Activity 1 DF
Activity 1 DF
BACHELOR OF COMPUTER
APPLICATIONS
SEMESTER-V
SPECIALISATION: CYBER SECURITY
DIGITAL FORENSICS
ACTIVITY 1
REPORT OF CERTIFICATION COURSE
Signature
Signature
LEARNING OBJECTIVES
Digital forensics is a vital discipline within the realm of cybersecurity, dedicated to the
identification, recovery, and analysis of digital evidence for legal proceedings. Its significance
stems from its capability to extract and interpret data from digital devices, thereby maintaining
the integrity and admissibility of evidence in court. The scope of digital forensics spans a
diverse array of investigations, covering criminal activities, corporate misconduct, and civil
litigation.
Key Concepts:
1. Chain of Custody: This process involves meticulously documenting the handling of digital
evidence to uphold its integrity and admissibility in court. It includes recording who accessed
the evidence, when, and for what purpose, ensuring that no unauthorized alterations occur.
3. Forensic Readiness: Being proactively prepared for potential incidents involves establishing
policies and procedures for digital evidence handling. This includes training personnel,
maintaining forensic tools, and setting protocols for incident response to ensure effective and
lawful investigations.
Techniques:
1. Initial Response Procedures: A rapid and methodical response to incidents is crucial to
minimize damage and preserve the integrity of evidence. This involves assessing the
situation, securing the scene, and identifying potential sources of evidence.
Steps:
Identify the Incident: Determine the nature of the incident, such as a data breach,
malware infection, or unauthorized access.
Evaluate the Scope and Severity: Assess the impact and potential spread of the
incident to prioritize actions and allocate resources effectively.
2
Isolate Affected Systems: Disconnect compromised systems from the network to
prevent further damage and data exfiltration, while considering the potential loss of
volatile evidence.
Implement Access Controls: Restrict access to the affected area or systems to
authorized personnel only, preventing contamination of evidence.
Avoid Altering Evidence: Ensure no changes are made to the compromised systems or
data. Use write-blocking tools to prevent any modifications.
Document Everything: Maintain detailed logs of actions taken, including timestamps,
personnel involved, and decisions made.
Locate Key Evidence Sources: Identify and prioritize the collection of evidence from
critical sources such as servers, workstations, network devices, and logs.
Consider Volatile Data: Capture volatile data (e.g., system memory, running processes,
network connections) before it is lost.
2. Evidence Collection Basics: Use systematic approaches to gather digital evidence while
preserving its integrity. Techniques include:
3
o Follow a Methodical Approach: Use checklists and standardized procedures to
ensure all relevant evidence is collected in a consistent and thorough manner.
Overview: The forensic investigation process consists of several key phases: identification,
preservation, analysis, and presentation. Each phase is critical for ensuring the integrity and
admissibility of digital evidence in legal proceedings.
Key Concepts:
Evidence Handling: Methods for safely and securely handling digital evidence to
prevent contamination or alteration.
Forensic Imaging: Techniques for creating bit-by-bit copies (forensic images) of
storage devices to preserve evidence without modifying the original.
Documentation: Importance of maintaining detailed records throughout the
investigation process to establish a clear chain of custody and document findings.
Techniques:
Steps:
Identify Relevant Sources: Gather timestamp data from various sources such as system
logs, application logs, file metadata, and network logs.
Extract Timestamps: Use forensic tools to extract timestamps from files, system
events, and logs. Common timestamps include creation, modification, access, and
deletion times.
2. Normalization of Timestamps:
3. Chronological Ordering:
Create Visual Timelines: Use graphical tools to create visual timelines that can help in
identifying patterns, correlations, and anomalies.
Correlate Data Sources: Cross-reference timestamps from different data sources to
corroborate events and gain a comprehensive view of the incident.
Detail the Timeline: Document the timeline with detailed descriptions of each event,
including timestamps, sources, and relevance to the investigation.
Prepare Reports: Create clear and concise reports that can be used for internal analysis,
legal proceedings, or presentation to stakeholders.
File System Analysis: Examining file structures, metadata, and allocation tables to understand
file storage, deletion, and modification patterns.
Steps:
Know the File System Types: Familiarize yourself with different file systems (e.g.,
NTFS, FAT32, ext4, HFS+) and their characteristics.
Study File Structures: Learn how files are organized, stored, and managed within the
specific file system in use.
2. Analyzing Metadata:
Extract Metadata: Use forensic tools to extract metadata from files. Metadata includes
information such as creation time, modification time, access time, owner, permissions,
and file size.
Interpret Metadata: Analyze the metadata to understand file activity, such as when
files were created, accessed, modified, and by whom.
Review Allocation Tables: Investigate allocation tables (e.g., Master File Table in
NTFS, inode table in ext4) to understand how files are allocated, fragmented, and
managed.
Identify Unallocated Space: Look for unallocated space that may contain remnants of
deleted files or hidden data.
6. Documenting Findings:
Record Analysis Results: Document the findings of the file system analysis, including
details of file structures, metadata, allocation patterns, and any anomalies detected.
Prepare Evidence Reports: Create comprehensive reports that outline the analysis
process, findings, and their implications for the investigation.
Overview: Hard disks are primary storage devices in digital forensics investigations, utilizing
various file systems such as FAT, NTFS, ext4, etc. Understanding their structure and
functionality is crucial for effective data recovery and analysis.
Key Concepts:
Techniques:
Disk Imaging: Creating forensic copies (images) of entire disks or specific partitions
using tools that ensure data integrity and preservation.
Steps:
1. Preparation:
6
Use Write-Blockers: Employ write-blocking devices to prevent any alterations to the
original disk during the imaging process.
Select Appropriate Tools: Choose reliable forensic imaging tools such as FTK Imager,
EnCase, or dd.
Full Disk Imaging: Capture a bit-by-bit copy of the entire disk, including all partitions,
unallocated space, and slack space.
Partition Imaging: If only specific partitions are needed, create images of those
partitions instead of the whole disk.
3. Verification of Integrity:
Generate Hash Values: Calculate hash values (e.g., MD5, SHA-1) for the original disk
and the forensic image before and after imaging.
Verify Hash Matches: Compare hash values to ensure the forensic image is an exact
duplicate of the original disk.
4. Documentation:
Record Details: Document all aspects of the imaging process, including date, time,
tools used, and personnel involved.
Maintain Chain of Custody: Keep detailed records of each transfer and access to the
forensic image.
Recovering Deleted Files: Techniques for recovering files that have been deleted or marked as
inaccessible within file systems.
Techniques:
File System Behavior: Understand how different file systems handle file deletion. For
example, NTFS may retain metadata even after files are deleted, while FAT may
overwrite the file entry.
Unallocated Space: Deleted files often remain in unallocated space until they are
overwritten.
Forensic Software: Use forensic recovery tools such as Recuva, TestDisk, or Autopsy
to scan for and recover deleted files.
Carving Techniques: Employ file carving methods to recover files based on known file
headers, footers, and structure, without relying on the file system’s metadata.
7
3. Analyzing Recovered Data:
Verify File Integrity: Check the integrity of recovered files using hash values or other
verification methods.
Examine Metadata: Analyze the metadata of recovered files to understand their origin,
creation, modification, and deletion.
Analyzing File Metadata: Extracting and analyzing metadata associated with files to
reconstruct activities and timelines.
Steps:
1. Extraction of Metadata:
Forensic Tools: Use tools like ExifTool, FTK Imager, or EnCase to extract metadata
from files.
Batch Processing: Process multiple files simultaneously to extract metadata efficiently.
2. Types of Metadata:
Basic Metadata: Includes creation date, modification date, file size, and file type.
Extended Metadata: May include author information, application used to create/edit
the file, and geolocation data (especially for images).
3. Analysis of Metadata:
4. Reporting:
Detail Findings: Document the metadata analysis process and findings, including
significant insights or anomalies.
Visual Aids: Use tables, charts, or graphs to present metadata in a clear and
understandable format.
8
Module 4 - Data Acquisition and Duplication
Overview: Data acquisition involves methods for capturing forensic data, distinguishing
between live and dead acquisition approaches depending on whether the system is active or not
during acquisition.
Key Concepts:
Techniques:
Creating Forensic Images: Using specialized tools to create forensic images of storage
devices, ensuring the preservation of evidence in a forensically sound manner.
Steps:
1. Preparation:
Secure the Scene: Ensure that the storage device is secured and that access is restricted
to authorized personnel only.
Use Write-Blockers: Employ write-blocking devices to prevent any modifications to
the original storage device during the imaging process.
Choose the Right Tool: Select reliable forensic imaging tools such as FTK Imager,
EnCase, dd, or Guymager.
