Module 3 Word File Part 4
Module 3 Word File Part 4
Computer Forensics
Part 4
41. Email Investigation/ Analysis-
Emails play a very important role in business communications and have emerged
as one of the most important applications on internet. They are a convenient
mode for sending messages as well as documents, not only from computers but
also from other electronic gadgets such as mobile phones and tablets.
The negative side of emails is that criminals may leak important information
about their company. Hence, the role of emails in digital forensics has been
increased in recent years. In digital forensics, emails are considered as crucial
evidences and Email Header Analysis has become important to collect evidence
during forensic process.
3. Digital Forensics: Email metadata (information about the email itself, such as
sender, receiver, timestamps, etc.) can be analyzed forensically to determine
authenticity, trace the origin of messages and identify any attempts at
manipulation or forgery.
2
44. Procedure to investigate an email-
Email crime investigation contains the following steps:
1. Obtain a search warrant and seize the computer and email account
2. Examine the email message
3. Copy the email message into USB key
4. Print the email message
5. View the mail headers
6. Examine the email headers
7. Examine attachment if it is there in email
8. Trace the email
1. Obtain a search warrant and seize the computer and email account:
The investigators should arrange a search warrant in an appropriate language
prior to carrying out an onsite examination of the computer and the email server.
A forensic test should be conducted on the permitted equipment which is
already stated in the warrant. The computers and email accounts suspected of
being involved in the crime should be seized. The investigators seize the email
account by changing it’s existing password.
3. Take the printout of the email message by using the print option available in
the mail program.
3
5. Examine the email header: The email header contains the message header and
the subject body. It also contains the information of the email origin. It also gives
the return path and receiver’s mail id.
6. Examine the attachment: If the mail contains any attachment, then copy that
attachment and also take the print out of that attachment.
7. Trace the email: The IP address of the origin computer tells who is the owner of
the email address which has been used in the possible crime that is being
investigated. It may be possible that this information may be fake. So it’s important
to validate the evidence before uncovering. There are many sites which tell the
owner associated with the domain name. For example: [email protected], everything
after the @ sign is the domain name.
4
45. Roles of the client and server in email-
Email client message is made up of two parts i.e. header and body. The header
contains the information about the email origin, like the address from where it
comes, how it reached to the destination and who send it. The body contains the
message and attachment if any.
Many organizations have their own mail server. Some users dial for the internet
service provider. When these users send the mail, that mail first go to the ISP
(Internet Service Provider) server, then ISP send that mail to receiver’s mail
server.
The message stays on the receiver server till the recipient retrieve it. An email
server is a computer which runs on Linux, Windows or any other os. The server
contains the software to manage the transmissions and holds the message.
When the email crime is investigated, the internal corporate emails are easy to
trace. They use Universal Naming Conventions (UNC) coupled with central
authentication. So it makes easy to find the sender and receiver of the email.
The email client lists all the messages in mailbox by displaying message header as
well as the time and date of the message. It also tells the senders and the size of
the message. The client can view, compose or delete the message.
5
The email server is having the list of all the accounts. It has text file for each
account. When a person clicks the send button to send the mail, it passes the
mail to the mail server with sender and receiver name and message. The server
formats this information and appends it to the bottom of the recipient’s text file.
To interact with the server the following email protocols are required.
6
2. Link Analysis: It is a graphical data analysis method to evaluate emails
exchanged between users. Since a crime can involve multiple suspects, link
analysis is used in order to examine the link between the suspects.
3. Bait Tactics: The basic aim of this technique is to extract the IP address of the
culprit. Here an email with http:<img src> tag, which has some image source at
a computer that is monitored by investigators is sent to the email address that
is under investigation. Now the recipient is the one who originally was sender
during the crime. When the email is opened, a log entry which contains the IP
address of the recipient is recorded on the server which is hosting the image
and the recipient is recorded by the investigator.
2. EmailTracer: This is one of the cyber forensic tool. This tool tracks the initiating
IP address and other particulars from email header, produces detail HTML report
of email header analysis, discovers the city-level particulars of the source, plots
path traced by the email and show the initiating geographic position of the email.
3. Adcomplain: This is the tool for reporting unsuitable marketable emails and
make use of net positions, along with chain letters and “make money fast”
postings.
5. AbusePipe: This tool examines abuse objection emails and regulates which of
ESP’s client are disturbing spam prounded on the material in e-mailed objection.
8
8. FINALeMAIL: It can bring back the email database file and finds lost emails that
do not have data position information related with them.
Fake Emails
The biggest challenge in email forensics is the use of fake e-mails that are created by
manipulating and scripting headers etc. In this category criminals also use temporary
email which is a service that allows a registered user to receive email at a temporary
address that expires after a certain time period.
Spoofing
Anonymous Re-emailing
Here, the Email server strips identifying information from the email message before
forwarding it further. This leads to another big challenge for email investigations.
