Digital Forensics Case Project Solution
Digital Forensics Case Project Solution
1.1.Introduction:
Computer forensics involves the preservation, identification, extraction, documentation and
interpretation of computer data. The three main steps in any computer forensic investigation are
acquiring, authenticating, and analyzing of the data. Acquiring the data mainly involves creating a
bit-by-bit copy of the hard drive. Authentication is the ensuring that the copy used to perform the
investigation is an exact replica of the contents of the original hard drive by comparing the
checksums of the copy and the original. Analysis of the data is the most important part of the
investigation since this is where incriminating evidence may be found.
I became involved in conducting forensic investigations involving Email based investigation, Data
acquisition, and how to conduct an investigation.
A computer forensics professional is to gather evidence from a suspect’s computer and determine
whether the suspect committed a crime or violated a company policy. If the evidence suggests that a
crime or policy violation has been committed, you begin to prepare a case, which is a collection of
evidence you can offer in court or at a corporate inquiry.
Data acquisition is the process of copying data. For computer forensics, it’s the task of collecting
digital evidence from electronic media. There are two types of data acquisition: static acquisitions
and live acquisitions.
In addition to encryption concerns, collecting any data that’s active in a suspect’s computer RAM is
becoming more important to digital investigations. Your goal when acquiring data for a static
acquisition is to preserve the digital evidence. Many times, you have only one chance to create a
reliable copy of disk evidence with a data acquisition tool.
E-mail has become a primary means of communication, and most computer users have e-mail
programs to receive, send, and manage e-mail.
These programs differ in how and where they store and track e-mail. Some are installed separately
from the OS and require their own directories and information files on the local computer.
For 1st Case, I work with forensic disk images from small USB drives to perform the activities and
projects in this case. After that Isearch how to find data on a small storage device, apply the same
techniques to a large disk.
For 2nd Case, I learn how to perform static acquisitions from digital media.
The future of data acquisitions is shifting toward live acquisitions because of the use of disk
encryption with newer operating systems (OSs).
For 3rd Case, I learn how to trace, recover, and analyze e-mail messages by using forensics tools
designed for investigating e-mail and general-purpose tools, such as disk editors, special E-mail
forensic tool.
1
Digital Forensics and Cyber Law
The issue of the employee deleting the files can happen to anyone. The retrieval of data that has been
accidentally deleted or a hard drive, storage device or cd/dvd that has been damaged is a three step
process. The client should be questioned, the data recovered and the information should be delivered
to the client.
The first step in data recovery is to question the client. It is vital to find out what operating
system the employee is using and if it was a laptop or a desktop. By asking what programs the client
uses, the type of files to look for can be determined.
For example if the client was using Microsoft Word, the .doc would be included. Also the client
should have a general idea of the name of the directory that was deleted and the amount of files that
were deleted. Another question to ask the client would be if they are working on a network. In some
cases the client might be saving files on a network drive.
If so, identify if it is Novell or Active Directory. The directory may be recovered using a salvage
function within the network utility. Finally, we would need to know how soon the employee needs
the restored files.
Once a general idea of what the client deleted is obtained, the data can be recovered using a
recovery software. There are many different free recovery software applications from which to
choose. Some examples are Foremost, Scalpel, Magic Rescue and Sleuth Kit.
2
Digital Forensics and Cyber Law
You’re investigating a case involving a 2 GB drive that you need to copy at the scene. Write one to two
pages describing three options you have to copy the drive accurately. Be sure to include your software
and media choices.
Disk imaging
Included in the Recover My Files installation folder is the stand alone drive imaging program
“Forensic Imager”. Forensic Imager is a Windows based program that will acquire a sector copy
(“image”) of a drive into one of the following common forensic file formats:
DD /RAW (Linux “Drive Dump”)
AFF (Advanced Forensic Format)
E01 (EnCase) [Version 6.xx format]
3
Digital Forensics and Cyber Law
Forensic Image is run from the Recover My Files drop down menu by selecting the “Disk Image”
Image” option:
Or by selecting the Disk Imager shortcut from the “Windows Start > All Programs > Recover My
Files v5 > Disk Imager” shortcut.
