SlideShare a Scribd company logo
Technology Open Source
                      Laboratory




Portable Computer
          Forensic




        Novizul Evendi
         C.E.O T'Lab
Theory
Computer forensic
    ●
        Computer forensics involves the preservation,
        identification, extraction, documentation, and
        interpretation of computer media for
        evidentiary and/or root cause analysis.

    ●
        Multiple methods of
         –   Discovering data on computer system
         –   Recovering deleted, encrypted, or damaged file
             information
         –   Monitoring live activity
         –   Detecting violations of corporate policy

    ●
        Information collected assists in arrests,
        prosecution, termination of employment, and
        preventing future illegal activity
Example Computer forensic

  ●
      Recovering thousands of deleted emails
  ●
      Performing investigation post employment
      termination
  ●
      Recovering evidence post formatting hard
      drive
  ●
      Performing investigation after multiple
      users had taken over the system
Who Uses Computer forensic
  ●
      Criminal Prosecutors
      ●
          Rely on evidence obtained from a computer to
          prosecute suspects and use as evidence
  ●
      Civil Litigations
      ●
          Personal and business data discovered on a
          computer can be used in fraud, divorce,
          harassment, or discrimination cases
  ●
      Insurance Companies
      ●
          Evidence discovered on computer can be
          used to mollify costs (fraud, worker’s
          compensation, arson, etc)
  ●
      Private Corporations
      ●
          Obtained evidence from employee computers
          can be used as evidence in harassment, fraud,
          and embezzlement cases
Who Uses Computer forensic
  ●
      Law Enforcement Officials
      ●
          Rely on computer forensics to backup search
          warrants and post-seizure handling
  ●
      Individual/Private Citizens
      ●
          Obtain the services of professional computer
          forensic specialists to support claims of
          harassment, abuse, or wrongful termination
          from employment
Step Of Computer Forensic
 ●
     Acquisition : Physically or remotely obtaining possession of
     the computer, all network mappings from the system, and
     external physical storage devices
 ●
     Identification : This step involves identifying what data could
     be recovered and electronically retrieving it by running various
     Computer Forensic tools and software
     suites
 ●
     Evaluation : Evaluating the information/data recovered to
     determine if and how it could be used again the
     suspect for employment termination or prosecution
     in court
 ●
     Presentation : This step involves the presentation of
     evidence discovered in a manner which is understood by
     lawyers, non-technically staff/management, and suitable as
     evidence as determined by United States and internal laws
Processing Guidelines

 ●
     Shut down the computer
 ●
     Document the Hardware Configuration
     of The System
 ●
     Transport the Computer System to A Secure Location
 ●
     Make Bit Stream Backups of Hard Disks and Floppy Disks
 ●
     Mathematically Authenticate Data on All Storage Devices
 ●
     Document the System Date and Time
 ●
     Make a List of Key Search Words
 ●
     Evaluate the Windows Swap File
Processing Guidelines (Cont)

 ●
     Evaluate File Slack
 ●
     Evaluate Unallocated Space (Erased Files)
 ●
     Search Files, File Slack and Unallocated Space for Key
     Words
 ●
     Document File Names, Dates and Times
 ●
     Identify File, Program and Storage Anomalies
 ●
     Evaluate Program Functionality
 ●
     Document Your Findings
 ●
     Retain Copies of Software Used
Anti Computer Forensic

 ●
     Software that limits and/or corrupts evidence
     that could be collected by an investigator
 ●
     Performs data hiding and distortion
 ●
     Exploits limitations of known and used forensic
     tools
 ●
     Works both on Windows and LINUX based
     systems
 ●
     In place prior to or post system
     acquisition
War Tools
Portable Computer Forensic
Portable Computer Forensic
Portable Computer Forensic
Portable Computer Forensic
Portable Computer Forensic
Portable Computer Forensic
Portable Computer Forensic
Technology Open Source
                                                      Laboratory

Web : www.tlab.co.id
Mail : karuwak@tlab.co.id


                            Penutup



         /TLabUpdate            @TLabUpdate




                                              Demo

More Related Content

What's hot

Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
Β 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
Β 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
primeteacher32
Β 
Digital investigation
Digital investigationDigital investigation
Digital investigation
unnilala11
Β 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsNicholas Davis
Β 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Mithileysh Sathiyanarayanan
Β 
Anti forensic
Anti forensicAnti forensic
Anti forensicMilap Oza
Β 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics pptNikhil Mashruwala
Β 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
Β 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
Β 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Neilg42
Β 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
Β 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
Avinash Mavuru
Β 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
One97 Communications Limited
Β 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
Β 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
Β 
Digital forensics
Digital forensics Digital forensics
Digital forensics
vishnuv43
Β 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
Β 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Ambuj Kumar
Β 

