to from a particular offset to divide the scan into multiple parts or refine your search to certain files.
  • Some examples:

foremost-v-o / mnt / usbdisk / recovery / / home/immagine1.dd

Analyze the image contained in the / home directory and save the results in the recovery of a hard USB disk.
foremost-v-c / home / Anconelli / foremost.conf / dev/sda1
Reads the configuration file in the user's home and analyze the device / dev/sda1
foremost-o / home / test /-s 681574400 / mnt/immagini/disco1.dd
begins to scan the image at offset 681574400 disco1.dd

configuration file

The configuration file foremost guide behavior during the search and is essentially a list of features to look for each file. The lines starting with a # character are comments and are not taken into account by the program. Each line is divided into sections with different file attributes:

extension

case sensitive
size

header

footer
options mpg REVERSE can be set to 'y' or 'n' and concerns the handling of header and footer. \\ x4f \\ 123 \\ I \\ SCCI is equivalent to "OSI CCI"

y

4000000
\\ x00 \\ x00 \\ x01 \\ Xba
\\ x00 \\ x00 \\ x01 \\ xb9



Foremost alleged number each recovered file, starting from 00000000 and adding the extension specified in the extension. E 'can enter
NONE
in that field to ensure that no extension is added to the file name.

Case sensitive

Size is the maximum number of bytes that foremost recovery if it finds a footer.
The header and footer can be specified with hexadecimal, octal, or character, the space is represented by
\\ s
. The hexadecimal values \u200b\u200bare represented as \\ x [0-f] [0-f], as octal as \\ [0-3] [0-7] [0-7]. The example in the configuration file itself is the following:

A useful trick is to insert a wildcard strings containing byte variables: the font used by default is'
?
'(eg ???????? \\ x6d \\ x6f \\ x6f \\ x76) that can be changed by changing its string in the configuration file. Field footer is the only option and, in many cases, it is useful to eliminate reliance on specified maximum size.
addition to these parameters there are two options that can be hung on the line to shape the behavior of specific foremost in special cases:
REVERSE - Foremost scans the header to the specified maximum size, then retraces the path back until the first occurrence of the footer. Useful in cases with multiple instances of files in the footer (PDF files in this category, we find the parameter set to REVERSE default in the original configuration file)
NEXT - The scan stops at the first occurrence of the footer that is excluded from the recovered file. This makes it possible to conclude the recovery when there is a string that we know for sure they do not belong to the type of file sought, but it is also possible to recover files of which we know the footer concluding and initiating the recovery following the first occurrence of the same header .

Value

In the directory where you stored the recovered data, create a file named Foremost audit.txt, or a report containing the details of carried out among which is offset from the original starting point out of the recovered file ( Found at Byte
). I found this very useful parameter to investigate an initial basic research. Looking at some example images created in Photoshop 7, we can set the header so that's a unique feature of the image (the string Adobe \\ sPhotoshop). Knowing that the occurrence of the header is located all'offsett 144 (0x90) of the file we can retrieve the entire image by calculating the starting byte of the file by setting it as a starting point of research with the-s option

.
opportunities Foremost depend very much on the imagination of the investigator. Play with the configuration files, analyzed the data retrieved with a good hex editor, changed the options and creative ad hoc configurations for most common types of recovery: you will discover that sometimes it may be worthwhile to abandon programs more convenient to return to the old and simple line of command.
The current version is 0.69 and can be downloaded from sourceforge.net
. Installation is very simple and is achieved by running the commands and
  • make make install
    inside the folder created by unzipping the tar.gz file.

0 comments:

Post a Comment