A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage

被引:1
作者
Breitinger, Frank [1 ]
Zhang, Xiaolu [2 ]
Quick, Darren [3 ]
机构
[1] Univ Lausanne, Sch Criminal Justice, CH-1015 Lausanne, Switzerland
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[3] South Australia Police, 100 Angas St, Adelaide, Australia
关键词
Rclone; Cloud storage; Acquisition; Application forensics; Cloud computing forensics;
D O I
10.1016/j.fsidi.2022.301443
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations and end users are moving their data into the cloud and trust Cloud Storage Providers (CSP) such as pCloud, Dropbox, or Backblaze. Given their popularity, it is likely that forensic examiners encounter one or more online storage types that they will have to acquire and analyze during an investigation. To access cloud storage, CSPs provide web-interfaces, proprietary software solutions (e.g., Dropbox client for Windows) as well as APIs allowing third-party access. One of these third-party ap-plications is rclone which is an open-source tool to access many common CSPs through a command line interface. In this article, we look at rclone from two perspectives: First, we perform a forensic analysis on rclone and discuss aspects such as password recovery of the configuration file, encryption, and JA3 fingerprints. Second, we discuss rclone as a prospect to be a forensic tool which includes its read-only mount feature and sample cases. Under the circumstances tested, rclone is suitable for forensic practi-tioners as it is open-source, documented, and includes some essential functionality frequently needed but practitioners need to be aware of the caveats.(c) 2022 The Author(s). Published by Elsevier Ltd on behalf of DFRWS This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 24 条
[1]  
Ahmed I., 2019, Security, Privacy, and Digital Forensics in the Cloud, P301, DOI [10.1002/9781119053385.ch15, DOI 10.1002/9781119053385.CH15]
[2]  
Almulla S, 2014, J DIGIT FORENSICS SE, V9, P7
[3]  
Alqahtany S, 2015, 2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (ICCC), P88
[4]  
Althouse J.., 2019, TLS Fingerprinting with JA3 and JA3S
[5]  
[Anonymous], 2011, P IFIP INT C DIG FOR, DOI DOI 10.1007/978-3-642-24212-03
[6]   Digital forensic investigation of cloud storage services [J].
Chung, Hyunji ;
Park, Jungheum ;
Lee, Sangjin ;
Kang, Cheulhoon .
DIGITAL INVESTIGATION, 2012, 9 (02) :81-95
[7]  
Costello K., 2021, Gartner forecasts worldwide low-code development technologies market to grow 23% in 2021
[8]  
Craig-Wood N., 2022, BUGS LIMITATIONS
[9]   Cloud Data Imager: A unified answer to remote acquisition of cloud storage areas [J].
Federici, Corrado .
DIGITAL INVESTIGATION, 2014, 11 (01) :30-42
[10]  
Greetham A., 2021, DETECTING RCLONE AN