SlideShare a Scribd company logo
1 of 11
Download to read offline
Computer	
  Forensic	
  Lifecycle	
  (common	
  PC/Laptop)	
  
1. Preparation	
  
a. Preparation	
  steps	
  
i. Test	
  and	
  familiarize	
  yourself	
  with	
  software	
  tools	
  
ii. Prepare	
  hard	
  drives	
  
1. Wipe	
  &	
  verify	
  
2. Partitioning	
  
a. Filesystem	
  type	
  
3. Load	
  tools	
  
iii. Prepare	
  flash	
  drives	
  
1. Wipe	
  &	
  verify	
  
2. Partitioning	
  
a. Filesystem	
  type	
  
3. Load	
  tools	
  
b. Initial	
  response	
  kit	
  
i. Necessary	
  hardware	
  
1. Prepared	
  flash	
  drive(s)	
  
2. Prepared	
  hard	
  drive(s)	
  
3. Hand	
  tools	
  
ii. Necessary	
  software	
  
1. RAM	
  collection	
  software	
  
2. Encryption	
  detection	
  software	
  
3. Imaging	
  software	
  
iii. Other	
  necessary	
  equipment	
  
1. Forms	
  (CoC,	
  computer	
  worksheet)	
  
2. Notepad	
  
3. Bags,	
  tape,	
  labels,	
  pens	
  
4. Camera/Video	
  
	
  
2. Identify,	
  Triage,	
  Collect	
  and	
  Document	
  
a. Initial	
  response	
  considerations	
  
i. Safety	
  
ii. Safeguarding	
  digital	
  evidence	
  from	
  further	
  tampering	
  
iii. Urgency	
  
	
  
b. Triaging	
  Live	
  computers	
  
i. Initial	
  triage	
  
1. Deletion	
  or	
  other	
  potentially	
  destructive	
  action	
  in	
  progress?	
  
a. Stop	
  process	
  vs.	
  shutting	
  down	
  computer	
  
2. If	
  circumstances	
  dictate,	
  disconnecting	
  physical	
  network	
  connection	
  
a. Necessary	
  to	
  collect	
  minimal	
  information	
  prior	
  to	
  disconnection?	
  
b. Disconnect	
  physical	
  network	
  connection	
  
i. Hardware	
  wireless	
  switch	
  (laptop)	
  
ii. Unlocked	
  Screen	
  
1. Wireless	
  status/disconnect	
  required?	
  
2. Determine	
  level	
  of	
  access	
  
a. Administrator	
  access	
  
i. Collection	
  of	
  volatile	
  data	
  
1. Follow	
  order	
  of	
  volatility	
  
a. RAM	
  collection	
  
b. Other	
  volatile	
  Data	
  
i. Comprehensive	
  networking	
  information	
  
ii. Running	
  applications	
  
iii. Date	
  &	
  time	
  
c. Detecting	
  encrypted	
  volumes	
  
i. Logical	
  imaging	
  
ii. Obtain	
  Bitlocker	
  recovery	
  key	
  
2. Shutdown	
  system	
  
b. Non-­‐administrator	
  access	
  
i. Collection	
  of	
  volatile	
  data	
  
1. Follow	
  order	
  of	
  volatility	
  
a. Other	
  volatile	
  data	
  
i. Comprehensive	
  networking	
  information	
  
ii. Running	
  applications	
  
iii. Date	
  &	
  time	
  
b. Detecting	
  encrypted	
  volumes	
  
i. Logical	
  imaging	
  
iii. Locked	
  Screen	
  
1. Shutdown	
  system	
  
a. Pulling	
  plug	
  vs.	
  shutdown	
  process	
  
c. Collection	
  of	
  digital	
  media	
  
i. Marking/labeling	
  
d. Documentation	
  
i. CoC	
  
ii. Notes	
  
	
  
	
  
	
  
	
  
	
  
	
  
 
3. Imaging	
  Process	
  
a. Interface	
  considerations	
  –	
  Available	
  adapters	
  and	
  connectors	
  
