Module 5
Module 5
Chapter 5:
Understanding Computer Forensics
Understanding Computer Forensics: Introduction, Historical Background of
Cyberforensics, Digital Forensics Science, Need for Computer Forensics, Cyber Forensics
and Digital Evidence, Digital Forensic Life cycle, Chain of Custody Concepts, network
forensics.
Learning Objective
Fundamental concepts in Cyberforensics
Understand the meaning of the term "Cyberforensics and the need for
Cyberforensics
Learn what "digital evidence" means along with the base term forensics science
Get an overview of cardinal rules of computer forensics.
Learn how Cyberforensics is used in cybercrime investigations
Understand the legal requirements for Cyberforensics and compliance aspects of
Cyberforensics
Get an overview of the role of forensics experts.
Understand the "data privacy issues" involved in Cyberforensics
Forensic Auditing, Cyberforensics tools available, Challenges faced in
Cyberforensics
5.1 Introduction,
• Cyber forensics plays role in investigation of cybercrime.
• Evidence in the case of Cyber offenses is extremely important from legal perspective.
• There are legal aspects involved in the investigation as well as handling of the digital
forensics evidence.
• Technically trained and experienced experts are involved in the forensics activities.
• Use of hand-held devices are incensing now a days. [PDA (Personal Digital
Assistance), mobile Phones, iPods]
• Use of data mining in cyber forensics, forensics auditing and anti-forensics.
Computer forensics
Digital forensics is the application of analyses techniques to the reliable and unbiased
collection, analysis interpretation and presentation of digital evidence. There is a number
of slightly varying definitions/The term computer forensics, however, is generally
considered to be related to the use of analytical and investigative techniques to identify,
collect, examine and preserve evidence/information which is magnetically stored or encoded
2. Digital forensics: It is the use of scientifically derived and proven methods toward the
preservation, collection, validation, identification, analysis, interpretation, documentation
Introduction to Cyber Security (BETCK105I) Module 5
and presentation of digital evidence derived from digital sources for the purpose of
facilitation or furthering the reconstruction of events found to be criminal, or helping to
anticipate unauthorized actions shown to be disruptive to planned operations.
Figure 5.1 shows the kind of data you "see" using forensics tools.
Introduction to Cyber Security (BETCK105I) Module 5
COFEE Time:
Digital evidence plays an important role in threat management life cycle, from incident
response to high-stakes corporate litigation. Evidences involve computer hard drives,
portable storage, floppy diskettes, portable music players and PDA's, etc.....
Key evidences often reside on more than a user hard drive or file server, requiring the
capture and analysis of evidence from enterprise productivity servers, network logs or
proprietary databases.
Many threats arise from illegal internet activities that extend beyond the firewall and
require new investigative and forensics approaches. Forensics professionals need
supporting solution for the acquisition, management and analysis of digital evidence.
Such types of computer evidences are important because quite often the
evidence becomes the deciding factor in a criminal, civil or employee dismissal
action.
Investigations involving trade secrets, commercial disputes and misdemeanor
and felony crimes can be won or lost solely with the introduction of recovered E-
mail and other documentation. If someone makes an attempt to delete, erase or
otherwise hide critical evidence, you need the competent data recovery capabilities
of forensics discoveries.
⯈ The media on which clues related to cybercrime reside may vary from case to case.
⯈ There are many challenges for the forensics investigator because storage devices are
getting miniaturized due to advances in electronic technology; for example, external
storage devices such as mini hard disks (pen drives) are available in amazing shapes.
⯈ Looking for digital forensics evidence (DFE) is like looking for a needle in the
haystack.
⯈ Here is a way to illustrate why there is always the need for forensics software on
suspect media - the capacity of a typical regular hard disk is 500 GB (gigabytes).
⯈ In an A4 size page, there are approximately 4,160 bytes (52 lines x 80 Characters =
4160 bytes assuming 1 byte per character). This is equivalent to 4 KB (kilobytes). An
A4 size of paper sheet has thickness of 0.004 inches.
⯈ Data of 4 MB (megabyte; 1,000 times of 4 KB) when printed on A4 size of paper would
be 4 inches thick.
