0% found this document useful (0 votes)
78 views42 pages

Unit 3 - Digital Forensics Process Model

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views42 pages

Unit 3 - Digital Forensics Process Model

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

DIGITAL FORENSICS

3170725

UNIT 3:
DIGITAL FORENSICS
PROCESS MODEL

Prepared by,
Prof. Kaxa Domadia
Assistant Professor
CE Department
V.V.P. Engineering College - Rajkot
DOCUMENTING THE SCENE AND EVIDENCE
 Documentation of a crime scene creates a record
for the investigation.
 It is vital to correctly trace the place of the scene;

the scene itself; the state, power status, and


state of computers, storage media, wireless
network devices, mobile phones, smart
phones, PDAs, and other data storage
devices; Internet and network access; and
other electronic devices.
 The investigating officer should be aware that not

all digital evidence may be closely situated to the


computer or other devices.
 Administrator may require moving a computer or

another electronic device to discover its serial


numbers or other identifiers.
 Moving a computer or another electronic device
though it is on may damage it or the digital
evidence it contains. Computers and other
electronic devices must not be moved till
they are switched off.
 The initial documentation of the scene

should include a detailed record using


video, photography, and notes and
sketches to help recreate or convey the
details of the scene later.
 All activity and processes on display screens

must be fully documented. Documentation of


the scene may comprise the entire location,
including the type, location, and position of
computers, their components and peripheral
equipment, and other electronic devices.
 The scene may develop to several places;
investigating officer should document all
physical links to and from the computers
and other devices.
 Record any network and wireless entrance

centers that may be present and capable of


linking computers and other devices to each
other and the Internet.
 The subsistence of network and wireless
entrance centers may indicate that additional
evidence exists beyond the initial scene.
 A number of conditions may not authorize

investigating officer to collect all electronic


devices or components at a scene or location.
 Applicable laws or other factors may prohibit
collecting some computer systems and other
electronic devices and the information they
enclose; however, these devices should be
incorporated in the investigating officer’s
documentation of the scene.
CHAIN OF CUSTODY
 The chain of custody in digital cyber forensics is
also known as the paper trail or forensic link, or
chronological documentation of the evidence.
 Chain of custody indicates the collection,
sequence of control, transfer and analysis.
 It also documents details of each person who

handled the evidence, date and time it was


collected or transferred, and the purpose of the
transfer.
 It demonstrates trust to the courts and to the

client that the evidence has not tampered.


 Digital evidence is acquired from the numerous

devices like a vast number of IoT devices, audio


evidence, video recordings, images, and other
data stored on hard drives, flash drives, and other
physical media.
Importance of maintaining Chain of Custody
Importance to Examiner:
 To preserve the integrity of the evidence.

 To prevent the evidence from contamination, which

can alter the state of the evidence.


 In case you obtained metadata for a piece of

evidence but unable to extract any meaningful


information from the metadata. In such a case, the
chain of custody helps to show where possible
evidence might lie, where it came from, who
created it, and the type of equipment used. This
will help you to generate an exemplar and compare
it to the evidence to confirm the evidence
properties.

Importance to the Court


 If not preserved, the evidence submitted in the

court might be challenged and ruled inadmissible.


Chain of Custody Process
 In order to preserve digital evidence, the

chain of custody should span from the first


step of data collection to examination,
analysis, reporting, and the time of
presentation to the Courts. This is very
important to avoid the possibility of any
suggestion that the evidence has been
compromised in any way.
 Data Collection:
This is where chain of custody process is initiated.
It involves identification, labeling, recording,
and the acquisition of data from all the
possible relevant sources that preserve the
integrity of the data and evidence collected.