2. Imaging Process:
Full Disk Imaging: Create a bit-by-bit copy of the entire storage device, including all
partitions, unallocated space, and slack space. This captures the entire state of the disk,
including any hidden or deleted data.
Partition Imaging: If the investigation requires only specific partitions, create images
of those partitions to save time and storage space.
9
Live Imaging: For volatile data (like RAM or live systems), perform live imaging to
capture the state of the system in real-time.
Label and Store: Label the original storage device and the forensic image properly.
Store the original device securely to prevent any tampering or damage.
4. Documentation:
Record Details: Document all details of the imaging process, including date, time, tools
used, personnel involved, and the serial numbers of devices.
Chain of Custody: Maintain a detailed chain of custody log to track who has handled
the evidence and when.
Verifying Data Integrity: Comparing hash values before and after data acquisition to ensure
data integrity and detect any changes that may have occurred.
Steps:
Original Storage Device: Calculate hash values (e.g., MD5, SHA-1, SHA-256) for the
original storage device before imaging. Use trusted forensic tools to generate these
hashes.
Forensic Image: After creating the forensic image, calculate hash values for the image.
2. Comparison:
Match Hash Values: Compare the hash values of the original storage device with those
of the forensic image. They must match exactly to confirm the integrity of the data.
Document Results: Record the hash values and the comparison results in your
documentation. This provides a verifiable record that the data has not been altered.
3. Periodic Verification:
Recalculate Hashes: Periodically recalculate hash values of the forensic image during
the investigation to ensure continued integrity, especially if the data is transferred or
accessed multiple times.
Consistency Checks: Ensure that all copies and backups of the forensic image also
match the original hash values.
10
Module 5 - Defeating Anti-Forensic Techniques
Overview: Module 5 addresses the techniques and strategies employed to defeat anti-forensic
measures, which are methods used to impede or obstruct digital forensic investigations. The
module emphasizes the importance of identifying and mitigating these techniques to ensure
thorough and effective forensic analysis.
11
o Legal Guidelines: Adherence to legal standards in countering anti-forensic
activities.
o Ethical Standards: Ensuring documentation and reporting of findings in a
manner that is legally admissible.
Key Concepts:
Forensic Tools: Examples include EnCase, FTK (Forensic Toolkit), Autopsy, and
Volatility for memory analysis.
Cryptanalysis Tools: Tools used to decrypt encrypted data or recover keys used in
encryption.
Outcomes:
Overview: Windows forensics involves the analysis of Microsoft Windows operating systems
to retrieve and analyze digital evidence. This module covers essential techniques and tools for
examining Windows environments, including registry analysis, event logs, and file system
artifacts.
Key Concepts:
Registry Analysis: Examining the Windows registry to gather information about system
configuration, user activities, installed software, and system settings.
Event Logs: Analyzing Windows event logs to reconstruct system and user activities,
including login/logout events, application usage, and security-related events.
12
Prefetch Analysis: Investigating prefetch files to identify recently accessed programs
and files, which can provide insights into user activities and software usage.
Techniques:
Steps:
Overview: Linux and macOS systems require specific forensic approaches due to their distinct
file system structures and command-line interfaces. This module covers the essential techniques
for analyzing these operating systems, focusing on file system structures, command-line
artifacts, and volatile data.
Key Concepts:
File System Differences: Understanding the file system architectures like ext4 (Linux)
and HFS+ (macOS), which affect how data is stored, retrieved, and analyzed.
14
Command-Line Artifacts: Analyzing shell history, logs, and configuration files to
reconstruct user activities and system changes on Linux and macOS systems.
Techniques:
1. Volatile Data Analysis: Extracting and analyzing data residing in memory (RAM) to
capture running processes, network connections, and other volatile information.
Steps:
1. Internet History:
o Browser Artifacts: Extract browsing history, cookies, cache, and download
history from web browsers like Chrome, Firefox, and Edge. Tools such as
Browser History Examiner, NirSoft BrowsingHistoryView, and
WebCacheImageInfo can be useful.
o System Artifacts: Examine system artifacts related to internet activity, including
DNS cache and temporary internet files.
