CSDF
CSDF
✔ The SI-FI prototype uses digital evidence bags (DEBs), which are secure and
tamperproof containers used to store digital evidence.
✔ Investigators can seal evidence in the DEBs and use the SI-FI implementation to
collaborate on complex investigations.
✔ Authorized users can securely reopen the DEBs for examination, while automatic
audit of all actions ensures the continued integrity of their contents.
✔ The results of CFX-2000 verified that the hypothesis was largely correct and that it
is possible to ascertain the intent and identity of cyber criminals.
5. Data Compression
Computer forensic experts should become familiar with how compression works and
how compression programs can be used to hide and disguise sensitive data and also
learn how password- protected compressed files can be broken.
6. Erased Files
Computer forensic experts should become familiar with how previously erased files
can be recovered by using DOS programs and by manually using data-recovery
technique & familiar with cluster chaining.
✔ PC PhoneHome is a software application that will track and locate a lost or stolen
PC or laptop any-where in the world.
✔ Responsibility: The attacker is responsible for the damage done, and the only way
to bring him to justice is with proper evidence to prove his actions. Information
gathered after a compromise can be examined and used by others to prevent
further attacks.
Collection Options
Once a compromise has been detected, you have two options:
✔ Pull the system off the network and begin collecting evidence: In this case you
may find that you have insufficient evidence or, worse, that the attacker left a
dead man switch that destroys any evidence once the system detects that its
offline.
✔ Leave it online and attempt to monitor the intruder: you may accidentally alert
the intruder while monitoring and cause him to wipe his tracks any way necessary,
destroying evidence as he goes.
Obstacles
✔ Computer transactions are fast, they can be conducted from anywhere, can be
encrypted and have no intrinsic identifying features such as handwriting and
signatures to identify those responsible.
✔ Any paper trail of computer records they may leave can be easily modified or
destroyed, or may be only temporary.
✔ Auditing programs may automatically destroy the records left when computer
transactions are finished with them.
✔ Investigating electronic crimes will always be difficult because of the ease of
altering the data and the fact that transactions may be done anonymously.
2) Types of Evidence
Ans:
3) Rules of Evidence
Ans:
1. Admissible: Admissible is the most basic rule. The evidence must be able to be
used in court.
2. Authentic: You must be able to show that the evidence relates to the incident in a
relevant way.
3. Complete: It’s not enough to collect evidence that just shows one perspective of
the incident.
4. Reliable: Your evidence collection and analysis procedures must not cast doubt on
the evidence’s authenticity and veracity.
2. Routing tables
3. Arp cache
4. Process table
6. Main memory
8. Secondary memory
9. Router configuration
10. Network topology
General Procedure
✔ Identification of Evidence: You must be able to distinguish between evidence and
junk data
✔ Preservation of Evidence: The evidence you find must be preserved as close as
possible to its original state.
✔ Analysis of Evidence: Analysis requires in-depth knowledge of what you are
looking for and how to get it.
✔ Presentation of Evidence: The manner of presentation is important, and it must
be understandable by a layman to be effective.
Methods of Collection
There are two basic forms of collection: freezing the scene and honey-potting.
Freezing the Scene
It involves taking a snapshot of the system in its compromised state. You should then
start to collect whatever data is important onto removable non-volatile media in a
standard format.
Honey-potting
It is the process of creating a replica system and luring the attacker into it for further
monitoring. The placement of misleading information and the attacker’s response to
it is a good method for determining the attacker’s motives.
1. Find the Evidence: Use a checklist. Not only does it help you to collect evidence,
but it also can be used to double-check that everything you are looking for is there.
2. Find the Relevant Data: Once you’ve found the evidence, you must figure out
what part of it is relevant to the case.
3. Create an Order of Volatility: The order of volatility for your system is a good
guide and ensures that you minimize loss of uncorrupted evidence.
5. Collect the Evidence: Collect the evidence using the appropriate tools for the job.
✔ Authenticode
• Microsoft Authenticode allows developers to include information about
themselves and their code with their programs through the use of digital
signatures.
• The user is alerted through Authenticode:
1. of the true identity of the publisher.
2. of a place to find out more about the control.
3. The authenticity of the previous information.
• Users can choose to trust all subsequent downloads of software from the same
publisher and all software published by commercial publishers that has been
verified by VeriSign.
