SlideShare a Scribd company logo
1 of 11
Download to read offline
Computer	
  Forensic	
  Lifecycle	
  (common	
  PC/Laptop)	
  
1. Preparation	
  
a. Preparation	
  steps	
  
i. Test	
  and	
  familiarize	
  yourself	
  with	
  software	
  tools	
  
ii. Prepare	
  hard	
  drives	
  
1. Wipe	
  &	
  verify	
  
2. Partitioning	
  
a. Filesystem	
  type	
  
3. Load	
  tools	
  
iii. Prepare	
  flash	
  drives	
  
1. Wipe	
  &	
  verify	
  
2. Partitioning	
  
a. Filesystem	
  type	
  
3. Load	
  tools	
  
b. Initial	
  response	
  kit	
  
i. Necessary	
  hardware	
  
1. Prepared	
  flash	
  drive(s)	
  
2. Prepared	
  hard	
  drive(s)	
  
3. Hand	
  tools	
  
ii. Necessary	
  software	
  
1. RAM	
  collection	
  software	
  
2. Encryption	
  detection	
  software	
  
3. Imaging	
  software	
  
iii. Other	
  necessary	
  equipment	
  
1. Forms	
  (CoC,	
  computer	
  worksheet)	
  
2. Notepad	
  
3. Bags,	
  tape,	
  labels,	
  pens	
  
4. Camera/Video	
  
	
  
2. Identify,	
  Triage,	
  Collect	
  and	
  Document	
  
a. Initial	
  response	
  considerations	
  
i. Safety	
  
ii. Safeguarding	
  digital	
  evidence	
  from	
  further	
  tampering	
  
iii. Urgency	
  
	
  
b. Triaging	
  Live	
  computers	
  
i. Initial	
  triage	
  
1. Deletion	
  or	
  other	
  potentially	
  destructive	
  action	
  in	
  progress?	
  
a. Stop	
  process	
  vs.	
  shutting	
  down	
  computer	
  
2. If	
  circumstances	
  dictate,	
  disconnecting	
  physical	
  network	
  connection	
  
a. Necessary	
  to	
  collect	
  minimal	
  information	
  prior	
  to	
  disconnection?	
  
b. Disconnect	
  physical	
  network	
  connection	
  
i. Hardware	
  wireless	
  switch	
  (laptop)	
  
ii. Unlocked	
  Screen	
  
1. Wireless	
  status/disconnect	
  required?	
  
2. Determine	
  level	
  of	
  access	
  
a. Administrator	
  access	
  
i. Collection	
  of	
  volatile	
  data	
  
1. Follow	
  order	
  of	
  volatility	
  
a. RAM	
  collection	
  
b. Other	
  volatile	
  Data	
  
i. Comprehensive	
  networking	
  information	
  
ii. Running	
  applications	
  
iii. Date	
  &	
  time	
  
c. Detecting	
  encrypted	
  volumes	
  
i. Logical	
  imaging	
  
ii. Obtain	
  Bitlocker	
  recovery	
  key	
  
2. Shutdown	
  system	
  
b. Non-­‐administrator	
  access	
  
i. Collection	
  of	
  volatile	
  data	
  
1. Follow	
  order	
  of	
  volatility	
  
a. Other	
  volatile	
  data	
  
i. Comprehensive	
  networking	
  information	
  
ii. Running	
  applications	
  
iii. Date	
  &	
  time	
  
b. Detecting	
  encrypted	
  volumes	
  
i. Logical	
  imaging	
  
iii. Locked	
  Screen	
  
1. Shutdown	
  system	
  
a. Pulling	
  plug	
  vs.	
  shutdown	
  process	
  
c. Collection	
  of	
  digital	
  media	
  
i. Marking/labeling	
  
d. Documentation	
  
i. CoC	
  
ii. Notes	
  
	
  
	
  
	
  
	
  
	
  
	
  
