Unit-5 CSDF
Unit-5 CSDF
DIGITAL FORENSICS
5.1.1 INTRODUCTION TO DIGITAL FORENSICS
5.1.1 Introduction
Industrial espionage
Employment disputes
Fraud investigations
Bankruptcy investigations
To produce evidence in the court, which can lead to the punishment of the
culprit.
If the tool used for digital forensic is not according to specified standards,
then in the court of law, the evidence can be disapproved by justice.
Lack of technical knowledge by the investigating officer might not offer the
desired result.
5.2 LOCARD'S PRINCIPLE OF EXCHANGE IN DIGITAL FORENSICS
1. Digital Contact
Whenever there is interaction between digital devices, systems, or
users, there is a potential to an exchange of digital information.
• Examples include file transfers, communication over networks,
logins, data access, and or digital transactions.
2. Exchange of Digital Evidence
• During digital interactions, data is created, modified, or
deleted, leaving behind a trail of digital evidence.
• This digital evidence can include files, logs, metadata,
timestamps, network activity record images, audio,
video and other artifacts that reflect the nature of the
interaction.
3. Analysis of Digital Artifacts
• Digital forensics experts analyse these digital artifacts to
reconstruct events, understand the series of actions, and
identify relevant information for an investigation.
• It involves examining file computer system logs, network
traffic, and other digital traces to together the timeline
and details of digital incident.
4. Chain of Custody and Integrity
• Locard's Principle reinforces the importance of
maintaining a secure chain of custody for digital
evidence. This involves documenting the handling,
storage, and transfer of digital evidence to ensure
its integrity and admissibility in legal proceedings.
5. Specialized Tools and Techniques:
• Digital forensics professionals use specialized tools
and techniques to acquire, preserve, analyse digital
evidence.
• These tools help investigators extract information
from digital devices without altering the original
data, maintaining the integrity of the evidence.
• 5.2.2 Limitations of Locard's Principle of Exchange
• One of the greatest drawbacks of Locard's exchange theory lies in evidence
dynamics. This refers to the alteration of physical evidence before it has been
examined by investigators.
There are many factors that can lead to the tampering and destruction of
evidence.
Witness actions
• This is usually achieved by running special software that captures the current state of
the system's memory as a snapshot file, also known as a memory dump. This file can
then be taken offsite and marched by the investigator. It involves examining the
contents of the memory at a given time to identify running processes, network
connections, open files, passwords, encryption keys, and other volatile data.
• This is useful because of the way in which processes, files and programs are run in
memory, and once a snapshot has been captured, many important facts can be
ascertained by the investigator, such
Processes running
Executable files that are running
Open ports, IP addresses and other networking information
Users that are logged into the system, and from where
Files that are open and by whom
• Network Forensics
• Most of the attacks move through the network before hitting the target and they leave some
track According to Locard's exchange principle, "every contact leaves a trace, even in
cyberspace.
• Network forensics deals with the examination of network traffic and data packets to
investigate network-based security incidents or cybercrimes. It involves capturing, analysing,
and interpreting network traffic to identify potential threats, unauthorized activities, or
evidence of malicious actions.
"Stop, look and listen" method: Administrators watch each data packet that flows across
network but they capture only what considered suspicious and deserving of in-depth analysis
While this method does not consume much space, it may require significant processing power.
Investigators focus on two primary sources:
Full-packet data capture: This is the direct result of the "Catch it as you can" method.
Log files: These are the files which reside on web servers, proxy servers, Active Directory
servers, firewalls, Intrusion Detection Systems (IDS), DNS and Dynamic Host Control Protocol
(DHCP). Unlike full-packet capture, logs do not take up so much space.
• Database Forensics
• It involves the systematic examination of database systems, structures, contents, and logs
identify, preserve, analyse, and present digital evidence that may be relevant to an
investigation.
The different kind of activities performed during database forensics are as under.
• Data Collection: The process begins with the collection of data from the database system
under investigation. This may include capturing disk images, memory dumps, transaction
and database backups.
• Data Preservation : It's crucial to preserve the integrity of the data during the forensic
investigation. This involves creating forensic copies of original data to prevent any
alterations or modifications that could compromise its evidentiary value.
