0% found this document useful (0 votes)
13 views

Lecture-4 Introduction to Digital Forensics

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Lecture-4 Introduction to Digital Forensics

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

Introduction to

Digital Forensics
Tools

• Course Title: Introduction to


Digital Forensics Tools
• Faculty of Artificial Intelligence
• Program: Cyber Security, 4th
Level
Forensic Tools
and Technologies

• Digital forensics relies on


various tools to aid
investigations.
• We'll explore software and
hardware tools commonly
used.
FTK (Forensic Toolkit)

FTK, or Forensic Toolkit, is a leading


forensic software.

It offers indexing, file carving, and


password cracking features.

FTK is widely used in law enforcement


and corporate investigations.
1. What is FTK?

Forensic Toolkit (FTK) is a comprehensive


digital forensics software developed by
AccessData.
Known for its speed and efficiency, FTK
specializes in scanning, organizing, and
presenting vast amounts of data for forensic
investigations.
FTK is used by law enforcement, corporate
investigators, and cybersecurity
professionals to analyze digital evidence.
Key Capabilities:
File Indexing: FTK’s indexing technology allows
for fast keyword searches across multiple files
and drives.
File Carving: Recovering deleted files and
fragmented data is made easier with FTK’s data
carving tools.

Password Cracking: FTK includes a password-


cracking feature for encrypted files.

Data Visualization: FTK presents data in a


user-friendly format, ideal for analysis and
reporting
2. Why is FTK Important in Digital
Forensics?

FTK’s unique features make it an industry standard.


Here’s why FTK is critical:
Speed: Its indexing function is fast and
efficient, especially when handling large data
volumes, which is common in digital forensics.

Search Precision: FTK’s keyword search is


powerful, making it easier to locate relevant
information in extensive data sets.

Data Integrity: FTK’s write-blocking ensures


no data tampering, preserving evidence
integrity.
3. FTK Interface and
Functionalities
• The FTK interface is organized into modules,
each designed for specific forensic functions:
• Case Creation: Setting up a new case
allows investigators to organize and manage
evidence.
• Evidence Processing: Import evidence
files, and FTK indexes them for quick search
and retrieval.
• File Carving and Data Recovery: FTK’s file
carving can recover deleted or hidden files.
• Email Analysis: FTK can retrieve and
analyze email data, making it valuable for
cases involving communication tracking.
• Visualization: Visual aids, like charts and
timelines, make FTK effective for presenting
evidence clearly.
4. How to Use FTK in a
Digital Investigation?
Step-by-Step Example:
1. Acquire Evidence: Using a write-blocked drive, an investigator
creates an image of the suspect’s device to avoid altering original
data.
2. Case Setup: The investigator opens FTK, sets up a case file, and
imports the evidence.
3. Indexing: FTK processes the evidence to create an index, making
future searches quick and efficient.
4. Keyword Searches: Investigators use keywords related to the
case (e.g., a victim’s name or specific dates) to locate relevant files
or emails.
5. Analyze Files: FTK’s file carving recovers deleted files, and its
email analysis can track communication.
6. Report Generation: Once evidence is analyzed, FTK generates a
report summarizing findings for presentation or court submission.
Case Study: FTK in Action
Imagine a corporate case where confidential data was
leaked.
• The Setup: A company suspects an employee of leaking
sensitive information. Investigators obtain the employee’s
work laptop and create a forensic image.
• Using FTK: The forensic team uses FTK to analyze files,
focusing on emails and document histories. They conduct
keyword searches for project names and any private
keywords related to the information leak.
• Finding Evidence: FTK recovers deleted emails and logs,
showing that the employee sent restricted files to an
unauthorized recipient. The tool’s reporting feature then
creates a clear summary of evidence, ready for legal action.
FTK Interface and
Key Functionalities

The FTK interface includes modules


for case creation, evidence analysis,
and reporting.
• Common features:
• - Email analysis
• - File carving
• - Keyword searching
Case Study: Using
FTK in Digital
Investigations

Example: FTK used


in fraud
investigation
• Highlights:
• - Organized evidence
indexing
• - Fast search and
recovery of email
conversations
EnCase Forensics
EnCase is another
popular forensic
software.
• It provides evidence
processing, reporting
tools, and search
capabilities.
• It’s known for its
flexibility in supporting
different file types.
EnCase Workflow
EnCase workflow
includes acquisition,
analysis, and
reporting stages.
EnCase's ability to
handle different
devices makes it
valuable.
EnCase Forensics is a
software solution that allows
forensic analysts to acquire,
analyze, and report on digital
1. What evidence.
is It’s known for its flexibility
in handling multiple
EnCase device types like
computers, mobile devices,
? and network data.
Trusted in legal
investigations, EnCase’s
forensic capabilities ensure
evidence integrity, a critical
aspect in court-admissible
evidence.
Data Acquisition: Captures data
from computers, mobile devices,
and removable media.
Data Analysis: Advanced search
and filtering tools for a thorough

EnCas examination.
Email Analysis: Analyzes email
e Key content and attachments across
various platforms.

Featur Hash Analysis: Checks file


integrity and identifies duplicate
es: files.
Reporting Tools: Generates court-
ready reports with evidence
summaries and data trails.
EnCase offers a comprehensive,
flexible, and legally trusted platform,
2. Why making it invaluable in digital
forensics for several reasons:

is Comprehensive Analysis:
EnCase is capable of examining
EnCase different file systems, such as
NTFS, FAT, EXT, and APFS,
Import covering a wide range of devices
and formats.
ant in Legal Trustworthiness: Known
for upholding data integrity,
EnCase preserves evidence in a
Digital format admissible in court.

Forensi
Multi-Device Support: Supports
cs? diverse sources, from mobile
devices to network drives,
making it suitable for complex
cases.
3. EnCase Interface and
Workflow
The EnCase workflow is organized into several steps,
each designed to streamline the investigation
process:
• Case Setup: Investigators begin by creating a
new case file, where all evidence is stored and
organized.
• Evidence Acquisition: Data is captured from
suspect devices using write-blocked acquisition
tools. EnCase supports creating digital images or
forensic copies.
• Data Processing: EnCase processes the data,
indexing it for faster searches and filtering.
• Evidence Analysis: Investigators can use
keyword searches, hash filtering, and file carving
to find pertinent information.
• Reporting and Documentation: EnCase’s
reporting tools help organize and present findings
in a format suitable for legal proceedings.
Step-by-Step Example:
1.Evidence Acquisition:
Investigators obtain physical
devices or remote data sources.
They use EnCase’s write-blocked
4. Using acquisition mode to create
forensic images, preserving the
EnCase in original data.
2.Data Indexing: EnCase indexes
Digital all data on the forensic image,
making it ready for quick
Investigat searches. This indexing includes
metadata, emails, and document
ions contents.
3.Keyword Searches and Filters:
Investigators use keywords
related to the investigation (such
as specific dates, names, or
locations) to filter and locate
relevant files or conversations.
Step-by-Step Example:
4.Email and Chat Analysis:
EnCase’s email module retrieves
and organizes emails and chat
logs, allowing for detailed analysis
of communication patterns.
4. Using 5.File Carving: For deleted files,
EnCase in EnCase’s file carving tools can
recover fragments and reassemble
Digital them based on file headers and
footers.
Investigat 6.Reporting and Documentation:
EnCase automatically logs every
ions step taken by the investigator,
ensuring that the process is
documented for legal scrutiny.
Reports are then generated for
court use or internal investigation
summaries
5. Case Study: EnCase in
Action
Let’s look at a case where EnCase was crucial in a corporate fraud
investigation.
• The Scenario: A company suspects an employee of fraud and
data theft. Investigators use EnCase to capture a forensic image
of the employee’s laptop.
• Using EnCase: The forensic team sets up a case file and indexes
the laptop’s data. They use EnCase’s search and filtering tools to
examine email attachments and sensitive document folders.
• Finding Evidence: EnCase reveals encrypted documents that
match a unique hash value in the company’s database,
confirming the employee accessed and modified confidential
files.
• Outcome: EnCase’s comprehensive report and integrity-
preserved evidence are presented to the legal team, supporting
their case in court.
6. Benefits of EnCase

Efficient Analysis: Its indexing and search capabilities


make it faster to sift through large datasets.

Broad Compatibility: EnCase works with various


operating systems, file types, and devices, making it
adaptable to complex cases.

Data Integrity: By using write-blocking and hashing,


EnCase ensures that data remains unaltered, preserving
the chain of custody.

Legal Compliance: Known for reliability, EnCase-


generated evidence is often accepted in courts globally.
Autopsy
1. What is Autopsy?
• Autopsy is an open-source digital forensics
platform developed by Basis Technology.
• It’s known for its flexibility, supporting various
types of forensic investigations, including file
system analysis, email recovery, and more.
• Autopsy integrates several forensic modules,
enabling investigators to handle diverse
evidence types, such as hard drives, mobile
devices, and memory dumps.
Key Features of Autopsy:

Timeline Analysis: Generates a timeline of user


activities to help reconstruct events.

Keyword Search: Allows for quick searches across files


and logs, useful for locating relevant information.

Data Carving: Recovers deleted files and hidden data


from drives.

Artifact Extraction: Analyzes data specific to user


actions, like web browsing, email, and chat history.

Multimedia Analysis: Includes image analysis tools to


identify sensitive or illicit content.
2. Why is Autopsy Important in
Digital Forensics?

Autopsy’s open-source nature means


it’s accessible to any organization,
regardless of budget.

Its extensive functionality makes it a


valuable tool in both large-scale
investigations and smaller, educational
settings.
Benefits:

Cost-Effective: As open-source software,


Autopsy is free, making it highly
accessible.

Comprehensive Features: Includes


modules for multiple forensic tasks, from
basic data recovery to in-depth network
analysis.

Extensibility: Additional modules can be


integrated, allowing investigators to
customize Autopsy based on their needs.
3. Autopsy Interface and Core
Functionalities
Autopsy’s user interface is intuitive and modular:

Case Creation and Management: Set up a case, add evidence,


and Autopsy will organize findings automatically.

Keyword Search: Investigators can use keyword search for


targeted investigation of documents, emails, and logs.
Timeline Analysis: The Timeline feature organizes events by date,
enabling analysts to reconstruct actions, like file deletions or access
times.
Artifact Extraction: Autopsy can extract specific user activities,
including:
• Web History: Browsing data, cached pages, and download logs.
• Email Analysis: Recovers emails and related metadata.
• Multimedia Analysis: Includes tools for identifying sensitive or incriminating
images.
4. How to Use Autopsy in a
Digital Investigation

Step-by-Step Example:

Set Up Case: Investigators create a new case and import


evidence (e.g., disk image).

Add Modules: Enable relevant modules based on the case,


such as timeline analysis, keyword search, or multimedia
analysis.

Keyword Search: Use keywords relevant to the


investigation, like a suspect’s name or critical dates.
4. How to Use Autopsy in a
Digital Investigation

Timeline Analysis: Autopsy creates a timeline that shows


the sequence of events, such as when specific files were
accessed, modified, or deleted.
Analyze Artifacts: Investigators focus on specific data
artifacts:
• Web history: Find out which websites the user visited.
• Email content: Check for sensitive or incriminating messages.
Generate Report: Autopsy allows investigators to export
their findings in an organized report, making it easy to
present evidence.
5. Case Study: Autopsy in Action

• Imagine a scenario of corporate espionage (spying)where an


employee is suspected of leaking confidential data to a
competitor.
• Using Autopsy:
• Setup: Investigators image the employee’s computer and import
it into Autopsy.
• Keyword Search: Investigators search for specific project
names, dates, and keywords related to company trade secrets.
• Artifact Review: Autopsy retrieves web history showing the
employee accessed suspicious email accounts and file-sharing
services.
• Timeline: A timeline reveals that sensitive files were accessed
shortly before an email was sent to an unknown external address.
• Reporting: The report generated by Autopsy summarizes
evidence, which can then be used for legal action.
6. Benefits of Using Autopsy

Accessible and Cost-Efficient: Its open-source


model provides the functionality of a professional
forensic tool without the high costs.

Powerful Analysis Modules: Autopsy’s modules are


versatile, from timeline analysis to advanced file
recovery.

User-Friendly: Even with extensive features,


Autopsy’s interface is straightforward, enabling a
faster learning curve.

Collaborative: Autopsy is used globally, so its open-


source community actively contributes new modules
and updates.
Comparing FTK, EnCase, and
Autopsy

EACH TOOL HAS - FTK: INDEXING - ENCASE: - AUTOPSY:


UNIQUE AND SPEED DEVICE OPEN-SOURCE
FEATURES: VERSATILITY AND
ACCESSIBLE
Hardware Tools for Forensic
Analysis

