Lecture-4 Introduction to Digital Forensics
Lecture-4 Introduction to Digital Forensics
Digital Forensics
Tools
EnCas examination.
Email Analysis: Analyzes email
e Key content and attachments across
various platforms.
is Comprehensive Analysis:
EnCase is capable of examining
EnCase different file systems, such as
NTFS, FAT, EXT, and APFS,
Import covering a wide range of devices
and formats.
ant in Legal Trustworthiness: Known
for upholding data integrity,
EnCase preserves evidence in a
Digital format admissible in court.
Forensi
Multi-Device Support: Supports
cs? diverse sources, from mobile
devices to network drives,
making it suitable for complex
cases.
3. EnCase Interface and
Workflow
The EnCase workflow is organized into several steps,
each designed to streamline the investigation
process:
• Case Setup: Investigators begin by creating a
new case file, where all evidence is stored and
organized.
• Evidence Acquisition: Data is captured from
suspect devices using write-blocked acquisition
tools. EnCase supports creating digital images or
forensic copies.
• Data Processing: EnCase processes the data,
indexing it for faster searches and filtering.
• Evidence Analysis: Investigators can use
keyword searches, hash filtering, and file carving
to find pertinent information.
• Reporting and Documentation: EnCase’s
reporting tools help organize and present findings
in a format suitable for legal proceedings.
Step-by-Step Example:
1.Evidence Acquisition:
Investigators obtain physical
devices or remote data sources.
They use EnCase’s write-blocked
4. Using acquisition mode to create
forensic images, preserving the
EnCase in original data.
2.Data Indexing: EnCase indexes
Digital all data on the forensic image,
making it ready for quick
Investigat searches. This indexing includes
metadata, emails, and document
ions contents.
3.Keyword Searches and Filters:
Investigators use keywords
related to the investigation (such
as specific dates, names, or
locations) to filter and locate
relevant files or conversations.
Step-by-Step Example:
4.Email and Chat Analysis:
EnCase’s email module retrieves
and organizes emails and chat
logs, allowing for detailed analysis
of communication patterns.
4. Using 5.File Carving: For deleted files,
EnCase in EnCase’s file carving tools can
recover fragments and reassemble
Digital them based on file headers and
footers.
Investigat 6.Reporting and Documentation:
EnCase automatically logs every
ions step taken by the investigator,
ensuring that the process is
documented for legal scrutiny.
Reports are then generated for
court use or internal investigation
summaries
5. Case Study: EnCase in
Action
Let’s look at a case where EnCase was crucial in a corporate fraud
investigation.
• The Scenario: A company suspects an employee of fraud and
data theft. Investigators use EnCase to capture a forensic image
of the employee’s laptop.
• Using EnCase: The forensic team sets up a case file and indexes
the laptop’s data. They use EnCase’s search and filtering tools to
examine email attachments and sensitive document folders.
• Finding Evidence: EnCase reveals encrypted documents that
match a unique hash value in the company’s database,
confirming the employee accessed and modified confidential
files.
• Outcome: EnCase’s comprehensive report and integrity-
preserved evidence are presented to the legal team, supporting
their case in court.
6. Benefits of EnCase
Step-by-Step Example:
2.
A write blocker is a
Write device that allows forensic
analysts to access data on
Blocke a storage device without
modifying any data.
rs It blocks all write
commands, preventing
changes while still
allowing read access to
the data.
Hardware Write Blockers:
Physical devices that
connect between the
Types analyst’s computer and the
evidence drive. They
of intercept write commands
and block them from
reaching the evidence.
Write Software Write Blockers:
Programs installed on a
Blocke forensic machine to prevent
write operations on
rs: connected drives. Although
useful, they are generally
less secure than hardware
solutions.
Data Preservation:
Ensures that no files are
modified, deleted, or
Why added, which is crucial for
maintaining evidence
Use integrity.
Write Forensic Soundness: Any
modification to the original
Blocke data could invalidate
evidence in court. Write
rs? blockers maintain the
“forensic soundness” of
evidence by guaranteeing
its originality.
Using Write Blockers in Practice:
Imagin system.
Hash Generation: Generate a hash
g (like MD5 or SHA-1) of the original data.
This hash will be compared with the