SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
sComputer Forensic Workshop - 2013
Computer Forensic Investigation
Procedure, tools, and practice
Ahmad Zaid Zam Zami
damhadiaz@gmail.com
About the speaker
sComputer Forensic Workshop - 2013

Bachelor's degree in Electronic Engineering

Digital forensic analyst

GCFA, CHFI, CEH, ENSA, ECIH, CEI

Founder Indonesia Digital Forensic Community

Case involved :
Corporate espionage, data leak, banking fraud,
cyber attack,etc
Agenda
sComputer Forensic Workshop - 2013

Digital forensic introduction

Digital evidence

Computer forensic Procedure

Evidence acquisition

Data organization

Demo
Introduction
sComputer Forensic Workshop - 2013

Today, many business and personal transactions are
conducted electronically

Business professionals regularly negotiate deals by e-mail

People store their personal address books and calendars
on desktop computers or tablet.

People regularly use the Internet for
business and pleasure
Cyber Crime
sComputer Forensic Workshop - 2013

Any illegal act involving a computer and a network

The computer may have been used in the commission of a crime
or it may be the target

Computer viruses, denial-of-service attacks, malware

Fraud, identity theft, phishing, spam, cyber warfare
Introduction
sComputer Forensic Workshop - 2013
“A methodical series of techniques and procedures for gathering
evidence, from computing equipment and various storage devices
and digital media, that can be presented in a court of law
in a coherent and meaningful format” - DR. H.B. Wolfe
Introduction
sComputer Forensic Workshop - 2013

The collection, preservation, analysis and
presentation of digital evidence

Scientific procedure

Develop and test hypotheses that answer questions
about incidents that occurred

Admissible in a court of law
Why is computer forensic important ?
sComputer Forensic Workshop - 2013

Help reconstruct past event or activity

Extend the target of information security to the
wider threat from cybercrime

Show evidence of policy violation or illegal activity

Ensure the overall integrity of network infrastructure
Digital evidence
sComputer Forensic Workshop - 2013
Two basic type of evidence :

Persistent evidence
the data that is stored on a local hard drive and is preserved
when the computer is turned off

Volatile evidence
any data that is stored in memory, or exists in transit,
that will be lost when the computer loses power
or is turned off
Persistent evidence
sComputer Forensic Workshop - 2013

Documents (word, slide, sheet, pdf)

Images

Chat log

Browser history

Registry

Audio / Video

Application

Email

SMS / MMS

Phone book

Call log
Volatile evidence
sComputer Forensic Workshop - 2013

Memory

Network status and connection

Process running

Time information
Procedure
sComputer Forensic Workshop - 2013

Preparation

Preliminary investigation

Site investigation

Evidence acquisition

Preservation

Analysis

Report
Preparation
sComputer Forensic Workshop - 2013

Media is freshly prepared

Forensic workstation is scanned for any malware

Validate all software licenses

Toolkits

Forms
- Computer worksheet forms
- Hard drive worksheet form
Preparation
sComputer Forensic Workshop - 2013

Establish file directories

Essential forms :
- Letter of authorization
- Chain of custody
- Non-Disclosure Agreement
Letter of authorization
sComputer Forensic Workshop - 2013
Chain of custody
sComputer Forensic Workshop - 2013
Evidence worksheet
sComputer Forensic Workshop - 2013
Preliminary investigation
sComputer Forensic Workshop - 2013

Who ?
Profile the target user – are they computer savvy?

What ?
What kind of evidence could be associated with this
case? Images? Documents? Spreadsheets?

When?
How long has it been since the digital activity?

Where?
How do you plan on procuring the digital evidence?
Site investigation
sComputer Forensic Workshop - 2013

Take picture of the scene

Asset tag

Inventory and describe all hardware

Identify every process or network information

Ensure chain of custody form is properly
completed
Order of Volatility
sComputer Forensic Workshop - 2013
● Memory
● Network status and connections
● Process running
● Hard disk
Evidence acquisition
sComputer Forensic Workshop - 2013

Bit-stream imaging (court-certified)

Write blocking device

Static prevention wrist strap

Record initial configuration

Record all activity
Evidence acquisition
sComputer Forensic Workshop - 2013

Physical imaging
- Grab entire drive (MBR)
- Considered best evidence
- Break out the partitions using dd

Logical imaging
- File system partition only
- Useful in obtaining backup of RAID drive
Evidence acquisition
sComputer Forensic Workshop - 2013

Three evidence acquisition method
- Hardware
- Live CD
- Live

Resultant file will be an image file in all three cases
Hardware acquisition
sComputer Forensic Workshop - 2013

Situation : Removed hard drive containing evidence
1. Attach drive adapter
2. Plug into acquisition workstation
3. Image attached drive to a image file

Evidence will be in static state

Volatile evidence not available
Live CD acquisition
sComputer Forensic Workshop - 2013