1. USB	
  
2. SCSI	
  
3. PATA	
  
4. SATA	
  
5. SAS	
  
6. ZIFF	
  
	
  
b. Hardware-­‐based	
  imaging	
  devices	
  
i. Storage	
  considerations	
  
1. Pre-­‐prepared	
  HD	
  (wiped)	
  
2. Drive	
  capacity	
  
ii. Tableau	
  
1. Native	
  .E01	
  support	
  
iii. Weibetech	
  
iv. Logicube	
  
	
  
c. Software	
  Imaging	
  
i. Storage	
  considerations	
  
1. Pre-­‐prepared	
  HD	
  (wiped)	
  
2. Drive	
  capacity	
  
ii. Hardware	
  write-­‐blockers	
  
1. Tableau	
  
2. Weibetech	
  
3. Others	
  
iii. Software	
  write-­‐blockers	
  
1. EnCase	
  Fastbloc	
  SE	
  
2. Registry	
  hack	
  
iv. No	
  write	
  blocker	
  
1. Linux	
  /	
  Unix	
  /	
  OSX	
  
	
  
d. Verification	
  Process	
  
i. Hash	
  verification	
  
	
  
4. Analysis	
  Process	
  
a. Pre-­‐Analysis	
  preparation	
  
i. Root	
  Case	
  Folder	
  
1. Location	
  
2. Naming	
  convention	
  
3. Case	
  folder	
  subcomponents	
  
a. Evidence	
  files	
  
b. Export	
  
c. Temp	
  
d. Index	
  
	
  
b. Pre-­‐Analysis	
  Processing	
  
i. Identification	
  of	
  all	
  archives,	
  encrypted	
  volumes,	
  virtual	
  machines.	
  
1. Virtual	
  mounting	
  
	
  
ii. Hash	
  Analysis	
  
1. Good	
  vs.	
  bad	
  hashes	
  (Known	
  vs.	
  Unknown)	
  
2. Generating	
  hash	
  values	
  for	
  each	
  file	
  
3. Comparing	
  hash	
  sets	
  
4. Filtering	
  out	
  identified	
  files	
  
	
  
iii. File	
  Signature	
  Analysis	
  
	
  
iv. Keyword	
  indexing	
  (optional)	
  
 
c. Case-­‐Specific	
  Analysis	
  Techniques	
  (common	
  techniques)	
  
i. RAM	
  Analysis	
  (if	
  applicable)	
  
1. Strings	
  
2. Redline	
  
3. HBGary	
  Responder	
  
	
  
ii. Keyword	
  Searching	
  
1. Live	
  searching	
  
2. Index	
  Searching	
  
3. Unicode	
  
4. GREP	
  
	
  
iii. Internet	
  History	
  Analysis	
  
1. IE	
  
a. Internet	
  history	
  
b. Favorites	
  
c. Zone	
  identifier	
  files	
  
d. Configuration	
  settings	
  
	
  
2. Firefox	
  
a. Internet	
  history	
  
b. Favorites	
  
c. Configuration	
  settings	
  
	
  
3. Chrome	
  
a. Internet	
  history	
  
b. Favorites	
  
c. Configuration	
  settings	
  
	
  
4. Safari	
  
a. Internet	
  history	
  
b. Favorites	
  	
  
c. Configuration	
  setting	
  
	
  
5. 3rd	
  party	
  tools	
  
a. Netanalysis	
  
b. Web	
  Historian	
  
	
  
iv. Email	
  Analysis	
  
1. Client	
  based	
  
a. Outlook	
  
b. Outlook	
  Express	
  
c. Thunderbird	
  
2. Web	
  based	
  
a. Gmail	
  
b. Hotmail	
  
c. Yahoo	
  
	
  
v. Windows	
  Event	
  logs	
  
1. Location	
  
2. Types	
  
3. Format	
  
a. XP	
  vs.	
  Vista	
  /	
  7/	
  8	
  
4. 3rd	
  party	
  tools	
  
a. Splunk	
  
b. Highlighter	
  
	
  
vi. Social	
  Media	
  Analysis	
  
1. Twitter	
  
2. Facebook	
  
3. Google+	
  
vii. Instant	
  Messaging	
  
1. Gtalk	
  
2. Yahoo	
  
3. Live	
  /	
  Communicator	
  /	
  Lync	
  
	
  
viii. User	
  Profile	
  Analysis	
  (recent	
  docs,	
  LNK,	
  etc)	
  
