Re: [sleuthkit-users] hashing a file system
Brought to you by:
carrier
From: Brian C. <ca...@sl...> - 2014-09-10 02:15:42
|
We have just started an effort to make a STIX / Cybox module in Autopsy as part of a DHS S&T effort. In Autopsy, the hash value is stored in the DB after the hash lookup module runs, so you can also do the Cybox analysis on each file as it is analyzed or after all of the files have been analyzed. On Sep 4, 2014, at 7:04 PM, Stuart Maclean <st...@ap...> wrote: > I am tracking recent efforts in STIX and Cybox and all things Mitre. > One indicator of compromise is an md5 hash of some file. Presumably you > compare the hash with all files on some file system to see if there is a > match. Obviously this requires a walk of the host fs, using e.g. fls or > fiwalk or the tsk library in general. > > Is this a common activity, the hashing of a complete filesystem that > is? If yes, some experiments I have done with minimising total disk > seek time by ordering Runs, reading content from the ordered Runs and > piecing each file's hash back together would show that this is indeed a > worthy optimization since it can decrease the time spent deriving the > full hash table considerably. > > I did see a slide deck by Simson G where he alluded to a similar win > situation when disk reads are ordered so as to minimise seek time, but > wonder if much has been published on the topic, specifically relating to > the digital forensics arena, i.e. when an entire file system contents is > to be read in a single pass, for the purposes of producing an 'md5 -> > file path' map. > > Opinions and comments welcomed. > > Stuart > > > ------------------------------------------------------------------------------ > Slashdot TV. > Video for Nerds. Stuff that matters. > http://tv.slashdot.org/ > _______________________________________________ > sleuthkit-users mailing list > https://lists.sourceforge.net/lists/listinfo/sleuthkit-users > http://www.sleuthkit.org |