Acquire:: The acquire option is used to take a forensic image (an exact copy) of the target media into
an image file on the investigators workstation;
Convert:: The convert option is used to copy an existing image file from one image format to
another, e.g. DD to E01;
Hash or verify:: The hash or verify option is
is used to calculate a hash value for a device or an existing
image file.
When the “Acquire”, “Convert” or “Hash or Verify” button is selected, the source selection screen is
displayed enabling selection of the source media:
1. When “Acquire”” is selected, the source window shows the available physical devices (hard
drives, USB drives, camera cards, etc.) and logical devices (partitions or volumes on the
physical devices, e.g. "C:" drive) attached to the forensic workstation.
2. When “Convert”” is selected, the source
source window allows the selection of the source image file.
Click the “Add Image” button to add the required image file to the selection list.
3. When the “Hash Verify” button is selected, the source window allows the selection of
Hash or Verify”
either a physical or logicall drive, or an image file.
4
Digital Forensics and Cyber Law
Label:
Physical drives are listed with their Windows device number.
Logical drives display the drive label (if no label is present then "{no label}" is used). Image
files show the path to the image.
Size:
The size column contains the size of the physical or logical device, or the size of the image
file. Note that the actual size of the drive is usually smaller than what the drive is labeled.
Drive manufactures usually round up the drive capacity, so a 2 GB drive in this screen may be
sold as 2 GB+.
FS:
The File-system on the drive, e.g. FAT, NTFS or HFS;
Type:
Describes the way in which the drive is connected to the computer. An image file will show
the type of image (e.g. EnCase or RAW).
The Copy Disk to Disk Wizard steps you through the process of transferring data from one disk or
partition to another with an option to resize partitions. Essentially it is like creating a disk image of
one partition or a whole disk and subsequently restoring it to another disk or partition except there is
no intermittent image created.
5
Digital Forensics and Cyber Law
You may use the Copy Disk to Disk Wizard to make a copy of the same configuration from one hard
drive onto multiple other hard drives. For example, you may duplicate a hard drive configuration
over several workstations on a network. If you are trying to recover data from a damaged hard drive
or partition, you may clone the damaged partition to a number of other hard drives in order to
experiment with different data recovery techniques on the copy rather than on the original.
A logical disk, logical volume or virtual disk (VD or vdisk for short) is a virtual device that
provides an area of usable storage capacity on one or more physical disk drives in a computersystem.
The disk is described as logical or virtual because it does not actually exist as a single physical entity
in its own right. The goal of the logical disk is to provide computer software with what seems a
contiguous storage area, sparing them the burden of dealing with the intricacies of storing files on
multiple physical units. Most modern operating systems provide some form of logical volume
management.
A sparse file is a type of computer file that attempts to use file system space more efficiently when
the file itself is mostly empty.
This is achieved by writing brief information (metadata) representing the empty blocks to disk
instead of the actual "empty" space which makes up the block, using less disk space. The full block
size is written to disk as the actual size only when the block contains "real" (non-empty) data.
Will create a file of 2 GB in size, but with no data stored on disk (only metadata). (GNU dd has this
behavior because it calls truncate to set the file size; other implementations may merely create an
empty file.)
6
Digital Forensics and Cyber Law
Detection
ls -ls sparse-file
Copying
cp sparse-file new-file
Creates new-file, which will be sparse. However, GNU cp does have a --sparse=WHEN option. This
is especially useful if a file containing long zero blocks is saved in a non-sparse way (i.e. the zero
blocks have been written out to disk in full). Disk space can be saved by doing:
Some cp implementations, like FreeBSD's cp, do not support the --sparse option and will always
expand sparse files. A partially viable alternative on those systems is to use sync with its own --
sparse option instead of cp. unfortunately --sparse cannot be combined with --in place, so syncing
huge files across the network will always be wasteful of either network bandwidth or disk bandwidth.
7
Digital Forensics and Cyber Law
3.3. Sets the segment size of the created forensic image file:
This setting enables the forensic image file to be broken into segments of a specific size. Setting an
image segment size is primary used when the forensic image files will later be stored on fixed length
media such as CD or DVD.
For the EnCase-.E01 image format, Forensic Imager uses the EnCase-v6 standard 2 GB and is not
limited to a 2 GB segment size. However, if an investigator plans to use larger file segments they
should give consideration to the limitations (RAM etc.) of the systems on which the image files will
be processed.
3.4. Sets the destination path and file name for the image file:
The output file name is the name of the forensic image file that will be written to the investigators
forensic workstation. Click on the folder icon to browse for the destination folder.
3.5. Calculates an MD5 and/or SHA256 acquisition hash of the imaged data:
A hash value is a mathematical calculation that is used for identification, verification, and
authentication of file data. A hash calculated by Forensic Imager during the acquisition of a device
(the “acquisition hash”) enables the investigator, by recalculating the hash at a later time (the
“verification hash”), to confirm the authenticity of the image file, i.e. that the file has not changed.
Any change to the acquired image will result in a change to the hash value.
3.6. Report
This guide describes best practices for copying file and investigating a case involving a 2 GB
drive. These include
8
Digital Forensics and Cyber Law
Step 2:
Before I work with a Mary, 1st I create written procedures for opening and printing an e-mail header
and message text with a variety of e-mail programs, according to her company’s laws or policies.
These steps help me to give consistent instructions and can be useful when training new
investigators.
In this case, I might have to recover e-mail after a suspect has deleted it and tried to hide it. You
know that how to recover those messages in Using Access Data FTK to Recover E-mail.
Step 3:
Copying an E-mail Message Before I start an e-mail investigation, need to copy and print the e-mail
involved in the crime or policy violation. I also want to forward the message as an attachment to
another e-mail address, depending on your organizationsguidelines.
The following activity shows how to use Outlook 2007 or 2007+, included with Microsoft Office:
To copy an e-mail message to a USB drive. (Note: Depending on the Outlook version you use, the
steps might vary slightly.) Use a similar procedure to copy messages in other e-mail programs, such
as Outlook Express and Evolution.
9
Digital Forensics and Cyber Law
Step 4:
This section includes instructions for viewing e-mail headers in a variety of e-mail programs,
including Windows GUI clients, a UNIX command-line e-mail program, and some common Web-
based e-mail providers. After you open e-mail headers, copy and pastethose into a text document so
that you can read them with a text editor, such as WindowsNotepad, Linux KEdit or gedit, Pico (used
with UNIX), or Apple TextEdit.
As part of the investigation, I determine an e-mail’s origin by further examining the header with one
of many free Internet tools. Determining message origin is referred to as tracing. In this section,
Itrace aboutsuspect computer by Internet lookup tools that can be used to trace where an e-mail
originated. I get more information about Billy’s email is false.
10
Digital Forensics and Cyber Law
Step 5:
To get more information to prove Mary Jane’s is innocence and Billy was a suspect I use Specialized
E-mail forensics tools.
I can rely on e-mail message files, e-mail headers, and e-mail server log files. However, when I can’t find
an e-mail administrator willing to help with the investigation, or encounter a highly customized e-mail
environment, Iuse data recovery tools and forensics tools designed to recover Mary’s e-mail files.
As technology has progressed in e-mail and other services, so have the tools for recovering information
lost or deleted from a hard drive. Ireviewed many tools for data recovery, such as ProDiscover Basic and
Access Data FTK. I also use these tools to investigate and recover e-mail files.
Finally I got the suspect like Billy’s and proved that Mary Jane’s was right about her complaint.
5. Conclusion
We discuss here how to recover delete file or data by using computer forensics tools and get form
any size of disk drive by using computer forensics imaging tools. Providing brief description about
E-mail investigation under computer forensics.
You see how e-mail programs on the server interact with e-mail programs on the client, and vice
versa. You also see how to recover deleted e-mail from a client computer, regardless of the e-mail
program used, and how to trace an e-mail back to the sender.
11