1. Desktop	
  
2. Downloads	
  
3. Documents	
  
4. Videos	
  
5. Photos	
  
	
  
ix. Registry	
  Analysis	
  
1. Global	
  
a. User	
  accounts	
  /	
  SIDS	
  
b. Installed	
  applications	
  
c. Passwords	
  
2. User	
  Specific	
  
a. Protected	
  Storage	
  Passwords	
  
b. UserAssist	
  
c. MRU	
  /	
  Recently	
  opened	
  files	
  
d. Background	
  Image	
  
3. 3rd	
  party	
  tools	
  
a. regripper	
  
b. regdecoder	
  
c. WRR	
  (mitec)	
  
	
  
x. USB	
  Device	
  Analysis	
  
1. XP	
  
a. Registry	
  
i. Mounted	
  Devices	
  
ii. USBSTOR	
  
b. setupapi.log	
  
2. Vista	
  /	
  7	
  /	
  8	
  
a. Registry	
  
i. Mounted	
  Devices	
  
ii. USBSTOR	
  
b. setupapi.dev.log	
  &	
  setupapi.app.log	
  
	
  
xi. Recycle	
  Bin	
  Analysis	
  
1. SID	
  mapping	
  
	
  
xii. System	
  Restore	
  Points	
  /	
  Volume	
  Shadow	
  Service	
  (VSS)	
  analysis	
  
1. XP	
  systems	
  
a. 3rd	
  party	
  tools	
  
i. Mandiant	
  Restore	
  Point	
  analyzer	
  
2. Vista	
  /	
  7/	
  8	
  
a. VSS	
  Analysis	
  
b. 3rd	
  party	
  tools	
  
i. ShadowExplorer	
  
ii. FAU	
  dd	
  (Garner)	
  
	
  
xiii. Peer-­‐to-­‐Peer	
  	
  (P2P)	
  Analysis	
  
1. Limewire	
  
2. Gigatribe	
  
3. uTorrent	
  
	
  
xiv. Cloud	
  Based	
  Applications	
  
1. Dropbox	
  
2. Microsoft	
  Live	
  mesh	
  
3. Google	
  drive	
  
	
  
xv. Basic	
  Data	
  Carving	
  
1. pagefile.sys	
  
2. hiberfil.sys	
  
3. Unallocated	
  Space	
  
4. Identifying	
  headers	
  &	
  footers	
  
a. Base64	
  
b. Internet	
  History	
  
5. 3rd	
  party	
  tools	
  
a. Internet	
  Evidence	
  Finder	
  (IEF)	
  
	
  
xvi. Unused	
  Disk	
  areas	
  
1. Deleted	
  partitions	
  
	
  
xvii. General	
  Intelligence	
  gathering	
  
1. Collection	
  of	
  email	
  addresses	
  
2. Collection	
  of	
  phone	
  numbers	
  
	
  
5. Report	
  Writing	
  
a. Baseline	
  	
  &	
  Case	
  specific	
  information	
  	
  
i. Request	
  
ii. Findings	
  
1. Drive	
  Info	
  
a. Physical	
  size	
  (label)	
  
b. Physical	
  size	
  (BIOS)	
  
c. Logical	
  size	
  
i. Logical	
  partitions	
  
d. Unused	
  disk	
  space	
  
2. OS	
  Information	
  
a. Type	
  
b. Version	
  
c. Patch	
  level	
  /	
  hotfixes	
  
d. Install	
  date	
  
e. Registered	
  Name	
  /	
  Organization	
  
3. Case	
  specific	
  findings	
  
iii. Summary	
  
iv. Recommendations	
  
	
  
b. Timeline	
  of	
  events	
  
	
  
	
  

