Sekilas tentang digital forensik

Agung Subroto
Agung SubrotoDirector at swevel media
Sekilas tentang Digital Forensik 
Fahmi Auliya Tsani 
amixcustomlinux@gmail.com
Pendahuluan 
• What? 
• Rangkaian metodologi > teknik & prosedur > 
kumpul bukti > entitas/piranti digital > 
alat bukti sah 
• Jenis: mobile forensic, internet forensic, 
video forensic, audio forensic, image 
forensic, dll
Digital Evidence Handling 
• Identification 
• Quarantine 
• Analyze 
• Presentation
Identification 
• Where are the digital evidences saved? 
• What is PC, notebook, harddisk, mobile 
phone, media/game player, etc?
Sekilas tentang digital forensik
Quarantine 
• Evidence contamination 
• How? 
• Bitstream image? dd, enCase
Analyze 
• Who? 
• What'd he do? 
• When? 
• Anti-Forensic?? How to extract? 
• Tools? Autopsy, FTK, EnCase, etc.
Presentation 
• Report 
• Investigator > netral > knews
Training & Certification 
• Ec-Council: CEH (Certified Ethical 
Hacker), CHFI (Computer Hacking Forensic 
Investigator), ECSA, etc 
(https://www.eccouncil.org/Certification). 
• EnCase: EnCE, EnCEP (very rare, 
https://www.guidancesoftware.com/training/ 
Pages/certification-programs.aspx) 
• Cellebrite: Cellebrite Mobile Forensic 
Fundamentals (CMFF), Cellebrite Certified 
Mobile Examiner (CCME), etc 
(https://www.cellebritelearningcenter.com/ 
). 
• Etc.
Any Question?
1 of 10

Recommended

Pengenalan Forensik Digital by
Pengenalan Forensik DigitalPengenalan Forensik Digital
Pengenalan Forensik Digitalyprayudi
2.2K views37 slides
Anti forensic by
Anti forensicAnti forensic
Anti forensicMilap Oza
8.2K views14 slides
Digital Anti-Forensics: Emerging trends in data transformation techniques by
Digital Anti-Forensics: Emerging trends in data transformation techniquesDigital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniquesSeccuris Inc.
1.6K views11 slides
Private Browsing: A Window of Forensic Opportunity by
Private Browsing: A Window of Forensic OpportunityPrivate Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic OpportunityAung Thu Rha Hein
2.3K views23 slides
Digital forensic science and its scope manesh t by
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
340 views42 slides
Digital Evidence in Computer Forensic Investigations by
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
19.2K views44 slides

More Related Content

What's hot

Chapter 3 cmp forensic by
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensicshahhardik27
3K views38 slides
Watching the Detectives: Using digital forensics techniques to investigate th... by
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...GarethKnight
3.4K views28 slides
Cyber Crimes & Cyber Forensics by
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensicsjahanzebmunawar
1.6K views62 slides
Digital investigation by
Digital investigationDigital investigation
Digital investigationunnilala11
4.2K views15 slides
Computer Forensic by
Computer ForensicComputer Forensic
Computer ForensicTawhidur Rahman
4.2K views76 slides
Draft current state of digital forensic and data science by
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Damir Delija
767 views16 slides

What's hot(20)

Watching the Detectives: Using digital forensics techniques to investigate th... by GarethKnight
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...
GarethKnight3.4K views
Cyber Crimes & Cyber Forensics by jahanzebmunawar
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
jahanzebmunawar1.6K views
Digital investigation by unnilala11
Digital investigationDigital investigation
Digital investigation
unnilala114.2K views
Draft current state of digital forensic and data science by Damir Delija
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
Damir Delija767 views
Presentation cyber forensics & ethical hacking by Ambuj Kumar
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
Ambuj Kumar260 views
Digital Evidence by Raghu Khimani by Dr Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
Dr Raghu Khimani12.1K views
Digital Forensics by William C. Barker (NIST) by AltheimPrivacy
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
AltheimPrivacy16K views
Collecting and preserving digital evidence by Online
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online 13.5K views
Computer Forensics by alrawes
Computer ForensicsComputer Forensics
Computer Forensics
alrawes989 views
Anti forensics-techniques-for-browsing-artifacts by gaurang17
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifacts
gaurang174.9K views
Lecture 4,5, 6 comp forensics 19 9-2018 basic security by Alchemist095
Lecture 4,5, 6 comp forensics 19 9-2018 basic securityLecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Alchemist095524 views