 Examination:
During this process, the chain of custody
information is documented outlining the forensic
process undertaken. It is important to capture
screenshots throughout the process to show
the tasks that are completed and the evidence
uncovered.
 Analysis:
This stage is the result of the examination stage.
In the Analysis stage, legally justifiable methods
and techniques are used to derive useful
information to address questions posed in the
particular case.
 Reporting:

This is the documentation phase of the


Examination and Analysis stage. Reporting
includes the following:
 Statement regarding Chain of Custody.
 Explanation of the various tools used.
 A description of the analysis of various data sources.
 Issues identified.
 Vulnerabilities identified.
 Recommendation for additional forensics measures
that can be taken.
PROCEDURE TO ESTABLISH THE
CHAIN OF CUSTODY
 Save the original material
 Take photos of the physical evidence

 Take screenshots of the digital evidence.

 Document date, time, and any other


information on the receipt of the evidence.
 Inject a bit-for-bit clone of digital evidence

content into forensic computers.


 Perform a hash test analysis to authenticate

the working clone.


FORENSIC CLONING OF EVIDENCE
 A forensic clone is an exact bit-for-bit copy of a
piece of digital evidence.
 Files, folders, hard drives, and more can be
cloned.
 A forensic clone is also known as a bit-stream
image or forensic image.
 A forensic image of a hard drive captures
everything on the hard drive, from the physical
beginning to the physical end. Performing a
“copy and paste” via the operating system is not
the same as a forensic clone.
 A true forensic image captures both the active
and latent data. That is a key difference between
the two and the primary reason why a forensic
image is preferred.
Cloning v/s Copy-paste

How cloning is different from copy-


pasting?
 Forensic cloning is an exact bit-for-bit copy of

a piece of digital evidence, including all the


deleted data while copy-pasting the data
involves only the files and folders present on
the device and not the deleted files.
 The investigating agencies use the cloning

technique when there is a probability of the


data being deleted or overwritten by the
user.
 Cloning a data storage device can be a pretty time-
consuming process, and for that reason it usually
makes more sense to do the cloning in the lab as
opposed to at the scene. Cloning in the lab
eliminates the need to be on scene for what could
be hours. It also provides a much more stable
environment, affording us better control of the
process.
 Having two clones gives you one to examine and

one to fall back on.


 Ideally, all examinations are done on a clone as

opposed to the original.


Sometimes that isn't an option, especially in a
business setting when the machine and drive must
be returned to service.
 In the eyes of the court, a properly authenticated

forensic clone is as good as the original.


The Cloning Process
 The suspect's drive is known as the source drive and

the drive you are cloning to is called the destination


drive.
 The destination drive must be at least as large (if not

slightly larger) than our source drive.


 The drive we want to clone (the source) is normally

removed from the computer. It's then connected via


cable to a cloning device of some kind or to another
computer.
 t's critical to have some type of write blocking in

place before starting the process.


 A write block is a crucial piece of hardware or

software that is used to safeguard the original


evidence during the cloning process.
 The hardware write block is placed between the

cloning device (PC, laptop, or standalone hardware)


and the source.
 The write block prevents any data from being
written to the original evidence drive. Using
this kind of device eliminates the possibility
of inadvertently compromising the evidence.
Remember, the hardware write blocking
device goes in between the source drive and
the cloning platform.
 There is a little prep work involved in making

a clone. The destination drive must be


forensically cleaned prior to cloning a
suspect's drive to it. Most if not all forensic
imaging tools will generate some type of
paper trail, proving that this cleaning has
taken place. This paperwork becomes part of
the case file.
 Once the connections are made, the process
is started with the press of a couple of
buttons or clicks of a mouse. When complete,
a short report should be generated by the
tool indicating whether or not the cloning
was successful. Cloning is successful when
the hash values (think “digital fingerprint”)
for the source and clone match.
WRITE BLOCKER
 A write blocker is a tool which permits read-only
access to data storage devices without
compromising the integrity of the data. The
original evidence (hard disk) is required to be
connected to a write blocker before imaging.
 A fresh sterilized destination disk where the