More Related Content

Viewers also liked

I&D - Taller Tema de Investigación
I&D - Taller Tema de InvestigaciónI&D - Taller Tema de Investigación
I&D - Taller Tema de InvestigaciónAna Pedraza
 
Revision artciculo cientifico - - Lcda. Mg. Marlene Suarez
Revision artciculo cientifico -  - Lcda. Mg. Marlene SuarezRevision artciculo cientifico -  - Lcda. Mg. Marlene Suarez
Revision artciculo cientifico - - Lcda. Mg. Marlene SuarezJairo Castillo
 
Comprar piezas de coches en línea- una solución rápida y asequible
Comprar piezas de coches en línea- una solución rápida y asequibleComprar piezas de coches en línea- una solución rápida y asequible
Comprar piezas de coches en línea- una solución rápida y asequiblecarolllee
 
Descriptores DeCS - Clara Gallardo
Descriptores DeCS - Clara GallardoDescriptores DeCS - Clara Gallardo
Descriptores DeCS - Clara GallardoClarita Gallardo
 

Viewers also liked (7)

I&D - Taller Tema de Investigación
I&D - Taller Tema de InvestigaciónI&D - Taller Tema de Investigación
I&D - Taller Tema de Investigación
 
References EN
References ENReferences EN
References EN
 
Tarea artículo
Tarea artículoTarea artículo
Tarea artículo
 
Revision artciculo cientifico - - Lcda. Mg. Marlene Suarez
Revision artciculo cientifico -  - Lcda. Mg. Marlene SuarezRevision artciculo cientifico -  - Lcda. Mg. Marlene Suarez
Revision artciculo cientifico - - Lcda. Mg. Marlene Suarez
 
Comprar piezas de coches en línea- una solución rápida y asequible
Comprar piezas de coches en línea- una solución rápida y asequibleComprar piezas de coches en línea- una solución rápida y asequible
Comprar piezas de coches en línea- una solución rápida y asequible
 
Descriptores DeCS - Clara Gallardo
Descriptores DeCS - Clara GallardoDescriptores DeCS - Clara Gallardo
Descriptores DeCS - Clara Gallardo
 
Resume TRUC TO - SC
Resume TRUC TO - SCResume TRUC TO - SC
Resume TRUC TO - SC
 

Similar to Computer forensic lifecycle

2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - publicSandro Suffert
 
Disk forensics for the lazy and the smart
Disk forensics for the lazy and the smartDisk forensics for the lazy and the smart
Disk forensics for the lazy and the smartJeff Beley
 
Hsc computer science chap 1 Operating System (1).pdf
Hsc computer science chap 1 Operating System  (1).pdfHsc computer science chap 1 Operating System  (1).pdf
Hsc computer science chap 1 Operating System (1).pdfAAFREEN SHAIKH
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newKatherineJack1
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newEmmaJack2018
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newmarysherman2018
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newsweetsour2017
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newLillieDickey
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newsarahlazeto
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newlizabonilla
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerShakacon
 
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptxSachinGosavi15
 
1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docxambersalomon88660
 
Foundation of Digital Forensics
Foundation of Digital ForensicsFoundation of Digital Forensics
Foundation of Digital ForensicsVictor C. Sovichea
 
Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plugKamal Rathaur
 

Similar to Computer forensic lifecycle (20)

Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public
 
Disk forensics for the lazy and the smart
Disk forensics for the lazy and the smartDisk forensics for the lazy and the smart
Disk forensics for the lazy and the smart
 
Hsc computer science chap 1 Operating System (1).pdf
Hsc computer science chap 1 Operating System  (1).pdfHsc computer science chap 1 Operating System  (1).pdf
Hsc computer science chap 1 Operating System (1).pdf
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
3871778
38717783871778
3871778
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layer
 
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
 
1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx
 
Foundation of Digital Forensics
Foundation of Digital ForensicsFoundation of Digital Forensics
Foundation of Digital Forensics
 
Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plug
 
1500 mcq questions of computer knowledge for bank exams
1500 mcq questions of computer knowledge for bank exams1500 mcq questions of computer knowledge for bank exams
1500 mcq questions of computer knowledge for bank exams
 