Viewers also liked

Digital forensic upload by
Digital forensic uploadDigital forensic upload
Digital forensic uploadSetia Juli Irzal Ismail
1.7K views17 slides
Toksikologi forensik smallpox ppt. by
Toksikologi forensik smallpox ppt. Toksikologi forensik smallpox ppt.
Toksikologi forensik smallpox ppt. anna maria manullang
205 views13 slides
Android forensik 2 by
Android forensik 2Android forensik 2
Android forensik 2Caisar Oentoro
623 views8 slides
Android forensik 1 by
Android forensik 1Android forensik 1
Android forensik 1Caisar Oentoro
778 views7 slides
Smartphone forensic by
Smartphone forensicSmartphone forensic
Smartphone forensic00heights
1.4K views22 slides
Android forensik 4 by
Android forensik 4Android forensik 4
Android forensik 4Caisar Oentoro
656 views11 slides

Viewers also liked(17)

Smartphone forensic by 00heights
Smartphone forensicSmartphone forensic
Smartphone forensic
00heights1.4K views
Web Wishes, Intents, Extensions, .. Friedger Müffke, droidcon London 2014 by Friedger Müffke
Web Wishes, Intents, Extensions, ..  Friedger Müffke, droidcon London 2014Web Wishes, Intents, Extensions, ..  Friedger Müffke, droidcon London 2014
Web Wishes, Intents, Extensions, .. Friedger Müffke, droidcon London 2014
Friedger Müffke1.1K views
12 jenis kerusakan laptop dan cara memperbaikinya by Yantho Lase
12 jenis kerusakan laptop dan cara memperbaikinya12 jenis kerusakan laptop dan cara memperbaikinya
12 jenis kerusakan laptop dan cara memperbaikinya
Yantho Lase99.1K views
Bioteknologi di bidang forensik by Jessy Damayanti
Bioteknologi di bidang forensikBioteknologi di bidang forensik
Bioteknologi di bidang forensik
Jessy Damayanti32.5K views
Розслідування Bellingcat щодо збитого на Донбасі МН17 by tsnua
Розслідування Bellingcat щодо збитого на Донбасі МН17Розслідування Bellingcat щодо збитого на Донбасі МН17
Розслідування Bellingcat щодо збитого на Донбасі МН17
tsnua36.6K views
tata letak / layout LABORATORIUM by Septia Nur'aini
tata letak / layout LABORATORIUMtata letak / layout LABORATORIUM
tata letak / layout LABORATORIUM
Septia Nur'aini74.2K views
Digital Forensic: Brief Intro & Research Challenge by Aung Thu Rha Hein
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
10 Langkah Awal Menjadi Seorang Ahli Komputer by Zayin
10 Langkah Awal Menjadi Seorang Ahli Komputer10 Langkah Awal Menjadi Seorang Ahli Komputer
10 Langkah Awal Menjadi Seorang Ahli Komputer
Zayin 11.1K views

Similar to Sekilas tentang digital forensik

Diving into Digital Forensics by
Diving into Digital Forensics Diving into Digital Forensics
Diving into Digital Forensics Pranjal Vyas
114 views19 slides
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo by
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloJohn Intindolo
255 views13 slides
Lect 3 Computer Forensics by
Lect 3 Computer ForensicsLect 3 Computer Forensics
Lect 3 Computer ForensicsKabul Education University
456 views19 slides
5.2. Digital forensics by
5.2. Digital forensics5.2. Digital forensics
5.2. Digital forensicsdefconmoscow
619 views30 slides
Cyber Incident Response & Digital Forensics Lecture by
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureOllie Whitehouse
2.3K views79 slides
Tips memulai karir di cybersecurity by
Tips memulai karir di cybersecurityTips memulai karir di cybersecurity
Tips memulai karir di cybersecurityPT Datacomm Diangraha
840 views14 slides

Similar to Sekilas tentang digital forensik(20)

