SlideShare a Scribd company logo
Computer and Mobile Forensic
Lecture 12
1
Background
• Cyber activity has become a significant
portion of everyday life of general public.
• Thus, the scope of crime investigation has
also been broadened.
• As the society has become more and more
dependent on computer and computer
networks. The computers and networks may
become targets of crime activities, such as
burglar, destruction, intelligence, or even
cyber war.
2
Forensic Science
• The functions of the forensic scientist
▫ Analysis of physical evidence
▫ Provision of expert testimony
▫ Furnishes training in the proper recognition,
collection, and preservation of physical
evidence.
3
Computer (or Cyber) Forensics
• Definition:
▫ Preservation, identification, extraction,
documentation, and interpretation of computer media
for evidentiary and/or root cause analysis using well-
defined methodologies and procedures.
• Methodology:
▫ Acquire the evidence without altering or damaging the
original.
▫ Authenticate that the recovered evidence is the same
as the original seized.
▫ Analyze the data without modifying it.
4
Types of Computer Forensic
• Disk Forensics: It deals with extracting raw data from primary or
secondary storage of device by searching active, deleted or modified files
• Network Forensics: It is the sub-branch of computer forensic that
involve monitoring and analyzing the computer network traffic.
• Database Forensic: It deals with study and examination of database and
their related metadata.
• Malware Forensic: It deals with the identification of suspicious code and
studying viruses, worms etc.
• Email Forensics: It deals with emails and their recovery and analysis
including deleted emails, calendars and contacts.
• Memory Forensics: Deals with collecting data from system
memory(system register, cache ,ram) in raw form and then analyzing it for
further investigation.
• Mobile Phone Forensics: It mainly deals with examination and analysis
of phones and smart phones helps to retrieve contacts, call logs, incoming
and outgoing sms etc.… and data present in it.
5
Network Forensics
The study of network traffic to search for
truth in civil, criminal, and administrative
matters to protect users and resources from
exploitation, invasion of privacy, and any
other crime fostered by the continual
expansion of network connectivity.
6
114/02/28
Jau-Hwang Wang
Central Police University,
Taiwan
7
Category of Digital Evidence
• Hardware
• Software
▫ Data
▫ Programs
8
Digital Evidence
• Definition
▫ Digital data that can establish that a crime has been
committed or can provide a link between a crime and
its victim or a crime and its perpetrator
▫ Categories
 Text
 Audio
 Image
 Video
9
Where Evidence Resides
• Computer systems
▫ Logical file system
 File system
 Files, directories and folders, FAT, Clusters, Partitions, Sectors
 Random Access memory
 Physical storage media
▫ Slack space
 space allocated to file but not actually used due to internal
fragmentation.
▫ Unallocated space
10
Where Evidence Resides (continued)
• Computer networks.
▫ Application Layer
▫ Transportation Layer
▫ Network Layer
▫ Data Link Layer
11
Evidence on Application Layer
• Web pages, Online documents.
• E-Mail messages.
• News group archives.
• Archive files.
• Chat room archives.
• …
12
Challenges of Computer Forensics
(continued)
• How to collect the specific, probative, and
case-related information from very large
groups of files?
▫ Link analysis
▫ Visualization
• Enabling techniques for lead discovery from
very large groups of files:
▫ Text mining
▫ Data mining
▫ Intelligent information retrieval
13
Challenges of Computer Forensics
(continued)
• Computer forensics must also adapt quickly to
new products and innovations with valid and
reliable examination and analysis techniques.
14
Understanding Mobile Device
Forensics
• People store a wealth of information on cell phones
▫ People don’t think about securing their cell phones
• Items stored on cell phones:
▫ Incoming, outgoing, and missed calls
▫ Text and Short Message Service (SMS) messages
