INCS-712: Computer Forensics Cyber Forensics, Crime Scene Analysis
INCS-712: Computer Forensics Cyber Forensics, Crime Scene Analysis
edu
Cyber Forensics
• The scientific examination and analysis of digital
evidence in such a way that the information can
be used as evidence in a court of law.
• Includes:
• Networks (Network Forensics)
• Small Scale Digital Devices
• Storage Media (Computer forensics)
• Code Analysis
4
5
5
6
The 3 As
The basic methodology consists of the 3 As:
– Acquire the evidence without altering or damaging the original
– Authenticate the image
– Analyze the data without modifying it
6
7
Crime Scenes
• Physical Crime Scenes vs. Cyber/Digital Crime
Scenes
• Overlapping principals
• The basics of criminalistics are constant across
both physical and cyber/digital
• Locard’s Principle applies
• “When a person commits a crime something is always left at the
scene of the crime that was not present when the person arrived”
7
8
8
9
Forensic Principles
• Digital/ Electronic evidence is extremely volatile!
• Once the evidence is contaminated it cannot be
de-contaminated!
• The courts acceptance is based on the best
evidence principle
• With computer data, printouts or other output readable
by sight, and bit stream copies adhere to this principle.
• Chain of Custody is crucial
9
10
10
11
Process/Phases
• Identification
• Collection
• Bag & Tag
• Preservation
• Examination
• Analysis
• Presentation/Report
11
12
Identification
• The first step is identifying evidence and
potential containers of evidence
• More difficult than it sounds
▫ Small scale devices
▫ Non-traditional storage media
▫ Multiple possible crime scenes
12
13
Identification
• Context of the investigation is very
important
• Do not operate in a vacuum!
• Do not overlook non-electronic
sources of evidence
▫ Manuals, papers, printouts, etc.
13
14
Collection
• Care must be taken to minimize
contamination
• Collect or seize the system(s)
• Create forensic image
▫ Live or Static?
▫ Do you own the system
▫ What does your policy say?
14
15
Collection: Documentation
15
16
Collection: Documentation
16
17
Collection: Documentation
Make sure to take photos and notes of all
connections to the computer/other devices
17
18
Collection: Imaging
• Rule of Thumb: make 2 copies and don’t work from
the original (if possible)
• A file copy does not recover all data areas of the
device for examination
• Working from a duplicate image
▫ Preserves the original evidence
▫ Prevents inadvertent alteration of original evidence
during examination
▫ Allows recreation of the duplicate image if necessary
18
19
Collection: Imaging
•Digital evidence can be duplicated with no
degradation from copy to copy
▫ This is not the case with most other forms of
evidence
19
20
Collection: Imaging
• Write blockers
▫ Software
▫ Hardware
• Hardware write blockers are becoming the industry
standard
▫ USB, SATA, IDE, SCSI, SIM, Memory Cards
▫ Not BIOS dependent
▫ But still verify prior to usage!
20
21
Collection: Imaging
• Forensic Copies (Bitstream)
▫ Bit for Bit copying captures all the data on the copied
media including hidden and residual data (e.g., slack
space, swap, residue, unused space, deleted files etc.)
• Often the “smoking gun” is found in the residual data.
• Imaging from a disk (drive) to a file is becoming the
norm
▫ Multiple cases stored on same media
▫ No risk of data leakage from underlying media
• Remember avoid working for original
• Use a write blocker even when examining a copy!
21
22
22
23
Examination
• Higher level look at the file system representation of the
data on the media
• Verify integrity of image
▫ MD5, SHA1 etc.
• Recover deleted files & folders
• Determine keyword list
▫ What are you searching for
• Determine time lines
▫ What is the timezone setting of the suspect system
▫ What time frame is of importance
▫ Graphical representation is very useful
23
24
Examination
• Examine directory tree • Search for relevant evidence
What looks out of place types
Stego tools installed ▫ Hash sets can be useful
Evidence Scrubbers ▫ Graphics
• Perform keyword ▫ Spreadsheets
searches ▫ Hacking tools
Indexed ▫ Etc.
Slack & unallocated space
• Look for the obvious first
• When is enough enough??
24
25
Issues
• lack of certification for tools
• Lack of standards
• lack of certification for professionals
• lack of understanding by Judiciary
• lack of curriculum accreditation
• Rapid changes in technology!
• Immature Scientific Discipline
25
Cyber Forensics, Crime Scene Analysis
Important Factors
• Legal procedures
▫ Not compromising evidence
• Treat every piece of evidence as it will be used in court
• Documentation
• Chain of Custody
▫ https://study.com/academy/lesson/what-is-the-chain-of-custody-definition-procedures-importance.html
• Write Blocks
• Imaging
▫ Bit by bit copy of a piece of electronic media (Hard drive)
42
• Changing data
▫ Changing time or date stamps
▫ Changing files
• Overwriting unallocated disk space
▫ This can happen when re-booting
• Verify Hash values from images
43
EnCase Forensic
• Acquisition
• Reporting
• EnScript :
▫ Scripting facility
▫ Various API's for interacting with evidence
• Collect, Analyze and examine data
▫ Deleted files
▫ Unallocated space
▫ File slack
• Duplicates of original data (Imaging)
▫ Accuracy can be verified by hash and Cyclic Redundancy Check values
46
EnCase Forensic
EnCase Forensic
48
File Signatures
49
EnCase Gallery
50