Diving into Digital Forensics by Pranjal Vyas
Diving into Digital Forensics Diving into Digital Forensics
Diving into Digital Forensics
Pranjal Vyas114 views
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo by John Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
John Intindolo255 views
5.2. Digital forensics by defconmoscow
5.2. Digital forensics5.2. Digital forensics
5.2. Digital forensics
defconmoscow619 views
Cyber Incident Response & Digital Forensics Lecture by Ollie Whitehouse
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
Ollie Whitehouse2.3K views
Digital Forensics Triage and Cyber Security by Amrit Chhetri
Digital Forensics Triage and Cyber SecurityDigital Forensics Triage and Cyber Security
Digital Forensics Triage and Cyber Security
Amrit Chhetri116 views
Computer forensic ppt by Priya Manik
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik10.9K views
computerforensicppt-160201192341.pdf by Gnanavi2
computerforensicppt-160201192341.pdfcomputerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdf
Gnanavi26 views
Forensics intro by test tt
Forensics introForensics intro
Forensics intro
test tt203 views
Remote forensics fsec2016 delija draft by Damir Delija
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draft
Damir Delija822 views
Computer Forensics (1).pptx by Gautam708801
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
Gautam70880114 views
Computer crimes and forensics by Avinash Mavuru
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
Avinash Mavuru646 views
Vest Forensics presentation owasp benelux days 2012 leuven by Marc Hullegie
Vest Forensics presentation owasp benelux days 2012 leuvenVest Forensics presentation owasp benelux days 2012 leuven
Vest Forensics presentation owasp benelux days 2012 leuven
Marc Hullegie443 views
An introduction to cyber forensics and open source tools in cyber forensics by Zyxware Technologies
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics

More from Agung Subroto

Rahasia orang sukses by
Rahasia orang suksesRahasia orang sukses
Rahasia orang suksesAgung Subroto
1.4K views21 slides
trust building in organization - Akbar - Swevel by
 trust building in organization - Akbar  - Swevel trust building in organization - Akbar  - Swevel
trust building in organization - Akbar - SwevelAgung Subroto
231 views7 slides
Semangat kerja by
Semangat kerjaSemangat kerja
Semangat kerjaAgung Subroto
1.6K views10 slides
semangat kerja by
semangat kerjasemangat kerja
semangat kerjaAgung Subroto
5.8K views13 slides
Teamwork2 by
Teamwork2Teamwork2
Teamwork2Agung Subroto
498 views29 slides
fotografi by
fotografifotografi
fotografiAgung Subroto
357 views7 slides

More from Agung Subroto(15)

Recently uploaded

20231123_Camunda Meetup Vienna.pdf by
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
50 views73 slides
DRBD Deep Dive - Philipp Reisner - LINBIT by
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
140 views21 slides
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... by
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...ShapeBlue
101 views17 slides
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITShapeBlue
166 views8 slides
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...ShapeBlue
138 views18 slides
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue by
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueShapeBlue
176 views20 slides

Recently uploaded(20)

DRBD Deep Dive - Philipp Reisner - LINBIT by ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... by ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue101 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue166 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue138 views
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue by ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue176 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue144 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue197 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue123 views
Future of AR - Facebook Presentation by Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty62 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue79 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue98 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson156 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash153 views
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T by ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue112 views
State of the Union - Rohit Yadav - Apache CloudStack by ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue253 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue117 views

Sekilas tentang digital forensik

  • 1. Sekilas tentang Digital Forensik Fahmi Auliya Tsani amixcustomlinux@gmail.com
  • 2. Pendahuluan • What? • Rangkaian metodologi > teknik & prosedur > kumpul bukti > entitas/piranti digital > alat bukti sah • Jenis: mobile forensic, internet forensic, video forensic, audio forensic, image forensic, dll
  • 3. Digital Evidence Handling • Identification • Quarantine • Analyze • Presentation
  • 4. Identification • Where are the digital evidences saved? • What is PC, notebook, harddisk, mobile phone, media/game player, etc?
  • 6. Quarantine • Evidence contamination • How? • Bitstream image? dd, enCase
  • 7. Analyze • Who? • What'd he do? • When? • Anti-Forensic?? How to extract? • Tools? Autopsy, FTK, EnCase, etc.
  • 8. Presentation • Report • Investigator > netral > knews
  • 9. Training & Certification • Ec-Council: CEH (Certified Ethical Hacker), CHFI (Computer Hacking Forensic Investigator), ECSA, etc (https://www.eccouncil.org/Certification). • EnCase: EnCE, EnCEP (very rare, https://www.guidancesoftware.com/training/ Pages/certification-programs.aspx) • Cellebrite: Cellebrite Mobile Forensic Fundamentals (CMFF), Cellebrite Certified Mobile Examiner (CCME), etc (https://www.cellebritelearningcenter.com/ ). • Etc.