 
3. Imaging	
  Process	
  
a. Interface	
  considerations	
  –	
  Available	
  adapters	
  and	
  connectors	
  
1. USB	
  
2. SCSI	
  
3. PATA	
  
4. SATA	
  
5. SAS	
  
6. ZIFF	
  
	
  
b. Hardware-­‐based	
  imaging	
  devices	
  
i. Storage	
  considerations	
  
1. Pre-­‐prepared	
  HD	
  (wiped)	
  
2. Drive	
  capacity	
  
ii. Tableau	
  
1. Native	
  .E01	
  support	
  
iii. Weibetech	
  
iv. Logicube	
  
	
  
c. Software	
  Imaging	
  
i. Storage	
  considerations	
  
1. Pre-­‐prepared	
  HD	
  (wiped)	
  
2. Drive	
  capacity	
  
ii. Hardware	
  write-­‐blockers	
  
1. Tableau	
  
2. Weibetech	
  
3. Others	
  
iii. Software	
  write-­‐blockers	
  
1. EnCase	
  Fastbloc	
  SE	
  
2. Registry	
  hack	
  
iv. No	
  write	
  blocker	
  
1. Linux	
  /	
  Unix	
  /	
  OSX	
  
	
  
d. Verification	
  Process	
  
i. Hash	
  verification	
  
	
  
4. Analysis	
  Process	
  
a. Pre-­‐Analysis	
  preparation	
  
i. Root	
  Case	
  Folder	
  
1. Location	
  
2. Naming	
  convention	
  
3. Case	
  folder	
  subcomponents	
  
a. Evidence	
  files	
  
b. Export	
  
c. Temp	
  
d. Index	
  
	
  
b. Pre-­‐Analysis	
  Processing	
  
i. Identification	
  of	
  all	
  archives,	
  encrypted	
  volumes,	
  virtual	
  machines.	
  
1. Virtual	
  mounting	
  
	
  
ii. Hash	
  Analysis	
  
1. Good	
  vs.	
  bad	
  hashes	
  (Known	
  vs.	
  Unknown)	
  
2. Generating	
  hash	
  values	
  for	
  each	
  file	
  
3. Comparing	
  hash	
  sets	
  
4. Filtering	
  out	
  identified	
  files	
  
	
  
iii. File	
  Signature	
  Analysis	
  
	
  
iv. Keyword	
  indexing	
  (optional)	
  
 
c. Case-­‐Specific	
  Analysis	
  Techniques	
  (common	
  techniques)	
  
i. RAM	
  Analysis	
  (if	
  applicable)	
  
1. Strings	
  
2. Redline	
  
3. HBGary	
  Responder	
  
	
  
ii. Keyword	
  Searching	
  
1. Live	
  searching	
  
2. Index	
  Searching	
  
3. Unicode	
  
4. GREP	
  
	
  
iii. Internet	
  History	
  Analysis	
  
1. IE	
  
a. Internet	
  history	
  
b. Favorites	
  
c. Zone	
  identifier	
  files	
  
d. Configuration	
  settings	
  
	
  
2. Firefox	
  
a. Internet	
  history	
  
b. Favorites	
  
c. Configuration	
  settings	
  
	
  
3. Chrome	
  
a. Internet	
  history	
  
b. Favorites	
  
c. Configuration	
  settings	
  
	
  
4. Safari	
  
a. Internet	
  history	
  
b. Favorites	
  	
  
c. Configuration	
  setting	
  
	
  