original evidence will be imaged to should also be


connected to the write blocker. However, care
should be taken while choosing the source (original
evidence) and destination hard disks in the
Forensic Imaging software.
 On completion of the imaging process, both the

hard disks should be disconnected from the write


blocker, labeled and preserved separately onto
anti-static bags and stored in a safe location.
LIVE AND DEAD SYSTEM
FORENSIC
 METHODS OF ACQUISITION
A. Live Acquisition
B. Dead/Offline Acquisition
Live Acquisition
 A live system refers to system that are up

and running where information may be


altered as data is continuously processed.
 There is a lot of information of evidentiary

value that could be found in a live system.


 Switching it off may cause loss of volatile

data such as running processes, network


connections and mounted file systems.
 In contrast, leaving a computer running may

cause evidence to be altered or deleted. The


investigator therefore needs to decide what
alternative is best in a given situation.
Another approach is to use specialized tools
to extract volatile data from the computer
before shutting it down.
 In Live Acquisition Technique is real world live
digital forensic investigation process.
 For example a common approach to live digital

forensic involves an acquisition tool into read


only mode in system. then attaching writable
media or disk to system and using the tool to
start Live imaging in that tool by using Graphic
User Interface(GUI) if available or use Command
Line Interface(CUI)
Dead/Offline Acquisition

 Dead system forensic can produce some


information, they can’t recover everything.
 In order to create a forensic image of an

entire disk, best practice dictates that the


imaging process should not alter any data on
the disk and that all data, metadata and
unallocated space be included.
 Traditionally, forensic investigators
accomplish this by powering down the
system and removing the disk (or disks)
in order to connect it to a forensic
workstation or hardware or software
write-blocker to create the image. This
is referred to as dead imaging.
 A write-blocker, as its name implies, will prevent
any data from being written to the disk, allowing
read access only.
 Removing a disk from a running system
prevents any further changes due to normal
system operations or process and user
interactions.
 Using a write-blocker during evidence
acquisition preserves the integrity of the file
metadata, such as timestamps that may be
relevant to the investigation.
 Dead systems are systems that are switched off

and no data processing is taking place. To retain


the integrity of the data it is often considered
appropriate to cut the power supply to the
computer, but this will have other implications.
HASHING CONCEPTS TO MAINTAIN
THE INTEGRITY OF EVIDENCE
 A hash value is a fixed length that represents
large amounts of data with a much smaller
value that uniquely identifies that data.
 They are thus useful for authenticating and

verifying the integrity of any given data sets


(files/folders/ storage media) to be used as
evidence in the courts of law across the
world.
 There are different types of hash algorithms

but the most common ones are MD5


(Message Digest), SHA-1 (Secure Hashing
Algorithm), SHA-2, etc.
 Digital forensics professionals use hashing
algorithms such as MD5 and SHA1 to generate
hash values of the original files they use in
investigation.
 This ensures that the information isn’t altered

during the course of investigation since various


tools and techniques are involved in data
analysis and evidence collection that can affect
the data’s integrity.
 Another reason why hash values are important is

that electronic documents are shared with legal


professionals and other parties during
investigation, and it’s important to ensure that
everyone has identical copies of the files.
MD5 AND SHA1 HASHING
ALGORITHMS
 MD5 and SHA1 are two most popular hashing
algorithms used by digital forensics
professionals today.
 MD5: MD5 aka Message Digest algorithm is

a hashing algorithm that was created by Ron


Rivest to replace previous hash algorithm
MD4. MD5 is the fifth and latest version of
the original algorithm MD and it creates hash
values of 128 bits.
 SHA1: SHA1 aka Secure Hash Algorithm is

another popular hashing algorithm which is


modelled after MD5. It’s more powerful than
MD5 and produces hash values of 160 bits.
 The use of MD5 and SHA1 hash algorithms is
a standard practice in digital forensics. These
algorithms allow investigators to preserve
digital evidence from the moment they
acquire it to the point it’s produced in court.