• Data Analysis and Reconstruction: Forensic analysts examine the database contents and
structures to reconstruct events, transactions, and user activities that may be relevant to
the Investigation. This may involve examining tables, records, metadata, and transaction
logs to identify anomalies, unauthorized access, or suspicious activities.
• Data Recovery and Reconstruction: In cases where data has been deleted, altered, or
corrupted, forensic analysts may employ specialized techniques and tools to recover
and reconstruct the original data or transactional history.
Header analysis: Email header analysis is the primary analytical technique. This involves analysing
metadata-data like sender, receiver, sending time etc. in the email header. It is evident that
analysing headers helps to identify the majority of email-related crimes. Email spoofing, phishing,
scams and even internal data leakages can be identified by analysing the header.
server Investigation: This involves investigating copies of delivered emails and server logs. In some
organizations they do provide separate email boxes for their employees by having internal mail
servers. In this case, investigation involves the extraction of the entire email box related to the
case and the server logs.
Network Device Investigation: In some investigations, the investigator requires the logs
maintained by the network devices such as routers, firewalls and switches to investigate the
source of an email message. This is often a complex situation where the primary evidence is not
perfect.
Software Embedded Analysis: Some information about the sender of the
email, attached files or documents may be included with the message by the
email software used by the sender for composing the email. This information
may be included in the form of custom headers or in the form of MIME
content as a Transport Neutral Encapsulation Format (TNEF)
Sender Mail Fingerprints: The "Received" field includes tracking information
generated by mail servers that have previously handled a message, in reverse
order. The "X-Mailer" or "User-Agent" field helps to identify email software.
Analysing these fields helps to understand the software, and the version
used by the sender.
1. Working and Objectives: Malware analysis is the process of dissecting and understanding inner workings
of a malware sample or code. The goal of malware analysis is to determine the functionality,
capabilities, and purpose of the malware, and to find ways to detect, remove or mitigate it. Malware
analysis typically involves reverse engineering, debugging, decompiling. t disassembling the malware
code, and observing its execution in a controlled environment. Malware analysis requires a solid
background in programming, assembly, binary formats, and malware analysis tools and frameworks.
2. Type of analysis method used: One of the main differences between malware forensics and malware
analysis is the type of analysis they perform: static or dynamic. Static analysis refers to examining the
malware without running it, while dynamic analysis refers to observing the male while it is running.
3. Tools and Techniques used: Another difference between malware forensics and
malware analysis is the tools and techniques they use. Malware forensics uses tools
such as FTK Imager EnCase, Autopsy, Volatility, Wireshark, and RegRipper to acquire
and analyze various types data from infected systems or networks. Malware analysis
uses tools such as IDA Pro, Ghidra OllyDbg, x64dbg, Radare2, Cuckoo Sandbox, and
VirusTotal to examine and manipulate malware code or samples.
4. When they are used? Malware forensics is often used in response to a malware
incident, sup as a ransomware attack, a data breach, or a cybercrime investigation.
Malware analysis is often used in research or development of malware detection or
mitigation solutions, such as antivirus software, firewall rules, or threat intelligence..
• Both malware forensics and malware analysis also use techniques such as hashing,
signature scanning, code obfuscation, encryption, unpacking, and sandboxing to deal
with different challenges an scenarios.
• Software Forensics
• Software forensics is a branch of science that investigates computer software text codes and
binary codes in cases involving patent infringement or theft. Software forensics can be used to
support evidence legal disputes over intellectual property, patents, and trademarks.
• Software forensics is especially important in patent and trade cases. In these cases, someone m
we copied another person's code, but rewritten that code in a way to hide the theft.
• Cloud forensics
• Cloud forensics focuses on the investigation of digital evidence stored in cloud computing
environments. It involves extracting and analysing data from cloud storage, virtual machines, and
other cloud-based services. Cloud forensics addresses the unique challenges of investigating data
stored remotely in shared environments and requires specific expertise in handling cloud-based
evidence.
• Multimedia Forensics
• Multimedia forensics deals with the analysis and authentication of digital images, audio
recordings. video recordings, and other forms of multimedia. It involves techniques such as image
analysis, video forensics audio forensics, and steganography analysis to determine the
authenticity, integrity, or origin of multimedia files.
• These are just a few examples of the different types of digital forensics. Depending on the nature
of the investigation and the specific digital artifacts involved, other specialized areas of digital
forensics may Include email forensics, social media forensics, IoT forensics, and more. Each type
requires specialize tools, techniques, and expertise to effectively analyse and interpret digital
evidence within its respective domain.
5.4 PHASES OF DIGITAL FORENSIC INVESTIGATION
• It involves the application of scientific methods and techniques to extract and
interpret information from digital devices, networks, and online platforms for
legal purposes.
5.4.1 Objectives of Digital Forensic Investigation
• The primary goal of digital forensics is to identify, preserve, and analyse digital
evidence support investigations and legal proceedings.
• It helps to postulate the motive behind the crime and identity of the main
culprit.
• Designing procedures at a suspected crime scene which helps you to ensure that
the digital evidence obtained is not corrupted.
• Data acquisition and duplication: Recovering deleted files and deleted partitions
from digital media to extract the evidence and validate them.
• Helps you to identify the evidence quickly, and also allows you to estimate the
potential impact of the malicious activity on the victim.
• Producing a computer forensic report which offers a complete report on the
investigation process.
• Preserving the evidence by following the chain of custody.
5.4.2 Digital Forensic Investigation Process Model
• The Digital Forensic investigation process is carried out as the model shown in the figure
• Witness actions
Drive Imaging
• Forensic investigators must first produce an image of the evidence before they can start examining from a source.
A forensic procedure called "drive imaging" involves an analyst making a bit-by-bit copy of the original disk.
The following considerations should be made by forensic professionals when examining an image:
• It is possible for crucial and recoverable data to remain on even erased drives.
• Using forensic procedures, experts in the field of forensics can recover all erased files.
• Never examine the original media through forensic examination. Utilize the duplicate image for all operations.
Forensic investigators should construct the image for analysis using a "write blocker," which is a piece of hardware
or software that aids in the forensic image's legal defensibility.
Hash Values
Cryptographic hash values such as MD5, SHA1, and others are produced when a forensic investigator prepares a
picture of the evidence for analysis. Hash values are important because:
• They are used to confirm that the image is an exact reproduction of the source media It is authentic and intact.
• Hashing values are essential when introducing evidence in court since even the smallest change to the data will
result in an entirely new hash value.
• A new hash value is generated for any modifications you make to a file on your computer, such as adding new
content or changing an already-existing one.
• Analysts can use specialized software to obtain information that is not available in a standard fie explorer window,
such as the hash value and other file metadata.
Chain of Custody
When forensic investigators gather and transfer media from the client, they
should record all actions taken throughout the transfer of media and
evidence on Chain of Custody (CoC) forms. They should also get signatures,
the time and date of the media handoff. For the following reasons,
completing CoC paperwork is imperative:
• The Certificate of Consistency (CoC) serves as proof that the image has
been in know possession since its creation.
• A breach in the CoC renders the image's legal value and the analysis it
contains void.
• This poses the greatest risk. Digital media evidence should be placed under
the CoC right away and quarantined if it is a piece of criminal evidence; an
investigator can subsequently make image.
Evidence Destruction
• If so, the longer it has been since the occurrence, the greater the chance is
that important evidence will be destroyed.
5.6 CRITICAL STEPS IN PRESERVING DIDITAL EVIDENCE
Misinterpretations or misleading evidence can lead to inaccurate crime reconstruction. So, we need follow a
series of steps in order to preserve digital evidence, as even a small inattentive move need wad to a loss of
evidence and the break of a case.
5.6.1 Critical Steps in Preserving Digital Evidence
This section will cover the essential actions that must be taken in order to prevent digital evidence ass before
delivering the it to the forensic specialists. When it comes to digital evidence preservation, time is crucial.
1. Do not change the current state of the device: If the device is OFF, it must be kept OFF and if the device is ON,
it must be kept ON. Call a forensics expert before doing anything.
2. Power down the device: In the case of mobile phones, If it is not charged, do not charge it. In case, the mobile
phone is ON power it down to prevent any data wiping or data overwriting due to automatic booting.
3. Do not leave the device in an open area or unsecured place: Ensure that the device is not left unattended in
an open area or unsecured area. You need to document things like- where the device is, who has access to the
device, and when it is moved.
4. Do not plug any external storage media in the device: Memory cards, USB thumb drives, o any other storage
media that you might have, should not be plugged into the device.
5. Do not copy anything to or from the device: Copying anything to or from the device will cause changes in the
slack space of the memory.
6. Take a picture of the piece of the evidence: Ensure to take the picture of the evidence from all the sides. If it
is a mobile phone, capture pictures from all the sides, to ensure the device ha not tampered till the time
forensic experts arrive.
7. Make sure you know the PIN/ Password Pattern of the device: It is very important for you to know the login
credentials of the device and share it with the forensic experts, for them to cam their job seamlessly.
8. Do not open anything like pictures, applications, or files on the device: Opening a application, file, or picture
on the device may cause losing the data or memory being overwritten.
9. Do not trust anyone without forensics training: Only a certified Forensics expert should be allowed to
investigate or view the files on the original device. Untrained Persons may cause the deletion of data or the
corruption of important information.
10. Make sure you do not Shut down the computer, if required Hibernate it: Since the digital evidence can be
extracted from both the disk drives and the volatile memory. Hibernation mode will preserve the contents of
the volatile memory until the next system boot.
• For the evidence to be professionally acquired by forensics investigators, the device is either seize a forensic
copy is created at the site of the "crime" scene.
• The key points to remember to speed up the process of preserving digital evidence and me out the process for
the authorities:
Prepare yourself to share your authentication codes like screen patterns and passwords.
You may also need to share the device manuals, chargers, cables.
Device interactions will the Internet can also be analysed to build a complete and most appropriate picture of
overall activity.
Have ownership of the device that you plan to submit to the police. In case you do not have the authority or
you're not voluntarily submitting the device, then, in that case, Police may need to seize the device under
their lawful powers.
It is easier to share external memory storage than your devices with the police instead of giving your phone
away every time, so it is recommended that you have an external memory configured for your phone.
Regularly back-up your phone data and retain copies of these back-ups for future use. These will help you
restore another handset or your phone if needs be at a later today, and also can help to log a trail of
incidence.
5.7 ROLE OF DEVICES AS EVIDENCE IN DIGITAL FORENSICS
• Digital forensic investigators must be adept at extracting evidence from an array of devices, each
with unique structures, operating systems, storage capabilities, and security features. A case
involving a desktop for example, may require an understanding of operating systems, file systems,
and data recover) Conversely, a case involving a Smartphone may call for expertise in mobile
operating systems GPS technologies, and app data extraction. In network or cloud-based
investigations, data transmission, network protocols, cloud architectures, and multi-tenancy
environments critical. Thus, the device or system at the centre of the investigation often shapes
the strategy and methodologies employed by the investigators.
• Digital forensics is not a single-size-fits-all discipline: it branches out into several areas, each
addressing a specific kind of device or system. Some of them are as discussed under.
• Data preservation is the first step in computer forensics, and it is accomplished by making a
forensic image of the system’s storage devices. To guarantee data integrity, this procedure by
making a forensic with the use ding history, king device. Next, the forensic picture is examined for
files (both deleted and present), surfing history, email conversations, system logs, information
(such as timestamps and file ownership), and metadata. These components may offer vital proof
of the ownership, usage, and intent of the gadget.
• The main sources of difficulty in computer forensics are anti-forensic
methods and encryption. disk encryption is a common feature of modern
computers that might keep investigators from accessing the data if they
don't have the right encryption key.
• CCTVS
• Other than above discussed devices some other devices are also there like
Smartphones and Tablets, Internet of Things (IoT) Devices, Wearables,
Drones, Medical Devices, Device Memory, Gaming Consoles, Cloud
Storage.
• With the varied types of devices and systems involved in digital forensic
investigations, a singular approach often proves insufficient. A more
encompassing, holistic approach is necessary to conduct an effective and
thorough investigation. This involves considering all the digital devices and
systems relevant to the case and understanding how data from each
device contributes to the overall picture.