Investigation Unit4
Investigation Unit4
• Admissible: Investigators ought to gift proof in admissible manner, which implies that it ought to be relevant to the case, act in
proceeding.
• Reliable: forensic investigations should be conducted solely on the copies of the proof as a result of the court must have the first
jury. they have to justify the facts clearly and acquire associate professional opinion on a similar to verify the investigation method.
Digital Evidence Collection
• Digital evidence can be collected from many sources.
• Obvious sources include computers, mobile phones, digital cameras, hard drives, CD-ROM, USB memory
sticks, cloud computers, servers and so on.
• Some Methods of collection are:
• Capturing Network Data Packet: This is often done to observe users that are connected to a local
network. By using existing tools such as netstat, cain ,Wireshark etc we can obtain valuable data. On
Cain and abel, we can see detailed information about the connected users such as IP addresses, mac
addresses, the site of what is being opened, the password and username that are entered for login, etc.
• Awakening Deleted Data: Criminals often take steps to conceal their crime, and deleted data can
often contain the most incriminating digital evidence. Therefore, one of the most useful process is
to generate the files and folders that have been deleted.
• Extracting Embedded Metadata: As explained previously, embedded metadata can answer a variety of
questions regarding a document, including the genuineness and authenticity of the source.
• Social Engineering: Sometimes collecting data with legal procedures is hard to do. Investigators usually
inhibited when will determine the status of a suspect or the accused due to lack of evidence
Digital Evidence Preservation
• Digital Evidence Preservation includes:
• Isolate the data files or devices for examination.
• Secure the files to inspect data.
• Preservation of data for investigation.
• Critical Steps in Preserving Digital Evidence:
• Do not change the current state of the device
• Power down the device
• Do not leave the device in an open area or unsecured place
• Do not plug any external storage media in the device
• Do not copy anything to or from the device
• Take a picture of the piece of the evidence
• Make sure you know the PIN/ Password Pattern of the device
• Do not open anything like pictures, applications, or files on the device
• Do not trust anyone without forensics training
• Make sure you do not Shut down the computer, If required Hibernate it
Three Methods to Preserve a Digital
Evidence
• Drive Imaging
• Before forensic investigators begin analyzing evidence from a
source, they need to create an image of the evidence. Imaging a
drive is a forensic process in which an analyst will create a bit-by-
bit duplicate of the drive. When analyzing an image forensic
experts need to keep in mind the following points:
• Even wiped drives can retain important and recoverable data to
identify.
• Forensic experts can recover all deleted files using forensic
techniques.
• Never perform forensic analysis on the original media. Always
Operate on the duplicate image.
• Hash Values:
• When a forensic investigator creates an image of the evidence for
analysis, the process generates cryptographic hash values like
MD5, SHA1, etc. Hash Values are critical as:
• They are used to verify the Authenticity and Integrity of the
image as an exact replica of the original media.
• When admitting evidence in the court, hash values are critical
as altering even the smallest bit of data will generate a
completely new hash value.
• When you perform any modifications like creating a new file or
editing an existing file on your computer, a new hash value is
generated for that file.
• Chain of Custody:
• As forensic investigators collect media from the client and transfer
it, they should document all the steps conducted during the
transfer of media and the evidence on the Chain of Custody (CoC)
forms and capture signatures, date, and time upon the media
handoff.
• It is essential to conduct CoC paperwork due to the following
reasons:
• CoC demonstrates that the image has been under known
possession since the time the image was created.
• Any lapse in the CoC nullifies the legal value of the image, and
thus the analysis.
Email Investigation/Forensics
• E-mail Investigation refers to the study of source and content of e-mail
as evidence to spot the actual sender and recipient of a message,
data/time of transmission, detailed record of e-mail transaction,
intention of the sender, etc.
• This study involves investigation of metadata, keyword searching, port
scanning, etc.
• Goals of Email Investigation:
• To identify the main criminal
• To collect necessary evidences
• To presenting the findings
• To build the case
Techniques used in email investigation
• Header Analysis: Metadata within the e-mail message is a sort of
control information i.e. envelope and headers including headers within
the message body contain information about the sender and/or the trail
along which the message has traversed. A number of these could also
be spoofed to hide the identity of the sender. An in depth analysis of
those headers and their correlation is performed in header analysis.
