Computer Forensics
Computer Forensics
EVIDENCE ACQUISITION
Digital evidence, such as computer data, is fragile by
nature. Without proper handling, delicate coding can
sustain damage or be completely destroyed. Whether this
mishandling is accidental or intentional, any damage will
affect evidence credibility in court.
receive training.
• Activities to seize, examine, store or transfer digital
• Storage failure
The term file system takes its name from the old paper-
based data management systems, where we kept
documents as files and put them into directories.
Here's an explanation:
The first few screens you see before your Windows logo
appears are the output of your computer's firmware,
verifying the health of hardware components and the
memory.
your partitions.
BIOS-based firmware boots the system differently than
UEFI-based firmware.
cd /sys/firmware/efi
sudo parted -l
And the output would be something like this:
Based on the above output, the storage device's ID
is /dev/vda with a capacity of 172GB. The storage device
is partitioned based on GPT and has three partitions; The
second and third partitions are formatted based on the
FAT32 and EXT4 file systems respectively.
Having a BIOS GRUB partition implies the firmware is still
BIOS-based firmware.
sudo dmidecode -t 0
“# dmidecode 3.2
Getting SMBIOS data from sysfs.
SMBIOS 2.4 present.
”
Formatting partitions
When partitioning is done, the partitions should
be formatted.
Most operating systems allow you to format a partition
based on a set of file systems.
mkdir -p /media/usb
mount /dev/disk1s1 /media/usb
Files metadata
File metadata is a data structure that contains data about
a file, such as:
• File size
• Timestamps, like creation date, last accessed date,
and modification date
• The file's owner
• The file's mode (who can do what with the file)
• What blocks on the partition are allocated to the file
• and a lot more
Metadata isn’t stored with the file content, though.
Instead, it’s stored in a different place on the disk - but
associated with the file.
Introduction
• Application
• System
• Security
Relevance
• An Application Failure,
System Log
Security Log
Application Log
• LogParser
• LOGAlyze
• GrayLog
• LogCheck