What's hot (20)

Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Β 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Β 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
Β 
Digital investigation
Digital investigationDigital investigation
Digital investigation
Β 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Β 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Β 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Β 
Anti forensic
Anti forensicAnti forensic
Anti forensic
Β 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Β 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
Β 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
Β 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Β 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Β 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
Β 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Β 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Β 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Β 
Digital forensics
Digital forensics Digital forensics
Digital forensics
Β 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Β 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Β 

Viewers also liked

Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
Xavier Prathap
Β 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Sarwar Hossain Rafsan
Β 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
OWASP Khartoum
Β 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
Β 
Wireless Hacking Fast Track
Wireless Hacking Fast TrackWireless Hacking Fast Track
Wireless Hacking Fast Track
Novizul Evendi
Β 
Information System Security
Information System SecurityInformation System Security
Information System Security
Novizul Evendi
Β 
Small servers
Small serversSmall servers
Small servers
Albin Sebastian
Β 
Dialog Technoprener
Dialog Technoprener Dialog Technoprener
Dialog Technoprener
Novizul Evendi
Β 
T'Lab
T'LabT'Lab
Outline course Backtrak Pentest
Outline course Backtrak PentestOutline course Backtrak Pentest
Outline course Backtrak Pentest
Novizul Evendi
Β 
E-commerce
E-commerceE-commerce
E-commerce
Novizul Evendi
Β 
Hacking Is Not Always a Crime
Hacking Is Not Always a CrimeHacking Is Not Always a Crime
Hacking Is Not Always a Crime
Novizul Evendi
Β 
Hacking Backtrak Mobile
Hacking Backtrak MobileHacking Backtrak Mobile
Hacking Backtrak Mobile
Novizul Evendi
Β 
Modul praktikum hardware dan software
Modul praktikum hardware dan softwareModul praktikum hardware dan software
Modul praktikum hardware dan software
joko2016
Β 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
alrawes
Β 
Modul teknisi komputer kursus
Modul teknisi komputer kursusModul teknisi komputer kursus
Modul teknisi komputer kursus
alpi sahrin
Β 
Virtualisasi Hacking
Virtualisasi HackingVirtualisasi Hacking
Virtualisasi Hacking
Novizul Evendi
Β 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
Novizul Evendi
Β 
Lecture1
Lecture1Lecture1
Lecture1rjaeh
Β 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security Session
OWASP Khartoum
Β 

Viewers also liked (20)

Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
Β 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Β 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
Β 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Β 
Wireless Hacking Fast Track
Wireless Hacking Fast TrackWireless Hacking Fast Track
Wireless Hacking Fast Track
Β 
Information System Security
Information System SecurityInformation System Security
Information System Security
Β 
Small servers
Small serversSmall servers
Small servers
Β 
Dialog Technoprener
Dialog Technoprener Dialog Technoprener
Dialog Technoprener
Β 
T'Lab
T'LabT'Lab
T'Lab
Β 
Outline course Backtrak Pentest
Outline course Backtrak PentestOutline course Backtrak Pentest
Outline course Backtrak Pentest
Β 
E-commerce
E-commerceE-commerce
E-commerce
Β 
Hacking Is Not Always a Crime
Hacking Is Not Always a CrimeHacking Is Not Always a Crime
Hacking Is Not Always a Crime
Β 
Hacking Backtrak Mobile
Hacking Backtrak MobileHacking Backtrak Mobile
Hacking Backtrak Mobile
Β 
Modul praktikum hardware dan software
Modul praktikum hardware dan softwareModul praktikum hardware dan software
Modul praktikum hardware dan software
Β 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Β 
Modul teknisi komputer kursus
Modul teknisi komputer kursusModul teknisi komputer kursus
Modul teknisi komputer kursus
Β 
Virtualisasi Hacking
Virtualisasi HackingVirtualisasi Hacking
Virtualisasi Hacking
Β 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
Β 
Lecture1
Lecture1Lecture1
Lecture1
Β 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security Session
Β 