Recently uploaded

Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 

Recently uploaded (20)

Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 

Computer forensic lifecycle

  • 1. Computer  Forensic  Lifecycle  (common  PC/Laptop)   1. Preparation   a. Preparation  steps   i. Test  and  familiarize  yourself  with  software  tools   ii. Prepare  hard  drives   1. Wipe  &  verify   2. Partitioning   a. Filesystem  type   3. Load  tools   iii. Prepare  flash  drives   1. Wipe  &  verify   2. Partitioning   a. Filesystem  type   3. Load  tools   b. Initial  response  kit   i. Necessary  hardware   1. Prepared  flash  drive(s)   2. Prepared  hard  drive(s)   3. Hand  tools   ii. Necessary  software   1. RAM  collection  software   2. Encryption  detection  software   3. Imaging  software   iii. Other  necessary  equipment   1. Forms  (CoC,  computer  worksheet)   2. Notepad   3. Bags,  tape,  labels,  pens   4. Camera/Video    
  • 2. 2. Identify,  Triage,  Collect  and  Document   a. Initial  response  considerations   i. Safety   ii. Safeguarding  digital  evidence  from  further  tampering   iii. Urgency     b. Triaging  Live  computers   i. Initial  triage   1. Deletion  or  other  potentially  destructive  action  in  progress?   a. Stop  process  vs.  shutting  down  computer   2. If  circumstances  dictate,  disconnecting  physical  network  connection   a. Necessary  to  collect  minimal  information  prior  to  disconnection?   b. Disconnect  physical  network  connection   i. Hardware  wireless  switch  (laptop)   ii. Unlocked  Screen   1. Wireless  status/disconnect  required?   2. Determine  level  of  access   a. Administrator  access   i. Collection  of  volatile  data   1. Follow  order  of  volatility   a. RAM  collection   b. Other  volatile  Data   i. Comprehensive  networking  information   ii. Running  applications   iii. Date  &  time   c. Detecting  encrypted  volumes  
  • 3. i. Logical  imaging   ii. Obtain  Bitlocker  recovery  key   2. Shutdown  system   b. Non-­‐administrator  access   i. Collection  of  volatile  data   1. Follow  order  of  volatility   a. Other  volatile  data   i. Comprehensive  networking  information   ii. Running  applications   iii. Date  &  time   b. Detecting  encrypted  volumes   i. Logical  imaging   iii. Locked  Screen   1. Shutdown  system   a. Pulling  plug  vs.  shutdown  process   c. Collection  of  digital  media   i. Marking/labeling   d. Documentation   i. CoC   ii. Notes              
  • 4.   3. Imaging  Process   a. Interface  considerations  –  Available  adapters  and  connectors   1. USB   2. SCSI   3. PATA   4. SATA   5. SAS   6. ZIFF     b. Hardware-­‐based  imaging  devices   i. Storage  considerations   1. Pre-­‐prepared  HD  (wiped)   2. Drive  capacity   ii. Tableau   1. Native  .E01  support   iii. Weibetech   iv. Logicube     c. Software  Imaging   i. Storage  considerations   1. Pre-­‐prepared  HD  (wiped)   2. Drive  capacity   ii. Hardware  write-­‐blockers   1. Tableau   2. Weibetech   3. Others   iii. Software  write-­‐blockers   1. EnCase  Fastbloc  SE   2. Registry  hack  
  • 5. iv. No  write  blocker   1. Linux  /  Unix  /  OSX     d. Verification  Process   i. Hash  verification     4. Analysis  Process   a. Pre-­‐Analysis  preparation   i. Root  Case  Folder   1. Location   2. Naming  convention   3. Case  folder  subcomponents   a. Evidence  files   b. Export   c. Temp   d. Index     b. Pre-­‐Analysis  Processing   i. Identification  of  all  archives,  encrypted  volumes,  virtual  machines.   1. Virtual  mounting     ii. Hash  Analysis   1. Good  vs.  bad  hashes  (Known  vs.  Unknown)   2. Generating  hash  values  for  each  file   3. Comparing  hash  sets   4. Filtering  out  identified  files     iii. File  Signature  Analysis     iv. Keyword  indexing  (optional)  