▫ E-mail
▫ Instant-messaging (IM) logs
▫ Web pages
▫ Pictures
Understanding Mobile Device
Forensics (continued)
• Items stored on cell phones: (continued)
▫ Personal calendars
▫ Address books
▫ Music files
▫ Voice recordings
• Investigating cell phones and mobile devices is
one of the most challenging tasks in digital
forensics
Inside Mobile Devices
• Mobile devices can range from simple phones to
small computers
▫ Also called smart phones
• Hardware components
▫ Microprocessor, ROM, RAM, a digital signal
processor, a radio module, a microphone and
speaker, hardware interfaces, and an LCD display
• Most basic phones have a proprietary OS
▫ Although smart phones use stripped-down
versions of PC operating systems
Inside Mobile Devices (continued)
• Phones store system data in electronically
erasable programmable read-only
memory (EEPROM)
▫ Enables service providers to reprogram phones
without having to physically access memory chips
• OS is stored in ROM
▫ Nonvolatile memory
SIM Card
Inside Mobile Devices (continued)
• Subscriber identity module (SIM) cards
▫ Additional SIM card purposes:
 Identifies the subscriber to the network
 Stores personal information
 Stores address books and messages
 Stores service-related information
Understanding Acquisition Procedures for Cell
Phones and Mobile Devices
• Check these areas in the forensics lab :
▫ Internal memory
▫ SIM card
▫ Removable or external memory cards
▫ System server
• Checking system servers requires a search
warrant or subpoena
• SIM card file system is a hierarchical structure
• MF: root of the system
• DF: directory files
• EF: elementary data
Understanding Acquisition Procedures for Cell
Phones and Mobile Devices
• Information that can be retrieved:
▫ Service-related data, such as identifiers for the
SIM card and the subscriber
▫ Call data, such as numbers dialed
▫ Message information
▫ Location information
• If power has been lost, PINs or other access
codes might be required to view files
Mobile Forensics Equipment
• Mobile forensics is a new science
• Biggest challenge is dealing with constantly
changing models of cell phones
• When you’re acquiring evidence, generally
you’re performing two tasks:
▫ Acting as though you’re a PC synchronizing with
the device (to download data)
▫ Reading the SIM card
• First step is to identify the mobile device
Mobile Forensics Equipment
(continued)
• Make sure you have installed the mobile device
software on your forensic workstation
• Attach the phone to its power supply and
connect the correct cables
• After you’ve connected the device
▫ Start the forensics program and begin
downloading the available information
Mobile Forensics Equipment
(continued)
• SIM card readers
▫ A combination hardware/software device used to
access the SIM card
▫ You need to be in a forensics lab equipped with
appropriate antistatic devices
▫ General procedure is as follows:
 Remove the back panel of the device
 Remove the battery
 Under the battery, remove the SIM card from holder
 Insert the SIM card into the card reader
Mobile Forensics Equipment
(continued)
• SIM card readers (continued)
▫ A variety of SIM card readers are on the market
 Some are forensically sound and some are not
▫ Documenting messages that haven’t been read yet
is critical
 Use a tool that takes pictures of each screen
iPhone Forensics
• MacLockPick II
▫ Uses backup files
▫ It can’t recover deleted files
• MDBackUp Extract
▫ Analyzes the iTunes mobile sync backup directory
Mobile Forensics Tools
• Paraben Software Device Seizure Toolbox
▫ Contains cables, SIM card readers, and more
• Data Pilot
▫ Similar to Paraben
• BitPim
▫ Can view data on many phones, but it's not
intended for forensics
• MOBILedit!
▫ Has a write-blocker
Mobile Forensics Tools
• SIMCon
▫ Reads files on SIM cards
▫ Recoveres deleted text messages
▫ Archives files with MD5 and SHA-1 hashes
• Software tools differ in the items they display
and the level of detail
Digital forensics Computer and mobile forensic
Digital forensics Computer and mobile forensic
Mobile Forensics Equipment
(continued)

