SlideShare una empresa de Scribd logo
1 de 62
CYBER FORENSIC
K. B. JENA
ASSTT. DIRECTOR &
SCIENTIST ‘C’
CFSL, KOLKATA
DOCUMENT FORENSIC
TO
DIGITAL DOCUMENT FORENSIC
• PRESENCE OF SCANNED AND PRINTED DOCUMENTS
DURING EXAMINATION OF FORENSIC DOCUMENTS.
• EXAMINATION OF COMPUTERS CONTAINING DIGITAL
COPY THOUGHT TO BE A WAY TO FIX RESPONSIBILITY.
*first case of computer forensic was taken up in the year
2004
TYPE OF CASES EXAMINED
AROUND 2008-10
• THEFT OF DESIGNS AND CUSTORMES LIST BY PARTNERS/
EMPOYESS WHILE LEAVING COMPANY AND OFFERING LOW
PRICE TO EXISTING CUSTOMERS FROM OLD COMPANY
EMAIL.
• THREATNING EMAIL.
• CUSTOMERS DUPED BY TRAVELLING AGENCY FOR FOREIGN
TOUR.
• FLIGHT/ RAIL TICKETS PURCHASED ONLINE BY CREDIT CARD
DETAILS OF OTHERS
• *20-25 cases in year
CHANGE IN NATURE OF CASES IN
2011-2013
• Cases related to fake account in social site(orkut, facebook,
skype, twitter)
• Terrorist communications by internet
• Computers used for transaction of fictitious companies
online/ offline.
• Data of national interest leaked vide internet.
• Online circulation Of defamatory material.
• Mobile communication by sms/ mms/voice recording/ still
and video recording
* 150 cases per year
Elaborate planning, more details and diverse tools requirement
for examination.
*210 cases received
2014-15
• mobile used as communication for all social network and
email activities.
• Laptop replaced desktops.
• Laptop size grew smaller
• Request for CCTV footages increased.
• New applications/ apps on mobile for social networking
(whatsapp, viber, line)
• Apps for financial transaction/ banking /billing.
• Server examination requirements
Seizure of digital evidence
• Why they are called best practices.
• Practices differ(depends on working
environment).
• Need to adopt a Guideline.
• Stringent or Diverse.
• Need to Document.
CHAIN OF CUSTODY
of computer evidence
• Physical(sl. No, IMEI)
• Digital(Hash value)
SCENE OF CRIME
• WHEN DESKTOP COMPUTER IS OFF
• WHEN DESKTOP COMPUTER IS ON
• ANY HARD DISK INSIDE?
• WHEN LAPTOP COMPUTER IS ON?
• WHEN LAPTOP COMPUTER IS OFF?
• WHTHER ACCUSED SHOULD BE ALLOWED TO
BACKUP DATA?
HOW DAMAGING FOR INVESTIGATION
READ LABELS(os, hard disk capacity, repairs in
between)
SEIZURE OF MOBILE/ SIM / MEMORY CARD
• ONE SIM vs DUAL SIM
• REMOVE BATTERY
• FLIGHT MODE/ BLOCK SIM
• SIM LOST
• MEMORY CARD.
• PATTERN LOCK/ PASSWORD ON SCREEN
• MEMORY CARD LOCKED.
• SEIZE POWER CABLE/ CONNECTORS
CCTV SEIZURE
• TIME / DATE CHECK BEFORE SWITCHING OFF.
• CHECK CAPACITY OF THE HARD DISK INSIDE.
• DVR BOX IS REQUIRED ALONGWITH
POWERCORD .
• BACKED UP FOOTAGE ACUIRED AT THE CRIME
SCENE.
NETWORKED COMPUTER
• DELEGATE EXPERTS TO ACUIRE DATA
• ADVICE OF THE NETWORK ADMINISTRATOR /
SERVICE PROVIDER NEEDED.
• POWERING ON AT ORIGINAL SITE IS
REQUIRED.
ONLY HARD DISK/ WHOLE
COMPUTER
• ONLY HARD DISK IF DATA IS QUESTINED
• DESKTOP/LAPTOP CONCERNED IF FUNCTIONS
OF COMPUTER IS QUESTIONED/ SPECIAL.
TOOLS REQUIRED FOR
PREVIEW/DUPLICATION
• WRITE BLOCKERS
• IDENTIFICATION OF DIFFERENT OS
• NEW HARD DISK/ PROPERLY WIPED HARD
DISK
• VALIDATION OF HARDWARES/ SOFTWARES
• HASH VALUE
CLONING VS BIT STREAM IMAGE
• CLONING FOR REBOOT
• BIT STREAM IMAGE FOR RESTORE.
• HASH VALUE
WHAT MAY ESCAPE DURING
PURVIEW
• SLACK SPACE
• WEB MAIL
• INTERNET ACTIVITY
• HIDDEN FILES
• FILES NOT SUPPORTED BY SOFTWARE.
• HOST PROTECTED AREA
• DEVICE CONFIGURATION OVERLAY
• BACK UP OF DEVICES (COMPRESSED FILES, IMAGE OF CD/DVD,
BACK OF MOBILE, BACK UP OF CHAT HISTORY
DIFFERENT APPROACH
• REGISTRY FORENSIC
• BROWSER FORENSIC
• SYSTEM RESTORE POINT FORENSIC
• VIRTUAL MACHINE FORENSIC
• CLOUD FORENSIC
• NETWORK FORENSIC
MATERIAL FOR SEARCH
• TEXT SEARCH
• IMAGE SEARCH
• VIDEO SEARCH
• EMAIL SEARCH
EXAMINATION
• INTERNET ARTIFACTS
• ARCHIVED/ WEBMAIL
• UNALLOCATED CLUSTER
• FILE SLACK
SYNCHRONISE/ BACK UP/ CREATE SYSTEM
RESTORE
REMOVABLE DRIVE
EXHIBITS
 CPU
 HARD DISK
 CD/DVD/FLOPPY
 PENDRIVE/ EXTERNAL HARD DISK
