Unit 4 CS
Unit 4 CS
Introduction
Computer Forensics is a scientific method of investigation and analysis in order to gather
evidence from digital devices or computer networks and components which is suitable for
presentation in a court of law or legal body. It involves performing a structured
investigation while maintaining a documented chain of evidence to find out exactly what
happened on a computer and who was responsible for it.
Types
Disk Forensics: It deals with extracting raw data from the primary or secondary storage
of the device by searching active, modified, or deleted files.
Network Forensics: It is a sub-branch of Computer Forensics that involves monitoring
and analysing the computer network traffic.
Database Forensics: It deals with the study and examination of databases and their
related metadata.
Malware Forensics: It deals with the identification of suspicious code and studying
viruses, worms, etc.
Email Forensics: It deals with emails and their recovery and analysis, including deleted
emails, calendars, and contacts.
Memory Forensics: Deals with collecting data from system memory (system registers,
cache, RAM) in raw form and then analysing it for further investigation.
Mobile Phone Forensics: It mainly deals with the examination and analysis of phones
and smartphones and helps to retrieve contacts call logs, incoming, and outgoing SMS,
etc., and other data present in it.
Collection
The collection phase involves acquiring digital evidence, usually by seizing physical assets,
such as computers, hard drives, or phones. It is critical to ensure that data is not lost or
damaged during the collection process.
Examination
The examination phase involves identifying and extracting data. You can split this phase into
several steps—prepare, extract, and identify.
Analysis
The analysis phase involves using collected data to prove or disprove a case built by the
examiners. Here are key questions examiners need to answer for all relevant data items:
Reporting
The reporting phase involves synthesizing the data and analysis into a format that makes
sense to laypeople. These reports are essential because they help convey the information so
that all stakeholders can understand.
Much of what computer forensics does is related to data recovery. Data recovery
programs used in businesses and personal computers, such as DataNumen Data
Recovery and DataNumen SQL Recovery, are also widely used for law enforcement.
1. Investigation
The first step in a Digital Forensics process is to start the investigation and seize the
evidence. This involves acquiring digital devices or data that is relevant to the case. This may
involve seizing electronic devices, such as computers or smartphones, or acquiring data from
cloud services.
2. Identification
During this process, the relevant data related to the case is identified and extracted from the
collected evidence. This includes information such as emails, documents, images, and other
types of digital files that are relevant to the case.
3. Collection
The next step is to collect the evidence from the digital device or system. This may involve
using specialized tools and techniques to extract data from the device, such as acquiring a
disk image or copying specific files.
4. Preservation
Preserving the evidence is the next step here. This involves duplicating the digital data and
ensuring that the original data is kept undamaged. This is an important process since it
ensures that the evidence will be accepted in court and can be used to support the findings of
the investigation.
5. Analysis
The collected evidence till now, is then analyzed to uncover any related information. This
involves using various Digital Forensics tools to examine the data, such as disk imaging
tools, data recovery tools, and many more.
6. Presentation
The final step of the Digital Forensics process is to prepare a report, document the findings of
the Digital Forensics investigation, and present the evidence in a clear and brief form to the
relevant authorities or stakeholders.
Metadata Analysis:
Header Information: The email header contains crucial metadata, including
sender and recipient addresses, timestamps, routing information, and more. This
information can be crucial in tracking the source of an email or establishing a
timeline.
IP Address Tracking: Examining the IP addresses associated with an email can
help determine the sender's location and trace the email's path through various
servers.
Content Analysis:
Message Content: Analyzing the content of an email is essential for
understanding the message's context, intent, and potential relevance in an
investigation.
Attachments: Email attachments, such as documents or images, can contain
vital clues or evidence.
Email Authentication:
Sender Verification: Email forensics helps verify the authenticity of an email sender.
Techniques like Domain Keys Identified Mail (DKIM) and Sender Policy Framework (SPF)
are used to prevent email spoofing and phishing.
