Cyber Forensics
Cyber Forensics
6A Cyber Law 3 25 75 3 3 50 2
OR
Machine Learning for Digital
6B 3 25 75 3 3 50 2
Forensics
7C Network Forensics 3 25 75 3 3 50 2
OR
Reverse Engineering &
6D 3 25 75 3 3 50 2
Malware Analysis
Vulnerability Assessment
7D 3 25 75 3 3 50 2
and Penetration Testing
Note-1: For Semester–V, for the domain subject Botany, any one of the four pairs of SECs shall
be chosen as courses 6 and 7, i.e., 6A & 7A or 6B & 7B or 6C & 7C or 6D & 7D. The pair shall
not be broken (ABCD allotment is random, not on any priority basis).
Note-2: One of the main objectives of Skill Enhancement Courses (SEC) is to inculcate field skills
related to the domain subject in students. The syllabus of SEC will be partially skill oriented.
Hence, teachers shall also impart practical training to students on the field skills embedded in the
syllabus citing related real field situations.
Semester-wise Revised Syllabus under CBCS, 2020-21
Four Year B.Sc. (Hons) - Semester – V (from 2022-23)
Subject: B. Sc - Cyber Forensics
Course-6A: Cyber Law
(Skill Enhancement Course (Elective), 5 credits, Max Marks: 100+50 + 50
Learning Outcomes:
1. Overview of Indian Legal System
2. Overview of Cyber Space
3. Information Technology Act, 2000 and its Amendments (till date)
4. Outline of Electronic Governance
5. Copyright infringements
6. Incident Response Team Development
7. Identify, Interpret and Evaluate Laws, Government Regulations and International Legal
Systems Pertinent to Ecommerce
8. Explain and Evaluate Emerging Legal and Ethical Issues in Ecommerce
9. Analyze Ethical Problems That Arise in The E-Commerce Context Through the
Examination of Case Studies
Syllabus: (Total Hours: 90 including Teaching, Lab, Field Training and unit tests etc.)
UNIT - 1: Cyber crimes and related offences and penalties: Introduction to Cybercrimes,
Classification of cybercrimes, Distinction between cyber crime and conventional crimes, Reasons
for commission of cyber crime, Kinds of cyber crimes – cyber stalking; cyber pornography; forgery
and fraud; crime related to IPRs; Cyber terrorism; Spamming, Phishing, Privacy and National
Security in Cyberspace, Cyber Defamation and hate speech, computer vandalism etc.
Provisions in Indian Laws in dealing with Cyber Crimes and its critical analysis, Information
Technology Act, 2000, Penalties under IT Act, Offences under IT Act, Offences and Analysis
related with Digital Signature and Electronic Signature under IT Act, Statutory Provisions,
Establishment of Authorities under IT Act and their functions, powers. Cyber crimes under IPC.
UNIT - 3: Cr.P.C and Indian Evidence Act - Cyber crimes under the Information Technology
Act,2000 - Cyber crimes under International Law - Hacking Child Pornography, Cyber Stalking,
Denial of service Attack, Virus Dissemination, Software Piracy, Internet Relay Chat (IRC) Crime,
Credit Card Fraud, Net Extortion, Phishing etc - Cyber Terrorism Violation of Privacy on Internet
- Data Protection and Privacy – Indian Court cases
UNIT - 4: Intellectual Property Rights – Copyrights- Software – Copyrights vs Patents debate -
Authorship and Assignment Issues - Copyright in Internet - Multimedia and Copyright issues -
Software Piracy - Trademarks - Trademarks in Internet – Copyright and Trademark cases
Patents - Understanding Patents - European Law on Computer related Patents, Legal process on
Computer related Patents - Indian process Patents – Case Law, Domain names -registration -
Domain Name Disputes-Cyber Squatting-IPR cases
References:
10. The Information Technology Act, 2000 Bare Act with Short Notes, Universal Law
Publishing Co., New Delhi
11. Justice Yatindra Singh: Cyber Laws, Universal Law Publishing Co., New Delhi
12. Farouq Ahmed, Cyber Law in India, New Era publications, New Delhi
13. S.R.Myneni: Information Technology Law(Cyber Laws), Asia Law House, Hyderabad.
14. Chris Reed, Internet Law-Text and Materials, Cambridge University Press.
15. Pawan Duggal: Cyber Law- the Indian perspective Universal Law Publishing Co., New
Delhi
16. Elias. M. Awad, " Electronic Commerce", Prentice-Hall of India Pvt Ltd.
Co-curricular Activities:
1. Court Visit
2. Cyber Cell Visit
Learning Outcomes:
1. Overview of Windows Forensics
2. File System Analysis
3. Overview of Cryptography
4. Encryption and Decryption
5. Overview of Memory Forensics
6. Anti-forensic Techniques
7. Hypervisor Files and Formats
8. Forensic Analysis of a Virtual Machine
9. Overview of Cloud Forensics
10. Analysis of Cloud Applications
UNIT 1: Windows Forensics - Volatile data collection, Non-volatile data collection, Registry
Analysis, Browser Usage, Hibernate File Analysis, Crash Dump Analysis, File System Analysis,
File Metadata and Timestamp Analysis, Event Viewer Log Analysis, MFT analysis, Timeline
Creation, Evidence Collection in Linux and Mac Operating system.