 MOBILE PHONE/SIM CARD/MEMORY
CARD
 DIGITAL VIDEO RECOREDER
 STILL/VIDEO CAMERA/MEMORY CARD
 SPY CAM
 INTERNET HISTORY
 FILES DOWNLODED/UPLOADED FROM
INTERNET
 COOKIES
 WEBMAIL
 SOCIAL NETWORK ARTIFACTS
 CHAT HISTORY
 FILES FROM PRIVATE
NETWORK(BLUETOOTH, WIFI)
 INTERNET HISTORY
 FILES DOWNLODED/UPLOADED FROM
INTERNET
 COOKIES
 WEBMAIL
 SOCIAL NETWORK ARTIFACTS
 CHAT HISTORY
 FILES FROM PRIVATE
NETWORK(BLUETOOTH, WIFI)
DIFFRENCE BETWEEN DATA EXTRACTION
AND COMPUTER FORENSIC
 IT MUST BE PROVED THAT CHAIN OF
CUSTODY IS PROPERLY FOLLOWED
 NOTHING HAS BEEN DELETED, ADDED
OR CHANGED DURING EXAMINATION.
 THE PROCESS OF SUCH ASSURANCE
STARTS FROM CRIME SCENE.
 BEST PRACTICES FOR SEIZURE OF
DIGITAL EVIDENCE
 HASH VALUE
UNCOMMON CASES
 PICTURES IN EXCEL SHEET
 IMAGE OF HANDWRITTEN NOTES AS
EMAIL MESSAGES
 FORMATTED HARD DISK
 VOICE RECORDING AS SUICIDE NOTE
MOBILE PHONE EXAMINATION
 SIM
 INTERNAL MEMORY
 MEMORY CARD
DATA IN SIM
 LOCATION
 ICCID(INTEGRATED CIRCUIT CARD
IDENTIFIER)
 IMSI(INTERNATIONAL MOBILE
SUBSCRIBER IDENTITY)
 SERVICE PROVIDER
 CONTACT
 SMS
 LAST CALL DETAILS
INTERNAL MOBILE MEMORY
 IMEI
 CONTACTS
 SMS
 MOBILE SETTINGS
 TO DO LIST
 NOTES
 EMAIL/CHAT/SOCIAL NETWORK SITE
DETAILS
 INTERNET HISTORY
MEMORY CARD
 IMAGE/ VIDEO/ AUDIO
 ARCHIVED DATA/ SMS BACK UP/
WHATSAPP
 INTERNET DATA
 HISTORY OF USE IN OTHER DEVICES
 DELETED DATA
CHALLENGES
 PASSWORD PROTECTION
 LOST SIM
 NOT SUPPORTED BY TOOLS
 PROBLEM IN SWITCHING ON THE
MOBILE.(broken/ blast cases)
CCTV CASES
 PROPRIETORY OPREATING SYSTEM
 REQUIRES OWN HARDWARE FOR
EXAMINATION.
 INHERENT CLOCK SETTINGS CAN NOT
BE CROSS CHECKED
 DELETED FILES CAN NOT BE
RECOVERED
REQUIREMENTS WHILE
SUBMITTING CASE
1. PROPER FORMAT
2. PROPER SEALING AND LABELLING OF
EXHIBITS
3. SIGNATURE AND SEAL OF AUTHORITY
4. ATTESTED COPY OF FIR
5. REQUIREMENT OF HARD DISK
PROPER DESCRIPTION OF
EXHIBITS IN FORWARDING
LETTER
• CPU / LAPTOP
• HARD DISK
• MOBILE PHONE
• CCTV
QUERY
FORMAT OF QUERY
SUPPORTING MATERIAL
WHEN QUERY IS SOCIAL
NETWORK SITE RELATED
RELATED EMAIL ADDRESS
PROFILE NAME
SCREENSHOT OF ALLEGED PAGE
ALLEGED IMAGE VIDEO
CHAT ROOM
CHAT HISTORY
QUERY REGARDING ACTIVITY OF
A COMPANY
DOCUMENT RELATED TO ALLEGED
ACTIVITIES.
WHEN QUERY IS IMAGE/ VIDEO
RELATED
COPY OF ALLEGED IMAGE /VIDEO
WHEN QUERIES DO NOT SERVE
PURPOSE.
1. MISSING NAME OF THE COMPANY.
2. ASKING RANDOM SYSTEM RELATED
QUERIES.
3. ALL EMAILS/ CREDIT CARDS/ IP
ADDREESS
4. ALL USERS
5. MISSING INTERNET HISTORY AND
KEYWORDS
JUDICIOUS DISTRIBUTION/
SEIZURE OF EXHIBIT
CAMERA WITH DVR
MONITOR WITH CPU
MODEM WITH LAPTOP
DETACHED HARD DISKS OF SERVER
BUNDLING 10 BRANCHES OF A COMPANY
IN 01 BIG CASE
REQUIREMENT OF HARD DISK
COPY
CLONE/ MIRROR IMAGE
WHAT ARE CHANCES OF MISSING
EVIDENCE WHEN INVESTIGATING
AGENCY DECIDES TO SEE EVIDENCE
THEMSELVE.
Multiple queries
What is ip address used in this computer
What is mac address used in this computer
What are programs installed in this computer
Who are users of this computer
Whether this computer was used for email.
Which modem was used for connecting to
internet
Traslate to single query
WHETHER THE MAILS AT ANNEXURE- A
WAS SENT RECEIVED FROM THIS
COMPUTER.
Multiple queries
What are the accounting packages installed
How many xls files are there
How many word files are there
What is opreating system of the computer
Are there any password or encrypted files
What are different types of data avillable in the
system
any deleted files are there.
Translate to single query
Please provide all the data related to company
and any simmilar document related to
documents at annexure a b c
What areas change when a FILE is written?
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
Root C
FILE
FILE
FILE
FILE
Reserved
Area
Writing a file
What areas change when a FILE is written?
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
Root C
FILE
FILE
FILE
FILE
Reserved
Area
Filename Start Cluster Size
FILE 2 1024
Unused Directory Entry
Unused Directory Entry
Directory entry is created
Writing a file
What areas change when a FILE is written?
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
Root C
FILE
FILE
FILE
FILE
Reserved
Area
Filename Start Cluster Size
FILE 2 1024
Unused Directory Entry
Unused Directory Entry
Directory entry is created
2
E
6
0
10
0
3
0
7
0
11
0
4
0
8
0
12
0
5
0
9
0
13
0
FATs are updated
Writing a file
What areas change when a FILE is written?
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
Root C
FILE
FILE
FILE
FILE
Reserved
Area
Filename Start Cluster Size
FILE 2 1024
Unused Directory Entry
Unused Directory Entry
Directory entry is created
2
E
6
0
10
0
3
0
7
0
11
0
4
0
8
0
12
0
5
0
9
0
13
0
FATs are updated
FILE contents
written to data area
Writing a file
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
Root C
FILE
FILE
FILE
FILE
Reserved
Area
What areas change when a FILE is deleted?
Deleting a file
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
RootC
FILE
FILE
FILE
FILE
Reserved
Area
Filename Start Cluster Size
 ILE 2 1024
Unused Directory Entry
Unused Directory Entry
First character of the Directory
entry is changed to 
Deleting a file
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
Root C
FILE
FILE
FILE
FILE
Reserved
Area
FAT entries are ed
Filename Start Cluster Size
 ILE 2 1024
Unused Directory Entry
Unused Directory Entry
First character of the Directory
entry is changed to 
0
6
0
10
0
3
0
7
0
11
0
4
0
8
0
12
0
5
0
9
0
13
0
2
Deleting a file
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root D
FAT2
Root D
Root D
Root D
FILE
FILE
FILE
FILE
Reserved
Area
FAT entries are ed
Filename Start Cluster Size
 ILE 2 1024
Unused Directory Entry
Unused Directory Entry
First character of the Directory
entry is changed to 
Data area is not changed !
0
6
0
10
0
3
0
7
0
11
0
4
0
8
0
12
0
5
0
9
0
13
0
2
Deleting a file
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
Root C
FILE
FILE
FILE
FILE
Reserved
Area
What areas change when a partition is reformatted?
Reformatting
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
Root C
FILE
FILE
FILE
FILE
Reserved
Area
Three areas change when a partition is reformatted
Filename Start Cluster Size
Unused Directory Entry
Unused Directory Entry
Unused Directory Entry
Root Directory entries are ed
Reformatting
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
Root C
FILE
FILE
FILE
FILE
Reserved
Area
Three areas change when a partition is reformatted
Filename Start Cluster Size
Unused Directory Entry
Unused Directory Entry
Unused Directory Entry
Root Directory entries are ed
2
0
6
0
10
0
3
0
7
0
11
0
4
0
8
0
12
0
5
0
9
0
13
0
FAT entries are ed
Reformatting
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
Root C
FILE
FILE
FILE
FILE
Reserved
Area
Three areas change when a partition is reformatted
Filename Start Cluster Size
Unused Directory Entry
Unused Directory Entry
Unused Directory Entry
Root Directory entries are ed
Boot Record is written
2
0
6
0
10
0
3
0
7
0
11
0
4
0
8
0
12
0
5
0
9
0
13
0
FAT entries are ed
MBR
FAT1
BR
FAT1
FAT1
FAT2
FAT2
Root C
FAT2
Root C
Root C
Root C
FILE
FILE
FILE
FILE
Reserved
Area
Three areas change when a partition is reformatted
Filename Start Cluster Size
Unused Directory Entry
Unused Directory Entry
Unused Directory Entry
Root Directory entries are ed
Boot Record is written
2
0
6
0
10
0
3
0
7
0
11
0
4
0
8
0
12
0
5
0
9
0
13
0
FAT entries are ed
Cluster 2
Cluster 2
Cluster 2
Cluster 2
Cluster 2
Cluster 2
Cluster 2
Cluster 2
What are the two
types of slack?
RAM Slack
RAM Slack is the area
from the end of the file
to the end of that
sector.
- Comes from RAM
File
File
File
File
Slack Space
Cluster 2
Cluster 2
Cluster 2
Cluster 2
Cluster 2
Cluster 2
Cluster 2
Cluster 2
RAM Slack
Residual
Slack
Residual
Slack
Residual
Slack
Residual data slack is
the area from the end of
RAM slack to the end of
the cluster – whatever
was on the media before.
File
File
File
File
Slack Space
 THANK YOU.

