SlideShare a Scribd company logo
1 of 56
Process of Digital
Forensics
What is digital forensics?
Digital Forensics is defined as the process of preservation, identification,
extraction, and documentation of computer evidence which can be used by the
court of law. It is a science of finding evidence from digital media like a computer,
mobile phone, server, or network. It provides the forensic team with the best
techniques and tools to solve complicated digital-related cases.
3/2/2024 PROCESS OF DIGITAL FORENSICS
History
3/2/2024 PROCESS OF DIGITAL FORENSICS
Objectives of Digital Forensics
3/2/2024 PROCESS OF DIGITAL FORENSICS
Process of Digital Forensics
3/2/2024 PROCESS OF DIGITAL FORENSICS
Types of digital forensics
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
DATA ACQUISITION / COLLECTING
EVIDENCE
Data acquisition is the act of taking possession
of or obtaining control of data and adding it to a
collection of evidence.
3/2/2024 PROCESS OF DIGITAL FORENSICS
DATA ACQUISITION / COLLECTING
EVIDENCE – METHODS
Determining the Best Acquisition Methods
Forensic investigators can acquire digital evidence using the following methods:
1. Creating a bit-stream disk-to-image file
2. Making a bit-stream disk-to-disk copy
3. Creating a sparse data copy of a folder or file
3/2/2024 PROCESS OF DIGITAL FORENSICS
Creating a bit-stream disk-to-image
file
Disk-To-Image File
Creating a bit-stream disk-to-image file is the most common
method forensic investigators use.
When using this method, forensic investigators are able to
make as many copies of the digital evidence as they need.
Investigators are able to image the original disk to another
disk.
An investigator can then make use of other tools such as
EnCase, FTK, Smart, Task, and Ilook to read and analyze the
image file.
3/2/2024 PROCESS OF DIGITAL FORENSICS
Making a bit-stream disk-to-disk copy
Disk-To-Disk Copy
If an investigator is unable to create a bit-stream disk-to-image
file, the alternative is to create a bit-streamdisk-to-disk copy of
the suspect’s disk drive in order to acquire the information from
it.
There are several bitstreaming programs that can copy the
information from one disk to another.
Disk-to-disk imaging tools include SafeBack, SnapCopy, and
Norton Ghost.
Many of these applications run under MS-DOS.
3/2/2024 PROCESS OF DIGITAL FORENSICS
Creating a sparse data copy of a
folder or file
Sparse Data Copy
There are times during a forensic investigation when an investigator finds
incriminating evidence in a particular file or folder.
Therefore, it would not be necessary to create a bit-stream disk-to-image
file or a disk-to-disk copy.
The investigator would just need to create a sparse data copy of the
folder or file.
A sparse data copy is a copy that an investigator makes of only part of a
large set of data in which only the data pertinent to the investigationn is
included.
An investigator may choose to make a sparse data copy to reduce the
overall size of an evidence file.
3/2/2024 PROCESS OF DIGITAL FORENSICS
DATA RECOVERY CONTINGENCIES
Investigators must make contingency plans when data acquisition failure occurs.
To preserve digital evidence, investigators must create a duplicate copy of the evidence files.
In case the original data recovered is corrupted, investigators can make use of the second copy.
Investigators can use forensic tools such as EnCase and SafeBack to obtain multiple copies.
Typically, computer forensic investigators make at least bit-stream image copies of the digital evidence that is
collected.
Investigators have at their disposal more than one bit-streaming tool.
They should use at least two of these tools to make copies of the digital evidence in case one tool doesn’t properly acquire the data.
During the data recovery process, an investigator must remember not to make any changes to the digital
evidence.
Forensic activities must be performed only on the bit-stream copies of digital evidence to ensure that
the original evidence is not altered or corrupted
3/2/2024 PROCESS OF DIGITAL FORENSICS
DATA ACQUISITION SOFTWARE TOOLS
Windows Standard Tools
Linux Standard Tools
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
oThe changes you make while collecting the volatile data, will impact the processes found in RAM.
That is why you need to take notes and document everything you do.
oSome examples of volatile data we collect are the current state of the system networking
information (the ARP table, connections, routing table, and name cache), the logged-on users,
running services, running processes, shared drives, remote activity, and open encrypted
containers.
oWe have to balance the changes we will make versus the evidence that may be potentially lost
forever.
oThe term "forensically sound manner" ---Digital evidence is said to be forensically sound if it was
collected, analyzed, handled and stored in a manner that is acceptable by the law, and there is
reasonable evidence to prove so. Forensic soundness gives reasonable assurance that digital
evidence was not corrupted or destroyed during investigative processes whether on purpose or by
accident
oThe order of collecting volatile data is significant because if you collect volatile data in the wrong
order, you may destroy the evidence you are looking for.