• Server Investigation: This involves investigating copies of delivered
emails and server logs. In some organizations they do provide separate
email boxes for their employees by having internal mail servers. In this
case, investigation involves the extraction of the entire email box
related to the case and the server logs.
• Network Device Investigation: In some investigations, the
investigator requires the logs maintained by the network devices
such as routers, firewalls and switches to investigate the source of an
email message. This is often a complex situation where the primary
evidence is not percent.
• Software Embedded Analysis: Some information about the sender of
the email, attached files or documents may be included with the
message by the email software used by the sender for composing
the email . This information may be included in the form of custom
headers or in the form of MIME content as a Transport Neutral
Encapsulation Format (TNEF).
• Sender Mail Fingerprints: The “Received” field includes tracking
information generated by mail servers that have previously handled
a message, in reverse order. The “X-Mailer” or “User-Agent” field
helps to identify email software. Analyzing these fields helps to
understand the software, and the version used by the sender.
Email Tracking
• Email tracking is a method for monitoring the delivery of email
messages to the intended recipient.
• In other words, email tracking is the process of tracking sent emails
and using that data to inform business decisions.
• Email tracking involves using software to monitor the emails you
send.
• Most tracking technologies use some form of digitally time-stamped
record to reveal the exact time and date that an email was received
or opened, as well the IP address of the recipient.
Advantages of Email Tracking
• Providing unique insight: With Email Tracking, we’re provided with
more than just valuable information about our contact’s engagement
with our emails.
• Saving time: if you notice a contact is clicking on the links you sent
and viewing a cover letter or a proposal that you attached, you know
that you’re currently at the top of their minds.
• Providing context: For example, if you included links or attachments
in an email prior to a meeting, you can see if your contact has viewed
them.
Email Tracking Process Consists of five main
steps
• Establish company guidelines on email tracking practices: Get
instructions for locating a header for your email provider.
• Installing an email tracking app.
• Compose an email: Open the email you want to trace and find its
header.
• Checking the “Track” box.
• Scroll down below the box for the Trace Email results
IP Tracking
• IP stands for internet protocol, which is the set of processes that
dictate how information is shared across the web.
• Each device has an IP address.
• In most cases, IP addresses are a string of numbers separated by
periods, and used for identification and location.
Reasons to Track an IP
• Legal Concerns
• IP addresses are how we as a society identify people who commit illegal activities
online in order to hold them accountable. This ranges from small offenses to large.
• Marketing
• In some legal cases, an IP address can be tracked back to a specific individual.
When it comes to marketing uses though, IP tracking is more anonymized than
that. Marketing and analytics software includes the capability to track the location
data of IP addresses and provide that data to website owners.
• Scam Detection
• Consumers aren’t the only ones who have to worry about online scammers. Many
credit card companies and eCommerce businesses now use security software to
help spot purchases that are likely fraudulent.
Working of IP Address Trackers
• IP Handshake
• Every time your device connects to a website or another network, you need to
exchange IP addresses to ensure data can be properly sent and received between the
two parties. Proper communication requires both IP addresses to be fully open,
revealing themselves to the other. This is IP Handshake.
• Recording IP addresses
• As IP addresses are automatically identified thanks to the handshake, IP address
trackers can easily collect the data they need and record any further movements. This
process of recording is usually done through a JavaScript code attached onto the
website tracking IP addresses.
• Extracting data
• Now the IP address has been identified and recorded, the IP address tracker is ready to
extract valuable data.
Email Recovery
• In digital forensics, to tackle certain kind of situations, there comes a need of investigators to recover lost or
deleted email data. Nowadays, emails play a significant role in everyone’s life as it is being used for business
or personal communication, sharing confidential documents which may be crucial, etc. It could be a
nightmare if such important data gets lost somehow.
• In most of the illegal cases, criminals usually delete such suspected emails intentionally to remove the
leads of evidence. Hence arises the need of email recovery.
• The following is a partial list of the types of data can be recovered from email:
● Written communications
● Photographs, diagrams, compressed attachments, etc.
● Send to / Received from data
● Date and location data
● Send path information
● Contact list data
• In addition, there can be email log information, email headers and other types of metadata that can be used
to establishing timelines of action, locations, and connections between subjects involved in investigations.