Más contenido relacionado

Similar a PRESENTATIONWBJA-1.ppt

Better Results. Less Work. Optimize IT with Mainframe Visibility in Splunk
Better Results. Less Work. Optimize IT with Mainframe Visibility in SplunkBetter Results. Less Work. Optimize IT with Mainframe Visibility in Splunk
Better Results. Less Work. Optimize IT with Mainframe Visibility in SplunkPrecisely
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityPaul Morse
 
Unit-2 Process of Digital Forensics [Autosaved].pptx
Unit-2 Process of Digital Forensics [Autosaved].pptxUnit-2 Process of Digital Forensics [Autosaved].pptx
Unit-2 Process of Digital Forensics [Autosaved].pptxSunny94841
 
Toward low-latency Java applications - javaOne 2014
Toward low-latency Java applications - javaOne 2014Toward low-latency Java applications - javaOne 2014
Toward low-latency Java applications - javaOne 2014John Davies
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hackingAmbuj Kumar
 
NEDAS Boston Symposium - Presentations July 12, 2017
NEDAS Boston Symposium - Presentations July 12, 2017NEDAS Boston Symposium - Presentations July 12, 2017
NEDAS Boston Symposium - Presentations July 12, 2017Ilissa Miller
 
Alfresco Security Best Practices 2014
Alfresco Security Best Practices 2014Alfresco Security Best Practices 2014
Alfresco Security Best Practices 2014Toni de la Fuente
 
An Evolving Era of Botnet Empires @ BSides Las Vegas
An Evolving Era of Botnet Empires @ BSides Las VegasAn Evolving Era of Botnet Empires @ BSides Las Vegas
An Evolving Era of Botnet Empires @ BSides Las VegasAndrea Scarfo
 
Whatever floats your boat desktop or cloud
Whatever floats your boat desktop or cloudWhatever floats your boat desktop or cloud
Whatever floats your boat desktop or cloudIpro Tech
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collectiongagan deep
 
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno OvereinderHSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno OvereinderSplend
 
DIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONDIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONAmina Baha
 
Finding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsFinding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsNetFort
 
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsMemory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsJared Greenhill
 
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...BCS ProSoft
 
iOS Application Security Testing
iOS Application Security TestingiOS Application Security Testing
iOS Application Security TestingBlueinfy Solutions
 
The Details That Matter: Kafka in Production, at Scale with Or Arnon and Elad...
The Details That Matter: Kafka in Production, at Scale with Or Arnon and Elad...The Details That Matter: Kafka in Production, at Scale with Or Arnon and Elad...
The Details That Matter: Kafka in Production, at Scale with Or Arnon and Elad...HostedbyConfluent
 