UNIT 2: Cryptography - Cryptographic System, Classification of Cryptographic System, Secret
Key, Cryptography, Cryptanalysis and Attacks, Encryption and their types, Encryption algorithms,
brute force attack, Decryption and their types, HDD and Artifacts Encryption and Decryption
Techniques.
UNIT 3: Memory Forensics - History of Memory Forensics, x86/x64 architecture, Data
structures, Volatility Framework & plugins Memory acquisition, File Formats – PE/ELF/Mach-O,
Processes and process injection, Command execution and User activity, Networking, sockets,
DNS and Internet history, shellbags, paged memory and advanced registry artifacts, Related tools
– Bulk Extractor and YARA, Timelining memory, Recovering and tracking user activity,
Recovering attacker activity from memory, Introduction to Anti-forensics, tools and techniques.
UNIT 4: Virtual Machine Forensics - Types of Hypervisors, Hypervisor Files and Formats, Use
and Implementation of Virtual Machines in Forensic Analysis, Use of VMware to establish
working version of suspect’s machine, Networking and virtual networks within Virtual Machine,
Forensic Analysis of a Virtual Machine (Imaging of a VM, Identification and Extraction of
supporting VM files in the host system, VM Snapshots, Mounting Image, Searching for evidence)
UNIT 5- Cloud Forensics - Introduction to Cloud Computing, Challenges faced by Law
enforcement and government agencies, Cloud Storage Forensic Framework (Evidence Source
Identification and preservation, Collection of Evidence, Examination and analysis of collected
data) Cloud Storage Forensic Analysis.
Dropbox analysis: Data remnants on user machines, Evidence source identification and analysis,
Collection of evidence from cloud storage services, Examination and analysis of collected data.
Google Drive: Forensic analysis of Cloud storage and data remnants, Evidence source
identification and analysis - Collection of evidence from cloud storage services, Examination and
analysis of collected data, Issues in cloud forensics.
Case Studies.
Reference:
1. Window Forensic Analysis (DVD Toolkit) by Harlan Carver
2. File System Forensic Analysis by Brain Carrier
3. Windows Registry Forensics
4. Advanced Digital Forensic Analysis of the Windows Registry by Harlan Carvey
5. Cryptography and Network Security: United States Edition by William Stallings
6. Cryptography: An Introduction (3rd Edition) by Nigel Smart
7. An Introduction to Cryptography
8. Cryptography and Data Security by Dorothy Elizabeth Rob, ling Denning
9. The Art of Memory Forensics (Detecting Malware and Threats in Windows, Linux, and
Mac Memory) Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
10. Advances in Memory Forensics by Fabio Pagani
11. Virtualization and Forensics A Digital Forensic Investigator’s Guide to Virtual
Environments by Diane Barrett
12. http://atkison.cs.ua.edu/papers/ACMSE11_JF.pdf
13. https://stars.library.ucf.edu/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsre
dir=1&article=2790&context=etd
14. https://odr.chalmers.se/bitstream/20.500.12380/300023/1/CSE%2019-
10%20CPL%20Andersson.pdf
15. Cloud Forensics by Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie
16. Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence
Guide for Moving Targets and Data Paperback by Terrence V. Lillard
17. Data Collection Techniques for Forensic Investigation in Cloud by Thankaraja Raja Sree
and Somasundaram Mary Saira Bhanu
18. https://www.researchgate.net/publication/235712413_Cloud_Forensics_A_MetaStudy_of_
Challenges_Approaches_and_OpenProblems
19. Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems
by Vijay Prakash, Alex Williams, Lalit Garg, Claudio Savaglio and Seema Bawa.
