Cyber Forensics Unit-1 Notes
Cyber Forensics Unit-1 Notes
UNIT- I Introduction of Cybercrime: Types, The Internet spawns crime, Worms versus viruses,
Computers' roles in crimes, Introduction to digital forensics, Introduction to Incident - Incident Response
Methodology –Steps - Activities in Initial Response, Phase after detection of an incident
UNIT-II Initial Response and forensic duplication, Initial Response & Volatile Data Collection from
Windows system -Initial Response & Volatile Data Collection from Unix system – Forensic Duplication:
Forensic duplication: Forensic Duplicates as Admissible Evidence, Forensic Duplication Tool
Requirements, Creating a Forensic. Duplicate/Qualified Forensic Duplicate of a Hard Drive
UNIT – III Forensics analysis and validation: Determining what data to collect and analyze, validating
forensic data, addressing data-hiding techniques, performing remote acquisitions Network Forensics:
Network forensics overview, performing live acquisitions, developing standard procedures for network
forensics, using network tools, examining the honeynet project.
UNIT - IV Current Forensic tools: evaluating computer forensic tool needs, computer forensics software
tools, computer forensics hardware tools, validating and testing forensics software E-Mail Investigations:
Exploring the role of e-mail in investigation, exploring the roles of the client and server in e-mail,
investigating e-mail crimes and violations, understanding e-mail servers, using specialized e-mail forensic
tools. Cell phone and mobile device forensics: Understanding mobile device forensics, understanding
acquisition procedures for cell phones and mobile devices.
UNIT - V Working with Windows and DOS Systems: understanding file systems, exploring Microsoft File
Structures, Examining NTFS disks, Understanding whole disk encryption, windows registry, Microsoft
startup tasks, MS-DOS startup tasks, virtual machines.
TEXT BOOKS:
1. Kevin Mandia, Chris Prosise, “Incident Response and computer forensics”, Tata McGraw Hill, 2006.
2. Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New Delhi.
3. Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart, CENGAGE Learning
REFERENCES:
1. Real Digital Forensics by Keith J. Jones, Richard Bejtiich, Curtis W. Rose, Addison- Wesley Pearson
Education
2. Forensic Compiling, A Tractitioneris Guide by Tony Sammes and Brian Jenkinson, Springer
International edition.
UNIT 1 : Introduction of Cybercrime
• Cybercrime is defined as a crime where a computer is the object of the crime or is used as a tool
to commit an offense.
• A Cyber Criminal may use a device to access a user’s personal information, confidential business
information, government information, or disable a device.
A computer security incident is defined as any unlawful, unauthorized, or unacceptable action that
involves a computer system or a computer network. Such an action can include any of the following
events:
• Embezzlement
• Extortion
• Any unlawful action when the evidence of such action may be stored on computer
media such as fraud, threats, and traditional crimes.
TYPES
Viruses
Malware
DoS Attacks
• Crime using devices to participate in criminal activities
Phishing Emails
Cyberstalking
Identity Theft
Further, there are three major categories that cybercrime falls into:
• Individual
• Property
• Government
The types of methods used and difficulty levels vary depending on the category
• Individual: This category of cybercrime involves one individual distributing malicious or illegal
information online. This can include cyberstalking, distributing pornography and trafficking.
• Property: This is similar to a real life instance of a criminal illegally possessing an individual’s
bank or credit card details. The hacker steals a person’s bank details to gain access to funds,
make purchases online or run phishing scams to get people to give away their information.
• Government: This is the least common cybercrime, but is the most serious offense. A crime
against the government is also known as cyber terrorism
WORM
• Spread much more rapidly. Eg. SQL Slammer worm75,000 victims within ten minutes
VIRUS
• Network Analysis
Communication analysis
Log analysis
Path tracing
• Media Analysis
Disk imaging
Content Analysis
Steganography
• Code Analysis
Reverse Engineering
Exploit review
Initial Response
One of the first steps of any preliminary investigation is to obtain enough information to determine an
appropriate response.
• The goal of an initial response is twofold: Confirm there is an incident, and then retrieve the system’s
volatile data that will no longer be there after you power off the system.
For an initial response, you need to plan your approach to obtain all the information.
• Without affecting any potential evidence, you will be issuing commands with administrator rights on
the victim system, you need to be particularly careful not to destroy or alter the evidence.
• The best way to meet this goal is to prepare a complete response toolkit.
