Unit-1(CF)
Unit-1(CF)
How it works?
● Cyber forensics professionals use specialized techniques to uncover
hidden data.
● They analyze data from networks, storage devices, and wireless
communications.
● They use tools like network protocol analyzers and hard drive
investigation software.
● They document their findings in a report and verify them with the
original device.
Incident
This is the occurrence of a cybercrime instance where digital devices like computers, mobile
devices, etc., have been used to commit a crime.
Identification
Identification is a crucial step in the forensic examination process. It directly affects efforts to
develop a plan of action and ultimately the success of the investigation. Before starting a digital
forensic examination, the scope of actions must be identified:
Seizure
Prior to the actual examination, digital media related to the investigation will be seized. In
criminal cases, law enforcement personnel, trained technicians to ensure that the evidence is not
tampered with, often perform seizing the digital evidence. There are various laws that cover the
seizure of digital media. For example, in any criminal investigation, there are laws related to
search warrants, which will be applicable here.
Imaging
After successfully seizing digital evidence, a forensic image of this evidence is created for
further analysis. This image is a bit-stream copy which is an exact bit-by-bit copy of a
computer’s physical storage device (SSD or HDD). Forensic image formats include disk dump
(dd) and encase image file format (.E01). This image contains all the files and folders along with
deleted files present on the hard disk of the digital evidence. The forensic image should be
created with hashing and without tampering with the contents of the digital evidence, so that it
can be admissible in a court of law.
5
Hashing
After successfully obtaining the forensic image of the digital evidence it is important to
maintain the integrity of the image. To ensure such integrity a hash value is created for
every forensic image using various hashing algorithms such as MD5 (Message Digest 5),
SHA1 (Secure Hash Algorithm), and SHA25. The hash value is generated in accordance to
the contents of the data stored in the digital evidence. Any tampering with evidence will
result in a different hash value, and thus the digital evidence will not be admissible in a court
of law.
Analysis
After the process of imaging and hashing, the evidence is taken for forensic analysis by a
forensic examiner to look out for findings that can support or oppose the matters in the
investigation. During the analysis the forensic examiner should maintain the integrity of the
digital evidence.
Reporting
Upon completion of a forensic analysis, all the relevant findings should be presented in a
report format by the forensic investigator. The investigator cannot present their personal
views in this report. This report should be precise and must consist of conclusions drawn from
the in-depth analysis. It should be easily understandable by any non-technical person such as
the law enforcement agency staff.
Preservation
Once evidence is collected, it is important to protect it from any type of modification or
deletion. For example, it might be necessary to isolate host systems such as desktops (a
suspect system in forensic investigation) from the rest of the network through either
physical or logical controls, network access controls, or perimeter controls. It is also
important that no other users access a suspect system.
Forensic Protocol
A forensic protocol is a structured process for investigating incidents using scientific
methods. Forensic protocols can apply to digital evidence, crime scenes, and other types
of evidence.
● Digital evidence comprises physical devices such as computer systems, mobile phones,
flash drives, memory cards, routers, switches, modems, etc., and the electronic
information stored in these devices.
● Law enforcement and lawyers are becoming more aware of its
importance,not just for cybercrime but for other crimes too.
● Since we store a lot of personal data on our devices, it can be crucial in
investigations.
● However, due to its fragile nature, it’s best to have a cyber forensic expert
handle digital evidence.
What Is a Cybercrime?
● A cybercrime is a criminal activity that involves computers, networks, or
digital devices as the main tools or targets.
● It can include crimes like hacking, identity theft, online fraud, spreading
malware, cyberbullying, and illegal activities on the internet.
● Essentially, any crime that happens in the digital space or uses technology for
illegal purposes is considered a cybercrime.
Types of Cybercrimes
Malware Attacks (Ransomware, Rootkit, Virus, Trojan)
Ransomware: A type of malware that encrypts a victim's files or system, then demands
payment (ransom) in exchange for restoring access to the files.Example: WannaCry,
Cryptolocker.
Virus: A malicious program that attaches itself to files or programs and spreads when
those files are executed. Viruses can corrupt data, steal information, or disrupt system
functionality.Example: MyDoom.
Trojan: A type of malware that disguises itself as a legitimate program to trick users into
installing it. Once installed, Trojans can steal data, install more malicious software, or
give attackers remote access to the system.Example: Zeus, Emotet.
Phishing Attacks
Phishing attacks are a type of cybercrime where attackers try to trick individuals into
providing sensitive information, such as usernames, passwords, or credit card details,
by pretending to be a trustworthy entity. These attacks typically happen through
email, text messages, or fraudulent websites.
Aadhaar
Aadhaar is a 12-digit unique identifier that is assigned to every Indian citizen. Aadhaar
records of all 1.1 billion India citizens were compromised.
Facebook
Hackers exploited Facebook’s vulnerability, which allowed them to steal Facebook
access tokens.
