Project File (Cyber Forensics)
Project File (Cyber Forensics)
Project File (Cyber Forensics)
Submitted By
Anish Raj, Alaukik Deep, Vivek Kumar
12110401, 12111271, 12107030
Submitted To
Dr Yasir Afaq
Asst. Professor, SCA
Content
➢ Digital Evidence: In today's world, most crimes leave digital traces. Cyber
forensics helps to extract and analyze digital evidence from devices such as
computers, smartphones, and other electronic devices. This digital evidence
can be used to establish the identity of suspects, their location at the time of
the crime, and their motives.
➢ Identify the source of the attack: Cyber forensics can help to identify the
source of an attack or a breach. This information can be used to prevent
similar attacks in the future and to take appropriate action against the
perpetrators.
How it works?
Cyber forensics works in cyber investigation through a well-defined process that
involves the following steps:
2. Preservation: Once the scope has been identified, the next step is to
preserve the digital evidence. This involves taking steps to prevent any
further damage to the system or device, such as shutting down the device,
disconnecting it from the network, or isolating it from other devices.
3. Collection: The next step is to collect the digital evidence. This involves
using specialized tools and techniques to extract data from the device or
system. The data is collected in a forensically sound manner, to ensure that
it is admissible in court.
4. Analysis: After the data has been collected, the next step is to analyze it.
This involves using specialized software to search for patterns and
anomalies in the data. The goal of the analysis is to identify any relevant
information that can help to establish the facts of the case.
1. Kali Linux
Without the requirement for installation on the computer, Kali Linux can be run
immediately from a USB drive or DVD, enabling users to test the software without
modifying their current operating system. Additionally, it contains built-in security
features including automated upgrades, full disc encryption, and secure defaults
for network services.
In general, Kali Linux is a well-liked and frequently used tool for security experts
and researchers, but it should only be used by qualified experts who have a solid
grasp of computer security principles and procedures.
2. FTK Imager
FTK Imager is a powerful and widely used tool for digital forensics investigations.
It allows the examiner to create forensic images of hard drives, logical drives, and
other storage media. This report will focus on the analysis of data
using FTK Imager, and the output that can be obtained from this
tool.
3. Wireshark
4 Autopsy
Autopsy is a widely used digital forensics platform that is commonly used in cyber
forensics investigations. It is an open-source tool that provides a user-friendly
interface for analyzing and investigating digital evidence. Autopsy offers a wide
range of features and capabilities that allow investigators to analyze and
investigate digital evidence in detail.
Process: The basic process of using dcfldd or dc3dd involves several process
from updating the kali linux to specifying the input and output files of devices and
then running the command. The tools will read data from the input file or device
and write it to the output file or device. During this process, the tools can also
perform hashing, verify the data, and display progress information.
Output
The output of dcfldd and dc3dd is the copied or imaged data that is written to the
output file or device. The output can also include log files that contain information
about the copying process, such as the number of bytes copied and any errors
encountered.
Both tools provide statistics about the copying process, such as the number of
bytes copied, the transfer rate, and the estimated time remaining. The tools can
also display progress bars that show the percentage of the copy process that is
completed.
Visualization:
Both tools can display progress bars that show the percentage of the copy process
that is completed. In addition, dc3dd can display a graphical representation of the
data being copied, which can be helpful for detecting patterns or anomalies in the
data.
Fig. 8: For avoiding the integrity of data
Interpretation of Result
The result of using dcfldd or dc3dd is a copy or image of the input data. The output
can be compared to the input to ensure that the copy was successful and that no
data was lost or corrupted during the process. The hashing feature of both tools
can be used to verify the integrity of the copied data by comparing the hash of the
input to the hash of the output.
The log files produced by the tools can also be used to identify any errors or issues
that occurred during the copying process. Overall, the result of using dcfldd or
dc3dd is a reliable copy or image of the input data that can be used for forensic
analysis, data recovery, or other purposes.
Now that we have successfully created bitstream copies of the evidence, let's look
at verifying the integrity of the forensic acquisitions using hash verification
Fig. 11- Verifying integrity of the forensic acquisitions using hash verification
Then, We will be analyzing acquired forensic images using various tools. However,
the image can also be copied or directly cloned to another device if the investigator
wishes. Example, we could clone the forensic image acquired previously onto a
new drive recognized like sda/sdb.
FTK Imager
FTK Imager is a powerful and widely used tool for digital forensics investigations.
It allows the examiner to create forensic images of hard drives, logical drives, and
other storage media. This report will focus on the analysis of data using FTK
Imager, and the output that can be obtained from this tool.
FTK Imager is a tool used for forensic imaging and data analysis.
It can be used to acquire and analyze data from various sources,
such as hard drives, memory, and mobile devices. FTK Imager is
a user-friendly tool that provides a wide range of features for
forensic investigators.
Once the forensic image has been created using FTK Imager, the examiner can
begin the analysis process. FTK Imager provides a number of tools and features
that allow the examiner to analyze the data in great detail.
Some of the features that can be used for data analysis in FTK Imager include:
1. File Type Identification: FTK Imager can be used to identify the file types that
are present in the forensic image. This can be useful in determining the type
of data that has been stored on the device.
2. Keyword Search: FTK Imager allows the examiner to search for specific
keywords or phrases within the forensic image. This can be useful in
identifying important information that may be relevant to the investigation.
3. Hash Value Verification: FTK Imager can be used to verify the hash value of
files within the forensic image. This can help to ensure that the data has not
been tampered with.
4. Timeline Analysis: FTK Imager provides a timeline analysis feature that allows
the examiner to view the activity on the device over a specific period of time.
This can be useful in identifying patterns of behavior or activity that may be
relevant to the investigation.
The output of FTK Imager will depend on the type of analysis that is conducted.
Some of the possible outputs include: