Cyber Security and Digital Forensic
Cyber Security and Digital Forensic
Cyber Security and Digital Forensic
Case Study:
Stuxnet: Malware by Isreal and US, 500KB size , Ethics and the Law
Locards exchange principle holds that the perpetrator of a crime will bring
something into the crime scene and leave with something from it, and that both
can be used as forensic evidence.
1. Identification
2. Preservation [make imaging physical or logical: then chair of custody
COC::]
3. Analysis [60% time is consumed here]
4. Documenting Report
Malware:
Mobile device
Email
Some tooks:
Ceddelk :
UFET touch:
Open source
DFF, Autopsy, Caine interface, AccessData (input is image and parse to structure
data)
++++++++++++++++++++PRACTICAL HANDON+++++++++++++++++++++++++++
AccessData FTK Imager (keep the information that from which device data is
retrieved)[software forensic imagers]
SAM,SYSTEM,SECURITY,SOFTWARE, NTUSER.DAT
Artifacts =>
D3pakblogspot.wordpress.com
Lighshot