✔ Digital ID
• A Digital ID/Certificate is a form of electronic credentials for the Internet.
• A Digital ID is issued by a trusted third party to establish the identity of the ID
holder.
• The third party who issues certificates is known as a Certificate Authority (CA).
• Digital ID technology is based on the theory of public key cryptography.
• The purpose of a Digital ID is to reliably link a public/private key pair with its
owner.
• When a CA such as VeriSign issues a Digital IDs, it verifies that the owner is not
claiming a false identity.
• When a CA issues you a digital certificate, it puts its name behind the statement
that you are the rightful owner of your public/private key pair.
✔ Practical Consideration
• It is useful to present some fundamental requirements of a forensic data
collection system before considering how these can be securely protected.
• Forensic data collection should be complete and non-software specific, thus
avoiding software traps and hidden partitioning.
• In operation, it should be as quick and as simple as possible to avoid error or delay
• It should be possible for anyone to use a forensic data collection system with the
minimum amount of training.
• Necessary costs and resources should be kept to a minimum.
• To meet the conditions specified in items 2, 3, and 4, the digital integrity
verification and authentication protocol must be tailored to suit.
• Only investigators issued with a valid digital signature would be able to complete
copies.
Practical Implementation
• A minimum amount of reliance is placed on the technical ability of the
operator/investigator.
• It must be understood that during the copying process, procedures are
implemented to trap and handle hardware errors, mapping exceptions where
necessary.
• It must also be understood that procedures are implemented to verify that
information is copied correctly.
• This information is stored on each cartridge within a copy series.
• Also stored on each cartridge is a reference area containing copy-specific
information such as CPU type and speed, hardware equipment indicators, copying
drive serial number, etc.
• The cartridge is divided into blocks of an arbitrary chosen size. Blocks may contain
reference, ROM, CMOS, or disk data depending on their location on the cartridge.
Each cartridge contains the information copied from the suspect drive on a sector
by sector basis.
UNIT 5
• To make sure the evidence you recover and analyze can be admitted in court. To
do this, you must test and validate your software. The bellow we discuss
validation tools available at the time of this writing and how to develop your own
validation protocols.
• The National Institute of Standards and Technology (NIST) publishes articles,
provides tools, and creates procedures for testing and validating computer
forensics software.
• Establish categories for computer forensics tools—Group computer forensics
software according to categories, such as forensics tools designed to retrieve and
trace e-mail.
• Identify computer forensics category requirements—For each category, describe
the technical features or functions a forensics tool must have.
• Develop test assertions—Based on the requirements, create tests that prove or
diSprove the tool’s capability to meet the requirements.
• Identify test cases—Find or create types of cases to investigate with the forensics
tool, and identify information to retrieve from a sample drive or other media
• Establish a test method—Considering the tool’s purpose and design, specify how
to test it.
• Report test results—Describe the test results in a report that complies with ISO
17025, which requires accurate, clear, unambiguous, and objective test reports.
• Another standards document, ISO 5725, demands accuracy for all aspects of the
testing pro- cess, so results must be repeatable and reproducible.
5) E-Mail Investigation
Ans:
✔ Exploring the Role of E-mail in Investigations
• E-mail evidence has become an important part of many computing investigations,
so computer forensics investigators must know how e-mail is processed to collect
this essential evidence.
• In addition, with the increase in e-mail scams and fraud attempts with phishing or
spoofing, investigators need to know how to examine and interpret the unique
content of e-mail messages.
• As a computing investigator, you might be called on to examine a phishing e-mail
to see whether it’s authentic. Later, in tracing an E-mail Message, you learn about
resources for looking up e-mail and Web addresses to verify whether they’re
associated with a spoofed message.
• One of the most noteworthy e-mail scams was 419, or the Nigerian Scam, which
originated as a chain letter from Nigeria, Africa.
• Unlike newer, more sophisticated phishing e-mail frauds, 419 messages have
certain characteristic ploys and a typical writing style. For example, the sender
asks for access to your bank account so that he can transfer his money to it as a
way to prevent corrupt government officials in his homeland from confiscating it.
• The sender often promises to reward you financially if you make a minor payment
or allow access to your bank account. The messages are usually in uppercase
letters and use poor grammar