2. Recently Opened Files:
o Recent Files List: Investigate the "Recent" or "Recent Items" list in the
operating system's file explorer and associated system logs.
o Jumplists: Extract and analyze jumplists, which are records of recently accessed
files and applications. Tools like Jumplists Parser can assist in this process.
o Link Files (LNK): Recover shortcut (LNK) files that provide metadata about
recently accessed files, including file paths and timestamps. Tools like FTK
Imager or LECmd can help parse these files.
3. USB Device Connections:
o Registry Analysis: On Windows, examine the Registry, particularly the
SYSTEM\CurrentControlSet\Enum\USBSTOR and SYSTEM\
CurrentControlSet\Services\USBSTOR keys, to identify connected USB devices.
o Windows Event Logs: Review event logs for records of USB device
connections and disconnections. Tools like Event Log Explorer can simplify this
process.
o Setupapi Logs: Analyze the setupapi.dev.log file for information about USB
devices that have been connected to the system.
4. Tools and Methods:
o Automated Tools: Use forensic suites like EnCase, FTK, and Autopsy to
automate the recovery and analysis of artifacts.
o Manual Inspection: Perform manual inspections of file systems, registries, and
logs to identify and correlate artifacts.
5. Documentation:
o Record Findings: Document recovered artifacts, including their locations,
timestamps, and relevance to the investigation.
o Chain of Custody: Maintain detailed records of the artifact recovery process to
preserve the integrity of the evidence.
6. Recovering from Encrypted Volumes:
15
o Techniques for Accessing and Decrypting: Address methods for accessing and
decrypting data stored on encrypted file systems or containers used by Linux and
macOS.
Steps:
1. File Accesses:
o File System Analysis: Examine file system metadata to identify accessed,
modified, and created files. Tools like FTK Imager and EnCase can help extract
this information.
o Prefetch Files: Analyze prefetch files (for Windows) to determine when
programs were executed and what files were accessed.
o USN Journal: Review the Update Sequence Number (USN) Journal (for NTFS
volumes) to track changes to files and directories.
2. Program Executions:
o Prefetch Files: Analyze prefetch files for details on executed programs,
including the last execution time and frequency.
o Shimcache: Examine the Application Compatibility Cache (Shimcache) stored
in the Windows Registry to identify executed applications.
o Amcache: Analyze the Amcache.hve file to gather information about program
executions, including timestamps and file paths.
o SRUM: Review the System Resource Usage Monitor (SRUM) database for
detailed logs of application usage and resource consumption.
3. System Modifications:
o Registry Changes: Monitor changes in the Windows Registry, focusing on keys
related to system settings, installed software, and user activities. Tools like
RegRipper can automate this analysis.
o Event Logs: Analyze Windows Event Logs for records of system changes, user
logins, and administrative actions. Event Log Explorer can facilitate this process.
o Scheduled Tasks: Review the list of scheduled tasks in the Task Scheduler for
any suspicious or unexpected entries.
4. Tools and Methods:
o Forensic Suites: Utilize comprehensive forensic tools such as EnCase, FTK, and
Autopsy to streamline the identification and analysis of user activities.
o Custom Scripts: Develop custom scripts to automate repetitive tasks and
enhance the analysis of specific artifacts or logs.
5. Documentation:
o Detail Findings: Document all identified user activities, including file accesses,
program executions, and system modifications, with relevant timestamps and
context.
o Correlation of Events: Correlate different sources of evidence to build a
coherent timeline of user actions and their potential impact on the system.
16
Module 8 - Network Forensics
Key Concepts:
Techniques:
Steps:
18
Privilege Escalation: Identify signs of privilege escalation, such as the
creation of new administrative accounts or changes to critical system
files.
System Modifications: Detect unauthorized changes to system files,
configurations, or registry settings.
Lateral Movement: Track lateral movement by monitoring unusual
access to multiple systems or shared resources.
5. Tools and Methods:
o SIEM Systems: Utilize Security Information and Event Management (SIEM)
systems like Splunk, ArcSight, or QRadar to aggregate, correlate, and analyze
security events and logs.
o Threat Intelligence Feeds: Incorporate threat intelligence feeds to stay updated
on the latest threats and indicators of compromise (IOCs).
o Behavioral Analysis: Apply behavioral analysis techniques to detect deviations
from normal network activity patterns.
Key Concepts:
Web Server Logs: Analyzing logs to trace HTTP requests, user interactions, and
potential attack patterns.
Web Application Forensics: Examining web application code, databases, and server
configurations for security weaknesses.