Chain of Custody:
Maintaining a secure chain of custody is crucial when handling email evidence in a legal
context. This ensures that the integrity of the evidence is preserved.
Several tools are available to forensic experts to perform email analysis, such as:
1. 4n6 Email Forensics Wizard: This software orchestrates the art of email
analysis, from metadata examination to content scrutiny.
4. Wireshark: A network protocol analyzer that can help with IP tracking and
network-related email forensics tasks.
While email forensics is a powerful investigative tool, it comes with its fair share of
challenges:
2. Privacy Concerns: Balancing the need for email evidence with privacy rights is
a constant challenge in email forensics.
In order to be processed and analysed, evidence must first be identified. A sequence of events
in a computer might include interactions between:
Different files
Files and file systems
Processes and files
Log files
Digital evidence can be collected from many sources. The obvious sources can be:
Mobile phone
Digital cameras
Hard drives
CDs
USB memory devices
Care should be taken that evidence does not go anywhere without properly being traced.
Things that can go wrong in storage include:
Forensics specialist should ensure that he/she has proper legal authority to seize, copy and
examine the data. As a general rule, one should not examine digital information unless one
has the legal authority to do so. Forensic investigation performed on data at rest (hard disk) is
called dead analysis.
Many current attacks leave no trace on the computer’s hard drive. The attacker only exploits
the information in the computer’s main memory. Performing forensic investigation on main
memory is called live analysis.
In digital forensics, only a few sequences of events might produce evidence. But the possible
number of sequences is very huge. The digital evidence must be analyzed to determine the
type of information stored on it.
Media analysis
Media management analysis
File system analysis
Application analysis
Network analysis
Image analysis
Video analysis
6. Reporting
After the analysis is done, a report is generated. The report may be in oral form or in written
form or both. Some of the general elements in the report are:
7. Testifying
Chain of Custody
Chain of Custody refers to the logical sequence that records the sequence of custody,
control, transfer, analysis and disposition of physical or electronic evidence in legal cases.
Each step in the chain is essential as if broke, the evidence may be rendered inadmissible.
One of the concepts that is most essential in Digital Forensics is the Chain of Custody.
The chain of custody in digital cyber forensics is also known as the paper trail or forensic
link, or chronological documentation of the evidence.
Chain of custody indicates the collection, sequence of control, transfer and analysis.
It also documents details of each person who handled the evidence, date and time it was
collected or transferred, and the purpose of the transfer.
It demonstrates trust to the courts and to the client that the evidence has not tampered.
Importance of maintaining Chain of Custody
Importance to Examiner:
To preserve the integrity of the evidence.
To prevent the evidence from contamination, which can alter the state of the evidence.
In case you obtained metadata for a piece of evidence but unable to extract any
meaningful information from the metadata. In such a case, the chain of custody helps to
show where possible evidence might lie, where it came from, who created it, and the
type of equipment used. This will help you to generate an exemplar and compare it to
the evidence to confirm the evidence properties.
Importance to the Court: If not preserved, the evidence submitted in the court might be
challenged and ruled inadmissible.
The chain of custody should span from the first step of data collection to examination,
analysis, reporting, and the time of presentation to the Courts.
In order to prove a chain of custody, you’ll need a form that lists out the details of how the
evidence was handled every step of the way. The form should answer the following
questions:
What is the evidence?: For example- digital information includes the filename, md5
hash, and Hardware information includes serial number, asset ID, hostname, photos,
description.
How did you get it?: For example- Bagged, tagged or pulled from the desktop.
When it was collected?: Date, Time
Who has handle it?
Why did that person handled it?
Where was it stored?: This includes the information about the physical location in
which proof is stored or information of the storage used to store the forensic image.
How you transported it?: For example- in a sealed static-free bag, or in a secure
storage container.
How it was tracked?
How it was stored?: For example- in a secure storage container.
Who has access to the evidence?: This involves developing a check-in/ check-out
process.