5. 3rd	
  party	
  tools	
  
a. Netanalysis	
  
b. Web	
  Historian	
  
	
  
iv. Email	
  Analysis	
  
1. Client	
  based	
  
a. Outlook	
  
b. Outlook	
  Express	
  
c. Thunderbird	
  
2. Web	
  based	
  
a. Gmail	
  
b. Hotmail	
  
c. Yahoo	
  
	
  
v. Windows	
  Event	
  logs	
  
1. Location	
  
2. Types	
  
3. Format	
  
a. XP	
  vs.	
  Vista	
  /	
  7/	
  8	
  
4. 3rd	
  party	
  tools	
  
a. Splunk	
  
b. Highlighter	
  
	
  
vi. Social	
  Media	
  Analysis	
  
1. Twitter	
  
2. Facebook	
  
3. Google+	
  
vii. Instant	
  Messaging	
  
1. Gtalk	
  
2. Yahoo	
  
3. Live	
  /	
  Communicator	
  /	
  Lync	
  
	
  
viii. User	
  Profile	
  Analysis	
  (recent	
  docs,	
  LNK,	
  etc)	
  
1. Desktop	
  
2. Downloads	
  
3. Documents	
  
4. Videos	
  
5. Photos	
  
	
  
ix. Registry	
  Analysis	
  
1. Global	
  
a. User	
  accounts	
  /	
  SIDS	
  
b. Installed	
  applications	
  
c. Passwords	
  
2. User	
  Specific	
  
a. Protected	
  Storage	
  Passwords	
  
b. UserAssist	
  
c. MRU	
  /	
  Recently	
  opened	
  files	
  
d. Background	
  Image	
  
3. 3rd	
  party	
  tools	
  
a. regripper	
  
b. regdecoder	
  
c. WRR	
  (mitec)	
  
	
  
x. USB	
  Device	
  Analysis	
  
1. XP	
  
a. Registry	
  
i. Mounted	
  Devices	
  
ii. USBSTOR	
  
b. setupapi.log	
  
2. Vista	
  /	
  7	
  /	
  8	
  
a. Registry	
  
i. Mounted	
  Devices	
  
ii. USBSTOR	
  
b. setupapi.dev.log	
  &	
  setupapi.app.log	
  
	
  
xi. Recycle	
  Bin	
  Analysis	
  
1. SID	
  mapping	
  
	
  
xii. System	
  Restore	
  Points	
  /	
  Volume	
  Shadow	
  Service	
  (VSS)	
  analysis	
  
1. XP	
  systems	
  
a. 3rd	
  party	
  tools	
  
i. Mandiant	
  Restore	
  Point	
  analyzer	
  
2. Vista	
  /	
  7/	
  8	
  
a. VSS	
  Analysis	
  
b. 3rd	
  party	
  tools	
  
i. ShadowExplorer	
  
ii. FAU	
  dd	
  (Garner)	
  
	
  
xiii. Peer-­‐to-­‐Peer	
  	
  (P2P)	
  Analysis	
  
1. Limewire	
  
2. Gigatribe	
  
3. uTorrent	
  
	
  
xiv. Cloud	
  Based	
  Applications	
  
1. Dropbox	
  
2. Microsoft	
  Live	
  mesh	
  
3. Google	
  drive	
  
	
  
xv. Basic	
  Data	
  Carving	
  
1. pagefile.sys	
  
2. hiberfil.sys	
  
3. Unallocated	
  Space	
  
4. Identifying	
  headers	
  &	
  footers	
  
a. Base64	
  
b. Internet	
  History	
  
5. 3rd	
  party	
  tools	
  
a. Internet	
  Evidence	
  Finder	
  (IEF)	
  
	
  
xvi. Unused	
  Disk	
  areas	
  
1. Deleted	
  partitions	
  
	
  
xvii. General	
  Intelligence	
  gathering	
  
1. Collection	
  of	
  email	
  addresses	
  
2. Collection	
  of	
  phone	
  numbers	
  
	
  