(Research Paper)
Semester-wise Revised Syllabus under CBCS, 2020-21
Four Year B.Sc. (Hons) - Semester – V (from 2022-23)
Subject: B. Sc - Cyber Forensics
Course-6B: Machine Learning for Digital Forensics
(Skill Enhancement Course (Elective), 5 credits, Max Marks: 100+50
LEARNING OUTCOMES:
Understanding the important role of machine learning
Analyzing large amounts of diverse datasets in order to reveal any criminal behavior
Understanding various machine learning algorithms and techniques that can be useful in
the process of extracting and analyzing digital evidence
UNIT 5- Clustering
Clustering, Gaussian Mixture Models, Spectral Clustering; Ensemble Methods; Learning Theory,
Reinforcement Learning
Suggested Readings:
Learning Outcomes:
1. Overview of Multimedia Forensic
2. Image Enhancement Techniques
3. Video Frame Analysis
4. DVR Examination
5. Voice Production Process
6. Automatic Speaker Identification System
Learning Outcomes:
1. Overview of Social Media Forensics
2. Cyber Crimes related to social media
3. Open Street Map
4. Open-Source tools for social media analytics
UNIT 1: What is Online Social Networks, data collection from social networks, challenges,
opportunities, and drawbacks in online social network, Cybercrimes related to social media and its
awareness, scrapping of data from social media API’s.
UNIT 2: Information privacy disclosure, revelation and its effects in OSM and online social
networks, Privacy issues related to location-based services on OSM.
UNIT 3: Tracking social footprint / identities across different social network, Identifying
fraudulent entities in online social networks, Effective and usable privacy setting and policies on
OSM, Policing & OSM.
UNIT 4: Detection and characterization of spam, phishing, frauds, hate crime, abuse and
extremism via online social media, Data Collection & Analysis, Fake News & content on social
media.
UNIT 5: Social Media Forensics: Case Studies Open-Source tools or social media analytics,
Safety on social media. Legal Issues in world social media, Information Technology (Intermediary
Guidelines and Digital Media Ethics Code) Rules, 2021
References:
• Social Media Analytics: Effective Tools for Building, Interpreting, and Using Metrics
• Social Network Analysis: Methods and Application by Katherine Faust and Stanley
Wasserman.
• Understanding Social Networks: Theories, Concepts by Charles Kadushin
• Social Media Data Extraction and Content Analysis by Shalin Hai-Jew
Semester-wise Revised Syllabus under CBCS, 2020-21
Four Year B.Sc. (Hons) - Semester – V (from 2022-23)
Subject: B. Sc - Cyber Forensics
Course-7C: Network Forensics
(Skill Enhancement Course (Elective), 5 credits, Max Marks: 100+50
Learning Outcomes:
1. Overview of networks
2. Overview of Wireless Network Forensics
3. Packet Analysis
4. Different Malware Analysis techniques and their behaviour.
5. Ransomware Analysis
References:
1. Ndatinya, V., Xiao, Z., Manepalli, V. R., Meng, K., & Xiao, Y. (2015). Network forensics
analysis using Wireshark. International Journal of Security and Networks, 10(2), 91-106.
2. Meghanathan, N., Allam, S. R., & Moore, L. A. (2010). Tools and techniques for network
forensics. arXiv preprint arXiv:1004.0570.
3. Davidoff, S., & Ham, J. (2012). Network forensics: tracking hackers through
cyberspace (Vol. 2014). Upper Saddle River: Prentice Hall.
4. Social Media & Network Forensics, CDAC
5. Monnappa, K. A. (2018). Learning Malware Analysis: Explore the concepts, tools, and
techniques to analyze and investigate Windows malware. Packt Publishing Ltd.
6. Mohanta, A., Velmurugan, K., & Hahad, M. (2018). Preventing Ransomware: Understand,
prevent, and remediate ransomware attacks. Packt Publishing Ltd.
Semester-wise Revised Syllabus under CBCS, 2020-21
Four Year B.Sc. (Hons) - Semester – V (from 2022-23)
Subject: B. Sc - Cyber Forensics
Course-6D: Reverse Engineering and Malware Analysis
(Skill Enhancement Course (Elective), 5 credits, Max Marks: 100+50
Binary numbers, x86: Registers, Memory addressing: Endianness. Basic instructions, Bitwise
algebra, Control flow, Stack manipulation, Tools – builder and debugger: Popular assemblers:
MASM, NASM, FASM, x86: Debuggers, WinDbg, Ollydebug, x64dbg.
Hello World: Installation of FASM, Dealing with common errors when building, Dissecting the
program. After Hello: Calling APIs, Common Windows API libraries, Short list of common, API
functions, Debugging
Assessment and static analysis: Static analysis, File types and header analysis: Extracting useful
information from file, Other information: PE executables. Deadlisting: IDA (Interactive
Disassembler), Decompilers: ILSpy – C# Decompiler. Dynamic analysis, Analysis environments,
Information gathering tools, Disassemblers, Debuggers, Decompilers, Network tools, Editing tools,
Attack tools, Automation tools, Software forensic tools, Automated dynamic analysis, Online
service sites.