oRAM is considered to be the most volatile of all volatile data, so we would want to collect that first.
3/2/2024 PROCESS OF DIGITAL FORENSICS
Chain of custody
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
•Dates and time zones can cause issues for the digital forensic investigator if they forget to consider them.
•If you only conduct exams in a specific time zone and all of your seized data comes from the same tim
zone, then the issues you face are small.
• But if the data comes from multiple time zones or you travel to various time zones, then they can cau
some confusion if you do not take them into account.
•Setting the forensic machine and tools to use universal time (UTC) as a standard frame of reference help
solve this problem. Also, ensure that you adjust any timeframe where criminal activity may have occurre
in UTC.
• It does not help that operating systems save metadata in a multitude of different time zones.
•You also have to consider that the suspect may have changed the time zone settings on the computer
hide their illicit activity.
•Timeline analysis is critical when conducting a forensic exam.
•Next, we will need to be able to identify files we know are irrelevant, as well as instantly
•identify contraband images.
•We can do that with hash analysis.
3/2/2024 PROCESS OF DIGITAL FORENSICS
Understanding the analysis process –
Hash Analysis
3/2/2024 PROCESS OF DIGITAL FORENSICS
Understanding the analysis process –
Hash Analysis
3/2/2024 PROCESS OF DIGITAL FORENSICS
Understanding the analysis process –
Hash Analysis
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
Windows Forensics
3/2/2024 PROCESS OF DIGITAL FORENSICS
Volatile information
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
Device Manager of Windows is available to get information
about all the devices that were connected to a particular
system.
Recovering Deleted Files and Partitions
3/2/2024 PROCESS OF DIGITAL FORENSICS
Anatomy of a Hard Disk :
A hard disk drive (HDD), hard disk, hard drive or
fixed disk is a data storage device used for
storing and retrieving digital information using
one or more rigid ("hard") rapidly rotating disks
(platters) coated with magnetic material.
The platters are paired with magnetic heads
arranged on a moving actuator arm, which read
and write data to the platter surfaces.
Data is accessed in a random-access manner,
meaning that individual blocks of data can be
stored or retrieved in any order rather than
sequentially. HDDs retain stored data even when
powered off.
The primary characteristics of an HDD are its
capacity and performance. Capacity is specified in
unit prefixes corresponding to powers of 1000: a 1-
terabyte (TB) drive has a capacity of 1,000
gigabytes (GB; where 1 gigabyte = 1 billion bytes).
An HDD records data by magnetizing a thin film of
ferromagnetic material on a disk. Sequential changes
in the direction of magnetization represent binary
data bits.
The data is read from the disk by detecting the
transitions in magnetization. User data is encoded
using an encoding scheme, such as run-length
limited encoding, which determines how the data is
represented by the magnetic transitions.
3/2/2024 PROCESS OF DIGITAL FORENSICS
In computer disk storage, a sector is a subdivision of
a track on a magnetic disk or optical disc. Each
sector stores a fixed amount of user-accessible data,
traditionally 512 bytes for hard disk drives (HDDs)
and 2048 bytes for CD-ROMs and DVD-ROMs.
Newer HDDs use 4096-byte (4 KB) sectors, which
are known as the Advanced Format (AF).
Geometrically, the word sector means a portion of a
disk between a center, two radii and a corresponding
arc (see Figure 17, item B), which is shaped like a
slice of a pie. Thus, the disk sector (Figure 17, item
C) refers to the intersection of a track and
geometrical sector.
3/2/2024 PROCESS OF DIGITAL FORENSICS
In disk drives, each physical sector is made up of
three basic parts, the sector header, the data area and
the error-correcting code (ECC). The sector header
contains information used by the drive and
controller; this information includes sync bytes,
address identification, flaw flag and header parity
bytes.
The header may also include an alternate address to
be used if the data area is undependable. The
address identification is used to ensure that the
mechanics of the drive have positioned the
read/write head over the correct location.
3/2/2024 PROCESS OF DIGITAL FORENSICS
In disk drives, each physical sector is made up of
three basic parts, the sector header, the data area and
the error-correcting code (ECC). The sector header
contains information used by the drive and
controller; this information includes sync bytes,
address identification, flaw flag and header parity
bytes.
The header may also include an alternate address to
be used if the data area is undependable. The
address identification is used to ensure that the
mechanics of the drive have positioned the
read/write head over the correct location. The data
area contains the recorded user data, while the ECC
field contains codes based on the data field, which
are used to check and possibly correct errors that
may have been introduced into the data.
3/2/2024 PROCESS OF DIGITAL FORENSICS
Data Organization in Windows
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS
3/2/2024 PROCESS OF DIGITAL FORENSICS

