Unit 6 - CSDF
Unit 6 - CSDF
What are the common examples of email crime & violations that may
necessitate investigation? Explain any one in detail? [9M] Ans:-
Common Examples of Email Crimes & Violations:
1. Phishing Attacks
2. Email Spoofing
3. Spamming
4. Malware Distribution
Spamming
Spamming is the act of sending unsolicited bulk messages, typically
through email, instant messaging, or social media platforms.
1. Purpose:
o To advertise products, services, or scams.
o To spread malware or phishing links.
2. Types:
o Email spam: Unwanted promotional or fraudulent emails.
o SMS spam: Unsolicited text messages.
o Social media spam: Fake posts, comments, or messages.
3. Impact:
o Wastes time and resources.
o Poses security risks like phishing and malware attacks.
4. Prevention:
o Use spam filters in email services.
o Avoid clicking on unknown links.
o Report spam to service providers.
Purpose:
Autopsy is an open-source digital forensics tool used for analyzing digital
devices like computers, mobile phones, and storage drives during
investigations.
Uses of Autopsy:
1. File Recovery: Recovers deleted files, images, and documents.
2. Keyword Search: Helps find specific words or data in files and emails.
c) Email Investigation
Email investigation is the process of analyzing email communications to
detect illegal activities or find evidence of cybercrimes, fraud, or other
malicious activities. It involves analyzing the email’s content, headers, and
attachments to determine its origin and any hidden threats.
Key Components:
• Email Headers: Analyzing the header of an email helps trace the
sender’s IP address, mail servers, and time stamps, which can help
identify if the email is fraudulent or malicious.
• Content Analysis: Investigators check for suspicious content like
phishing links, malware attachments, or threatening language.
• Attachment Examination: Attachments in emails are checked for
viruses or hidden malicious code.
• Purpose: To detect fraudulent emails, phishing attempts, or malware
and to trace the origins of potentially criminal activity.
• Example: Investigating an email that appears to be from a bank
asking the recipient to click a link to "verify" their account, which is
actually a phishing attempt to steal personal information.
Q). State the features of any five computer forensic software tools [9M]
Ans:- These software tools assist forensic investigators in retrieving,
analyzing, and preserving digital evidence in a reliable and efficient
manner.
Features of Five Computer Forensic Software Tools:
1. EnCase
• Purpose: Used for forensic investigation of computers and mobile
devices.
• Features:
o Comprehensive evidence collection and analysis. o Can recover
deleted files and emails. o Supports analysis of various file
systems (FAT, NTFS, etc.).
o Provides hash verification to ensure evidence integrity.
3. Autopsy
• Purpose: Open-source tool used for analyzing hard drives and
smartphones.
• Features:
o Recovers deleted files and images. o Conducts keyword
searches for specific information. o Analyzes file systems and
examines web activity.
o Supports timeline analysis to track user actions.
4. X1 Social Discovery
• Purpose: For forensic investigation of social media and web data.
• Features:
o Searches and collects data from social media platforms
(Facebook, Twitter, etc.).
o Captures web activity, emails, and chat logs.
o Can retrieve deleted social media posts and communications.
o Provides a built-in viewer to analyze multimedia evidence.
5. Disk Drill
• Purpose: A data recovery and analysis tool for forensic investigations.
• Features:
o Recovers lost or deleted files from various storage devices. o
Supports a wide range of file formats and devices.
o Offers disk imaging and data backup features.
o Can recover files from damaged or formatted drives.
1. FTK (Forensic Toolkit): Used to collect and analyze emails and recover
deleted messages.
4. EnCase: Can recover and analyze email data from various email
platforms and file formats.
These tools help extract email evidence, detect phishing attempts, and
track malicious activity.
Q). State the features of any five computer forensic hardware tools. [9M]
Ans:- These forensic hardware tools are crucial for conducting proper
investigations and ensuring that digital evidence remains complete and
accurate for legal purposes.
Features of Five Computer Forensic Hardware Tools:
1. Write Blockers
• Purpose: Prevents modification of data on storage devices during
analysis.
• Features:
o Allows read-only access to hard drives or USBs. o Ensures
evidence is not tampered with. o Compatible with multiple
storage devices (HDD, SSD, USB). o Essential for preserving the
integrity of forensic evidence.
2. Forensic Duplicators
• Purpose: Creates an exact, bit-by-bit copy of storage devices for
analysis.
• Features:
o Ensures no data is lost or altered during duplication. o Creates
forensic images (exact copies) of hard drives or memory cards.
o Supports multiple device types (SATA, IDE, SSD).
o Allows parallel duplication of multiple drives.
3. Disk Imagers
• Purpose: Used to create exact copies (images) of storage media.
• Features:
o Captures all sectors of a storage device, including deleted data.
o Ensures the original device is not altered during analysis. o
Supports compressed or encrypted images for security. o Can
be used for further investigation without touching the original
data.
Q). How does email play a significant role in digital investigations? What
types of information can be obtain from email Header that may be relevant
in investigations? [9M]
Ans:- Role of Email in Digital Investigations
Emails play a significant role in digital investigations because they often
contain valuable evidence related to cybercrimes, fraud, harassment, or
other illegal activities. Investigators can use email data to track suspects,
identify fraudulent activities, or recover lost communications. Email
records are often admissible in court and can link individuals to criminal
activities.
5. Message-ID:
o A unique identifier for the email, helping to track the email in
case of duplicates or forwarding.
6. Mail Servers:
o Shows the path the email took through various mail servers
before reaching the recipient, useful for detecting suspicious
activity like spoofing or relay attacks.