Similar a PRESENTATIONWBJA-1.ppt (20)

Better Results. Less Work. Optimize IT with Mainframe Visibility in Splunk
Better Results. Less Work. Optimize IT with Mainframe Visibility in SplunkBetter Results. Less Work. Optimize IT with Mainframe Visibility in Splunk
Better Results. Less Work. Optimize IT with Mainframe Visibility in Splunk
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
Unit-2 Process of Digital Forensics [Autosaved].pptx
Unit-2 Process of Digital Forensics [Autosaved].pptxUnit-2 Process of Digital Forensics [Autosaved].pptx
Unit-2 Process of Digital Forensics [Autosaved].pptx
 
Toward low-latency Java applications - javaOne 2014
Toward low-latency Java applications - javaOne 2014Toward low-latency Java applications - javaOne 2014
Toward low-latency Java applications - javaOne 2014
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
5 Components of Compliant Backups
5 Components of Compliant Backups5 Components of Compliant Backups
5 Components of Compliant Backups
 
NEDAS Boston Symposium - Presentations July 12, 2017
NEDAS Boston Symposium - Presentations July 12, 2017NEDAS Boston Symposium - Presentations July 12, 2017
NEDAS Boston Symposium - Presentations July 12, 2017
 
Alfresco Security Best Practices 2014
Alfresco Security Best Practices 2014Alfresco Security Best Practices 2014
Alfresco Security Best Practices 2014
 
An Evolving Era of Botnet Empires @ BSides Las Vegas
An Evolving Era of Botnet Empires @ BSides Las VegasAn Evolving Era of Botnet Empires @ BSides Las Vegas
An Evolving Era of Botnet Empires @ BSides Las Vegas
 
Whatever floats your boat desktop or cloud
Whatever floats your boat desktop or cloudWhatever floats your boat desktop or cloud
Whatever floats your boat desktop or cloud
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
 
Forensic
ForensicForensic
Forensic
 
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno OvereinderHSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
 
DIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONDIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATION
 
Finding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsFinding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analytics
 
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsMemory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
 
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
 
iOS Application Security Testing
iOS Application Security TestingiOS Application Security Testing
iOS Application Security Testing
 
BRKSEC-3144.pdf
BRKSEC-3144.pdfBRKSEC-3144.pdf
BRKSEC-3144.pdf
 
The Details That Matter: Kafka in Production, at Scale with Or Arnon and Elad...
The Details That Matter: Kafka in Production, at Scale with Or Arnon and Elad...The Details That Matter: Kafka in Production, at Scale with Or Arnon and Elad...
The Details That Matter: Kafka in Production, at Scale with Or Arnon and Elad...
 

Último

Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...amitlee9823
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...amitlee9823
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...amitlee9823
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...only4webmaster01
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 

Último (20)

Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 

PRESENTATIONWBJA-1.ppt

  • 1. CYBER FORENSIC K. B. JENA ASSTT. DIRECTOR & SCIENTIST ‘C’ CFSL, KOLKATA
  • 2. DOCUMENT FORENSIC TO DIGITAL DOCUMENT FORENSIC • PRESENCE OF SCANNED AND PRINTED DOCUMENTS DURING EXAMINATION OF FORENSIC DOCUMENTS. • EXAMINATION OF COMPUTERS CONTAINING DIGITAL COPY THOUGHT TO BE A WAY TO FIX RESPONSIBILITY. *first case of computer forensic was taken up in the year 2004
  • 3. TYPE OF CASES EXAMINED AROUND 2008-10 • THEFT OF DESIGNS AND CUSTORMES LIST BY PARTNERS/ EMPOYESS WHILE LEAVING COMPANY AND OFFERING LOW PRICE TO EXISTING CUSTOMERS FROM OLD COMPANY EMAIL. • THREATNING EMAIL. • CUSTOMERS DUPED BY TRAVELLING AGENCY FOR FOREIGN TOUR. • FLIGHT/ RAIL TICKETS PURCHASED ONLINE BY CREDIT CARD DETAILS OF OTHERS • *20-25 cases in year
  • 4. CHANGE IN NATURE OF CASES IN 2011-2013 • Cases related to fake account in social site(orkut, facebook, skype, twitter) • Terrorist communications by internet • Computers used for transaction of fictitious companies online/ offline. • Data of national interest leaked vide internet. • Online circulation Of defamatory material. • Mobile communication by sms/ mms/voice recording/ still and video recording * 150 cases per year
  • 5. Elaborate planning, more details and diverse tools requirement for examination. *210 cases received
  • 6. 2014-15 • mobile used as communication for all social network and email activities. • Laptop replaced desktops. • Laptop size grew smaller • Request for CCTV footages increased. • New applications/ apps on mobile for social networking (whatsapp, viber, line) • Apps for financial transaction/ banking /billing. • Server examination requirements
  • 7. Seizure of digital evidence • Why they are called best practices. • Practices differ(depends on working environment). • Need to adopt a Guideline. • Stringent or Diverse. • Need to Document.
  • 8. CHAIN OF CUSTODY of computer evidence • Physical(sl. No, IMEI) • Digital(Hash value)
  • 9. SCENE OF CRIME • WHEN DESKTOP COMPUTER IS OFF • WHEN DESKTOP COMPUTER IS ON • ANY HARD DISK INSIDE? • WHEN LAPTOP COMPUTER IS ON? • WHEN LAPTOP COMPUTER IS OFF? • WHTHER ACCUSED SHOULD BE ALLOWED TO BACKUP DATA?
  • 10. HOW DAMAGING FOR INVESTIGATION READ LABELS(os, hard disk capacity, repairs in between)
  • 11. SEIZURE OF MOBILE/ SIM / MEMORY CARD • ONE SIM vs DUAL SIM • REMOVE BATTERY • FLIGHT MODE/ BLOCK SIM • SIM LOST • MEMORY CARD. • PATTERN LOCK/ PASSWORD ON SCREEN • MEMORY CARD LOCKED. • SEIZE POWER CABLE/ CONNECTORS
  • 12. CCTV SEIZURE • TIME / DATE CHECK BEFORE SWITCHING OFF. • CHECK CAPACITY OF THE HARD DISK INSIDE. • DVR BOX IS REQUIRED ALONGWITH POWERCORD . • BACKED UP FOOTAGE ACUIRED AT THE CRIME SCENE.
  • 13. NETWORKED COMPUTER • DELEGATE EXPERTS TO ACUIRE DATA • ADVICE OF THE NETWORK ADMINISTRATOR / SERVICE PROVIDER NEEDED. • POWERING ON AT ORIGINAL SITE IS REQUIRED.
  • 14. ONLY HARD DISK/ WHOLE COMPUTER • ONLY HARD DISK IF DATA IS QUESTINED • DESKTOP/LAPTOP CONCERNED IF FUNCTIONS OF COMPUTER IS QUESTIONED/ SPECIAL.
  • 15. TOOLS REQUIRED FOR PREVIEW/DUPLICATION • WRITE BLOCKERS • IDENTIFICATION OF DIFFERENT OS • NEW HARD DISK/ PROPERLY WIPED HARD DISK • VALIDATION OF HARDWARES/ SOFTWARES • HASH VALUE
  • 16. CLONING VS BIT STREAM IMAGE • CLONING FOR REBOOT • BIT STREAM IMAGE FOR RESTORE. • HASH VALUE
  • 17. WHAT MAY ESCAPE DURING PURVIEW • SLACK SPACE • WEB MAIL • INTERNET ACTIVITY • HIDDEN FILES • FILES NOT SUPPORTED BY SOFTWARE. • HOST PROTECTED AREA • DEVICE CONFIGURATION OVERLAY • BACK UP OF DEVICES (COMPRESSED FILES, IMAGE OF CD/DVD, BACK OF MOBILE, BACK UP OF CHAT HISTORY
  • 18. DIFFERENT APPROACH • REGISTRY FORENSIC • BROWSER FORENSIC • SYSTEM RESTORE POINT FORENSIC • VIRTUAL MACHINE FORENSIC • CLOUD FORENSIC • NETWORK FORENSIC
  • 19. MATERIAL FOR SEARCH • TEXT SEARCH • IMAGE SEARCH • VIDEO SEARCH • EMAIL SEARCH
  • 20. EXAMINATION • INTERNET ARTIFACTS • ARCHIVED/ WEBMAIL • UNALLOCATED CLUSTER • FILE SLACK
  • 21. SYNCHRONISE/ BACK UP/ CREATE SYSTEM RESTORE REMOVABLE DRIVE
  • 22.
  • 23. EXHIBITS  CPU  HARD DISK  CD/DVD/FLOPPY  PENDRIVE/ EXTERNAL HARD DISK  MOBILE PHONE/SIM CARD/MEMORY CARD  DIGITAL VIDEO RECOREDER  STILL/VIDEO CAMERA/MEMORY CARD  SPY CAM