More Related Content

Similar to Unit-2 Process of Digital Forensics [Autosaved].pptx

A Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows SystemsA Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows SystemsIRJET Journal
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libinlibinp
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 
Evidence and data
Evidence and dataEvidence and data
Evidence and dataAtul Rai
 
Introduction To Forensic Methodologies
Introduction To Forensic MethodologiesIntroduction To Forensic Methodologies
Introduction To Forensic MethodologiesLedjit
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsAlchemist095
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
pres_drone_forensics_program.pptx
pres_drone_forensics_program.pptxpres_drone_forensics_program.pptx
pres_drone_forensics_program.pptxVolgaTC
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionIJERA Editor
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
ICT741 Digital Forensics.docx
ICT741 Digital Forensics.docxICT741 Digital Forensics.docx
ICT741 Digital Forensics.docxwrite4
 
E discovery2
E discovery2E discovery2
E discovery2elijaht
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 

Similar to Unit-2 Process of Digital Forensics [Autosaved].pptx (20)

A Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows SystemsA Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows Systems
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libin
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
Introduction To Forensic Methodologies
Introduction To Forensic MethodologiesIntroduction To Forensic Methodologies
Introduction To Forensic Methodologies
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
pres_drone_forensics_program.pptx
pres_drone_forensics_program.pptxpres_drone_forensics_program.pptx
pres_drone_forensics_program.pptx
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data Acquisition
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
ICT741 Digital Forensics.docx
ICT741 Digital Forensics.docxICT741 Digital Forensics.docx
ICT741 Digital Forensics.docx
 
E discovery2
E discovery2E discovery2
E discovery2
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Unit-2 Process of Digital Forensics [Autosaved].pptx

