UNIT-4 Information Security - Cryptography
UNIT-4 Information Security - Cryptography
Network Forensics
● Wireless forensics is a discipline included within the computer forensics science, and
specifically, within the network forensics field. The goal of wireless forensics is to provide
the methodology and tools required to collect and analyse (wireless) network traffic that
can be presented as valid digital evidence in a court of law.
● The evidence collected can correspond to plain data or with the broad usage of VoIP
technologies can include voice conversations.
● The wireless forensics process involves capturing all data moving over Wi-Fi network and
analysing network events to uncover network anomalies, discover the source of security
attacks and investigate holes on computers and wireless networks to determine whether
they are or have been used for illegal or unauthorized activities.
Approaching a computer forensics Investigation
● Computer forensics investigation is a detailed science. The broad phases involved in the
investigation.
● The phases involved are as follows:
1. Secure the subject system (from unauthorized changes during the investigation);
2. take a copy of hard drive/disk (if applicable and appropriate);
3. identify and recover all files (including deleted files);
4. access/view/copy hidden, protected and temp files;
5. study “special” areas on the drive (e.g., the remainder from previously deleted files);
6. investigate the data from applications and programs used on the system;
7. create detailed and considered report, containing an assessment of the data and
information collected.
Typical Elements Addressed in a Forensics Investigation Engagement Contract
● Typically, the following important elements are addressed before while drawing up a
forensics investigation engagement contract.
1. Authorization:
● The customer will be asked to authorize the computer forensics laboratory or its agents to
conduct an evaluation of the data/media/equipment onsite or offsite to determine the nature
and scope of the engagement.
● The customer will be asked to authorize the computer forensics laboratory, its employees,
independent contractors and agents to securely receive and transport the
media/equipment/data.
2. Confidentiality:
● The concerned computer forensics is supposed to use any information contained in the
data, media or equipment provided to the company by the customer only for the purpose
fulfilling the engagement and is expected to hold such customer information in the strictest
confidence.
3. Payment:
● Customers agrees to pay the computer forensics laboratory all sums authorized from time
to time by customer, which will typically include charges for computer forensics laboratory
services, Reasonable travel expenses for onsite work, Shipping and insurance and actual
expenses, Media or off-the-shelf software used in the forensics service engagement.
4. Consent and acknowledgment:
● Any consent(agreement) required of either party becomes effective only if provided in a
commercially reasonable manner; Customers’ needs to acknowledge that the
equipment/media/data may be damaged prior to computer forensics laboratory receipt.
5. Limitation of liability:
● The computer forensics laboratory will not consider itself to be legally responsible for any
claims regarding the physical functioning of the equipment /media or the condition or
existence of data stored on the media supplied before during or after services.
6. Legal aspects/the law side:
● Both the parties need to agree that the agreement shall be governed by existing law in every
particular way in the country where the contract is signed.
7. Data protection:
● The computer forensics laboratory (engaged in the investigation) will hold the information
that the customer has given verbally, electronically or in any submitted form for the
purpose of the forensics investigation to be carried out as per contracted services from the
forensics laboratory.
Solving a Computer Forensics Case
These are just some broad illustrative steps and they may vary depending on the specific
case in hand.
1. Prepare for the forensics examination.
2. Talk to key people to find out what you are looking for and what is the surrounding
environment of the case.
3. If you are convinced that the case has a sound foundation, start assembling your tools to
collect the data in question. Identify the target media.
4. Collect the data from the target media. You will be creating an exact duplicate image of
the device in question. To do this, you will need to use an imaging software application.
5. To extract the contents of the computer in question, connect the computer you are
investigating to a portable hard drive or other storage media and then boot the computer
under investigation according to the directions for the software you are using.
6. When collecting evidence, be sure to check Email records as well. Quite often, these
messages yield a great deal of information.
7. Examine the collected evidence on the image you have created. Document anything that
you find and where you found it.
8. Analyse the evidence you have collected by manually looking into the storage media
and, if the target system has a Windows OS, check the registry.
9. Report your findings back to your client. Be sure to provide a clear, concise report; this
report may end up as evidence in a court case.
Relevance of the OSI 7 Layer Model to Computer Forensics
The OSI 7 Layer Model is useful from computer forensics perspective because it
addresses the network protocols and network communication processes.
Steps to hack network by attacker:
e-ROL Allows you to recover through the internet files erased by mistake.
Recuva Windows tool that recovers accindentally deleted files
R - Studio Data recovery software suit that can recover files from FAT (12 to 13),
NTFS, NTFS5 etc.
Steller Phoenix Data recovery software services and tools recover lost data from hard drive
Adroit photo Photo recovery tool able to recover high-definition raw images from
recovery Cannon Nikon etc.
Partition Recovery Tools
Name of tool Description
Partition Table Doctor Types recover deleted or lost partitions (FAT16/FAT32/NTFS/NTFS5)
NTFS Recovery Automatic utility that recovers data from damaged or formatted disks.
Gpart It is tool which tries to gets the primary partition table of a PC type hard disk
incase the primary partition table sector 0 is damaged, incorrect or deleted.
Simple carver Collection of tools designed for a number of purposes including data recovery, forensics
suite computing and E-discovery.
Foremost Console program to recover files based on their headers, footers and internal data
structures.
Scalpel Fast file carver that reads database of header and footer definitions and extracts
matching files from a set of image files or raw device files.
PhotoRec File data recovery software designed to recover lost files including video, documents
and archives from hard disks and CDROM.
Revlt It is an experimental carving tool, initially developed for the DFRWS.
Magic Rescue File carving tool that uses “magic bytes” in file contents to recover data.