Reverse Engineering the Microsoft Extended FAT File System (exFAT)
14
DRAFT
If there is digital evidence to be found, will someone take time to look for it? If storage
media is collected, and brought to a digital forensics lab, what will happen to it? If the
technician at the lab inserts the media in a system and tries to image it, will they bother to
continue if the operating system reports back that the media is RAW or corrupt? Will
they even be able to acquire an image? Or, will the storage media just get bagged and
tagged and added to the evidence pile and never processed?
Suppose the forensics examiner get past that, and manages to acquire the image and at
least do some analysis by carving out pieces and analyzing them. What position does this
leave the results of a forensics examination when digital evidence has been uncovered
and extracted, especially if that evidence is to be used in court?
When examining the expert witness, the tools and the technology will be put through the
Daubert guidelines (Daubert v. Merrell Dow Pharmaceuticals). For a file system
analysis, procedures that will be scrutinized are those that are used to break one large file
system image into the smaller components such as files. (Carrier, Brian (2003))
Taking the position of prosecution and law enforcement, consider the forensics examiner
on the witness stand as an expert witness. How would the expert answer questions posed
from the defense about what was uncovered if the expert could not understand and
describe with authority the file system? The defense may first come up with a question
such as “how could you read this media when it shows up on my expert’s machine as
unreadable? When the expert gets past that, then “how do you know this file was deleted
or if other files were not mixed in with this one?” This line of questioning is intended to
put doubt into the jury or the judge. This approach might not be as effective with media
formatted as FAT or FAT32, as these are well known, well documented, and well
understood file systems. Until exFAT has been out there a while, accepted, documented,
and widely used, the forensic expert will be challenged with addressing that gap.
The fact that file systems are relevant to digital forensics should not require an argument
or any discussion. Without any understanding of the file system or organization of the
image being acquired it would be difficult, if not impossible, to make any sense of it.
Today we live mostly in an ASCII world, but what if it was a disk from an IBM
mainframe that used EBCDIC? Tools that search for ASCII strings won’t work. What
about the difference between Little-Endian vs. Big-Endian where the byte order makes a
difference? All data is binary, ones and zeros, what makes data is the context of those
representations.
RobertShullich
The exFAT file system has been out for a few years already, why has anyone cared and
why will they care now? Many of the current file systems were constrained to 2TiB,
although some could handle larger volume sizes. Disks with storage capacities at 2TB
used to only be seen in servers and in data centers. Within the past couple of years,
buying storage devices with 1TB and 2TB capacities with a price point of less than $200
for use in home desktops was made possible. Storage capacities of the Secure Digital SD
cards were achieving 4GB, but a SDHC card was achieving up to 32GB. The SD type
cards are used in many portable consumer electronics such as Personal Digital Assistants,
1/5/2010 10:57:18 PM
T:\exFAT Project 2010-01-04 10-00 am\Reverse Engineering the Microsoft Extensible File System Recovered.doc