Cyber Forensics Unit - 3
Cyber Forensics Unit - 3
📌 Forensic Analysis
Meaning:
A detailed process of detecting, investigating, and documenting the reasons,
course, and results of a security incident or law violation.
🔸 Key Points:
1️⃣ It identifies and examines crimes.
2️⃣ Helps in understanding how and why the incident happened.
3️⃣ Documents the findings for legal and organizational use.
4️⃣ Often used as evidence in court hearings and criminal investigations.
5️⃣ Involves a wide range of tools, technologies, and investigative methods.
6️⃣ Forensic experts collect evidence from electronic devices like computers,
📌 Forensic Validation
mobiles, servers, etc.
Meaning:
A process of confirming through examination and evidence that a forensic tool,
procedure works correctly and as intended.
🔸 Key Points:
1️⃣ Ensures the accuracy and reliability of forensic tools and methods.
2️⃣ One of the most important steps in digital forensics.
3️⃣ Validates the integrity and authenticity of collected digital evidence.
4️⃣ Prevents evidence tampering and errors during analysis.
5️⃣ Essential for ensuring that evidence is legally acceptable in court.
📌 Determining What Data to Collect
and Analyze
🔶 Meaning:
It involves deciding which digital data is important to recover and examine,
depending on the type of case and legal limits.
Type of Case:
● Criminal Case:
Only collect the data mentioned in the search warrant.
(Example: Files or messages related to the crime.)
● Civil Case:
Data is limited by court discovery orders.
(Example: Only documents requested by court.)
● Corporate Case:
Check for policy violations like misuse of email or files.
(Example: Searching only emails of one employee.)
👉 Scope creep occurs when the investigation grows bigger than planned,
increasing workload but sometimes uncovering important evidence.
🔸 What is FTK?
● A tool used in computer forensics to check and analyze data from
computers, drives, and image files.
🔸
● Limitations:
🔸
Cannot search for hexadecimal string values
🔸
Some words might be missed if not properly indexed
Indexing can take several hours (best done overnight)
2️⃣ Live Search:
🔸
● Can find:
🔸
Text hidden in unallocated space
🔸
Alphanumeric and hexadecimal values
Specific items like phone numbers, credit card numbers, Social Security
numbers
● Allows right-clicking a search hit to bookmark it for inclusion in the final
report
🔹 Criminal Case Collect data only mentioned in search warrant (e.g. crime-related
files/messages).
🔹 Civil Case Data limited by court discovery orders (e.g. requested documents).
🔹 Corporate Case Look for policy violations (e.g. emails of a specific employee).
Scope Creep Investigation grows bigger than planned because of new or unexpected
evidence.
🔹 Why It Happens New evidence found, lawyer requests, criminal case needs, defense
lawyer rights.
What is FTK? A forensic tool to analyze data from computers, drives, and image files.
Case Log File in FTK Keeps record of searches & data extractions. Helpful for tracking work.
Can turn off if needed.
FTK Keyword Search Options 1️⃣ Indexed Search (fast after cataloging words, but limited, takes time to
index)
2️⃣ Live Search (direct, finds hidden text & hex values, bookmark hits)
📌 Validating Forensic Data
🔶 Meaning:
● In computer forensics, it’s very important to check that the digital evidence
collected is original, unchanged, and reliable.
● This is called validating forensic data and it ensures that the evidence can
be safely presented in court without being questioned.
Hash values do not match The hash value before and after ❌ File has been altered
is different
🔶 Example:
● In ProDiscover, when you load an image file, it automatically calculates a
hash and compares it to the original value.
● A message box called “Auto Image Checksum Verification” appears to
confirm the integrity.
🔸 Why Important:
● Useful when trying to locate a suspicious file, like a contraband image.
● Even if someone renames a file, its hash value remains the same if content
is unchanged.
🔸 How It Helps:
● With the known hash value of illegal/sensitive files, investigators can quickly
search and match files, even if renamed.
● Hex editors can do this faster and allow more control than basic forensic
software.
✅ In Short:
● Validation = Check evidence integrity using hash values
● Hash match = file unchanged | Hash mismatch = file altered
● Hex editors are useful for advanced validation of specific files or sectors
Data Hiding Techniques:-
🔶 Meaning:
● In digital forensics, criminals may use various techniques to hide data on
computers and drives.
● These techniques make evidence harder to find during investigation
● Create a partition.
● Manually delete its reference from the partition table using the disk editor.
● The partition disappears from the system.
● To access it again, edit the partition table to recreate the link. When the system
restarts, the hidden partition will reappear
Example Scenario
● Disk Manager shows:
○ An extended partition (EXT DOS) of 5381.1 MB.
○ Two logical partitions inside it (Drive E + F) totaling only 5271.3 MB.
○ Difference = 109.8 MB — this could be:
■ A previously deleted partition
■ Or a hidden partition
Clue:
● Some systems may mark hidden partitions with a letter like ‘H’ in partition tables.