GATHERING-THE-TOOLS
In all incident responses, regardless of the type of incident, it is critical to use trusted commands. For
responding to Windows, we maintain a CD or some storage devices that contain a minimum of the tools
listed
GATHERING-THE-TOOLS
Preparing the Toolkit
• Case number
• Whether or not the response media contains output files or evidence from the victim
system
• Now that you have a forensic toolkit and a methodology, you need to determine exactly
which data to collect. At this point, you want to obtain the volatile data from the
Windows
• NT/2000 system prior to turning off that system. At a minimum, we collect the following
volatile data prior to forensic duplication:
• Now that you know what to collect and how to document your response, you are ready
to retrieve the volatile data.
1) You will be collecting forensic evidence from this machine and storing it on the
“VTELaunchpad.” You will need to reestablish the VTELaunchpad to listen for incoming
connections.
2) You will want to save the collected data in a file called C:\
LinuxCollectiondata.txt or C:\LinuxCollectiondata. cvs.
• Examining and analyzing digital evidence depend on the nature of the investigation
– Attorneys may ask investigators to examine other areas to recover more evidence
– Increases the time and resources needed to extract, analyze, and present evidence
– Criminal investigations require more detailed examination of evidence just before trial
– It’s become more important for prosecution teams to ensure they have analyzed the
evidence exhaustively before trial
• Ensuring the integrity of data collected is essential for presenting evidence in court
– It runs a hash and compares the value with the original hash calculated when the image
was first acquired
• Advanced hex editors offer features not available in digital forensics tools, such as:
• Block-wise hashing
– A process that builds a data set of hashes of sectors from the original file
– Then examines sectors on the suspect’s drive to see whether any other sectors match
– If an identical hash value is found, you have confirmed that the file was stored on the
suspect’s drive
– AccessData has its own hashing database, Known File Filter (KFF)
– KFF filters known program files from view and contains has values of known illegal files
– It compares known file hash values with files on your evidence drive to see if they
contain suspicious data
– Other digital forensics tools can import the NSRL database and run hash comparisons
• ProDiscover
– Has a preference you can enable for using the Auto Verify Image Checksum feature
when image files are loaded
– If the Auto Verify Image Checksum and the hashes in the .eve file’s metadata don’t
match
• ProDiscover will notify that the acquisition is corrupt and can’t be considered reliable evidence
• Techniques:
– Hiding entire partitions
– Bit-shifting
– Using encryption
– If there’s a discrepancy, the tool flags the file as a possible altered file
Hiding Partitions
– You can unassign the partition’s letter, which hides it from view in File Explorer
– Partition Magic, Partition Master, and Linux Grand Unified Bootloader (GRUB)
Hiding Partitions
– Analyze any disk areas containing space you can’t account for
• In ProDiscover, a hidden partition appears as the highest available drive letter set in the BIOS
– Other forensics tools have their own methods of assigning drive letters to hidden
partitions
• UNIT 4 : Current Forensic Tools
– OS
– File system(s)
– Script capabilities
– Automated features
– Types
• Command-line applications
• GUI applications
– Commonly used to copy data from a suspect’s disk drive to an image file
– Acquisition
– Extraction
– Reconstruction
– Reporting
• Validation
– Ensuring the integrity of data being copied
• Discrimination of data
• Subfunctions
– Hashing
– Filtering
• National Software Reference Library (NSRL) has compiled a list of known file hashes
• Subfunctions
– Hashing
– Filtering
• National Software Reference Library (NSRL) has compiled a list of known file hashes
– With this information, you can see whether a file extension is incorrect for the file type
• Most forensics tools can identify header values
• “E-mail investigation is a digital forensics process of finding out evidences from suspect emails
that allows investigator to examine, preserve, and reveal digital evidence”(branch of forensics
science).
• Examine.
• Preserve.
• Carve Evidence.
• Report.
• To carve evidence.
• Presenting an evidence
• E-mail investigation contains the wealth of mails that’s why E-mail forensics investigator must
not only investigate but also retrieve the kind of evidence from mails which is presentable and
• 1. Email spoofing.
• 2.Email frauds.
• 3. Email bombing.
• 5. Defamatory emails.
Try to ignore the use of your own email-id while investigating. Use public severs like yahoo,
Hotmail..,etc.
• Public: [email protected]
• • GUI clients.
• • Web-based clients.
• • Sending time.
• Criminal undertaking.
• Civil litigation.
• E-mail tracing.
• MailXaminer.
• Encase.
• DBXtract.
• Paraben, etc.
o E-mail
o Web pages
o Pictures
o Personal calendars
o Address books
o Music files
o Voice recordings
o GPS data
• Investigating cell phones and mobile devices is one of the most challenging tasks in digital
forensics
– Acting as though you’re a PC synchronizing with the device (to download data)
– SIM card
– Service-related data, such as identifiers for the SIM card and the subscriber
– Message information
– Location information
• If power has been lost, PINs or other access codes might be required to view files.
• Encryption