4th Module
4th Module
4th Module
• Introduction
• Historical Background of Cyber forensics
• Digital Forensics Science
• The Need for Computer, Cyber forensics and Digital Evidence
• Forensics Analysis of E-Mail
• Digital Forensics Life Cycle
• Chain of Custody Concept
• Network Forensics
• Approaching a Computer Forensics Investigation
• Setting up a Computer Forensics Laboratory: Understanding the Requirements
• Computer Forensics and Steganography
• Relevance of the OSI 7 Layer Model to Computer Forensics
• Forensics and Social Networking Sites: The Security/Privacy Threats
• Computer Forensics from Compliance Perspective
• Challenges in Computer Forensics
• Special Tools and Techniques
• Forensics Auditing
• Anti forensics.
Introduction and Historical Background of Cyber forensics
*Digital Forensic
*Cyber Forensic
*Computer Forensic
Characteristics Of Forensics
*Identifying
*Preserving
*Analyzing
*Presenting
Needs Of Computer Forensic
*To produce evidence in the court that can lead to the punishment of
the actual.
*Began to evolve more than 30 years ago in US when law enforcement and military
*Over the next decades, and up to today, the field has exploded.
*Law enforcement and the military continue to have a large presence in the
information security and computer forensic field at the local, state and federal level.
*Now a days, Software companies continue to produce newer and more robust
*And law enforcement and the military continue to identify and train more and more
*computer as a target
*The main goal of computer forensic experts is not only to find the criminal
but also to find out the evidence and the presentation of the evidence in a manner
1. Computer forensics.
2. Network forensics.
Network forensics is the study of network traffic to search for truth in civil, criminal and
administrative matters to protect users and resources from exploitation, invasion of privacy and
Digital evidence is much easier to change/manipulate! Second, “perfect” digital copies can
1. Physical context: It must be definable in its physical form, that is, it should reside
2. Logical context: It must be identifiable as to its logical position, that is, where
3. Legal context: the evidence in the correct context to read its meaning.
This may require looking at the evidence as machine language, for example,
American Standard
Some guidelines for the (digital) evidence collection phase:
1. Adhere to your site’s security policy and engage the appropriate incident
handling and law enforcement personnel.
2. Capture a picture of the system as accurately as possible.
Rules of evidence:
* Indian evidence act 1872 oral evidence , documentary evidence
Guidelines To Collect The Evidence
*keep detail notes with date and time
*Notes and printout should be signed.
* Note difference between the system clock and universal time.
* Outline all action you took and at what time -detail notes .
* minimize changes to the data as you are collecting it – avoid changes . *
Remove the external changes.
* Collect first and analysis later.
* Possible automate .
* spread the work among the team.
* Less volatile - power off data erase.
* Bit level copy .
Digital Forensics Life Cycle
* cardinal rule :
1.Is admissible.
2. Is authentic.
3. Is complete.
4. Is reliable.
The digital forensics process needs to be understood in the legal context starting from
registered, certain standards may apply with regard to the issues of expert witnesses.
What is the evidence?: For example- digital information includes the filename, photos,
description.
How did you get it?: For example- Bagged, tagged or pulled from the desktop.
When it was collected?: Date, Time
Who has handle it?
Why did that person handled it?
Where was it stored?
How you transported it?: For example- in a sealed static-free bag, or in a secure storage
container.
How it was tracked?
How it was stored?: For example- in a secure storage container.
Who has access to the evidence?: This involves developing a check-in/ check-out process.
Stage of the chain of custody
Data Collection: This is where chain of custody process is initiated. It involves
identification, labeling, recording, and the acquisition of data from all the possible
relevant sources
Examination: It is important to capture screenshots throughout the process to show the
tasks that are completed and the evidence uncovered.
Analysis: . In the Analysis stage, legally justifiable methods and techniques are used to
derive useful information to address questions posed in the particular case.
Reporting: This is the documentation phase of the Examination and Analysis stage.
Reporting includes the following:
Statement regarding Chain of Custody.
Explanation of the various tools used.
A description of the analysis of various data sources.
Issues identified.
Vulnerabilities identified.
Network forensics
*Network forensics is a sub-branch of digital forensics relating to the
monitoring and analysis of computer network traffic
* Network forensics can be generally defined as a science of discovering
and retrieving evidential information in a networked environment about a
crime in such a way as to make it admissible in court.
*The purposes of information gathering, legal evidence, or intrusion
detection
*Process of collecting and analyzing raw network data and tracking
network traffic
* how an attack was carried out or how an event occurred on a network
*The process of capture, recording, and analysis of network packets to determine
* For example, web server logs can be used to show when (or if) a suspect
accessed information related to criminal activity. Email accounts can often contain
useful evidence; but email headers are easily faked and, so, network forensics may
• Confidentiality
• Payment
* Mail server software - controls flow of email , compose ,send ,read, all action
* Mail server software is a network server software that controls the flow of *
E-Mail and the mail client software helps each user read, compose, send and delete
messages.
• TCP scan sends a TCP synchronization request to a series of ports and to the
machines that provide the associated service to respond.
• most hackers will try creating provisions for entry into the
network/hacked system
• Encryption
Third function – meet the attacker objective ,gather the packet traces on
local network ,vulnerability scans ,launch automated attacks
– Interesting in hiding
▪ masking
▪ algorithms
Challenges in Computer Forensics
Investigation of cybercrimes is not a easy task.
How to collect the specific, probative and case-related info from very large
groups of files;
Approaches like: link analysis and visualization.
Data involves many different protocols and the amount of data could potentially
be very large due to increasing n/w bandwidth.
• FORENSIC AUDITORS
– They are retained by banks, courts, business communities, police forces, lawyers, insurance
– Highly specialized Effective listener Knowledge of techniques and law Scrutiny of the options
• HOW IS FORENSIC AUDIT INVESTIGATION
CONDUCTED ?
– Accepting the investigation
– Planning the investigation
– Gathering the evidence
– Perform the analysis
– Reporting Court Proceeding
• Step 1 – accepting the investigation
– They have the necessary tools, skills and expertise to go forward with such an
investigation.
– Assessment of their own training and knowledge
• Step 2 – planning the investigation
Safeguards Rule:
Traditional approach – forensic
investigation
Antiforensics
• Anti-forensic techniques are content actions aiming at preventing or hardening
can be summed up like this: Make it hard for them to find you and impossible for
Evidence tampering.
MACE
Slacker : Slacker Breaks Up A File And Places Each Piece Of That File Into