Detection:
Detection:
● By checking all clusters using disk editors and forensic tools, you can identify
unusual marked areas.
3️⃣ Bit-Shifting
Working:
Example Exercise:
4️⃣ Steganography
🔶 Meaning:
● Technique of hiding secret data inside other normal-looking files like
images, audio, video, or documents.
● It hides the existence of data, not just its content.
🔶 Example:
● A text file hidden inside a JPEG image.
🔶 Detection:
● Use steganography detection tools like StegSpy, Stegdetect.
● Check for unusual file sizes or hidden data sections in media files.
5️⃣ Encryption
🔶 Meaning:
● Process of converting data into unreadable form using a secret key or
password.
● Only authorized users can decrypt and access the data.
🔶 Example:
● A folder encrypted with a password or encryption software like BitLocker.
🔶 Detection:
● Identify encrypted files using forensic tools (FTK, EnCase).
● Check for password-protected files or encrypted volumes.
● Attempt to recover passwords or keys from system memory or config files.
📌 Topic 📖 Meaning / Key Point 📊 Detection / Note
Validating Forensic Ensuring evidence is original, Use hash values (MD5, SHA) to
Data unchanged, reliable before court use. check.
Hash Match Hash before & after same → ✅ File Evidence valid.
unchanged
Forensic Tool Can hash full images only, not Use Hexadecimal Editors for
Limitation individual files/sectors. detailed check.
Hiding Partitions Create partition, delete its reference to Check total disk space vs visible
hide it. partitions
Partition Gap Small empty space between partitions If gap bigger → possible hidden
(Windows 2000/XP: 63 sectors, Vista: data
128 sectors).
Marking Bad Clusters Mark good clusters as bad using disk Use disk editor to scan all clusters.
editor, then hide data there.
Performing Remote Acquisitions
🔶 Meaning:
● A technique used in digital forensics to create a forensic image of a
computer’s hard drive remotely (from a different location).
● Useful when:
○ The computer is far away.
○ You want to acquire data without alerting the suspect.
○ It helps save time, effort, and travel costs.
🔸 Important Note:
● Runtime Software tools do not automatically generate hash values for
the acquired data
● Hashing must be done separately to verify data integrity.
1️⃣ People
2️⃣ Technology
3️⃣ Operations
🔶 Meaning:
● A live acquisition is done while the suspect system is still running, before
shutting it down.
● Important because some valuable evidence may only exist temporarily in
RAM, running processes, or active network connections.
● Example: Some malware hides in memory and disappears after a system
restart.
● Keep a detailed log of every action performed and the reason for each
action.
● Volatile data like RAM content, running processes, and active network
connections exists only while the system is powered on.
● Before turning off the system, perform a live acquisition to capture this
critical data.
● This information can reveal active malware, open network sessions, and data
in memory that would be lost after shutdown.
● Make a forensic image of the entire hard disk from the affected system.
● This image is an exact copy of the data at the time of acquisition, preserving
important evidence.
● Investigators can safely analyze the image without risking changes to the
original evidence.
Example Case:
● Attackers might upload a Trojan program to gain remote control of a
system.
● Later, they install a rootkit to hide their presence and monitor system
activities.
● Through network forensics, investigators can detect unusual network traffic,
🔶 Meaning:
● In network forensics and administration, various tools are used to monitor,
control, and investigate network-connected systems.
3️⃣ Handle
● Displays which files are currently open and which processes are using
those files
● Helps find processes that lock specific files.
4️⃣ Filemon
What is PsTools?
● A set of command-line tools (text-based) for managing computers on a
network.
● Helps in remote control, monitoring, and process management
📌 Tool Name 📖 Use
PsExec Runs programs on remote computers.
📌 Quick Recap
✅ Sysinternals = Free Windows tools to check and monitor computers.
✅ PsTools = Set of tools for managing systems remotely using simple commands.
✅ Useful for network administrators, security experts, and forensic
investigators.
Honeynet Project
🔸 Meaning:
● The Honeynet Project is an international, non-profit research
organization started in 1999
● Its purpose is to study cyber-attacks and hackers safely, without risking
real systems.
📌 What is a Honeynet?
● A honeynet is a fake network designed to look like a real one.
● It is created using honeypots, which are fake computers or servers made
to appear valuable.
● Hackers are tricked into attacking this fake setup, while their actions are
carefully monitored and recorded.
● This helps researchers learn how attacks happen and how to defend against
them in real systems.
2️⃣ Education:
● Develop and distribute free security tools for detecting, analyzing, and
responding to cyber-attacks.
4️⃣ Collaboration:
Quick Recap
✅ Honeynet Project → Studies hackers safely using fake networks.
✅ Uses honeynets and honeypots to observe attack methods.
✅ Main goals → Research, Education, Free Tools, Collaboration.
✅ Helps improve real-world cybersecurity by learning from attackers without
risk.