Computer Forensic Saturday1
Computer Forensic Saturday1
Acquisition
By
• This is the oldest version of data format that has been used.
• Raw format outperforms other file formats (like AFF and EWF)
in terms of throughput, i.e., has high transfer data rate between
media.
Some of its disadvantages are:
• Has metadata features that can be integrated into the image file,
such as timestamps
Their main disadvantages of AFF are:
• Preparation:
a. Obtain proper authorization and documentation to conduct the investigation.
b. Identify and secure the compromised computer to prevent further tampering or data loss.
c. Assemble the necessary tools and software for forensic analysis, such as imaging tools, network sniffers, and malware analysis tools.
• Collection and Preservation:
a. Create a forensic image of the compromised computer's storage devices using write-blocking techniques to ensure data integrity.
b. Document the physical state of the computer, noting any external damage or signs of tampering.
c. Identify and preserve volatile data by collecting live system information, open network connections, and running processes.
• Analysis:
a. Conduct a comprehensive analysis of the forensic image, focusing on areas such as file systems, registry entries, and network artifacts.
b. Use forensic tools and techniques to recover deleted files, hidden data, and artifacts that may provide evidence of unauthorized access
or malicious activity.
c. Analyze system logs, event logs, and other relevant data sources to trace the actions of the intruder and identify potential entry points.
d. Employ malware analysis techniques to identify and analyze any malicious software present on the system.
You are tasked with conducting a forensic investigation on a suspected compromised computer. Outline the steps
you would take to ensure a thorough and effective investigation
• Reconstruction:
a. Reconstruct the timeline of events by correlating timestamps, log entries, and file system metadata to understand the sequence of activities.
b. Identify and analyse network traffic data, including packet captures and firewall logs, to determine the communication channels used by the intruder.
c. Piece together the evidence to build a coherent narrative of the incident, including the methods used, potential motives, and impact on the
compromised system.
• Reporting:
a. Document all findings, including the methods used, tools employed, and the evidence collected.
b. Provide a clear and concise report that outlines the details of the investigation, including the identified vulnerabilities, the actions taken by the
intruder, and recommendations for remediation and prevention.
c. Ensure that the report is accurate, objective, and suitable for legal purposes, if required.
• Follow-Up Actions:
a. Coordinate with relevant stakeholders, such as legal counsel or law enforcement, to determine the appropriate actions based on the findings of the
investigation.
b. Implement remediation measures to address identified vulnerabilities and prevent future incidents.
c. Conduct post-incident analysis to identify lessons learned and improve incident response procedures and security measures.
• It is important to note that the specific steps and techniques employed in a cyber forensic investigation may vary depending on the nature of the
incident, the available resources, and legal considerations. Professional expertise and adherence to best practices are crucial to ensure a thorough and
effective investigation.