⯈ Data of 4 GB if printed on A4 sheet would be 4,000 inches, that is, 1,000 times of be
virtually impossible to "retrieve" relevant forensics data from this heap!! There comes
the help from forensics MB.
⯈ This would turn out to be 4 inches thick. The printout of 500 GB would be
500,000 inches!
⯈ It would be virtually impossible to "retrieve" relevant forensics data from this heap!!
There comes the help from forensics software-it helps sieve relevant data from the irrelevant
mass (vital few from trivial many as the proverb goes).
Fungibility:
CASE STUDY
Officer Amar collects the knife and places it into a container, then gives it to forensic
technician Balan. Forensics technician Balan takes the knife to the laboratory
and collects fingerprints and other
evidence from the knife. He then gives the knife and all evidence gathered from the knife
to evidence
clerk Charu. Charu then stores the evidence until it needed, documenting everyone who
has accessed the original evidence (the knife and original copies of the lifted
fingerprints).
The chain of custody requires that from the moment the evidence is collected,
every transfer of Evidence from one person to another person should be documented as
it helps to prove that nobody else could have accessed that evidence. It is advisable to
keep the number of evidence transfers as low as possible. In the courtroom, if the
defendant challenges the chain of custody of the evidence, it can be proven that the knife
in the evidence room is the same as found at the crime scene. However, if due to some
discrepancies it cannot be proven who had the knife at a particular point in time. Then
the chain of custody is broken and the defendant can ask to have the resulting evidence
declares inadmissible.
As compared the physical evidence digital visions is different in nature because of it has
some unique characteristics.
digital evidence is much easier to change or manipulate
prefers digital copies can be made without harming original.
Introduction to Cyber Security (BETCK105I) Module 5
File system: It includes files, volumes, directories and folders, file allocation tables
(FAT) as in the folder version of Windows Operating System, clusters, partitions,
sectors.
2. User created files: It consists of address books, audio/video files, calendars, database
files, spread- 2. sheets, E-Mails, Internet bookmarks, documents and text files.
3. Computer created files: It consists of backups, cookies, configuration files, history files,
log files, Swap files, system files, temporary files, etc.
4. Computer networks: It consists of the Application Layer, the Transportation Layer, the
Network Layer, the Data Link Layer. Readers who are not savvy with these terms
Box 5.5: The Father of Forensics Science the Sherlock Holmes of France:
Dr. Edmard Locard 1877-1966, Pioneer in Forensic Science and was popularly known
as Sherlock Holmes of France.
He Formulated the basic principle of forensics science; " Every contact leaves a trace".
known as Locard's exchange principle.
According to the "Indian Evidence Act 1872," "Evidence" means and includes:
1. All statements which the court permits or requires to be made before it by witnesses,
in relation to matters of fact under inquiry, are called oral evidence.
2. All documents that are produced for the inspection of the court are called
documentary evidence.
Legal community believes that "electronic evidence" is a new breed of evidence. They also,
at times, have an apprehension that the law of evidence as per Indian Evidence Act of 1872
may not hold good for electronic evidence. Some lawyers express doubts and apprehensions
about the process of leading electronic evidence in the courts. However, this is not true; the
traditional principles of leading evidence, along with certain newly added provisions in the
Indian Evidence Act 1972 through the Information Technology Act (ITA) 2000, constitute
the body of law applicable to electronic evidence. The challenges, however, need to be
understood from the "rules of evidence" perspective.
Paper evidence, the process is clear and intuitively obvious. Digital evidence by its very
nature Invisible to the eye. Therefore, the evidence must be developed using tools other
than the is human eye.
There are number of contexts involved in actually identifying a piece of digital evidence:
1. Physical context: It must be definable in its physical form, that is, it should reside on
a specific piece of media.
2. Logical context: It must be identifiable as to its logical position, that is, where does it
reside relative to the file system.
3. Legal context: We must place the evidence in the correct context to read its meaning,
this may require looking at the evidence as machine language, for example, American
Standard Code for Information Interchange (ASCII).
The path taken by digital evidence can be conceptually depicted as shown in Fig. 5.3.
What are the guidelines for the (digital) evidence Collection Phase.
1. Adhere to your site's security policy and engage the appropriate incident handling
and law enforcement personnel.