IN DIGITAL FORENSICS, WE’LL DISCUSS TWO THESE TOOLS ARE INVALUABLE


PRESERVING DATA INTEGRITY ESSENTIAL HARDWARE TOOLS FOR CAPTURING DIGITAL
IS CRUCIAL TO ENSURE THAT THAT SUPPORT THIS GOAL: EVIDENCE WITHOUT
EVIDENCE IS NOT ALTERED WRITE BLOCKERS AND MODIFYING THE ORIGINAL
DURING INVESTIGATIONS. IMAGING DEVICES. DATA.
Hardware tools like write
blockers and imaging
devices are essential for
1. forensic investigations
because they:
Importan
Protect Evidence Integrity:
ce of Prevent changes to original
data during extraction.
Hardwar Ensure Admissibility in
e Tools Court: Proper handling
preserves the chain of
in custody, making evidence
Forensic admissible.
Enable Data Acquisition:
Analysis Allow investigators to safely
access and copy data from
various devices.
What is a Write
Blocker?

2.
A write blocker is a
Write device that allows forensic
analysts to access data on
Blocke a storage device without
modifying any data.
rs It blocks all write
commands, preventing
changes while still
allowing read access to
the data.
Hardware Write Blockers:
Physical devices that
connect between the
Types analyst’s computer and the
evidence drive. They
of intercept write commands
and block them from
reaching the evidence.
Write Software Write Blockers:
Programs installed on a
Blocke forensic machine to prevent
write operations on
rs: connected drives. Although
useful, they are generally
less secure than hardware
solutions.
Data Preservation:
Ensures that no files are
modified, deleted, or
Why added, which is crucial for
maintaining evidence
Use integrity.
Write Forensic Soundness: Any
modification to the original
Blocke data could invalidate
evidence in court. Write
rs? blockers maintain the
“forensic soundness” of
evidence by guaranteeing
its originality.
Using Write Blockers in Practice:

Set Up: Connect the evidence drive to


the write blocker, which then links to the
forensic workstation.

Data Access: With the write blocker in


place, investigators can access the data
without fear of altering it.

Verification: Hash values are generated


before and after accessing data to ensure
integrity, which is essential for court
purposes.
3. Imaging
Devices
What is an Imaging
Device?
• An imaging device
creates an exact, bit-by-
bit copy of the data on a
storage device.
• This forensic image
includes every sector of
the drive, capturing
deleted files, file
fragments, and
unallocated space, which
may contain valuable
evidence
Types of Imaging Techniques:

Disk Imaging: The full content of the


disk is copied, including active and
deleted data.

RAM Imaging: Captures volatile memory


(RAM), which is crucial for finding active
processes, encryption keys, or malicious
code.

Mobile Device Imaging: Mobile devices


require specialized imaging due to varied
operating systems and encryption.
Benefits of Using Imaging Devices:

Data Integrity: Creates a true replica, allowing


investigators to work with a copy while preserving
the original evidence.

Preservation of Deleted Files: Since forensic


images capture everything, including deleted or
hidden data, they allow recovery of critical
evidence that might otherwise be missed.

Efficiency: Imaging is a fast, reliable way to


duplicate data for analysis.
Preparation: Verify that the storage
device is correctly connected to an
imaging device or write-blocked

Imagin system.
Hash Generation: Generate a hash
g (like MD5 or SHA-1) of the original data.
This hash will be compared with the

Proces image copy to ensure no data


alteration.

s in Imaging: The imaging device


duplicates all sectors of the drive.
Forensi
cs: Verification: After imaging, another
hash is generated from the image and
compared with the original to ensure
they match, confirming the data
integrity.
Case Study: Investigating a Data
4. Theft Incident

Practical • Scenario: An employee is


suspected of leaking sensitive
Applicat information. Investigators retrieve
the employee’s workstation and
ion of use forensic methods to analyze
the data without tampering.
Write • Step 1: Use of Write Blocker
The workstation’s hard drive is
Blockers connected to a hardware write
blocker to ensure no accidental
and data alteration. The investigator

Imaging then views and extracts files


without changing any data on the

Devices original drive.


Case Study: Investigating a Data Theft
4. Incident
• Step 2: Imaging the Drive
Practical An imaging device is used to create
a complete replica of the hard
Applicat drive, capturing all data, including
deleted files and unallocated space.
ion of This image will be analyzed for
evidence of data exfiltration, such
Write as email history or hidden files.
• Step 3: Data Analysis
Blockers Investigators analyze the image on
a forensic workstation, running
and keyword searches and recovering
deleted data without affecting the
Imaging original drive. Any suspicious
findings are documented,
Devices preserving the original evidence
untouched for court submission.
Thank
You

You might also like