More Related Content

PPTX
Network Forensics- Social Media Forensics
PPT
Cell Phone and Mobile Devices Forensics.ppt
PPT
Computer and Mobile Forensic Analysis
PPTX
Mobile_Forensics- General Introduction & Software.pptx
PPT
Cell Phone and Mobile Devices Forensics.ppt
PPTX
Mobile Forensics
PPTX
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
PPTX
Mobile Forensics and Investigation Android Forensics
Network Forensics- Social Media Forensics
Cell Phone and Mobile Devices Forensics.ppt
Computer and Mobile Forensic Analysis
Mobile_Forensics- General Introduction & Software.pptx
Cell Phone and Mobile Devices Forensics.ppt
Mobile Forensics
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Mobile Forensics and Investigation Android Forensics

Similar to Digital forensics Computer and mobile forensic (20)

PDF
Conceptual Study of Mobile Forensics
PPTX
Computer forensics toolkit
PPTX
DIGITAL FORENSICS, MULTIMEDIA AND INCIDENT RESPONSE.pptx
PPTX
Lessons v on fraud awareness (digital forensics)
PPTX
Lessons v on fraud awareness (digital forensics) [autosaved]
PPTX
Most promising cyber forensic solution providers from india forn sec solut...
PPTX
3170725_Unit-1.pptx
PPTX
3170725_Unit-1.pptx
PPTX
Introduction to Digital Forensics with Types.pptx
PDF
digital forensic examination of mobile phone data
PDF
Final Forensics Project
PPTX
mobile forensic.pptx
PDF
digital forensics-9 of cyber security.pdf
PDF
Digital forensic science and its scope manesh t
PPT
Introduction to computer forensic
PPTX
unit 5 understanding computer forensics.pptx
PPTX
Digital forensics
PPTX
Mobile Phone Seizure Guide by Raghu Khimani
PPT
Digital Forensic
Conceptual Study of Mobile Forensics
Computer forensics toolkit
DIGITAL FORENSICS, MULTIMEDIA AND INCIDENT RESPONSE.pptx
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness (digital forensics) [autosaved]
Most promising cyber forensic solution providers from india forn sec solut...
3170725_Unit-1.pptx
3170725_Unit-1.pptx
Introduction to Digital Forensics with Types.pptx
digital forensic examination of mobile phone data
Final Forensics Project
mobile forensic.pptx
digital forensics-9 of cyber security.pdf
Digital forensic science and its scope manesh t
Introduction to computer forensic
unit 5 understanding computer forensics.pptx
Digital forensics
Mobile Phone Seizure Guide by Raghu Khimani
Digital Forensic
Ad

More from SyedaHira10 (12)

PPTX
Purchasing Improvement Elements in a clinical Laboratory
PPTX
The Process Control and Sample Management
PPTX
How to prepare log sheet in clinical lablab
PPTX
cost of quality in laboratory Management
PPT
The Quality control in clinical laboratory
PPTX
cell structure & function and its organelles
PPTX
An Importance of DNA in forensics Sciences
PPTX
Generation of Antibodies by using different methods
PPTX
power requirement for bioreactor in bioprocessing
PPTX
Forensics of Firearm, tools and other impressions
PPTX
types of bioreactor (pluged and bedded).pptx
PPT
Fire Arson and Explosions Forensic Analysis
Purchasing Improvement Elements in a clinical Laboratory
The Process Control and Sample Management
How to prepare log sheet in clinical lablab
cost of quality in laboratory Management
The Quality control in clinical laboratory
cell structure & function and its organelles
An Importance of DNA in forensics Sciences
Generation of Antibodies by using different methods
power requirement for bioreactor in bioprocessing
Forensics of Firearm, tools and other impressions
types of bioreactor (pluged and bedded).pptx
Fire Arson and Explosions Forensic Analysis
Ad

Recently uploaded (20)

PPTX
NRPchitwan6ab2802f9.pptxnepalindiaindiaindiapakistan
PPT
Copy-Histopathology Practical by CMDA ESUTH CHAPTER(0) - Copy.ppt
PPTX
Acute Coronary Syndrome for Cardiology Conference
PPT
Obstructive sleep apnea in orthodontics treatment
PPTX
Human Reproduction: Anatomy, Physiology & Clinical Insights.pptx
DOCX
PEADIATRICS NOTES.docx lecture notes for medical students
PPT
neurology Member of Royal College of Physicians (MRCP).ppt
PPTX
Stimulation Protocols for IUI | Dr. Laxmi Shrikhande
PDF
Copy of OB - Exam #2 Study Guide. pdf
PPTX
surgery guide for USMLE step 2-part 1.pptx
PPTX
y4d nutrition and diet in pregnancy and postpartum
PPTX
PRESENTACION DE TRAUMA CRANEAL, CAUSAS, CONSEC, ETC.
PPTX
ONCOLOGY Principles of Radiotherapy.pptx
PPTX
Post Op complications in general surgery
PPTX
MANAGEMENT SNAKE BITE IN THE TROPICALS.pptx
PPTX
2 neonat neotnatology dr hussein neonatologist
PPTX
antibiotics rational use of antibiotics.pptx
PPTX
regulatory aspects for Bulk manufacturing
PDF
TISSUE LECTURE (anatomy and physiology )
PPT
MENTAL HEALTH - NOTES.ppt for nursing students
NRPchitwan6ab2802f9.pptxnepalindiaindiaindiapakistan
Copy-Histopathology Practical by CMDA ESUTH CHAPTER(0) - Copy.ppt
Acute Coronary Syndrome for Cardiology Conference
Obstructive sleep apnea in orthodontics treatment
Human Reproduction: Anatomy, Physiology & Clinical Insights.pptx
PEADIATRICS NOTES.docx lecture notes for medical students
neurology Member of Royal College of Physicians (MRCP).ppt
Stimulation Protocols for IUI | Dr. Laxmi Shrikhande
Copy of OB - Exam #2 Study Guide. pdf
surgery guide for USMLE step 2-part 1.pptx
y4d nutrition and diet in pregnancy and postpartum
PRESENTACION DE TRAUMA CRANEAL, CAUSAS, CONSEC, ETC.
ONCOLOGY Principles of Radiotherapy.pptx
Post Op complications in general surgery
MANAGEMENT SNAKE BITE IN THE TROPICALS.pptx
2 neonat neotnatology dr hussein neonatologist
antibiotics rational use of antibiotics.pptx
regulatory aspects for Bulk manufacturing
TISSUE LECTURE (anatomy and physiology )
MENTAL HEALTH - NOTES.ppt for nursing students