5. Report	
  Writing	
  
a. Baseline	
  	
  &	
  Case	
  specific	
  information	
  	
  
i. Request	
  
ii. Findings	
  
1. Drive	
  Info	
  
a. Physical	
  size	
  (label)	
  
b. Physical	
  size	
  (BIOS)	
  
c. Logical	
  size	
  
i. Logical	
  partitions	
  
d. Unused	
  disk	
  space	
  
2. OS	
  Information	
  
a. Type	
  
b. Version	
  
c. Patch	
  level	
  /	
  hotfixes	
  
d. Install	
  date	
  
e. Registered	
  Name	
  /	
  Organization	
  
3. Case	
  specific	
  findings	
  
iii. Summary	
  
iv. Recommendations	
  
	
  
b. Timeline	
  of	
  events	
  
	
  
	
  

More Related Content

Viewers also liked

Viewers also liked (10)

DIANA VINCENT Resume 4
DIANA VINCENT Resume 4DIANA VINCENT Resume 4
DIANA VINCENT Resume 4
 
Migración
MigraciónMigración
Migración
 
stephen dover-resume
stephen dover-resumestephen dover-resume
stephen dover-resume
 
La Ciencia y El Conocimiento Cientifico
La Ciencia y El Conocimiento CientificoLa Ciencia y El Conocimiento Cientifico
La Ciencia y El Conocimiento Cientifico
 
Celulas
CelulasCelulas
Celulas
 
Wes presentation
Wes presentationWes presentation
Wes presentation
 
Resume
ResumeResume
Resume
 
Clasificacion de desnutricion
Clasificacion de desnutricionClasificacion de desnutricion
Clasificacion de desnutricion
 
Jewish Museum Precedent Studies Board
Jewish Museum Precedent Studies BoardJewish Museum Precedent Studies Board
Jewish Museum Precedent Studies Board
 
Rejuvenate Your Small Business: 10 Marketing Ideas for Thanksgiving
Rejuvenate Your Small Business: 10 Marketing Ideas for ThanksgivingRejuvenate Your Small Business: 10 Marketing Ideas for Thanksgiving
Rejuvenate Your Small Business: 10 Marketing Ideas for Thanksgiving
 

Similar to Computer forensic lifecycle

2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - publicSandro Suffert
 
Disk forensics for the lazy and the smart
Disk forensics for the lazy and the smartDisk forensics for the lazy and the smart
Disk forensics for the lazy and the smartJeff Beley
 
Hsc computer science chap 1 Operating System (1).pdf
Hsc computer science chap 1 Operating System  (1).pdfHsc computer science chap 1 Operating System  (1).pdf
Hsc computer science chap 1 Operating System (1).pdfAAFREEN SHAIKH
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newKatherineJack1
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newEmmaJack2018
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newmarysherman2018
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newsweetsour2017
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newLillieDickey
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newsarahlazeto
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newlizabonilla
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerShakacon
 
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptxSachinGosavi15
 
1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docxambersalomon88660
 
Foundation of Digital Forensics
Foundation of Digital ForensicsFoundation of Digital Forensics
Foundation of Digital ForensicsVictor C. Sovichea
 
Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plugKamal Rathaur
 

Similar to Computer forensic lifecycle (20)

Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public
 
Disk forensics for the lazy and the smart
Disk forensics for the lazy and the smartDisk forensics for the lazy and the smart
Disk forensics for the lazy and the smart
 
Hsc computer science chap 1 Operating System (1).pdf
Hsc computer science chap 1 Operating System  (1).pdfHsc computer science chap 1 Operating System  (1).pdf
Hsc computer science chap 1 Operating System (1).pdf
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
3871778
38717783871778
3871778
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layer
 
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
 
1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx
 
Foundation of Digital Forensics
Foundation of Digital ForensicsFoundation of Digital Forensics
Foundation of Digital Forensics
 
Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plug
 
1500 mcq questions of computer knowledge for bank exams
1500 mcq questions of computer knowledge for bank exams1500 mcq questions of computer knowledge for bank exams
1500 mcq questions of computer knowledge for bank exams
 

Recently uploaded

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 

Recently uploaded (20)

