Introduction To Computer Forensics
Introduction To Computer Forensics
Michael Sonntag
z Registers, caches
z Memory
z Network state (routing configuration, estab. connections)
z Running processes
z Media in use: Disks in use
z Backup media: Disks not in use, tapes
z WOM: CD-ROMs, DVDs
z Analogue material: Paper, fingerprints, DNA, …
z Identity theft
Æ Personal information: Name, address, credit card, …
Æ Communication: Especially copies of other person's,
obtaining/buying information online
Æ Software: Generators (names, credit card numbers), imaging
(scanner, photo modification)
Æ Images: Certificates, forms, signatures
Æ Documents: Forms, letters, orders, …
Æ Electronic signatures
Æ Internet activity: Cache, logs, searches
z Copyright
Æ Software: P2P, CD/DVD-burning, encryption, recoding, key
generators, cracks
Æ Documents: Serial numbers, authorization information
Æ Internet activity: Cache, logs, searches, cookies
Æ Images: Covers, license forms
Æ Communication information: E-Mail, chat
Æ Accounts: Web-Sites, FTP, shops
Æ Date and time stamps
z Continental law:
Æ Generally all evidence is admissible, regardless how obtained
» But what evidence is worth depends on
– How it was collected and stored
– By whom it was collected
– Who analyzed it
– How it was analyzed
– Whether the conclusions are supported by facts
– Whether the conclusions are "state of the art"
Æ Typically the judge (or a jury) decides
z Common law:
Æ Facts might also be fixed by parties!
» If agreed upon, judge/jury cannot discuss it any more
Æ Esp. USA: "fruit of the poisonous tree" doctrine
» Evidence obtained unlawfully may not be used
Michael Sonntag Computer forensics: Introduction to Computer Forensics 34
Documenting actions
?
?
© Michael Sonntag 2008
Literature