  • 2. What is digital forensics? Digital Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. It is a science of finding evidence from digital media like a computer, mobile phone, server, or network. It provides the forensic team with the best techniques and tools to solve complicated digital-related cases. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 3. History 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 4. Objectives of Digital Forensics 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 5. Process of Digital Forensics 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 6. Types of digital forensics 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 7. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 8. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 9. DATA ACQUISITION / COLLECTING EVIDENCE Data acquisition is the act of taking possession of or obtaining control of data and adding it to a collection of evidence. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 10. DATA ACQUISITION / COLLECTING EVIDENCE – METHODS Determining the Best Acquisition Methods Forensic investigators can acquire digital evidence using the following methods: 1. Creating a bit-stream disk-to-image file 2. Making a bit-stream disk-to-disk copy 3. Creating a sparse data copy of a folder or file 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 11. Creating a bit-stream disk-to-image file Disk-To-Image File Creating a bit-stream disk-to-image file is the most common method forensic investigators use. When using this method, forensic investigators are able to make as many copies of the digital evidence as they need. Investigators are able to image the original disk to another disk. An investigator can then make use of other tools such as EnCase, FTK, Smart, Task, and Ilook to read and analyze the image file. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 12. Making a bit-stream disk-to-disk copy Disk-To-Disk Copy If an investigator is unable to create a bit-stream disk-to-image file, the alternative is to create a bit-streamdisk-to-disk copy of the suspect’s disk drive in order to acquire the information from it. There are several bitstreaming programs that can copy the information from one disk to another. Disk-to-disk imaging tools include SafeBack, SnapCopy, and Norton Ghost. Many of these applications run under MS-DOS. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 13. Creating a sparse data copy of a folder or file Sparse Data Copy There are times during a forensic investigation when an investigator finds incriminating evidence in a particular file or folder. Therefore, it would not be necessary to create a bit-stream disk-to-image file or a disk-to-disk copy. The investigator would just need to create a sparse data copy of the folder or file. A sparse data copy is a copy that an investigator makes of only part of a large set of data in which only the data pertinent to the investigationn is included. An investigator may choose to make a sparse data copy to reduce the overall size of an evidence file. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 14. DATA RECOVERY CONTINGENCIES Investigators must make contingency plans when data acquisition failure occurs. To preserve digital evidence, investigators must create a duplicate copy of the evidence files. In case the original data recovered is corrupted, investigators can make use of the second copy. Investigators can use forensic tools such as EnCase and SafeBack to obtain multiple copies. Typically, computer forensic investigators make at least bit-stream image copies of the digital evidence that is collected. Investigators have at their disposal more than one bit-streaming tool. They should use at least two of these tools to make copies of the digital evidence in case one tool doesn’t properly acquire the data. During the data recovery process, an investigator must remember not to make any changes to the digital evidence. Forensic activities must be performed only on the bit-stream copies of digital evidence to ensure that the original evidence is not altered or corrupted 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 15. DATA ACQUISITION SOFTWARE TOOLS Windows Standard Tools Linux Standard Tools 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 16. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 17. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 18. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 19. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 20. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 21. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 22. oThe changes you make while collecting the volatile data, will impact the processes found in RAM. That is why you need to take notes and document everything you do. oSome examples of volatile data we collect are the current state of the system networking information (the ARP table, connections, routing table, and name cache), the logged-on users, running services, running processes, shared drives, remote activity, and open encrypted containers. oWe have to balance the changes we will make versus the evidence that may be potentially lost forever. oThe term "forensically sound manner" ---Digital evidence is said to be forensically sound if it was collected, analyzed, handled and stored in a manner that is acceptable by the law, and there is reasonable evidence to prove so. Forensic soundness gives reasonable assurance that digital evidence was not corrupted or destroyed during investigative processes whether on purpose or by accident oThe order of collecting volatile data is significant because if you collect volatile data in the wrong order, you may destroy the evidence you are looking for. oRAM is considered to be the most volatile of all volatile data, so we would want to collect that first. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 23. Chain of custody 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 24. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 25. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 26. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 27. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 28. •Dates and time zones can cause issues for the digital forensic investigator if they forget to consider them. •If you only conduct exams in a specific time zone and all of your seized data comes from the same tim zone, then the issues you face are small. • But if the data comes from multiple time zones or you travel to various time zones, then they can cau some confusion if you do not take them into account. •Setting the forensic machine and tools to use universal time (UTC) as a standard frame of reference help solve this problem. Also, ensure that you adjust any timeframe where criminal activity may have occurre in UTC. • It does not help that operating systems save metadata in a multitude of different time zones. •You also have to consider that the suspect may have changed the time zone settings on the computer hide their illicit activity. •Timeline analysis is critical when conducting a forensic exam. •Next, we will need to be able to identify files we know are irrelevant, as well as instantly •identify contraband images. •We can do that with hash analysis. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 29. Understanding the analysis process – Hash Analysis 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 30. Understanding the analysis process – Hash Analysis 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 31. Understanding the analysis process – Hash Analysis 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 32. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 33. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 34. Windows Forensics 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 36. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 37. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 38. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 39. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 40. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 41. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 42. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 43. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 44. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 45. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 46. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 47. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 48. 3/2/2024 PROCESS OF DIGITAL FORENSICS Device Manager of Windows is available to get information about all the devices that were connected to a particular system.
  • 49. Recovering Deleted Files and Partitions 3/2/2024 PROCESS OF DIGITAL FORENSICS Anatomy of a Hard Disk : A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid ("hard") rapidly rotating disks (platters) coated with magnetic material. The platters are paired with magnetic heads arranged on a moving actuator arm, which read and write data to the platter surfaces. Data is accessed in a random-access manner, meaning that individual blocks of data can be stored or retrieved in any order rather than sequentially. HDDs retain stored data even when powered off.
  • 50. The primary characteristics of an HDD are its capacity and performance. Capacity is specified in unit prefixes corresponding to powers of 1000: a 1- terabyte (TB) drive has a capacity of 1,000 gigabytes (GB; where 1 gigabyte = 1 billion bytes). An HDD records data by magnetizing a thin film of ferromagnetic material on a disk. Sequential changes in the direction of magnetization represent binary data bits. The data is read from the disk by detecting the transitions in magnetization. User data is encoded using an encoding scheme, such as run-length limited encoding, which determines how the data is represented by the magnetic transitions. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 51. In computer disk storage, a sector is a subdivision of a track on a magnetic disk or optical disc. Each sector stores a fixed amount of user-accessible data, traditionally 512 bytes for hard disk drives (HDDs) and 2048 bytes for CD-ROMs and DVD-ROMs. Newer HDDs use 4096-byte (4 KB) sectors, which are known as the Advanced Format (AF). Geometrically, the word sector means a portion of a disk between a center, two radii and a corresponding arc (see Figure 17, item B), which is shaped like a slice of a pie. Thus, the disk sector (Figure 17, item C) refers to the intersection of a track and geometrical sector. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 52. In disk drives, each physical sector is made up of three basic parts, the sector header, the data area and the error-correcting code (ECC). The sector header contains information used by the drive and controller; this information includes sync bytes, address identification, flaw flag and header parity bytes. The header may also include an alternate address to be used if the data area is undependable. The address identification is used to ensure that the mechanics of the drive have positioned the read/write head over the correct location. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 53. In disk drives, each physical sector is made up of three basic parts, the sector header, the data area and the error-correcting code (ECC). The sector header contains information used by the drive and controller; this information includes sync bytes, address identification, flaw flag and header parity bytes. The header may also include an alternate address to be used if the data area is undependable. The address identification is used to ensure that the mechanics of the drive have positioned the read/write head over the correct location. The data area contains the recorded user data, while the ECC field contains codes based on the data field, which are used to check and possibly correct errors that may have been introduced into the data. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 54. Data Organization in Windows 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 55. 3/2/2024 PROCESS OF DIGITAL FORENSICS
  • 56. 3/2/2024 PROCESS OF DIGITAL FORENSICS