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 

Computer forensic lifecycle

  • 1. Computer  Forensic  Lifecycle  (common  PC/Laptop)   1. Preparation   a. Preparation  steps   i. Test  and  familiarize  yourself  with  software  tools   ii. Prepare  hard  drives   1. Wipe  &  verify   2. Partitioning   a. Filesystem  type   3. Load  tools   iii. Prepare  flash  drives   1. Wipe  &  verify   2. Partitioning   a. Filesystem  type   3. Load  tools   b. Initial  response  kit   i. Necessary  hardware   1. Prepared  flash  drive(s)   2. Prepared  hard  drive(s)   3. Hand  tools   ii. Necessary  software   1. RAM  collection  software   2. Encryption  detection  software   3. Imaging  software   iii. Other  necessary  equipment   1. Forms  (CoC,  computer  worksheet)   2. Notepad   3. Bags,  tape,  labels,  pens   4. Camera/Video    
  • 2. 2. Identify,  Triage,  Collect  and  Document   a. Initial  response  considerations   i. Safety   ii. Safeguarding  digital  evidence  from  further  tampering   iii. Urgency     b. Triaging  Live  computers   i. Initial  triage   1. Deletion  or  other  potentially  destructive  action  in  progress?   a. Stop  process  vs.  shutting  down  computer   2. If  circumstances  dictate,  disconnecting  physical  network  connection   a. Necessary  to  collect  minimal  information  prior  to  disconnection?   b. Disconnect  physical  network  connection   i. Hardware  wireless  switch  (laptop)   ii. Unlocked  Screen   1. Wireless  status/disconnect  required?   2. Determine  level  of  access   a. Administrator  access   i. Collection  of  volatile  data   1. Follow  order  of  volatility   a. RAM  collection   b. Other  volatile  Data   i. Comprehensive  networking  information   ii. Running  applications   iii. Date  &  time   c. Detecting  encrypted  volumes  
  • 3. i. Logical  imaging   ii. Obtain  Bitlocker  recovery  key   2. Shutdown  system   b. Non-­‐administrator  access   i. Collection  of  volatile  data   1. Follow  order  of  volatility   a. Other  volatile  data   i. Comprehensive  networking  information   ii. Running  applications   iii. Date  &  time   b. Detecting  encrypted  volumes   i. Logical  imaging   iii. Locked  Screen   1. Shutdown  system   a. Pulling  plug  vs.  shutdown  process   c. Collection  of  digital  media   i. Marking/labeling   d. Documentation   i. CoC   ii. Notes              
  • 4.   3. Imaging  Process   a. Interface  considerations  –  Available  adapters  and  connectors   1. USB   2. SCSI   3. PATA   4. SATA   5. SAS   6. ZIFF     b. Hardware-­‐based  imaging  devices   i. Storage  considerations   1. Pre-­‐prepared  HD  (wiped)   2. Drive  capacity   ii. Tableau   1. Native  .E01  support   iii. Weibetech   iv. Logicube     c. Software  Imaging   i. Storage  considerations   1. Pre-­‐prepared  HD  (wiped)   2. Drive  capacity   ii. Hardware  write-­‐blockers   1. Tableau   2. Weibetech   3. Others   iii. Software  write-­‐blockers   1. EnCase  Fastbloc  SE   2. Registry  hack  
  • 5. iv. No  write  blocker   1. Linux  /  Unix  /  OSX     d. Verification  Process   i. Hash  verification     4. Analysis  Process   a. Pre-­‐Analysis  preparation   i. Root  Case  Folder   1. Location   2. Naming  convention   3. Case  folder  subcomponents   a. Evidence  files   b. Export   c. Temp   d. Index     b. Pre-­‐Analysis  Processing   i. Identification  of  all  archives,  encrypted  volumes,  virtual  machines.   1. Virtual  mounting     ii. Hash  Analysis   1. Good  vs.  bad  hashes  (Known  vs.  Unknown)   2. Generating  hash  values  for  each  file   3. Comparing  hash  sets   4. Filtering  out  identified  files     iii. File  Signature  Analysis     iv. Keyword  indexing  (optional)  