2. Capture a picture of the system as accurately as possible.
3. Keep detailed notes with date and times, if possible, generate an automatic
transcript. Notes and printout should be signed and dated.
4. Not the difference between the system clock and coordinated universal time for each
time stand provided indicate whether UTC or local time is used.
5. be prepared to testify perhaps your leader outlining all actions you to convert times
detail notes will be vital.
6. minimise changes to the data as you are collecting it this is not limited to content
changes avoid updating files or directly access time.
7. Remove external avenues for change.
8. when confronted with the choice between collection and analysis used to do
collection first and analysis later.
9. Needless to say, your procedures should be implementable. As with any aspect of an
incident response policy, procedures should be tested to ensure feasibility,
particularly, in a crisis. If possible, procedures should be automated for reasons of
speed and accuracy. Being methodical always helps.
10. For each device, a systematic approach should be adopted to follow the guidelines
laid down in your collection procedure. Speed will often be critical; therefore, where
there are a number of devices requiring examination, it may be appropriate to spread
the work among your team to collect the evidence in parallel. However, on a single
given system collection should be done step by step.
11. Proceed from the volatile to the less volatile; order of volatility is as follows:
Registers, cache (most volatile, i.e., contents lost as soon as the power is turned
OFF); routing table, Address Resolution Protocol (ARP) cache, process table,
kernel statistics, memory;
Temporary file systems;
disk;
remote logging and monitoring data that is relevant to the system in question;
physical configuration and network topology;
archival media (least volatile, i.e., holds data even after power is turned OFF).
12.we should make a bit-level copy of the system's media. If we wish to do forensics
analysis we should make a bit-level copy of pour evidence copy for that purpose, as
our analysis will almost certainly alter file access times. try to avoid doing forensics
on the evidence copy.
Note: Address Resolution Protocol (ARP) is a very important part of IP networking.
ARP is used to connect O er (Network) to OSI Laver 2 (Datalink), For most of us this means
that ARP is used to link to our IP addressing to our Ethernet addressing (MAC
Addressing). For you to communicate with any device on you network, you must have the
Ethernet MAC address for that device. If that device is not on your land you go to your
default gateway.
Introduction to Cyber Security (BETCK105I) Module 5
In this case your rooter will be destination MAC address that your PC will communicate
with they are two types of ARP entries Static and dynamic.
Most of the time you will use dynamic ARP and trees what does means that the ARP entry
(the Ethernet Mac to the IP address link) is kept on a device for some period of time as
long as it is being used.
The opposite of a dynamic ARP entry is static ARP entry. With the static ARP entry, you
are manually entering the link between the Ethernet MAC address and IP address because
of Management headache that lack of insignificant negative to using dynamic entries are
used most of the time.
Email system is the hardware and software that controls the flow of email.
The two most important components of an email system are the email server and email
gateway.
Email server are computer set forward collect store and deliver an email to their clients and
email gateways are the connections between the email server.
Mail server software is a network software that controls the flow of email and the mail clients
of their helps each user read compose send and delete messages and email consists of two
parts the header and the body.
Theatre of an email is very important from forensic point of you a full header view of an
email provides the inter part of emails journey from its Origins to its destination. the header
view include sleep originating IP address and other useful information.
Header information very sweet email service provider Email application and system
configuration.
As per section 66a of c and Indian act any electronic mail electronic message for the
purpose of causing convenience about the origin of such messages shall be punishable
with imprisonment for a term which may extend to 2 to 3 years and with fine.
Introduction to Cyber Security (BETCK105I) Module 5
Typically, the sender's E-Mail address can be found after the "From" section of the header.
However, that is not the only place it can be found. It can also be found under other sections
depending on the E-Mail client uses. These sections include the following.
1. X-originating E-Mail;
2. X-sender;
3. return-path.
RFC2822
RFC2822 is the Internet Message Format. According to the Internet specification RFC2822,
there are several formats of valid E-Mail addresses, like [email protected], john@[10.0.3.19],
"Joshi Ganesh'@host.net or "Joshi Ganesh"@[10.0.3.19]. Many E-Mail address validators
on the Web fail to recognize some of those valid E-Mail addresses. Some examples of invalid
E-Mail addresses are as follows:
The RFC2822 standard applies only to the Internet Message Format and some of the
semantics of messages contents. It contains no specification of the information in the
envelope.