Digital forensics Computer and mobile forensic

  • 1. Computer and Mobile Forensic Lecture 12 1
  • 2. Background • Cyber activity has become a significant portion of everyday life of general public. • Thus, the scope of crime investigation has also been broadened. • As the society has become more and more dependent on computer and computer networks. The computers and networks may become targets of crime activities, such as burglar, destruction, intelligence, or even cyber war. 2
  • 3. Forensic Science • The functions of the forensic scientist ▫ Analysis of physical evidence ▫ Provision of expert testimony ▫ Furnishes training in the proper recognition, collection, and preservation of physical evidence. 3
  • 4. Computer (or Cyber) Forensics • Definition: ▫ Preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis using well- defined methodologies and procedures. • Methodology: ▫ Acquire the evidence without altering or damaging the original. ▫ Authenticate that the recovered evidence is the same as the original seized. ▫ Analyze the data without modifying it. 4
  • 5. Types of Computer Forensic • Disk Forensics: It deals with extracting raw data from primary or secondary storage of device by searching active, deleted or modified files • Network Forensics: It is the sub-branch of computer forensic that involve monitoring and analyzing the computer network traffic. • Database Forensic: It deals with study and examination of database and their related metadata. • Malware Forensic: It deals with the identification of suspicious code and studying viruses, worms etc. • Email Forensics: It deals with emails and their recovery and analysis including deleted emails, calendars and contacts. • Memory Forensics: Deals with collecting data from system memory(system register, cache ,ram) in raw form and then analyzing it for further investigation. • Mobile Phone Forensics: It mainly deals with examination and analysis of phones and smart phones helps to retrieve contacts, call logs, incoming and outgoing sms etc.… and data present in it. 5
  • 6. Network Forensics The study of network traffic to search for truth in civil, criminal, and administrative matters to protect users and resources from exploitation, invasion of privacy, and any other crime fostered by the continual expansion of network connectivity. 6
  • 8. Category of Digital Evidence • Hardware • Software ▫ Data ▫ Programs 8
  • 9. Digital Evidence • Definition ▫ Digital data that can establish that a crime has been committed or can provide a link between a crime and its victim or a crime and its perpetrator ▫ Categories  Text  Audio  Image  Video 9
  • 10. Where Evidence Resides • Computer systems ▫ Logical file system  File system  Files, directories and folders, FAT, Clusters, Partitions, Sectors  Random Access memory  Physical storage media ▫ Slack space  space allocated to file but not actually used due to internal fragmentation. ▫ Unallocated space 10
  • 11. Where Evidence Resides (continued) • Computer networks. ▫ Application Layer ▫ Transportation Layer ▫ Network Layer ▫ Data Link Layer 11
  • 12. Evidence on Application Layer • Web pages, Online documents. • E-Mail messages. • News group archives. • Archive files. • Chat room archives. • … 12
  • 13. Challenges of Computer Forensics (continued) • How to collect the specific, probative, and case-related information from very large groups of files? ▫ Link analysis ▫ Visualization • Enabling techniques for lead discovery from very large groups of files: ▫ Text mining ▫ Data mining ▫ Intelligent information retrieval 13
  • 14. Challenges of Computer Forensics (continued) • Computer forensics must also adapt quickly to new products and innovations with valid and reliable examination and analysis techniques. 14
  • 15. Understanding Mobile Device Forensics • People store a wealth of information on cell phones ▫ People don’t think about securing their cell phones • Items stored on cell phones: ▫ Incoming, outgoing, and missed calls ▫ Text and Short Message Service (SMS) messages ▫ E-mail ▫ Instant-messaging (IM) logs ▫ Web pages ▫ Pictures