9
49. Investigating Web Browser: -
Often the source of incidents and malware can be traced down using the artifacts
found inside of browsers. From the navigation history to downloaded files,
browsers are a critical piece in any forensic analysis.
Each browser stores it’s files in a different place than other browsers and they all
have different names, but they all store(most of the time) the same type of
data(artifacts).
Navigation History: Contains data about the navigation history of the user.
Can be used to track down if the user has visited some malicious sites for
example.
Autocomplete data: This is the data that the browser suggest based on
what you searched the most.
Cache: When navigating websites, the browser creates all sorts of cache
data for many reasons. For example, to speed loading time of websites.
These cache files can be a great source of data during a forensic
investigation.
Favicons: They are the little icon found in tabs, URLs, bookmarks and the
such. They can be used as another source to get more information about
the website or places the users visited.
10
Form data: Anything typed inside forms is often times stored by the
browser. So the next time the user enters something inside of a form the
browser can suggest the previously entered data.
a) Internet Explorer: It is the most famous and frequently used default web
browser. In Windows 10 IE is replaced with Microsoft Edge (ME). IE and ME both
work in private mode, without storing information about web resources visited
by the user.
b) Google Chrome:
It is the browser provided by google. It has incorporation with
google services. It allows the synchronization of user
passwords between devices. One can use the extensions and
plug-in. Google chrome performs fast operations and collects
user data but it consumes large amount of memory.
It work in incognito mode, which prevents the browser from permanently
storing any history information, cookies, site data or form inputs.
11
c) Opera: The Opera web browser is also a famous web browser. It was the first
web browser to introduce features that other web browsers adapted like: pop-
up blocking, speed dial, private browsing and tabbed browsing re-opening
recently closed pages. Opera has a free virtual private network (VPN) service,
which permits users to surf the web incognito.
d) Firefox: Firefox is also one of the popular web browsers. It is more secure as
compared to other browsers. It has advanced incognito mode, disabling tracking
of user’s locations and advertisements. Firefox has it’s own extensions.
Each web browser has it’s own artifacts in operating system. If the user is using
the incognito mode (private mode) then computer do not contain the browser
artifacts which are depending on the version of web browser. Usually the
artifacts which are common those are History, cache, cookie, typed URLs,
sessions, most visited sites, screenshots, form values(searches, autofill),
downloaded files, favourites etc.
12
52. Web Analysis Technique: -
a) Cookie Storage and Analysis:
Cookies are the text files. These files are used to feedback from the user to the
server. When performing some actions with a web resource like viewing web
links, downloading files etc, these actions are registered in a cookie that is
secretly sent by the server to the user’s computer. By using this web resource,
the server can find out what actions the user has taken on previous visits to this
web resource.
The cookies are stored in cookies folder, but the location of the cookies folder is
based on the web browser and the operating system.
Cache files:
The cache folder contains the browser history and it automatically creates
the profile folder at start. This folder is the storage place for the browsing
history.
Temporary files:
Windows temp files (C:\Windows\Temp) are temporary files made by windows
as different programs are running and diverse processes are occurring. They are
regularly exact copy of files put away somewhere else on the pc. At different
occasions, they are exact duplicate of files which are waiting to be handled by PC.
13
For instance, a print work heading off to a laser printer will make a temporary
document called an EMF(Enhanced Windows metafiles). EMF’S can frequently be
found in the temp index a very long time after laser printer was utilized.
Numerous different sorts of files can be found in the temp registry too.
a) Static Analysis
b) Dynamic Analysis
14
a) Static Analysis:
It is a method of analysis of malware that is done without running the
malware and analysis using this method is much more secure. This method can
further be divided into two stages:
i) Basic Static Analysis
ii) Advanced Static Analysis
b) Dynamic Analysis:
It is a method of analysis of malware by running the malware. To make it
more secure, malware will run inside a virtual machine, so that malware will not
damage the computer system.
This method can further be divided into two stages:
i) Basic Dynamic Analysis
ii) Advanced Dynamic Analysis
15
ii) Advanced Dynamic Analysis:
In this method, further analysis will be undertaken of the method of
dynamic analysis with debugging on malware, analysis the registry and so an
analysis on a windows system.
1. Technical challenges
2. Legal challenges
3. Resource Challenges
1. Technical Challenges:
Crimes and criminals evolve in tandem with technological advancements. In
digital forensics, this process is known as anti forensic technique and it is considered
a major challenge in the world of digital forensics. Digital forensic experts use
forensic tools to collect shreds of evidence against criminals and criminals use such
tools to hide, alter or remove the traces of their crime.
d) Steganography:
It is an encryption technique that can be used in conjunction with cryptography to
provide an extra layer of security for data protection. Steganography is a technique
for concealing information within a file carrier without altering it’s appearance. This
steganography is used by attackers to hide their hidden data within the
compromised system. When investigating computer crimes, the investigator must
first locate the hidden data in order to reveal it for future use.