  • 6.   c. Case-­‐Specific  Analysis  Techniques  (common  techniques)   i. RAM  Analysis  (if  applicable)   1. Strings   2. Redline   3. HBGary  Responder     ii. Keyword  Searching   1. Live  searching   2. Index  Searching   3. Unicode   4. GREP     iii. Internet  History  Analysis   1. IE   a. Internet  history   b. Favorites   c. Zone  identifier  files   d. Configuration  settings     2. Firefox   a. Internet  history   b. Favorites   c. Configuration  settings     3. Chrome   a. Internet  history   b. Favorites   c. Configuration  settings    
  • 7. 4. Safari   a. Internet  history   b. Favorites     c. Configuration  setting     5. 3rd  party  tools   a. Netanalysis   b. Web  Historian     iv. Email  Analysis   1. Client  based   a. Outlook   b. Outlook  Express   c. Thunderbird   2. Web  based   a. Gmail   b. Hotmail   c. Yahoo     v. Windows  Event  logs   1. Location   2. Types   3. Format   a. XP  vs.  Vista  /  7/  8   4. 3rd  party  tools   a. Splunk   b. Highlighter     vi. Social  Media  Analysis   1. Twitter  
  • 8. 2. Facebook   3. Google+   vii. Instant  Messaging   1. Gtalk   2. Yahoo   3. Live  /  Communicator  /  Lync     viii. User  Profile  Analysis  (recent  docs,  LNK,  etc)   1. Desktop   2. Downloads   3. Documents   4. Videos   5. Photos     ix. Registry  Analysis   1. Global   a. User  accounts  /  SIDS   b. Installed  applications   c. Passwords   2. User  Specific   a. Protected  Storage  Passwords   b. UserAssist   c. MRU  /  Recently  opened  files   d. Background  Image   3. 3rd  party  tools   a. regripper   b. regdecoder   c. WRR  (mitec)     x. USB  Device  Analysis  
  • 9. 1. XP   a. Registry   i. Mounted  Devices   ii. USBSTOR   b. setupapi.log   2. Vista  /  7  /  8   a. Registry   i. Mounted  Devices   ii. USBSTOR   b. setupapi.dev.log  &  setupapi.app.log     xi. Recycle  Bin  Analysis   1. SID  mapping     xii. System  Restore  Points  /  Volume  Shadow  Service  (VSS)  analysis   1. XP  systems   a. 3rd  party  tools   i. Mandiant  Restore  Point  analyzer   2. Vista  /  7/  8   a. VSS  Analysis   b. 3rd  party  tools   i. ShadowExplorer   ii. FAU  dd  (Garner)     xiii. Peer-­‐to-­‐Peer    (P2P)  Analysis   1. Limewire   2. Gigatribe   3. uTorrent     xiv. Cloud  Based  Applications  
  • 10. 1. Dropbox   2. Microsoft  Live  mesh   3. Google  drive     xv. Basic  Data  Carving   1. pagefile.sys   2. hiberfil.sys   3. Unallocated  Space   4. Identifying  headers  &  footers   a. Base64   b. Internet  History   5. 3rd  party  tools   a. Internet  Evidence  Finder  (IEF)     xvi. Unused  Disk  areas   1. Deleted  partitions     xvii. General  Intelligence  gathering   1. Collection  of  email  addresses   2. Collection  of  phone  numbers     5. Report  Writing   a. Baseline    &  Case  specific  information     i. Request   ii. Findings   1. Drive  Info   a. Physical  size  (label)   b. Physical  size  (BIOS)   c. Logical  size   i. Logical  partitions  
  • 11. d. Unused  disk  space   2. OS  Information   a. Type   b. Version   c. Patch  level  /  hotfixes   d. Install  date   e. Registered  Name  /  Organization   3. Case  specific  findings   iii. Summary   iv. Recommendations     b. Timeline  of  events