  • 24.  INTERNET HISTORY  FILES DOWNLODED/UPLOADED FROM INTERNET  COOKIES  WEBMAIL  SOCIAL NETWORK ARTIFACTS  CHAT HISTORY  FILES FROM PRIVATE NETWORK(BLUETOOTH, WIFI)
  • 25.  INTERNET HISTORY  FILES DOWNLODED/UPLOADED FROM INTERNET  COOKIES  WEBMAIL  SOCIAL NETWORK ARTIFACTS  CHAT HISTORY  FILES FROM PRIVATE NETWORK(BLUETOOTH, WIFI)
  • 26. DIFFRENCE BETWEEN DATA EXTRACTION AND COMPUTER FORENSIC  IT MUST BE PROVED THAT CHAIN OF CUSTODY IS PROPERLY FOLLOWED  NOTHING HAS BEEN DELETED, ADDED OR CHANGED DURING EXAMINATION.  THE PROCESS OF SUCH ASSURANCE STARTS FROM CRIME SCENE.  BEST PRACTICES FOR SEIZURE OF DIGITAL EVIDENCE  HASH VALUE
  • 27. UNCOMMON CASES  PICTURES IN EXCEL SHEET  IMAGE OF HANDWRITTEN NOTES AS EMAIL MESSAGES  FORMATTED HARD DISK  VOICE RECORDING AS SUICIDE NOTE
  • 28. MOBILE PHONE EXAMINATION  SIM  INTERNAL MEMORY  MEMORY CARD
  • 29. DATA IN SIM  LOCATION  ICCID(INTEGRATED CIRCUIT CARD IDENTIFIER)  IMSI(INTERNATIONAL MOBILE SUBSCRIBER IDENTITY)  SERVICE PROVIDER  CONTACT  SMS  LAST CALL DETAILS
  • 30. INTERNAL MOBILE MEMORY  IMEI  CONTACTS  SMS  MOBILE SETTINGS  TO DO LIST  NOTES  EMAIL/CHAT/SOCIAL NETWORK SITE DETAILS  INTERNET HISTORY
  • 31. MEMORY CARD  IMAGE/ VIDEO/ AUDIO  ARCHIVED DATA/ SMS BACK UP/ WHATSAPP  INTERNET DATA  HISTORY OF USE IN OTHER DEVICES  DELETED DATA
  • 32. CHALLENGES  PASSWORD PROTECTION  LOST SIM  NOT SUPPORTED BY TOOLS  PROBLEM IN SWITCHING ON THE MOBILE.(broken/ blast cases)
  • 33. CCTV CASES  PROPRIETORY OPREATING SYSTEM  REQUIRES OWN HARDWARE FOR EXAMINATION.  INHERENT CLOCK SETTINGS CAN NOT BE CROSS CHECKED  DELETED FILES CAN NOT BE RECOVERED
  • 34. REQUIREMENTS WHILE SUBMITTING CASE 1. PROPER FORMAT 2. PROPER SEALING AND LABELLING OF EXHIBITS 3. SIGNATURE AND SEAL OF AUTHORITY 4. ATTESTED COPY OF FIR 5. REQUIREMENT OF HARD DISK
  • 35. PROPER DESCRIPTION OF EXHIBITS IN FORWARDING LETTER • CPU / LAPTOP • HARD DISK • MOBILE PHONE • CCTV
  • 37. WHEN QUERY IS SOCIAL NETWORK SITE RELATED RELATED EMAIL ADDRESS PROFILE NAME SCREENSHOT OF ALLEGED PAGE ALLEGED IMAGE VIDEO CHAT ROOM CHAT HISTORY
  • 38. QUERY REGARDING ACTIVITY OF A COMPANY DOCUMENT RELATED TO ALLEGED ACTIVITIES.
  • 39. WHEN QUERY IS IMAGE/ VIDEO RELATED COPY OF ALLEGED IMAGE /VIDEO
  • 40. WHEN QUERIES DO NOT SERVE PURPOSE. 1. MISSING NAME OF THE COMPANY. 2. ASKING RANDOM SYSTEM RELATED QUERIES. 3. ALL EMAILS/ CREDIT CARDS/ IP ADDREESS 4. ALL USERS 5. MISSING INTERNET HISTORY AND KEYWORDS
  • 41. JUDICIOUS DISTRIBUTION/ SEIZURE OF EXHIBIT CAMERA WITH DVR MONITOR WITH CPU MODEM WITH LAPTOP DETACHED HARD DISKS OF SERVER BUNDLING 10 BRANCHES OF A COMPANY IN 01 BIG CASE
  • 42. REQUIREMENT OF HARD DISK COPY CLONE/ MIRROR IMAGE WHAT ARE CHANCES OF MISSING EVIDENCE WHEN INVESTIGATING AGENCY DECIDES TO SEE EVIDENCE THEMSELVE.
  • 43. Multiple queries What is ip address used in this computer What is mac address used in this computer What are programs installed in this computer Who are users of this computer Whether this computer was used for email. Which modem was used for connecting to internet
  • 44. Traslate to single query WHETHER THE MAILS AT ANNEXURE- A WAS SENT RECEIVED FROM THIS COMPUTER.
  • 45. Multiple queries What are the accounting packages installed How many xls files are there How many word files are there What is opreating system of the computer Are there any password or encrypted files What are different types of data avillable in the system any deleted files are there.
  • 46. Translate to single query Please provide all the data related to company and any simmilar document related to documents at annexure a b c
  • 47. What areas change when a FILE is written? MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C Root C FILE FILE FILE FILE Reserved Area Writing a file
  • 48. What areas change when a FILE is written? MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C Root C FILE FILE FILE FILE Reserved Area Filename Start Cluster Size FILE 2 1024 Unused Directory Entry Unused Directory Entry Directory entry is created Writing a file