Situation : Boot into Forensic Live CD

System will be rebooted

Loss of volatile evidence

Hard drive not removed

Image system to attached drive
or file share
Live acquisition
sComputer Forensic Workshop - 2013

Situation : Live System Acquisition

Snapshot of system

System stays power on

Capability to gather volatile evidence

Evidence will be changing while imaging

Image system to a file on attached drive or file shares
Write blocker
sComputer Forensic Workshop - 2013

Prevent any accidental writes to source data

Hardware based
Adapter based placed on hard drive

Software based
Software will not allow writes to system
http://www.cftt.nist.gov/software_write_block.htm
Preservation
sComputer Forensic Workshop - 2013

Create cryptographic hash

Create bit-image copies

Compare the hash results

Lock original disk in a limited container
Analysis of data
sComputer Forensic Workshop - 2013

Only work on the forensic copy

Stay within your scope of work

Analysis step
- Timeline analysis
- Media analysis
- String or byte search
- Data recovery
Questions ?
sComputer Forensic Workshop - 2013

Más contenido relacionado

La actualidad más candente

Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Anti forensic
Anti forensicAnti forensic
Anti forensicMilap Oza
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsHiren Selani
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 

La actualidad más candente (20)

Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
 
Data recovery
Data recoveryData recovery
Data recovery
 

Destacado

Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumOWASP Khartoum
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstationsjkvr100
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...Madan Golla
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...John Bambenek
 
MattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemMattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemRob Meijer
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptOnkar1431
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collectionFakrul Alam
 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum
 
Access lesson 06 Integrating Access
Access lesson 06  Integrating AccessAccess lesson 06  Integrating Access
Access lesson 06 Integrating AccessAram SE
 
Database and Access Power Point
Database and Access Power PointDatabase and Access Power Point
Database and Access Power PointAyee_Its_Bailey
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in englishAqib Memon
 
Monte Carlo G P U Jan2010
Monte  Carlo  G P U  Jan2010Monte  Carlo  G P U  Jan2010
Monte Carlo G P U Jan2010John Holden
 
Lecture1
Lecture1Lecture1
Lecture1rjaeh
 

Destacado (20)

Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
 
MattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemMattockFS Computer Forensic File-System
MattockFS Computer Forensic File-System
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
File000173
File000173File000173
File000173
 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security Session
 
Access lesson 06 Integrating Access
Access lesson 06  Integrating AccessAccess lesson 06  Integrating Access
Access lesson 06 Integrating Access
 
Database and Access Power Point
Database and Access Power PointDatabase and Access Power Point
Database and Access Power Point
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in english
 
Monte Carlo G P U Jan2010
Monte  Carlo  G P U  Jan2010Monte  Carlo  G P U  Jan2010
Monte Carlo G P U Jan2010
 
Lecture1
Lecture1Lecture1
Lecture1
 

Similar a Computer forensic

Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfGnanavi2
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...
Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...
Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...computerforensicsresources
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Damir Delija
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Digital evidence and the information security manager
Digital evidence and the information security managerDigital evidence and the information security manager
Digital evidence and the information security managerBradley Schatz
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionIJERA Editor
 
Fusing digital forensics, electronic discovery and incident response
Fusing digital forensics, electronic discovery and incident responseFusing digital forensics, electronic discovery and incident response
Fusing digital forensics, electronic discovery and incident responseDr. Richard Adams
 
Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3sabtolinux
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 

Similar a Computer forensic (20)

Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...
Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...
Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Securitarian
SecuritarianSecuritarian
Securitarian
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Digital evidence and the information security manager
Digital evidence and the information security managerDigital evidence and the information security manager
Digital evidence and the information security manager
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data Acquisition
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Fusing digital forensics, electronic discovery and incident response
Fusing digital forensics, electronic discovery and incident responseFusing digital forensics, electronic discovery and incident response
Fusing digital forensics, electronic discovery and incident response
 
Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 

Computer forensic

  • 1. sComputer Forensic Workshop - 2013 Computer Forensic Investigation Procedure, tools, and practice Ahmad Zaid Zam Zami damhadiaz@gmail.com
  • 2. About the speaker sComputer Forensic Workshop - 2013  Bachelor's degree in Electronic Engineering  Digital forensic analyst  GCFA, CHFI, CEH, ENSA, ECIH, CEI  Founder Indonesia Digital Forensic Community  Case involved : Corporate espionage, data leak, banking fraud, cyber attack,etc
  • 3. Agenda sComputer Forensic Workshop - 2013  Digital forensic introduction  Digital evidence  Computer forensic Procedure  Evidence acquisition  Data organization  Demo
  • 4. Introduction sComputer Forensic Workshop - 2013  Today, many business and personal transactions are conducted electronically  Business professionals regularly negotiate deals by e-mail  People store their personal address books and calendars on desktop computers or tablet.  People regularly use the Internet for business and pleasure
  • 5. Cyber Crime sComputer Forensic Workshop - 2013  Any illegal act involving a computer and a network  The computer may have been used in the commission of a crime or it may be the target  Computer viruses, denial-of-service attacks, malware  Fraud, identity theft, phishing, spam, cyber warfare
  • 6. Introduction sComputer Forensic Workshop - 2013 “A methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices and digital media, that can be presented in a court of law in a coherent and meaningful format” - DR. H.B. Wolfe
  • 7. Introduction sComputer Forensic Workshop - 2013  The collection, preservation, analysis and presentation of digital evidence  Scientific procedure  Develop and test hypotheses that answer questions about incidents that occurred  Admissible in a court of law
  • 8. Why is computer forensic important ? sComputer Forensic Workshop - 2013  Help reconstruct past event or activity  Extend the target of information security to the wider threat from cybercrime  Show evidence of policy violation or illegal activity  Ensure the overall integrity of network infrastructure
  • 9. Digital evidence sComputer Forensic Workshop - 2013 Two basic type of evidence :  Persistent evidence the data that is stored on a local hard drive and is preserved when the computer is turned off  Volatile evidence any data that is stored in memory, or exists in transit, that will be lost when the computer loses power or is turned off
  • 10. Persistent evidence sComputer Forensic Workshop - 2013  Documents (word, slide, sheet, pdf)  Images  Chat log  Browser history  Registry  Audio / Video  Application  Email  SMS / MMS  Phone book  Call log
  • 11. Volatile evidence sComputer Forensic Workshop - 2013  Memory  Network status and connection  Process running  Time information
  • 12. Procedure sComputer Forensic Workshop - 2013  Preparation  Preliminary investigation  Site investigation  Evidence acquisition  Preservation  Analysis  Report
  • 13. Preparation sComputer Forensic Workshop - 2013  Media is freshly prepared  Forensic workstation is scanned for any malware  Validate all software licenses  Toolkits  Forms - Computer worksheet forms - Hard drive worksheet form
  • 14. Preparation sComputer Forensic Workshop - 2013  Establish file directories  Essential forms : - Letter of authorization - Chain of custody - Non-Disclosure Agreement
  • 15. Letter of authorization sComputer Forensic Workshop - 2013
  • 16. Chain of custody sComputer Forensic Workshop - 2013
  • 18. Preliminary investigation sComputer Forensic Workshop - 2013  Who ? Profile the target user – are they computer savvy?  What ? What kind of evidence could be associated with this case? Images? Documents? Spreadsheets?  When? How long has it been since the digital activity?  Where? How do you plan on procuring the digital evidence?
  • 19. Site investigation sComputer Forensic Workshop - 2013  Take picture of the scene  Asset tag  Inventory and describe all hardware  Identify every process or network information  Ensure chain of custody form is properly completed
  • 20. Order of Volatility sComputer Forensic Workshop - 2013 ● Memory ● Network status and connections ● Process running ● Hard disk
  • 21. Evidence acquisition sComputer Forensic Workshop - 2013  Bit-stream imaging (court-certified)  Write blocking device  Static prevention wrist strap  Record initial configuration  Record all activity
  • 22. Evidence acquisition sComputer Forensic Workshop - 2013  Physical imaging - Grab entire drive (MBR) - Considered best evidence - Break out the partitions using dd  Logical imaging - File system partition only - Useful in obtaining backup of RAID drive
  • 23. Evidence acquisition sComputer Forensic Workshop - 2013  Three evidence acquisition method - Hardware - Live CD - Live  Resultant file will be an image file in all three cases
  • 24. Hardware acquisition sComputer Forensic Workshop - 2013  Situation : Removed hard drive containing evidence 1. Attach drive adapter 2. Plug into acquisition workstation 3. Image attached drive to a image file  Evidence will be in static state  Volatile evidence not available
  • 25. Live CD acquisition sComputer Forensic Workshop - 2013  Situation : Boot into Forensic Live CD  System will be rebooted  Loss of volatile evidence  Hard drive not removed  Image system to attached drive or file share
  • 26. Live acquisition sComputer Forensic Workshop - 2013  Situation : Live System Acquisition  Snapshot of system  System stays power on  Capability to gather volatile evidence  Evidence will be changing while imaging  Image system to a file on attached drive or file shares
  • 27. Write blocker sComputer Forensic Workshop - 2013  Prevent any accidental writes to source data  Hardware based Adapter based placed on hard drive  Software based Software will not allow writes to system http://www.cftt.nist.gov/software_write_block.htm
  • 28. Preservation sComputer Forensic Workshop - 2013  Create cryptographic hash  Create bit-image copies  Compare the hash results  Lock original disk in a limited container
  • 29. Analysis of data sComputer Forensic Workshop - 2013  Only work on the forensic copy  Stay within your scope of work  Analysis step - Timeline analysis - Media analysis - String or byte search - Data recovery