2. Legal Challenges:
The presentation of digital evidence is more difficult than it’s collection
because there are many instances where the legal framework acquires a soft
approach and does not recognize every aspects of cyber forensics.
This occurs in the majority of cases because the cyber police lack the necessary
qualifications and ability to identify and provr a possible source of evidence.
Also, electronic evidence is frequently challenged in court due to it’s
inconsistency.
b) Limitation of the Indian Evidence Act,1872: This act has a limited approach;
it is unable to evolve with the times and address the fact that electronic
evidence is more vulnerable to tampering, alteration, transposition and
17
other forms of fraud. This act is silent on how e-evidence is collected,
instead, it focuses on how electronic evidence is presented in court with a
certificate in accordance with Section 65B, subsection 4. This means that
whatever procedure is used, it mustbe documented with a certificate.
3. Resource Challenges:
Because digital evidence is more sensitive than physical evidence, it can
easily disappear as the rate of crime rises. As a result, the burden of analysing
such vast amounts of data falls on a digital forensic expert. Forensic experts use
various tools to check the authenticity of data in order to make the investigation
process faster and more useful but dealing with these tools are a challenge.
a) Change in technology:
Reading digital evidence has become more difficult due to rapid changes
in technology such as operating systems, application software and hardware.
Newer versions of software are not supported by older versions and software
developers have not provided any backward compatibles, which has legal
implications.
18
55. Needs of Computer Forensics Tool: -
The objective is to discover the best value of using computer forensic tool. Some
questions may be there when assessing tools comprises of the following:
19
3. X-Ways Forensics: X-Ways Forensics is known for its speed and efficiency in
processing large volumes of data. It provides comprehensive forensic analysis
features and supports various disk image formats, file systems, and encryption
methods.
5. EnCase Forensic: EnCase Forensic is one of the most widely used computer
forensics tools. It allows forensic examiners to conduct thorough investigations
by acquiring, analyzing, and reporting on digital evidence from various sources,
including computers, smartphones, and cloud storage.
7. Sleuth Kit (TSK): Sleuth Kit is a collection of command-line tools for forensic
analysis and incident response. It includes utilities for examining disk images, file
systems, and data structures, making it a valuable tool for forensic investigators.
20
57. Tasks performed by Computer Forensics Tool: -
All computer forensics tools, both hardware and software, execute specific
functions such as:
1. Acquisition
2. Validation and discrimination
3. Extraction
4. Reconstruction
5. Reporting
1. Acquisition:
Acquisition, the first task in computer forensic investigations, is making a
copy of the original drive. Subfunctions in the acquisition category comprises of
the following:
a) Physical data copy
b) Logical data copy
c) Data acquisition format
d) Command-line acquisition
e) GUI acquisition
f) Remote Acquisition
g) Verification
21
c) Analysing file headers
Validating data is done by obtaining hash values. The primary purpose of data
discrimination is to take away good data from suspicious data.
3. Extraction:
The extraction function is referred as the recovery task in a computing
investigation and is the most stimulating of all tasks to master. Recovering data is
the first step in analyzing an investigation’s data. The following subfunctions of
extraction are used in investigation:
a) Data viewing
b) Keyword Searching
c) Decompressing
d) Carving
e) Decrypting
Many computer forensic tools comprises of a data viewing mechanism for digital
evidence. Tool such as ProDiscover, X-Ways Forensics. FTK. Encase, SMART, ILooK
and others offer numerous methods to view data, together with logical drive
structures like folders and files. These tools also show allocated file data and
unallocated disk areas with special files and disk viewers.
4. Reconstruction:
The purpose of having a reconstruction feature in a forensic tool is to re-
create a suspect drive to display what happened during a crime or an incident.
These are the subfunctions of reconstruction:
a) Disk-to-disk copy
b) Image-to-disk copy
c) Partition-to-partition copy
d) Image-to partition copy
22
The following are some tools that perform an image-to-disk copy.
1. SafeBack
2. SnapBack
3. Encase
4. FTK Manager
5. ProDiscover
5. Reporting:
To complete a forensic disk analysis and examination, a report should be
created. Newer Windows forensic tools can generate electronic reports in a
variety of formats like word processing documents, HTML web pages or Acrobat
PDF files. These are the subfunction of the reporting functions.
1. Log Reports
2. Report Generator
As part of the validation process, one need to document the steps which he/she
took to obtain data from a suspect drive. The tools such as Encase, FTK, ILook,
ProDiscover may offer report generators to display bookmarked evidence.
23
59. Advantage of Computer Forensics: -
To produce evidence in the court, which can lead to the
punishment of the culprit.
It helps the companies in gathering important information about
their computer systems or networks that may have been
compromised.
Efficiently tracks down cyber criminals from anywhere in the world.
Helps to protect the organization’s money and valuable time.
Allows to extract, process, and interpret the factual evidence, so it proves the
cybercriminal action’s in the court.
24