Unit 2
Unit 2
UNIT- 2
CYBER FORENSICS
Cyber forensics, also known as digital forensics, is the
process of collecting, analyzing, and preserving digital
evidence from electronic devices to investigate cybercrimes
and security incidents.
It involves the identification, extraction, and documentation
Malware forensics.
STEPS IN CYBER FORENSICS
INVESTIGATION:
integrity.
Analysis – Examining data using forensic tools.
Power Consumption
possible.
Validation – Ensures extracted files are complete and
usable.
Tools: Foremost, Scalpel, PhotoRec , Autopsy/Sleuth
Kit.
DISK CARVING TECHNIQUES
Header/Footer Carving – Identifying file
signatures.
File Fragment Reconstruction – Reassembling
file patterns.
A forensic expert uses Scalpel or Foremost to
security.
Proxy Server: Acts as an intermediary for network
requests.
ROUTER
Device that forwards data packets between
computer networks.
It acts as a gateway between different networks,
open ports.
Command: nmap -p 1-65535 target_ip (Linux command)
Types:
ports.
WIRESHARK & PCAP ANALYSIS
security.
Examples: Netbus, Sub7, Poison Ivy.
Patching.
BOTNETS
A botnet is a network of compromised devices
(bots/zombies) controlled remotely by an attacker
(botmaster).
Used for launching cyberattacks, such as DDoS,
detection systems
DOS (DENIAL OF SERVICE) ATTACK
An attack that floods a server or network with
excessive requests, making it unavailable to
users. Types:
TCP SYN Flood – Overwhelms a system with
UDP packets.
DDOS (DISTRIBUTED DENIAL OF
SERVICE) ATTACK
A more powerful version of DoS, where multiple
compromised devices (botnet) launch an attack
simultaneously. Common methods:
Volumetric Attacks – Consumes network bandwidth
DDoS solutions.
HONEY POTS
A decoy system designed to attract and analyze
attackers. Types:
Low-Interaction Honey Pots – Simulate vulnerabilities
sectors.
Common types:
regular updates.
WORMS
A self-replicating malware that spreads through networks
without user intervention.
Exploits vulnerabilities in OS, software, or network
protocols.
Famous worms:
Morris Worm (1988) – One of the first internet worms.
ILOVEYOU Worm (2000) – Spread via email attachments.
Conficker Worm (2008) – Targeted Windows vulnerabilities.
Prevention: Patch vulnerabilities, use firewalls, disable
unnecessary services.