File Carving based Digital Forensic Tools Testing Data Sets (Contiguous Files)

The test image is a NTFS file system and is intended to test data carving tools and their ability to extract various file formats. The image contains several allocated and deleted files that are all stored in contiguous format within its allocated space. All files are random files that that were in...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Kethareswaran V
Format: Dataset
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Kethareswaran V
description The test image is a NTFS file system and is intended to test data carving tools and their ability to extract various file formats. The image contains several allocated and deleted files that are all stored in contiguous format within its allocated space. All files are random files that that were in my possession or that I created from scratch. This image was created from a NAND USB thumb-drive that was wiped and formatted using the Forensic Toolkit FTK Imager with the file extension of AD1. The image has been eliminated with its meta data so that it cannot be mounted and therefore data carving methods must be used to extract the files. This test image is a 'raw' image (i.e. 'dd') of a NTFS file system. The file system is 2 GB. The MD5, SHA, file types, name of every file and all other details of the image are clearly mentioned in the .csv and .txt files attached to this data set. One can run the image against any data carving based tool and thus can cross check the obtained values with that of our image.
doi_str_mv 10.17632/2kh2bdsp5b
format Dataset
fullrecord <record><control><sourceid>datacite_PQ8</sourceid><recordid>TN_cdi_datacite_primary_10_17632_2kh2bdsp5b</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_17632_2kh2bdsp5b</sourcerecordid><originalsourceid>FETCH-datacite_primary_10_17632_2kh2bdsp5b3</originalsourceid><addsrcrecordid>eNpjYBA2NNAzNDczNtI3ys4wSkopLjBN4mTwc8vMSVVwTiwqy8xLV0hKLE5NUXDJTM8sScxRcMsvSs0rzkxWCMnPzylWCEktLgEpckksSVQITi0pVtBwzs8ryUwvzS8tVgCZU6zJw8CalphTnMoLpbkZtN1cQ5w9dFOAmpIzS1LjC4oycxOLKuMNDeLBrolHuMaYNNUAUj1DDA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>dataset</recordtype></control><display><type>dataset</type><title>File Carving based Digital Forensic Tools Testing Data Sets (Contiguous Files)</title><source>DataCite</source><creator>Kethareswaran V</creator><creatorcontrib>Kethareswaran V</creatorcontrib><description>The test image is a NTFS file system and is intended to test data carving tools and their ability to extract various file formats. The image contains several allocated and deleted files that are all stored in contiguous format within its allocated space. All files are random files that that were in my possession or that I created from scratch. This image was created from a NAND USB thumb-drive that was wiped and formatted using the Forensic Toolkit FTK Imager with the file extension of AD1. The image has been eliminated with its meta data so that it cannot be mounted and therefore data carving methods must be used to extract the files. This test image is a 'raw' image (i.e. 'dd') of a NTFS file system. The file system is 2 GB. The MD5, SHA, file types, name of every file and all other details of the image are clearly mentioned in the .csv and .txt files attached to this data set. One can run the image against any data carving based tool and thus can cross check the obtained values with that of our image.</description><identifier>DOI: 10.17632/2kh2bdsp5b</identifier><language>eng</language><publisher>Mendeley</publisher><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776,1888</link.rule.ids><linktorsrc>$$Uhttps://commons.datacite.org/doi.org/10.17632/2kh2bdsp5b$$EView_record_in_DataCite.org$$FView_record_in_$$GDataCite.org$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Kethareswaran V</creatorcontrib><title>File Carving based Digital Forensic Tools Testing Data Sets (Contiguous Files)</title><description>The test image is a NTFS file system and is intended to test data carving tools and their ability to extract various file formats. The image contains several allocated and deleted files that are all stored in contiguous format within its allocated space. All files are random files that that were in my possession or that I created from scratch. This image was created from a NAND USB thumb-drive that was wiped and formatted using the Forensic Toolkit FTK Imager with the file extension of AD1. The image has been eliminated with its meta data so that it cannot be mounted and therefore data carving methods must be used to extract the files. This test image is a 'raw' image (i.e. 'dd') of a NTFS file system. The file system is 2 GB. The MD5, SHA, file types, name of every file and all other details of the image are clearly mentioned in the .csv and .txt files attached to this data set. One can run the image against any data carving based tool and thus can cross check the obtained values with that of our image.</description><fulltext>true</fulltext><rsrctype>dataset</rsrctype><creationdate>2021</creationdate><recordtype>dataset</recordtype><sourceid>PQ8</sourceid><recordid>eNpjYBA2NNAzNDczNtI3ys4wSkopLjBN4mTwc8vMSVVwTiwqy8xLV0hKLE5NUXDJTM8sScxRcMsvSs0rzkxWCMnPzylWCEktLgEpckksSVQITi0pVtBwzs8ryUwvzS8tVgCZU6zJw8CalphTnMoLpbkZtN1cQ5w9dFOAmpIzS1LjC4oycxOLKuMNDeLBrolHuMaYNNUAUj1DDA</recordid><startdate>20210825</startdate><enddate>20210825</enddate><creator>Kethareswaran V</creator><general>Mendeley</general><scope>DYCCY</scope><scope>PQ8</scope></search><sort><creationdate>20210825</creationdate><title>File Carving based Digital Forensic Tools Testing Data Sets (Contiguous Files)</title><author>Kethareswaran V</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-datacite_primary_10_17632_2kh2bdsp5b3</frbrgroupid><rsrctype>datasets</rsrctype><prefilter>datasets</prefilter><language>eng</language><creationdate>2021</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Kethareswaran V</creatorcontrib><collection>DataCite (Open Access)</collection><collection>DataCite</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kethareswaran V</au><format>book</format><genre>unknown</genre><ristype>DATA</ristype><title>File Carving based Digital Forensic Tools Testing Data Sets (Contiguous Files)</title><date>2021-08-25</date><risdate>2021</risdate><abstract>The test image is a NTFS file system and is intended to test data carving tools and their ability to extract various file formats. The image contains several allocated and deleted files that are all stored in contiguous format within its allocated space. All files are random files that that were in my possession or that I created from scratch. This image was created from a NAND USB thumb-drive that was wiped and formatted using the Forensic Toolkit FTK Imager with the file extension of AD1. The image has been eliminated with its meta data so that it cannot be mounted and therefore data carving methods must be used to extract the files. This test image is a 'raw' image (i.e. 'dd') of a NTFS file system. The file system is 2 GB. The MD5, SHA, file types, name of every file and all other details of the image are clearly mentioned in the .csv and .txt files attached to this data set. One can run the image against any data carving based tool and thus can cross check the obtained values with that of our image.</abstract><pub>Mendeley</pub><doi>10.17632/2kh2bdsp5b</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.17632/2kh2bdsp5b
ispartof
issn
language eng
recordid cdi_datacite_primary_10_17632_2kh2bdsp5b
source DataCite
title File Carving based Digital Forensic Tools Testing Data Sets (Contiguous Files)
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T15%3A51%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-datacite_PQ8&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.au=Kethareswaran%20V&rft.date=2021-08-25&rft_id=info:doi/10.17632/2kh2bdsp5b&rft_dat=%3Cdatacite_PQ8%3E10_17632_2kh2bdsp5b%3C/datacite_PQ8%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true