Faculty of Computer & Information Systems, Islamic University of Madinah, Madinah, Saudi Arabia.
Department of Computer Sciences, University of Kashmir, Srinagar, India.
J Forensic Sci. 2022 Mar;67(2):562-587. doi: 10.1111/1556-4029.14907. Epub 2021 Oct 7.
This paper presents forensic analysis of anti-forensic file-wiping tools on the Windows platform. The goal is to identify and extract the evidence of the tools used to wipe files and the files wiped by them on the Windows operating system. To achieve this goal, we analyzed the changes made by these tools to metadata structures of Windows file systems during file wiping. We also analyzed Registry keys and .lnk files to collect the evidence. Our experiments used four file-wiping tools (SecureDelete v1.0, Secure Eraser v5.2, PC Shredder v1.1, and Blank and Secure v5.88) to wipe files on three Windows file systems (FAT32, exFAT and NTFS). The results suggest that FAT32 and exFAT file system directory structures and $MFT entries of NTFS file system can confirm the use of wiping tools, identify these tools and provide the remnants of the wiped files. Also, $LogFile and $UsnJrnl files of NTFS file system, and Windows Registry keys provide detailed evidence of wiping tools used and the files wiped by them. We also found that the contents of resident and non-resident alternate data streams, $LogFile and $UsnJrnl files, and Windows Registry keys are not wiped by these tools. Finally, this study makes many recommendations, highlights the limitations of the work and points out the future scope.
本文对 Windows 平台上的反取证文件擦除工具进行了法医分析。目的是识别和提取用于在 Windows 操作系统上擦除文件的工具以及被它们擦除的文件的证据。为了实现这一目标,我们分析了这些工具在擦除文件期间对 Windows 文件系统元数据结构所做的更改。我们还分析了注册表项和.lnk 文件以收集证据。我们的实验使用了四种文件擦除工具(SecureDelete v1.0、Secure Eraser v5.2、PC Shredder v1.1 和 Blank and Secure v5.88)在三种 Windows 文件系统(FAT32、exFAT 和 NTFS)上擦除文件。结果表明,FAT32 和 exFAT 文件系统目录结构以及 NTFS 文件系统的 $MFT 条目可以确认使用了擦除工具,识别这些工具并提供被擦除文件的残余。此外,NTFS 文件系统的 $LogFile 和 $UsnJrnl 文件以及 Windows 注册表项提供了有关使用的擦除工具以及被它们擦除的文件的详细证据。我们还发现,驻留和非驻留备用数据流、$LogFile 和 $UsnJrnl 文件以及 Windows 注册表项的内容不会被这些工具擦除。最后,本研究提出了许多建议,强调了工作的局限性,并指出了未来的范围。