The following procedure is followed according to the chain of custody for electronic
devices:
Save the original material
Take photos of the physical evidence
Take screenshots of the digital evidence.
Document date, time, and any other information on the receipt of the evidence.
Inject a bit-for-bit clone of digital evidence content into forensic computers.
Perform a hash test analysis to authenticate the working clone.
Network Forensics
Network forensics is a subcategory of digital forensics that essentially deals with the
examination of the network and its traffic going across a network that is suspected to be
involved in malicious activities, and its investigation for example a network that is
spreading malware for stealing credentials or for the purpose analyzing the cyber-attacks.
With the help of network forensics, the entire data can be retrieved including messages, file
transfers, e-mails, and, web browsing history, and reconstructed to expose the original
transaction.
The biggest challenge is to manage the data generated during the process.
Intrinsic anonymity of the IP.
Address Spoofing.
Forensics and Social Networking Sites
Social media usage is constantly growing as people like to connect, share posts, videos, and
photos, and engage with others. However, it's essential to be aware of the potential privacy
risks and to know how to protect users’ personal information. People are becoming more
careful about their privacy, what they share on social media, and what social platforms do
with their social media data. Even with tough privacy laws, sensitive user information could
be at risk.
1. Data mining. Scammers use data mining for identity theft. They do not need much
data for that. Scammers can get email addresses, usernames, phone numbers, and
physical addresses quite easily.
2. Data breach. If a company is hacked, customers’ social media data is one of the first
data to be stolen. People provide a lot of personal information on social media which
could be used for malicious purposes.
3. Third-party data sharing. Many social media platforms are in partnership with
third-party services and share user data with them. While it allows the integration of
different services, it also creates significant privacy risks. Users often grant
permission to share or sell their data to these third parties even without knowing it.
4. Privacy setting loopholes. Social media accounts often are less private than users
think.
5. Location settings. User location paired with personal information can provide
detailed information to a user profile. Scammers can use this comprehensive data to
physically fi
6. d and target users or collect more digital data.
7. Harassment and cyberbullying. Defrauders can send threatening messages, perform
harassment, or cause emotional trouble even without getting into users’ social media
accounts.
8. Doxxing is a form of cyberbullying and involves sharing harmful content about
persons like revealing a person's address, phone number, or personal photos to cause
harm, embarrassment, or humiliation.
9. Malware and viruses. Malware and viruses can spread through social media
platforms. They can steal sensitive data, infect, or slow down users’ computers.
A variety of different social media platforms have become popular over the last decade. Here
are some of them:
The most commonly reported and seen crimes that occur on social media involve people
making threats, bullying, harassing, and stalking others online. While much of this type of
activity goes unpunished, or isn't taken seriously, victims of these types of crimes frequently
don't know when they can call the police
Creating fake accounts, or impersonation accounts, to trick people (as opposed to just
remaining anonymous), can be punished as fraud depending on the actions the
fake/impersonation account holder takes.
Connecting over social media to buy drugs, or other regulated, controlled or banned products
is probably illegal.
As smartphone and social media technology continue to improve hand in hand, more and
more criminals are posting videos of their crimes on social media.
5. Vacation Robberies
One common practice among burglars is to use social media to discover when a potential
victim is on vacation. If your vacation status updates are publicly viewable, rather than
restricted to friend groups, then potential burglars can easily see when you are going to be
away for an extended period of time.
• Centralization of Data: Forensic methods usually see all the digital data on a computer or
device. This tempts investigators to violate user privacy since they may find other interesting
things not originally sought or authorized during their searches
• Misjudgment of Data: Forensic investigators often have limited understanding of all the
variety of data they encounter and may be overly suspicious of innocent data.
Data Encryption: Encryption can make it difficult to access the data on a device or
network, making it harder for forensic investigators to collect evidence. This can
require specialized decryption tools and techniques.
Data Storage: The sheer amount of data that can be stored on modern digital
devices can make it difficult for forensic investigators to locate relevant
information. This can require specialized data carving techniques to extract relevant
information.