  • 6.   c. Case-­‐Specific  Analysis  Techniques  (common  techniques)   i. RAM  Analysis  (if  applicable)   1. Strings   2. Redline   3. HBGary  Responder     ii. Keyword  Searching   1. Live  searching   2. Index  Searching   3. Unicode   4. GREP     iii. Internet  History  Analysis   1. IE   a. Internet  history   b. Favorites   c. Zone  identifier  files   d. Configuration  settings     2. Firefox   a. Internet  history   b. Favorites   c. Configuration  settings     3. Chrome   a. Internet  history   b. Favorites   c. Configuration  settings    
  • 7. 4. Safari   a. Internet  history   b. Favorites     c. Configuration  setting     5. 3rd  party  tools   a. Netanalysis   b. Web  Historian     iv. Email  Analysis   1. Client  based   a. Outlook   b. Outlook  Express   c. Thunderbird   2. Web  based   a. Gmail   b. Hotmail   c. Yahoo     v. Windows  Event  logs   1. Location   2. Types   3. Format   a. XP  vs.  Vista  /  7/  8   4. 3rd  party  tools   a. Splunk   b. Highlighter     vi. Social  Media  Analysis   1. Twitter  
  • 8. 2. Facebook   3. Google+   vii. Instant  Messaging   1. Gtalk   2. Yahoo   3. Live  /  Communicator  /  Lync     viii. User  Profile  Analysis  (recent  docs,  LNK,  etc)   1. Desktop   2. Downloads   3. Documents   4. Videos   5. Photos     ix. Registry  Analysis   1. Global   a. User  accounts  /  SIDS   b. Installed  applications   c. Passwords   2. User  Specific   a. Protected  Storage  Passwords   b. UserAssist   c. MRU  /  Recently  opened  files   d. Background  Image   3. 3rd  party  tools   a. regripper   b. regdecoder   c. WRR  (mitec)     x. USB  Device  Analysis  
  • 9. 1. XP   a. Registry   i. Mounted  Devices   ii. USBSTOR   b. setupapi.log   2. Vista  /  7  /  8   a. Registry   i. Mounted  Devices   ii. USBSTOR   b. setupapi.dev.log  &  setupapi.app.log     xi. Recycle  Bin  Analysis   1. SID  mapping     xii. System  Restore  Points  /  Volume  Shadow  Service  (VSS)  analysis   1. XP  systems   a. 3rd  party  tools   i. Mandiant  Restore  Point  analyzer   2. Vista  /  7/  8   a. VSS  Analysis   b. 3rd  party  tools   i. ShadowExplorer   ii. FAU  dd  (Garner)     xiii. Peer-­‐to-­‐Peer    (P2P)  Analysis   1. Limewire   2. Gigatribe   3. uTorrent     xiv. Cloud  Based  Applications  
  • 10. 1. Dropbox   2. Microsoft  Live  mesh   3. Google  drive     xv. Basic  Data  Carving   1. pagefile.sys   2. hiberfil.sys   3. Unallocated  Space   4. Identifying  headers  &  footers   a. Base64   b. Internet  History   5. 3rd  party  tools   a. Internet  Evidence  Finder  (IEF)     xvi. Unused  Disk  areas   1. Deleted  partitions     xvii. General  Intelligence  gathering   1. Collection  of  email  addresses   2. Collection  of  phone  numbers     5. Report  Writing   a. Baseline    &  Case  specific  information     i. Request   ii. Findings   1. Drive  Info   a. Physical  size  (label)   b. Physical  size  (BIOS)   c. Logical  size   i. Logical  partitions  
  • 11. d. Unused  disk  space   2. OS  Information   a. Type   b. Version   c. Patch  level  /  hotfixes   d. Install  date   e. Registered  Name  /  Organization   3. Case  specific  findings   iii. Summary   iv. Recommendations     b. Timeline  of  events