RFC2822 states that each E-Mail must have a globally unique identifier. It is included into
the header of an E-Mail.
As per FBI's (Federal Bureau of Investigation) view, digital evidence is present in nearly
every crime scene. That is why law enforcement must know how to recognize, seize,
transport and store original digital evidence to preserve it for forensics examination. Figure
5.5 shows the process model for understanding a seizure and handling of forensics evidence
legal framework.
Digital forensic process needs to be understood in the legal context starting from
preparation of the evidence to testifying.
the exhibit should be introduced and presented and our challenge by properly qualified
people using a properly applied methodology that address is the legal theories and issue
Introduction to Cyber Security (BETCK105I) Module 5
Expert witness is very important and is associated with Digital forensic evidence
as per the court procedure the exhibits are introduced as evidences by either side.
Testimony is presented to established the process to identify collect preserve transport store
analyse interpret at tribute and or reconstruct the information contained in the exhibit and
to establish to the standard of proof required by the matter at hand that the evidence reflects
the sequence of events that is asserted to have produced it.
The assumption is that adequate facts can be established for the introduction of an evidence
exhibit.
people involved in the chain of custody need to justify a number of aspects relating to the
evidence- the testimonial typically include the process of used for creating handling and
introducing the evidence the method used for collecting the exhibit as well as the manner
in which the exhibit is brought to court.
Fig. 5.5: Process model for understanding a seizure and handling of forensics evidence
legal framework.
1. Technology expertise:
This is perhaps the biggest advantage of partnership with a computer forensics expert.
As an example of the technological complexity, consider the proliferation of operating
systems in the last decade: mainframe operating systems, Windows 95/98, UNIX, Linux,
Windows NT, Windows Server, Macintosh, Windows 2000, Windows XP and Novell
Netware. Specific forensics tools must be used with each of these file systems, along with
training and experience to interpret search results. Although some evidence may be found
easily, other evidence may have been deleted, altered, hidden or encrypted. Forensics
experts routinely deal with such complexities and nuances.
2. Forensics methodology: A comprehensive forensics methodology, repeatable and
defensible, has become a key attribute in choosing a forensics expert firm. Proper use of
a repeatable process prevents making the same mistake twice, ensures proper chain of
custody, leverages successful techniques from prior cases, supports clear and concise
testimony, and generally guarantees efficient forensics case management.
3. Experience and efficiency: The tools and methods of computer forensics examination
are still in their infancy. Experts know how to quickly navigate through the variety of
esoteric tools and procedures. Experts also have the experience to cull thousands of files
based on patterns and keywords. Therefore, working with experts will efficiently produce
relevant results for counsel.
Let us take a brief look at each of the activities mentioned. Table 5.5 shows phase-wise
outcome from the phases mentioned above.
if the machine is suspected of being used for illegal communication such as terrorist traffic
not all of this information may be stored on the hard drive.
If information told solely in Random Access Memory and not recovered before powering
down it may be lost.
This results in the need to collect volatile data from the computer at the onset of the
response.
Memory falls under the family of solid-state non-time memory it is used in some drive USB
sticks cell phone game console secure digital card and multimedia cards.
This technology differs from the normal hard disc by not containing any moving parts in
every device that interact with our daily life.
The benefit of Embedded memory continues to increase life expectancy. figure 5.8 shows
the various types of embedded memories inside a computer ROM, PROM, EPROM,
EEPROM.
Introduction to Cyber Security (BETCK105I) Module 5
Fig. 5.7. Some more media that can hold digital evidences
Introduction to Cyber Security (BETCK105I) Module 5
Many things can go wrong in storage, including decay over time; environment changes
resulting in the presence of a necessary condition for preservation;
Investigation in which the owner of the digital vision has not given consent to have his or
her media examined as in some criminal cases some care must be taken to ensure that the
forensic specialist has the legal authority to C copy and examine the data sometimes
authority stems from search warrant.
It is understanding the difference between live and dead analysis after that we explain about
the imaging of the media.
