Forensics - Manual 1 Flashcards
What is computer forensics?
The process of acquiring and analysing data stored on some form of physical storage media. The acquired data needs to not be corrupted and acceptable to a court of law. Includes recovery of hidden, deleted data, file identification.
Two types of digital data
Where information is gathered through internet
Where information is gathered through fragile data stored in electronic, optical or magnetic storage media (floppy, hard disk)
Some requirements for Computer Forensics Applications
- Read any IDE or SCSI hard drive or CD-ROM and replicate an exact snapshot of the disk to an evidence file.
- Password Cracker.
- View the entire drive imagine, including hidden and unallocated disk space and search for keywords
- Analyse and authenticate file signatures to find those renamed to conceal contents.
- Built in picture, gallery view.
- Acquire and preview via network cable
- View files without changing date time stamp and contents.
Principles of General Forensics
- Take Appropriate Anti-contamination precautions
- Crime scenes should be searched systematically and thoroughly
- Digital evidence to be examined in lab rather than at scene, only scene if removal impractical
- Laboratory rules of evidence management to be applied to all evidence.
- All times submitted for forensics should be reviewed for integrity of packaging
- All activity related to evidence access and examination to be documented.
- Any anti-contamination precautions to be done before examination.
- Health and Safety of evidence. All personel to take adequate precautions to preserve evidence from hazards such as electrical ones.
- Maintain forensic workplace temperature
- read and adhere to equipment manufacturer’s instructions for lab tools.
- All personnel to be properly trained
- Mirror image obtained should be authenticated via HAS value.
Cardinal rules of computer forensics
- Never mishandle evidence
- Never work on original evidence
- Never trust the subject’s Operating system
- Document all findings
- Results should be repeatable, reproducible and verifiable.
Manner of evidence acquistion
- Digital data is fragile, so data should be preserved against accidental manipulation. Make a bit stream mirror image of the media on sterile media of capacity larger.
- Acquire the original digital evidence in a manner that protects the evidence.
Shutdown procedure when preserving evidence
- Power down in a way that won’t corrupt the integrity of the files. Even viewing files would change it. it might no longer be original evidence.
- Opening a file changes its time and date accessed.
- Consideration should be given to other storage media, handwritten notes, and documents found in the vicinity of the computer.
- No one should be allowed contact with the storage media or computer involved in the security incident. people can wipe entire drives with a few commands
- Determine the operating system, for some, merely pulling plug is preferred, for others, it might crash the hard drive. Windows generates new files and opens existing files when it boots, this might destroy evidence.
Some exceptional circumstances when you don’t remove storage devices from the subejct system.
RAID systems – Removing disks individually may render data unusable.
Laptop systems – System drives may be inaccessible or unusable when detached.
Hardware dependency (legacy equipment) – Older drives may not be readable in newer systems.
Equipment availability – Lack of necessary equipment (e.g., network storage) may require using the original system.
What to do when you can’t remove storage device?
Reattach subject storage device and connect examiner’s evidence storage device (e.g., external HDD, tape drive).
Ensure examiner’s storage is forensically clean before acquisition.
Enable write protection (hardware or software) to preserve original evidence.
Create a known value (CRC, hash) to verify evidence integrity.
Check drive geometry to account for all data (including hidden areas).
Capture drive serial numbers and host-specific data.
Acquire evidence using appropriate tools:
Stand-alone duplication software.
Forensic analysis software suite.
Dedicated hardware devices.
Ways to acquire a drive safely
Local with Write-Block (Safe in Windows)
Uses a hardware write-blocker (e.g., FastBloc) to prevent writes.
Suspect drive connected via IDE/SCSI to forensic PC.
Local “Drive-to-Drive” (Fast but Risky)
Suspect drive installed in examiner’s PC (or examiner’s drive in suspect’s PC).
Must boot from a forensic OS (e.g., EnCase DOS) to avoid accidental writes.
Parallel-Port Cable (Slow but Secure)
Connects suspect PC (in server mode via boot disk) to examiner’s PC.
No risk of writes; useful when other methods fail.
Cross-Over Network (Faster than Cable)
Similar to parallel but uses Ethernet.
Suspect PC boots into server mode for secure transfer.
What is ambient Data
In backup, ambient data will not be copied. This is an area
where the most important source for the evidence could be found. Ambient data is a data stored in
Windows swap file, unallocated space and file slack.