  • 49. What areas change when a FILE is written? MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C Root C FILE FILE FILE FILE Reserved Area Filename Start Cluster Size FILE 2 1024 Unused Directory Entry Unused Directory Entry Directory entry is created 2 E 6 0 10 0 3 0 7 0 11 0 4 0 8 0 12 0 5 0 9 0 13 0 FATs are updated Writing a file
  • 50. What areas change when a FILE is written? MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C Root C FILE FILE FILE FILE Reserved Area Filename Start Cluster Size FILE 2 1024 Unused Directory Entry Unused Directory Entry Directory entry is created 2 E 6 0 10 0 3 0 7 0 11 0 4 0 8 0 12 0 5 0 9 0 13 0 FATs are updated FILE contents written to data area Writing a file
  • 51. MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C Root C FILE FILE FILE FILE Reserved Area What areas change when a FILE is deleted? Deleting a file
  • 52. MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C RootC FILE FILE FILE FILE Reserved Area Filename Start Cluster Size  ILE 2 1024 Unused Directory Entry Unused Directory Entry First character of the Directory entry is changed to  Deleting a file
  • 53. MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C Root C FILE FILE FILE FILE Reserved Area FAT entries are ed Filename Start Cluster Size  ILE 2 1024 Unused Directory Entry Unused Directory Entry First character of the Directory entry is changed to  0 6 0 10 0 3 0 7 0 11 0 4 0 8 0 12 0 5 0 9 0 13 0 2 Deleting a file
  • 54. MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root D FAT2 Root D Root D Root D FILE FILE FILE FILE Reserved Area FAT entries are ed Filename Start Cluster Size  ILE 2 1024 Unused Directory Entry Unused Directory Entry First character of the Directory entry is changed to  Data area is not changed ! 0 6 0 10 0 3 0 7 0 11 0 4 0 8 0 12 0 5 0 9 0 13 0 2 Deleting a file
  • 55. MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C Root C FILE FILE FILE FILE Reserved Area What areas change when a partition is reformatted? Reformatting
  • 56. MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C Root C FILE FILE FILE FILE Reserved Area Three areas change when a partition is reformatted Filename Start Cluster Size Unused Directory Entry Unused Directory Entry Unused Directory Entry Root Directory entries are ed Reformatting
  • 57. MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C Root C FILE FILE FILE FILE Reserved Area Three areas change when a partition is reformatted Filename Start Cluster Size Unused Directory Entry Unused Directory Entry Unused Directory Entry Root Directory entries are ed 2 0 6 0 10 0 3 0 7 0 11 0 4 0 8 0 12 0 5 0 9 0 13 0 FAT entries are ed Reformatting
  • 58. MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C Root C FILE FILE FILE FILE Reserved Area Three areas change when a partition is reformatted Filename Start Cluster Size Unused Directory Entry Unused Directory Entry Unused Directory Entry Root Directory entries are ed Boot Record is written 2 0 6 0 10 0 3 0 7 0 11 0 4 0 8 0 12 0 5 0 9 0 13 0 FAT entries are ed
  • 59. MBR FAT1 BR FAT1 FAT1 FAT2 FAT2 Root C FAT2 Root C Root C Root C FILE FILE FILE FILE Reserved Area Three areas change when a partition is reformatted Filename Start Cluster Size Unused Directory Entry Unused Directory Entry Unused Directory Entry Root Directory entries are ed Boot Record is written 2 0 6 0 10 0 3 0 7 0 11 0 4 0 8 0 12 0 5 0 9 0 13 0 FAT entries are ed
  • 60. Cluster 2 Cluster 2 Cluster 2 Cluster 2 Cluster 2 Cluster 2 Cluster 2 Cluster 2 What are the two types of slack? RAM Slack RAM Slack is the area from the end of the file to the end of that sector. - Comes from RAM File File File File Slack Space
  • 61. Cluster 2 Cluster 2 Cluster 2 Cluster 2 Cluster 2 Cluster 2 Cluster 2 Cluster 2 RAM Slack Residual Slack Residual Slack Residual Slack Residual data slack is the area from the end of RAM slack to the end of the cluster – whatever was on the media before. File File File File Slack Space

Notas del editor

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55
  56. 56
  57. 57
  58. 58
  59. 59
  60. 60
  61. 61
  62. 62
  63. 63
  64. 64
  65. 65
  66. 66
  67. 67
  68. 68