  • 16. Understanding Mobile Device Forensics (continued) • Items stored on cell phones: (continued) ▫ Personal calendars ▫ Address books ▫ Music files ▫ Voice recordings • Investigating cell phones and mobile devices is one of the most challenging tasks in digital forensics
  • 17. Inside Mobile Devices • Mobile devices can range from simple phones to small computers ▫ Also called smart phones • Hardware components ▫ Microprocessor, ROM, RAM, a digital signal processor, a radio module, a microphone and speaker, hardware interfaces, and an LCD display • Most basic phones have a proprietary OS ▫ Although smart phones use stripped-down versions of PC operating systems
  • 18. Inside Mobile Devices (continued) • Phones store system data in electronically erasable programmable read-only memory (EEPROM) ▫ Enables service providers to reprogram phones without having to physically access memory chips • OS is stored in ROM ▫ Nonvolatile memory
  • 20. Inside Mobile Devices (continued) • Subscriber identity module (SIM) cards ▫ Additional SIM card purposes:  Identifies the subscriber to the network  Stores personal information  Stores address books and messages  Stores service-related information
  • 21. Understanding Acquisition Procedures for Cell Phones and Mobile Devices • Check these areas in the forensics lab : ▫ Internal memory ▫ SIM card ▫ Removable or external memory cards ▫ System server • Checking system servers requires a search warrant or subpoena • SIM card file system is a hierarchical structure
  • 22. • MF: root of the system • DF: directory files • EF: elementary data
  • 23. Understanding Acquisition Procedures for Cell Phones and Mobile Devices • Information that can be retrieved: ▫ Service-related data, such as identifiers for the SIM card and the subscriber ▫ Call data, such as numbers dialed ▫ Message information ▫ Location information • If power has been lost, PINs or other access codes might be required to view files
  • 24. Mobile Forensics Equipment • Mobile forensics is a new science • Biggest challenge is dealing with constantly changing models of cell phones • When you’re acquiring evidence, generally you’re performing two tasks: ▫ Acting as though you’re a PC synchronizing with the device (to download data) ▫ Reading the SIM card • First step is to identify the mobile device
  • 25. Mobile Forensics Equipment (continued) • Make sure you have installed the mobile device software on your forensic workstation • Attach the phone to its power supply and connect the correct cables • After you’ve connected the device ▫ Start the forensics program and begin downloading the available information
  • 26. Mobile Forensics Equipment (continued) • SIM card readers ▫ A combination hardware/software device used to access the SIM card ▫ You need to be in a forensics lab equipped with appropriate antistatic devices ▫ General procedure is as follows:  Remove the back panel of the device  Remove the battery  Under the battery, remove the SIM card from holder  Insert the SIM card into the card reader
  • 27. Mobile Forensics Equipment (continued) • SIM card readers (continued) ▫ A variety of SIM card readers are on the market  Some are forensically sound and some are not ▫ Documenting messages that haven’t been read yet is critical  Use a tool that takes pictures of each screen
  • 28. iPhone Forensics • MacLockPick II ▫ Uses backup files ▫ It can’t recover deleted files • MDBackUp Extract ▫ Analyzes the iTunes mobile sync backup directory
  • 29. Mobile Forensics Tools • Paraben Software Device Seizure Toolbox ▫ Contains cables, SIM card readers, and more • Data Pilot ▫ Similar to Paraben • BitPim ▫ Can view data on many phones, but it's not intended for forensics • MOBILedit! ▫ Has a write-blocker
  • 30. Mobile Forensics Tools • SIMCon ▫ Reads files on SIM cards ▫ Recoveres deleted text messages ▫ Archives files with MD5 and SHA-1 hashes • Software tools differ in the items they display and the level of detail