Suggested Reading:
1. Mastering Reverse Engineering, Reginald Wong
2. Practical Reverse Engineering by Bruce Dang, Alexandre Gazet, Elias Bachaalany
3. Reversing: Secrets of Reverse Engineering by Eldad Eilam
4. Implementing Reverse Engineering: The Real Practice of X86 Internals by Jitender Narula
5. Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious
code and potential threats in your networks and systems by A. P. David
Semester-wise Revised Syllabus under CBCS, 2020-21
Four Year B.Sc. (Hons) - Semester – V (from 2022-23)
Subject: B. Sc - Cyber Forensics
Course-7D: Vulnerability Assessment of Application Security
(Skill Enhancement Course (Elective), 5 credits, Max Marks: 100+50
Unit II- Preparing for an Application Penetration Test and Identifying Vulnerabilities
Setup of vulnerable web applications, Reconnaissance, and file discovery: Using Burp for content
and file discovery. Testing for authentication via Burp, Detecting SQL injection flaws, Detecting
OS command injection, Detecting XSS vulnerabilities, Detecting XML-related issues such as XXE,
Detecting SSTI, Detecting SSRF, Detecting CSRF, Detecting Insecure Direct Object References,
Detecting security misconfigurations, Detecting insecure deserialization, Detecting OAuth-related
issues, Detecting broken authentication.
Data exfiltration via a blind Boolean-based SQL injection, Executing OS commands using an SQL
injection, Executing an out-of-band command injection, Stealing session credentials using XSS,
Taking control of the user's browser using XSS, Extracting server files using XXE vulnerabilities,
Performing out-of-data extraction using XXE and Burp Suite collaborator, Exploiting SSTI
vulnerabilities to execute server commands.
Unit IV- Exploiting Vulnerabilities Using Burp Suite - 2
Using SSRF/XSPA to perform internal port scans. Using SSRF/XSPA to extract data from internal
machines, Extracting data using Insecure Direct Object Reference (IDOR) Flaws. Exploiting
security misconfigurations, Directory listings, Default credentials, Untrusted HTTP methods. Using
insecure deserialization to execute OS commands, Exploiting crypto vulnerabilities, Brute forcing
HTTP basic authentication, Brute forcing forms, Bypassing file upload restrictions.
Setting up the development environment, Writing a Burp Suite extension: Burp Suite's API,
Modifying the user-agent using an extension. Executing the extension, Performing information
gathering, Port scanning, Discovering Authentication method. Exploiting and Exfiltrating Data from
a Large Shipping Corporation: Discovering Blind SQL injection: Automatic scan, SQLMap
detection, Intruder detection.
Suggested Reading:
1. Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern
Applications Using Nmap, Burp Suite and Wireshark by Richa Gupta
2. Practical Web Penetration Testing: Secure web applications using Burp Suite, Nmap,
Metasploit, and more by Gus Khawaja
3. Hands-On Application Penetration Testing with Burp Suite: Use Burp Suite and its features
by Carlos A. Lozano, Dhruv Shah, et al.
MODEL QUESTION PAPER (Sem-end. Exam)
B. Sc DEGREE EXAMINATION
SEMESTER –V
Time:3Hrs Max.marks:75
Suggested Theory Question Paper Pattern
SECTION A
Very Short Answer Questions 5 x2 10 Marks
1. What are the necessary components of search warrant?
2. What are the three rules of forensic hash?
3. List three sub-function of the extraction function.
4. What are different data hiding techniques?
5. What is the role of client and server in E-mail?
SECTION B
(Answer any four questions. Each answer carries 5 marks
(At least 1 question should be given from each 5x5=25 Marks
1. Define Digital Investigation Process.
2. Determine the best acquisition method, Discuss in brief.
3. Write about different Digital Forensic Lab certification requirements.
4. Define the term: A. Innocent Information B. The Plain View of Doctrine
C. HAZMAT D. Commingled Contraband E. Hash Functions
5. Describe different storage formats of Digital Evidence along with
advantages and disadvantages.
6. How can you validate forensic data?
7. What is Steganography and discuss different Steganalysis methods.
8. What is Honeynet Project and how to examine it?
SECTION C (4x10 = 40 Marks)
(Answer any four questions. Each answer carries 10 marks)
(At least 1 question should be given from each Unit)
1. What are different data hiding techniques. Explain in detail.
2. What is RAID, different types of RAIDS and how can you perform RAID data
acquisition.
3. Discuss in detail various Corporate High-Tech Investigation.
4. What are the functions of Digital Forensic tools and define sub-functions of each.
5. Write about different Mobile Phone acquisition which one is the best method
justify.
6. How to validate disk image using various Digital Forensic Tools.
Suggested Question Paper Model for Practical Examination
Semester – V/ Course – 6
Time: 3 hrs Max. Marks: 50
3. Extract Data of “Forensic Image” created using FTK Imager and observe its properties. 12 M
D. Give the same name to both the forensic images and the calculate and compare the
hash values.