For a exam well the content of hard drives the scan we brought thought of as a analysis
investigators were told to shut down computer system when they are impounded for fear
that digital time bomb might cause data to be at rest.
Process of creating an exact duplicate of the original evidence media is often called imaging
computer forensics software packages make this possible by converting an entire hard drive
into a single searchable file is file is called an image.
Analysis, interpretation and attribution of evidence are the most difficult aspects
encountered by most forensics' analysts.
In the digital forensics arena, there are usually only a finite number of possible events
sequences that could have produced evidence; however, the actual number of possible
sequences may be almost unfathomably large.
In essence, almost any execution of an instruction by the computing environment
containing or generating the evidence may have an impact on the evidence. Basic ally, all
digital evidence must be analysed to determine the type of information that is stored uponit.
For this purpose, specialty tools are used that can display information in a format useful to
investigators. Such forensics tools include but are not limited to the following list.
if the file system metadata is used at all, it is typically used only for establishing cluster
sizes and avoiding carving of undeleted file.
covering is an important technique for Digital forensic investigation and for simple data
recovery.
Why using a database of headers and footers for specific file types file covers can retri
files from a raw disc image regardless of the type of a file system on the disc image.
File carving ignore the file system and car of the images directly from the data blocks. in
cases of fragmented files, the carbon returns in perfect photo but this image might be
sufficient to identify the subject. (As in fig. 5.9)
Introduction to Cyber Security (BETCK105I) Module 5
Digital analysis is very important in Digital forensic because a digital investigation may
encounter many forms of digital data and therefore there is a several types of digital
analysis.
The different analysis types are based on interpretation obstruction layers which are
generally part of the data design.
For example, consider the date on a hard disc which has been designed with several
interpretation layers lowest layer me contain partitions or other containers that are used
for volume management.
Inside each partition is data that has been organised into a file system or database.
Data in the file system is interpreted to create file that contain data in an application specific
format and requirement
1. Media analysis: It is analysis of the data from a storage device. This analysis does
not consider any partitions or other operating system (OS)-specific data structures.
If the storage device uses a fixed size unit, such as a sector, then it can be used in
this analysis.
2. Media management analysis: It is analysis of the management system use d to
organize media. This typically involves partitions and may include volume
management or redundant array of independent (or inexpensive) disks (RAID, see
Box 5.11) systems chat merge data from multiple storage devices into a single virtual
storage device.
3. File system analysis: It is the analysis of the file system data inside a partition or
disk. This typically involves processing the data to extract the contents of a fil e or to
recover the contents of a deleted files.
4. Application analysis: It is the analysis of the data inside a file. Files are created by
users and applications. The format of the contents is application-specific.
Introduction to Cyber Security (BETCK105I) Module 5
Executable analysis:
executables are digital object that can cause events to occur and their frequently
examine during intrusion investigation because the investigator needs to determine
what events the executable could cause
6. Image analysis:
image is a single searchable file.
Digital images are the target of many digital investigations because some are
Contraband.
this type of analysis Looks for information about where the picture was taken and
who are what is in the picture image analysis also includes examining images for
evidence of steganography
7. Video analysis
digital radio is used in security cameras and then personal videos cameras and
webcams investigation of online predators can sometimes involve digital video from
webcams this type of analysis examine the video for identification of objects in the
video and the location where it was shot
level 0: this is nothing but a strip would Disc a rate without fault tolerance. it provides
data stripping but no redundancy. this results in an improved performance however it
does not deliver fault tolerance all data in the array is lost if one drive fails.
Introduction to Cyber Security (BETCK105I) Module 5
level 1: This is mirroring and duplex into provide disc mirroring. level 1 provides double
the rate of read transaction for single discs, but provide the same bright transaction rate
as single disc.
level 2: this is error correcting coding however it is not a typical implementation. this
level is rarely used it stripes data at the bit level rather than at the block level.
This is bit interleaved parity level 3 provides byte level stripping with a dedicated parity
disc. It is really used probably because it cannot service simultaneous multiple requests.
level 4: this is dedicated parity drive. its use is common for implementation of RAID.
Level 4 offers block level stripping with the parity disc if a data disc fails. The parity data
is used to create a replacement disc. there is a disadvantage to level 4 in that the parity
dis can create write bottlenecks.
Level 5 this is the block interleaved distributed parity. the idea year is to provide data
stripping at the bite level and also strike error correction information. level 5 results in
excellent performance and good fault tolerance. it most popular among RAID
implementation methods.
level 6 this is independent data disc with the double parity. this level provides block
level striping with parity data distributed across all disks.
level 0+1: this is nothing but a mirror of stripes. it is not one of the original RAID levels.
With this level used, to RAID 0 stripes are created and one RAID 1 mirror is created over
them. The use of the level is typically seen for both replicating and sharing data among
these.
Reporting:
Once the analysis is complete, a report is generated. The report may be in a written form
or an oral testimony or it may be a combination of the two. Finally, evidence, analysis,
interpretation and attribution
9. brief description of steps taken during examination, such as string searches, graphics
image searches
and recovering erased files;
10. results/ conclusions.
Testifying
This face in wall of presentation and cross examination of expert witness.
Depending on the country and legal Framework in which a cyber cream cases register that
is standards me apply with regard the issue of expert witnesses.
Digital forensic evidence is normally introduced by expert witness set in the case where
non expert can bring the clarity to non-scientific issues by taking what they observed or
did.
For example, and non-expert who works at a company may introduce the data here she
extracted from a company data base and discuss how the database works and how it
normally use from a non-technical standpoint.
To the extent that the witness is the custodian of a system or a content he or she can
justify to matters related to that custodial Rose as well.
Only expert witness can address issues based on scientific, technical or other specialized
knowledge.
A witness qualified as an expert by knowledge, skill, experience or education.a).
If a Testimony is based on sufficient facts or data.
b). Testimony is the product of reliable principles and methodsc).
the witness as applied the principles and methods reliable
presentation evidence,
and reporting Preparing and presenting the information report
resulting from analysis phase.
determine the issues relevance of the
information, its reliability and who can
testify to it.
interpreting the statistical from analysis
phase.
clarifying the evidence and documenting the
finding.
summarizing and providing explanation of
conclusions.
presenting the physical and digital evidence
to a court or corporate management.
attempting to confirm each piece of evidence
and each event in the chain either along with
each other are independent of one evidence
and or other events.
providing the validity of the hypothesis and
defend it against criticism and challenge.
Communicating Relevant findings to a
variety of audience management technical
personally law enforcement.
Principle 1:
No action taken by law enforcement Agencies or their agent should change data held on a
computer or storage media, which may subsequently be relied upon in court.
Introduction to Cyber Security (BETCK105I) Module 5
Principle 2:
In exceptional circumstance, where a person finds it necessary to access original data held
on a computer or storage media that person must be competent do so and be able to give
evidence explaining the relevance and the implications of his/her actions.
Principle 3:
An Audit trail or other record of all the processes applied to computer waste electronic
evidence should be created and preserved. An independent third party should be able to
examine those process and achieve the same result.
Principle 4:
The person in charge of the investigation (the case officer) has overall responsibility for
ensuring that the law and these principles are adhered to.
It is essential to get in the habit of protecting all evidences equally so that they will hold
up in court. Forensic nvestigation professionals know that if you do not have a chain of
custody, the evidence is worthless. They learn to deal with everything as if it would go to
litigation.
Purpose of the chain of custody is that the proponent of a piece of evidence must
demonstrate that it is what it purports to be.
In other words, there is a reliable information to suggest that the party offering the
evidence can demonstrate the piece of evidence is actually, in fact, what the party claims
it to be and can further demonstrate its origin and the handling of the evidence because it
was acquired.
The Chain of Custody is a chronological written record of those individuals who have had
custody of the evidence from, its initial acquisition until its final disposition.
A chain of custody begins when an item of relevant evidence is collected, and the chain is
maintained until the evidence is disposed off (Figs. 5.10 and 5.11). The chain of custody
assumes continuous accountability. This accountability is important because, if not
properly maintained, an item (of evidence) may be inadmissible
Fig. 5.11: Maintaining chain of custody 2. (a) Source of evidence - where did it come (b).
Who found it? (c) Where was it stored/locked up? (d) Who touched it/tampered With it?
(e) What did they do to it? What did they do with it? (f) Human signature always required
******************************** END**********************************