Similar to Computer Forensic

cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
Muzzammil Wani
Β 
CF.ppt
CF.pptCF.ppt
CF.ppt
KhusThakkar
Β 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
Β 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsHiren Selani
Β 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
Β 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
Β 
Lecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file systemLecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file system
Alchemist095
Β 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
Lalit Garg
Β 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Shashi Mishra
Β 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
Β 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
Gautam708801
Β 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
Online
Β 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
Gnanavi2
Β 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
gagan deep
Β 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
Β 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
Sweta Kumari Barnwal
Β 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Daksh Verma
Β 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
Winston & Strawn LLP
Β 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsNicholas Davis
Β 
Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3sabtolinux
Β 

Similar to Computer Forensic (20)

cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
Β 
CF.ppt
CF.pptCF.ppt
CF.ppt
Β 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
Β 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Β 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Β 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
Β 
Lecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file systemLecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file system
Β 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
Β 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Β 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Β 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
Β 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
Β 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
Β 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
Β 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Β 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
Β 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Β 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
Β 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Β 
Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3
Β 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
Β 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
Β 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
Β 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
Β 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
Β 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
Β 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
Β 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
Β 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
Β 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
Β 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
Β 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
Β 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
Β 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
Β 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
Β 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
Β 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
Β 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
Β 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
Β 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
Β 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
Β 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Β 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Β 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
Β 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Β 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Β 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
Β 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Β 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Β 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Β 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Β 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Β 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Β 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Β 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
Β 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
Β 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
Β 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Β 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Β 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Β 

Computer Forensic

  • 1. Technology Open Source Laboratory Portable Computer Forensic Novizul Evendi C.E.O T'Lab
  • 3. Computer forensic ● Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis. ● Multiple methods of – Discovering data on computer system – Recovering deleted, encrypted, or damaged file information – Monitoring live activity – Detecting violations of corporate policy ● Information collected assists in arrests, prosecution, termination of employment, and preventing future illegal activity
  • 4. Example Computer forensic ● Recovering thousands of deleted emails ● Performing investigation post employment termination ● Recovering evidence post formatting hard drive ● Performing investigation after multiple users had taken over the system
  • 5. Who Uses Computer forensic ● Criminal Prosecutors ● Rely on evidence obtained from a computer to prosecute suspects and use as evidence ● Civil Litigations ● Personal and business data discovered on a computer can be used in fraud, divorce, harassment, or discrimination cases ● Insurance Companies ● Evidence discovered on computer can be used to mollify costs (fraud, worker’s compensation, arson, etc) ● Private Corporations ● Obtained evidence from employee computers can be used as evidence in harassment, fraud, and embezzlement cases
  • 6. Who Uses Computer forensic ● Law Enforcement Officials ● Rely on computer forensics to backup search warrants and post-seizure handling ● Individual/Private Citizens ● Obtain the services of professional computer forensic specialists to support claims of harassment, abuse, or wrongful termination from employment
  • 7. Step Of Computer Forensic ● Acquisition : Physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices ● Identification : This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites ● Evaluation : Evaluating the information/data recovered to determine if and how it could be used again the suspect for employment termination or prosecution in court ● Presentation : This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws
  • 8. Processing Guidelines ● Shut down the computer ● Document the Hardware Configuration of The System ● Transport the Computer System to A Secure Location ● Make Bit Stream Backups of Hard Disks and Floppy Disks ● Mathematically Authenticate Data on All Storage Devices ● Document the System Date and Time ● Make a List of Key Search Words ● Evaluate the Windows Swap File
  • 9. Processing Guidelines (Cont) ● Evaluate File Slack ● Evaluate Unallocated Space (Erased Files) ● Search Files, File Slack and Unallocated Space for Key Words ● Document File Names, Dates and Times ● Identify File, Program and Storage Anomalies ● Evaluate Program Functionality ● Document Your Findings ● Retain Copies of Software Used
  • 10. Anti Computer Forensic ● Software that limits and/or corrupts evidence that could be collected by an investigator ● Performs data hiding and distortion ● Exploits limitations of known and used forensic tools ● Works both on Windows and LINUX based systems ● In place prior to or post system acquisition
  • 19. Technology Open Source Laboratory Web : www.tlab.co.id Mail : karuwak@tlab.co.id Penutup /TLabUpdate @TLabUpdate Demo