Differentiating
MD5 SHA1
Factor
Length of hash
128 bits 160 bits
value
Security level Poor Moderate
Speed Fast Slow
Algorithm
Simple Complex
complexity
REPORT DRAFTING
 The main goal of Computer forensics is to
perform a structured investigation on a
computing device to find out what happened
or who was responsible for what happened,
while maintaining a proper documented
chain of evidence in a formal report.
 Syntax or template of a Computer Forensic

Report is as follows :
Executive Summary :

 Executive Summary section of computer


forensics report template provides background
data of conditions that needs a requirement for
investigation.
 Executive Summary or the Translation Summary

is read by Senior Management as they do not


read detailed report.
 This section must contain short
description, details and important points.
This section could be one page long.
 Executive Summary Section consists of
following
 Taking account of who authorized the
forensic examination.
 List of the significant evidences in a short
detail.
 Explaining why a forensic examination of
computing device was necessary.
 Including a signature block for the
examiners who performed the work.
 Full, legitimate and proper name of all
people who are related or involved in case,
Job Titles, dates of initial contacts or
communications.
Objectives :

 Objectives section is used to outline all tasks


that an investigation has planned to complete.
 In some cases, it might happen that forensics

examination may not do a full fledged


investigation when reviewing contents of
media.
 The prepared plan list must be discussed and

approved by legal council, decision makers and


client before any forensic analysis.
 This list should consist tasks undertaken and

method undertaken by an examiner for each


task and status of each task at the end of
report.
Computer Evidence Analyzed :
 The Computer Evidence Analyzed section is where
all gathered evidences and its interpretations are
introduced.
 It provides detailed information regarding

assignment of evidence’s tag numbers, description


of evidence and media serial numbers.

Relevant Findings :
 This section of Relevant Findings gives summary of
evidences found of probative Value When a
match is found between forensic science material
recovered from a crime scene e.g., a fingerprint, a
strand of hair, a shoe print, etc. and a reference
sample provided by a suspect of case, match is
widely considered as strong evidence that suspect
is source of recovered material.
 However, probative value of evidence can vary
widely depending on way in which evidence is
characterized and hypothesis of its interest. It
answers questions such as “What related
objects or items were found during
investigation of case ?”.

Supporting Details :
 Supporting Details is section where in-depth

analysis of relevant findings is done. ‘How we


found conclusions outlined in Relevant
Findings?’, is outlined by this section. It
contains table of vital files with a full path
name, results of string searches, Emails/URLs
reviewed, number of files reviewed and any
other relevant data.
 All tasks undertaken to meet objectives is
outlined by this section.
 In Supporting Details we focus more on
technical depth. It includes charts, tables and
illustrations as it conveys much more than
written texts. To meet outlined objectives, many
subsections are also included.
 This section is longest section. It starts with

giving background details of media analyzed.


 It is not easy to report number of files reviewed

and size of hard drive in a human


understandable language. Therefore, your
client must know how much data you wanted to
review to arrive at a conclusion.
Investigative Leads :

 Investigative Leads performs action items that


could help to discover additional information
related to the investigation of case.
 The investigators perform all outstanding tasks

to find extra information if more time is left.


 Investigative Lead section is very critical to law

enforcement. This section suggests extra tasks


that discovers information needed to move on
case. e.g. finding out if there are any firewall
logs that date any far enough into past to give a
correct picture of any attacks that might have
taken place.
 This section is important for a hired forensic

consultant.
Additional Subsections :

 Various additional subsections are included in a


forensic report. These subsections are dependent
on clients want and their need. The following
subsections are useful in specific cases :
 Attacker Methodology
 User Applications
 Internet Activity
 Recommendations

For sample Report, please refer :


https://www.rnyte-cyber.com/uploads/9/8/5/9/98595764/
exampledigiforensicsrprt_by_ryan_nye.pdf

You might also like