Recovering Data from Web-Based Email Clients
❖ Header Analysis: Metadata within the e-mail message is a sort of control information i.e. envelope and
headers including headers within the message body contain information about the sender and/or the trail
along which the message has traversed. A number of these could also be spoofed to hide the identity of
the sender. An in depth analysis of those headers and their correlation is performed in header analysis.
❖ Forensic Imaging: Provides imaging (bit-by-bit copying) of email client data, as well as data export into
various file formats, while always maintaining the original properties, attachments, metadata and folder
structure.
• Methods to destroy the evidence and ways to recover the destroyed evidence:
❖ Deleted Files:
• Deleting files is one of the easiest, convenient, and foremost way to destroy the evidence. Whether it is using the
“Delete” button or “Ctrl+Delete” button. The deleted file can be retrieved by analyzing the contents of the
recycle bin as they are temporarily stored there before being [Link] the deleted files have no trace in the
recycle bin like in case of the “Ctrl+Delete” command, then, in that case, you can use commercial recovery tools
to recover the deleted evidence. One such example commercial tool is DiskInternals Partition Recovery.
❖ Formatted Hard Drives
➢ Recovery of the data from the formatted hard drive depends upon a lot of parameters. Information from the formatted hard drive may be
recoverable either using data carving technology or by using commercial data recovery tools. There are two possible ways to format a hard
drive: Full Format – As the name suggests, this initializes the disk by creating the new file system on the partition being formatted and also
checks the disk for the bad [Link] Format – This is never destructive except for the case of SSD. Disk format simply initializes the disk
by creating the new file system on the partition being formatted.
❖ SSD Drives
➢ SSD means Solid-State Drives represent a new storage technology. They operate much faster than traditional [Link] employ a
completely different way of storing information internally, which makes it much easier to destroy information and much more difficult to
recover it. The culprit in SSD is TRIM Command. TRIM enables SSD completely wiped all the deleted information in less than 3 minutes.
Traditional Methods are not useful when we try to recover deleted data from the SSD or even any information from the SSD formatted with
either Full format or Quick format. This means the traditional methods can be used for data recovery in SSD only when the TRIM command
is not issued.
❖ Data Carving
➢ Carving means bit-precise and sequential examination of the entire content of the hard drive. Carving allows to Identify particular
signatures or patterns that may give a clue that some interesting data can be stored in a particular spot on the disk. It can Locate various
artifacts that would not be available otherwise. Data Carving is truly amazing when looking for destroyed [Link] Carving has the
following features when we are dealing with the text content:
■ Text information is easiest to recover.
■ Blocks containing text data are filled exclusively with numeric values belonging to a shallow range that represents letters, numbers, and
symbols.
■ Different encodings must be taken into account when looking for texts in each supported language
Password Cracking
In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that
has been stored in or transmitted by a computer system in scrambled form.
Common Password-Cracking Techniques
❖ Brute Force Attack: In a brute-force attack, the attacker tries to crack the password by submitting various
combinations until the correct one is found. The attacker uses software to make this process automated and
run exhaustive combinations of passwords in significantly less amount of time
❖ Dictionary Attack: This password-cracking technique ‘dictionary attack’ gets its name for a reason. In this
method, the hacker systematically enters every word in the dictionary to crack the password. This is a type of
brute force attack but instead of submitting various combinations of symbols, numbers and words, this
method only uses words that could be found in a dictionary.
❖ Rainbow Table Attack: When your passwords are stored on the server they are encrypted into meaningless
strings of characters instead of storing as a plain text. This process is called hashing. Now, since the passwords
are converted into hashes, the hackers try to gain authentication by cracking the password hash. And they do
it by using a Rainbow table — a list of pre-computed hashes of possible password combinations. The hackers
can look up to the rainbow table to crack the hash resulting in cracking your password.
❖ Social Engineering: While the above password-cracking techniques use
technical vulnerabilities, social engineering takes advantage of human
errors and psychology. To put it simply social engineering is an act of
manipulating the victim to gain confidential information such as bank
information or passwords
❖ Phishing: Phishing is a type of social engineering used by cybercriminals to
trick the users and acquire their sensitive information which is then used
for cybercrimes such as financial breaches and data theft. There are varied
types of phishing — email spoofing, URL spoofing, website spoofing,
smishing, vishing and more. The most common ones are done through
email, phone and SMS.