Interactive Powerpoint_How to Master effective communication
Cyber Forensics & Challenges
1. DISCLAIMER
The issues addressed in this presentation may be controversial. This is for educational and awareness
purposes only. Do not attempt to violate the law with anything contained here. Neither the author of this
material, nor anyone else affiliated in any way, is liable for your actions.
Some information from the internet and some of personal experience; doesn’t want to hurt anybody,
and please give Feedback
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
FORENSICS CHALLENGES
2. AGENDA
FORENSIC GUIDELINES
CHAIN OF CUSTODY
FORENSICS CHALLENGES
ANTI-FORENSICS
WHAT IS FORENSICS
STEPS OF FORENSICS
TOOLS & QUESTIONS
DIGITAL FORENSICS TRENDS
GOOD THINGS IN FORENSICS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
FORENSICS CHALLENGES
3. SO WHAT IS 4N6 ?
IF THE COMPANY HACKED WHAT'S YOUR FIRST REACTION ?
4. YOU MEAN
• Almost Just Doing Data Extraction & Reporting
• Working On Tools
• Good In Malware Analysis
• Data Recovery From Storage Media
• Running Certain Script Programming
• Rooting / Jailbreak Mobile Phones
• ….
FORENSICS CHALLENGES
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
8. DIGITAL FORENSICS STANDARDS & GUIDELINES
• NIST: National Institute of Standard Technology (CFTT, NSRL, CFReDS)
• NIJ: National Institute of Justice (Several Standards, National Criminal Justice Reference Service)
• IOCE: International Organization on Computer Evidence
• ASCLD/LAB: American Society of Crime Laboratory Directors/Laboratory Accreditation Board
• ASTM: E2678 standard; Guide for Education & Training
• ISO SC 27 CS1: 17025 General requirements for the competence of testing and calibration laboratories
• AES: Audio Engineering Society (Authentication of Analog tape)
• SWGDE & SWGIT: Scientific Working Group on Digital Evidence & Scientific Working Group on Imaging Technology
• ACPO: Association of Chief Police Officers
• DSCI Manual India (Not specific standards but Manual)
FORENSICS CHALLENGES
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
9. FORENSICS CHALLENGES
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
CHAIN OF CUSTODY
Lack of integrity in the process of custody and, absence of appropriate documentation in this regard, will not only be detrimental to the cyber crime investigation, during trial but also, expose the IOs to criminal
liability under Section 72 of the ITAA2008
16. GOOD THINGS OF TECHNOLOGY
FORENSICS CHALLENGES
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
DEEP-WEB / REDDITLEAD (SOCIAL NETWORKING) MOBILE FORENSICS
IOT / Sync
COOKIES INTELLIGENCE
17. GOOD THINGS OF TECHNOLOGY (Cont)
FORENSICS CHALLENGES
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
CTI COMMUNITIES OPEN-SOURCE INTELLIGENCE / GIT
GOOGLE
And The best : Social Engineering
18. If you search for "how do I delete
my web history" , and I find it in
your web history, you have failed
FORENSICS CHALLENGES
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
20. Don’t believe marketing hype
"oh, we spent $$$ in $Vendor product, so we are safe"
Any "tool", regardless of the price, is still a "tool"
FORENSICS CHALLENGES
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE