EHF Module 5+Q Final
EHF Module 5+Q Final
1. Hardware Differences
➤ Many types of phones (Samsung, iPhone, Nokia, etc.) have different designs, ports, and
storage.
👉 Example: A charger or cable for one model might not work for another, slowing the
investigation.
6. Anti-Forensic Techniques
➤ Criminals may hide or fake data using special apps or rename files to confuse investigators.
👉 Example: Renaming a .jpg image to .mp3 to avoid detection.
8. Passcode Protection
➤ Getting past a screen lock without damaging the phone is difficult.
👉 Example: A wrong attempt might wipe all the data after multiple failed tries.
9. Malicious Programs
➤ Malware or viruses may delete or corrupt data when you try to access the phone.
👉 Example: A hidden app might auto-delete files when a forensic tool is used.
Mobile device forensics is a branch of digital forensics that deals with recovering and analyzing data
from mobile devices such as:
Smartphones
Tablets
Smartwatches
GPS devices
The goal is to collect evidence from these devices that can help in criminal or civil investigations,
while maintaining the integrity of the data (so that it can be used in court).
➤ Secure the mobile device and prevent it from connecting to networks (airplane mode or Faraday
bag).
👉 Example: This stops remote wiping or syncing.
3. Extraction
Call logs
SMS
Contacts
Browser history
Location data
👉 Example: An investigator recovers deleted WhatsApp chats from a suspect’s phone.
4. Analysis
➤ Study the data to find patterns, timeline of events, and links to the crime.
👉 Example: Find out if the phone was used to plan a scam or fraud.
5. Reporting
Tools used
👉 Simple Example:
An attacker calls an employee pretending to be from the IT department and says,
“There’s a virus on your system, please give me your login password to fix it.”
If the employee gives the password, the attacker gets access without hacking anything.
1. Phishing
➤ Fake emails or websites are used to trick users into giving sensitive information like
usernames, passwords, or credit card numbers.
👉 Example: An email that looks like it’s from your bank asking you to “update your account.”
4. Pretexting
➤ The attacker builds a fake identity or story to gain trust and collect information.
👉 Example: Pretending to be a survey taker or HR staff asking for personal details.
5. Baiting
➤ The attacker offers something attractive (like free music or USB drives) to make the victim
install malware or visit a malicious site.
👉 Example: A USB drive labelled “Salary Info 2024” is left in the office — someone plugs it in
out of curiosity.
2. Logical Copying
➤ Copies only active files and folders, not the entire disk (so it misses deleted or hidden
data).
👉 Use Case: Faster, but not ideal for full forensics. Used for quick checks or partial backups.
3. Live Acquisition
➤ Used when the system is running, and shutting it down would result in data loss.
👉 Example: RAM data, encrypted files, or network connections captured from a live system.
1. Identification
➤ Find out which devices may contain useful data (e.g., laptop, phone, USB).
👉 Example: A suspect’s desktop is suspected to have stolen company files.
3. Documentation
➤ Record everything — device details, serial number, time of seizure, who handled it (chain
of custody).
👉 Example: Note that a USB drive (serial #F13225YY) was collected at 3:30 PM.
6. Examination
➤ Examine the forensic image for:
Deleted files
Hidden files
Encrypted or steganographic content
Metadata (timestamps, file path, author, etc.)
👉 Tools: Autopsy, X-Ways, Volatility, etc.
7. Analysis
➤ Look for evidence that links the user to the crime.
👉 Example: Recovered Excel file shows money transferred to an unknown account.
8. Documentation of Findings
➤ All recovered evidence must be clearly documented:
What was found
Where it was found
File details (size, path, hash value)
9. Report Generation
➤ Create a proper forensic report using standard format. Include:
Summary of findings
Tools used
Methods followed
Hash values
Screenshots/logs as appendices
👉 Follow Module VI guidelines from your syllabus.
1. Identification
➤ First, find the devices or digital storage that might contain evidence.
👉 Example: Suspect’s mobile phone, laptop, or USB drive.
2. Collection
➤ Collect the devices carefully without turning them on or changing anything.
👉 Use tools: Gloves, anti-static bags, Faraday bags (for mobile phones).
👉 Example: Seizing a laptop without opening or disturbing it.
3. Documentation
➤ Record all details about the evidence:
Device name and type
Serial number
Date and time of collection
Who collected it
Where it was found
This is part of the chain of custody.
4. Preservation
➤ Make sure the original evidence is not modified. Use write blockers to stop changes
during access.
➤ Take a forensic duplicate (bit-by-bit copy) and work only on the copy.
5. Chain of Custody
➤ Keep a record of every person who handled the evidence — with time, date, and purpose.
👉 This proves in court that the evidence is authentic and was not tampered with.
6. Storage
➤ Keep original devices in secure, tamper-proof storage — like evidence lockers or digital
safes.
👉 Example: Locked cabinet with limited access.
7. Analysis
➤ Analyze the forensic copy using tools like FTK, Autopsy, or EnCase. Document every step.
8. Presentation in Court
➤ The final report includes all evidence handling steps, hash values, and analysis. This shows
that the evidence is legal and reliable.
A USB drive is found at a crime scene. Here's how proper evidence handling is done:
1. Identification:
➤ The investigator finds a grey USB drive on the suspect’s desk.
2. Collection:
➤ The investigator wears gloves and places the USB in an anti-static bag.
3. Documentation:
➤ Writes down:
o Device: Kingston USB
o Serial Number: F13225YY
o Date: 01/03/2025
o Time: 10:30 AM
o Collected by: Officer Vinay
4. Preservation:
➤ The USB is not plugged in directly. Instead, a forensic image is created using FTK
Imager.
5. Hashing:
➤ Hash value (MD5) of the original USB is calculated to prove the data is unchanged.
6. Storage:
➤ The original USB is locked in an evidence locker.
7. Analysis:
➤ Investigator uses the image copy for examining deleted files and logs.
8. Reporting:
➤ All steps and hash values are added to the final forensic report.
This way, the USB becomes admissible digital evidence in court because it was handled
properly.
6. Discuss basic security precautions to be taken to safeguard Laptops and wireless devices and
What are the devices related to security issues?
6. Use Encryption
➤ Encrypt your device's hard drive so data is safe even if the device is stolen.
👉 Example: BitLocker (Windows) or FileVault (Mac) for encryption.
🧩 1. Laptops
➤ May be hacked through:
Unsecured software
Missing updates
Lost or stolen devices
🌐 2. Wi-Fi Routers
➤ Common target for attackers if:
Default password is not changed
Firmware is outdated
Weak encryption (like WEP) is used
📱 3. Mobile Phones/Tablets
➤ Threats:
Malicious apps
Public Wi-Fi spying
Data leakage through Bluetooth or GPS
💽 What is RAID?
RAID stands for Redundant Array of Inexpensive Disks. It is a data storage technology that
uses multiple hard drives together to improve performance, storage capacity, and/or data
protection.
Instead of saving all data on one hard drive, RAID spreads the data across two or more drives
in different ways, depending on the RAID level.
🔹 RAID 0 (Striping)
Data is split across two or more disks
Fast performance
No data protection — if one disk fails, all data is lost
👉 Used for: Gaming, video editing (not for critical data)
🔹 RAID 1 (Mirroring)
Same data is copied to two or more disks
High data protection
Slower write speed
👉 Used for: Important files, servers
Hardware forensic tools are special devices and gadgets that help investigators access, copy,
and preserve data from physical electronics (hard drives, phones, routers, memory cards)
without changing the original evidence.
1. Write-Blocking
Task: Prevent any accidental writes to a storage device when you connect it to your analysis
computer.
Why it matters: Stops the operating system from updating timestamps or logs on the original
drive.
Example Tool: A USB or SATA write-blocker that sits between the suspect’s hard disk and the
forensic PC.
2. Disk Imaging/Duplicators
Task: Make an exact, bit-by-bit copy (forensic image) of a drive or USB stick.
Why it matters: Allows you to analyze the copy and leave the original untouched.
Example Tool: A standalone duplicator station that can image multiple hard drives at once,
showing progress and verifying hash values automatically.
7. Hardware Keyloggers
Task: Secretly record keystrokes between a keyboard and PC.
Why it matters: Can prove exactly what someone typed (passwords, commands) during an
incident.
Example: A small inline device plugged between the USB keyboard cable and the port.
Scanning tools are used in ethical hacking and forensics to scan networks, devices, and
systems for vulnerabilities, weaknesses, and unauthorized activities. These tools help detect
security flaws and assist investigators in collecting evidence during cybercrime
investigations.
Here are the main types of scanning tools:
2. Vulnerability Scanners
Purpose: Identify security weaknesses in systems, applications, and networks.
Functionality: They check for known vulnerabilities and misconfigurations that could be
exploited by attackers.
Example Tools:
o Nessus: A widely used vulnerability scanner that checks for vulnerabilities,
misconfigurations, and patches.
o OpenVAS: An open-source scanner that identifies potential vulnerabilities in systems
and networks.
A firewall is a security device (hardware or software) that sits between two networks—
typically your internal (trusted) network and the Internet—and controls which traffic is
allowed in or out based on a set of rules. It’s like a gatekeeper that inspects each data packet
and decides whether to let it pass.
A firewall is a security device (hardware or software) that sits between two networks—
typically your internal (trusted) network and the Internet—and controls which traffic is
allowed in or out based on a set of rules. It’s like a gatekeeper that inspects each data packet
and decides whether to let it pass.
1. Inbound: A request from the Internet (e.g., to your web server) hits the firewall.
2. Rule Check: Firewall checks if port 80 (HTTP) is allowed to the DMZ web server.
3. Forward or Block:
o If allowed → traffic passes into the DMZ.
o If not → traffic is dropped.
4. Outbound: Internal users’ requests to the Internet are also checked (e.g., only allow
HTTP/HTTPS).
By placing a firewall at your network’s edge and configuring clear rules, you ensure only
legitimate traffic flows while blocking malicious or unwanted connections.
Internet: Untrusted external network.
Firewall: The security gateway enforcing rules.
DMZ (Demilitarized Zone): Hosts public services (web, mail) with limited access to the
internal network.
Internal Network: Your protected, private LAN.
By placing a firewall at your network’s edge and configuring clear rules, you ensure only
legitimate traffic flows while blocking malicious or unwanted connections.