Techniques:
20
Identify Anomalies: Look for unusual login attempts, unexpected file
modifications, and abnormal network traffic patterns.
o Timestamps:
Synchronize Clocks: Ensure all systems' clocks are synchronized using
Network Time Protocol (NTP) to maintain accurate timestamps.
Timeline Reconstruction: Create a chronological timeline of the attack
using timestamps from logs, system events, and forensic artifacts.
Time Zone Considerations: Take time zone differences into account
when correlating events from systems in different geographical locations.
o Digital Footprints:
Network Traffic Analysis: Use tools like Wireshark, tcpdump, and
Bro/Zeek to capture and analyze network traffic for signs of malicious
activities.
Endpoint Forensics: Conduct forensic analysis on compromised
endpoints to recover artifacts such as file system changes, registry
modifications, and memory dumps.
Artifact Recovery: Identify and recover artifacts like malware binaries,
scripts, and configuration files that can provide insights into the attacker's
methods.
o Attribution:
IP Addresses: Trace IP addresses used by the attacker. Use WHOIS
lookup and geolocation tools to gather information about the IP
addresses.
User Agents: Analyze user agent strings in web server logs to identify
patterns or anomalies that may point to specific tools or scripts used by
the attacker.
External Intelligence: Utilize threat intelligence feeds and databases to
match discovered IOCs (Indicators of Compromise) with known threat
actors or campaigns.
3. Tools and Methods:
o Forensic Suites: Use comprehensive forensic tools like EnCase, FTK, and
Autopsy for in-depth analysis and artifact recovery.
o SIEM Systems: Implement SIEM solutions like Splunk, ArcSight, and QRadar
to aggregate, correlate, and analyze logs and events.
o Threat Intelligence Platforms: Integrate threat intelligence platforms like
ThreatConnect or MISP to enrich analysis with external threat data.
Overview: Dark web forensics involves investigating illegal activities conducted through
anonymous networks like Tor. This module focuses on tracing activities on the dark web,
analyzing cryptocurrency transactions, and overcoming anonymity challenges.
21
Key Concepts:
Tor Network: Understanding the architecture and anonymity features of Tor to trace
activities conducted on dark web platforms.
Cryptocurrency Transactions: Analyzing blockchain transactions to uncover financial
flows and transactions associated with illicit activities.
Techniques:
Overview: Email crimes encompass illegal or fraudulent activities carried out through email
communications.
Key Concepts:
Techniques:
Restoring Deleted Emails: Recovering deleted or archived emails from mail servers or
client applications to reconstruct communication histories.
23
Steps:
1. Server-Side Recovery:
o Email Retention Policies: Review server settings and retention policies to see if
deleted emails can be restored from backups or archives.
o Administrator Access: Secure admin access to email servers to retrieve deleted
emails from backup systems or recycle bins.
2. Client-Side Recovery:
o Email Client Applications: Utilize email clients (such as Microsoft Outlook or
Mozilla Thunderbird) with built-in recovery features to retrieve emails from
local storage or archives.
o Recycle Bin: Inspect the recycle bin or trash folder in the email client to recover
recently deleted emails before permanent deletion occurs.
3. Forensic Data Recovery:
o Forensic Software: Use forensic tools like EnCase, FTK Imager, or Autopsy for
data carving and recovering deleted email fragments from disk images or storage
devices.
o Metadata Analysis: Analyze email metadata, including headers and timestamps,
to reconstruct communication timelines and identify key email exchanges.
4. Legal Considerations:
o Compliance: Ensure that email recovery methods align with legal and
organizational standards concerning data privacy, confidentiality, and chain of
custody.
o Authorization: Obtain necessary authorization or legal warrants prior to
accessing and recovering deleted emails during an investigation.
Tracing Sender IPs: Utilizing email headers and metadata to determine the physical location
and identity of email senders, even if they try to obscure their origins.
Steps:
COURSE CERTIFICATE:
25
CONCLUSION
This extensive digital forensics course has offered an in-depth examination of critical
techniques and concepts essential to the field. Covering everything from fundamental principles
of evidence handling and forensic imaging to sophisticated approaches in network analysis, web
attack investigations, and dark web forensics, each module provides practical skills necessary
for the effective identification, preservation, and analysis of digital evidence. The course places
a strong emphasis on legal compliance and ethical practices, ensuring that professionals are
prepared to handle complex forensic scenarios while maintaining the integrity and admissibility
of evidence in legal contexts.
26