Quora
Quora is a platform where its users can ask and answer questions. A malicious third party
attacked it. Account information of 100 million Quora users including their name, email
address, and encrypted password were compromised.
Marriott Hotels
Marriott Hotels suffered a data breach in which personal information of 500 million hotel
guests were stolen. This included names, emails, addresses, dates of birth, credit card
information, and passport numbers of the guests.
TicketFly
Ticketfly, an event ticketing company, was the target of a malicious cyberattack.
Information of approximately 27 million Ticketfly users, including their names, addresses,
email addresses, and phone numbers, were compromised. Any financial information such as
credit and debit cards were not compromised during this attack. MyHeritage
MyHeritage Company is an online genealogy platform, which tests its users’ DNA to find their
ancestors and build their family trees. Ninety-two million records of users who signed up before
October 26, 2017, were breached. But DNA information and family trees were stored on separate
systems, which were not breached.
Exactis
Exactis’s database was on a publicly accessible server. Exactis exposed approximately 340
million records in which information was comprised of an email address, phone number,
physical address, etc.
British Airways
British Airways faced a serious attack on its website and application. Approximately 380,000
card payments made to British Airways between August 21st and September 5 were
compromised. The hackers in this attack used the credit card skimming technique.
Cathay Pacific
Cathay Pacific is an airline company from Hong Kong. The company’s data breach
exposed personal information of 9.4 million passengers.
Under Armour
The company’s food and nutrition app was hacked, exposing 150 million records, but
payment information was safe because payments are processed through a separate channel.
3. Lack of Awareness: Many individuals and organizations are not fully aware of
cybersecurity risks, making them more vulnerable to attacks.
4. Data Privacy: Protecting sensitive data, especially with laws and regulations
constantly changing, is a major challenge for businesses.
7. Insecure Devices: With the increase in IoT (Internet of Things) devices, securing
all connected devices becomes more difficult.
10. Cloud Security: As more companies move to the cloud, ensuring the security of
cloud environments becomes increasingly complex.
1. EnCase: A popular commercial tool used for acquiring and analyzing digital evidence,
often used by law enforcement.
2. FTK (Forensic Toolkit): Another commercial tool widely used for disk imaging, data
recovery, and evidence analysis.
3. Cellebrite UFED: A proprietary tool used for mobile forensics, specializing in extracting
and analyzing data from mobile devices.
1. Autopsy: An open-source digital forensics tool used for investigating and analyzing hard
drives and file systems.
2. Sleuth Kit: A set of open-source tools that help analyze disk images and file systems.
3. Wireshark: An open-source network protocol analyzer used to capture and examine
network traffic for signs of suspicious activity.
4. Volatility: An open-source tool for memory forensics, allowing investigators to analyze
RAM dumps for evidence of cyber attacks.
Windows Forensics
Microsoft Windows is the most popular operating system, and most cyber forensic software is
designed for Windows. There are many resources available on Windows forensics, and the field
has great potential as new methods and tools are developed for investigations.
Digital Evidence in Windows-Volatile and nonvolatile evidence
File System
A file system is a structure that organizes and manages files on a storage device. It
defines how data is stored, accessed, and organized on the device.
NTFS
The New Technology File System, used by Windows NT to store and retrieve files
on hard disk drives (HDDs) and solid-state drives (SSDs)
APFS
The Apple File System, developed for macOS, iOS, and other Apple devices. It
includes features like cloning, file-level encryption, and improved performance on
solid-state drives
ext4
A journaling file system that is the default file system for many Linux distributions.
It has backward compatibility with ext3 and ext2
HFS Plus
A journaling file system under Mac OS X that supports long filename support and
Unicode filename support
FAT32
FAT32 is still the default OS when a user wishes to format a drive. FAT32 supports a drive
size up to 8TB. Higher capacity storage devices are not supported by FAT32. It takes a
longer time to index, store, and retrieve files of larger sizes in comparison with its
counterpart, NTFS. However, FAT32 still remains the default file system for most devices
and is preferred and used by most cyber forensic experts to wipe and partition their
acquisition media.
The qualities of FAT 32 are more practical in a forensic situation than those of the
NTFS file system, especially when imaging hard drives. But from a computer user’s
perspective, the NTFS file system is always a better and preferred choice.
NTFS
The shortcomings of the FAT file system led to the creation of NTFS. It provided better
security, offered automatic encryption and decryption, better disk compression, support for
higher capacity storage devices, support for multiple file streams, and fault tolerance.
With NTFS, users could work with high-capacity storage devices with more ease. Better
cluster management allowed NTFS to retrieve files quickly and enhanced the user
experience. The MFT is a very important feature of the NTFS, which stores information
regarding all the files stored on the disk.
Timeline Analysis
Forensic investigators create a timeline of events based on the evidence collected, which
helps organize and analyze the case. Timeline analysis allows investigators to verify other
aspects of the investigation and reconstruct the crime, tracing the steps of the suspect or
victim. If any inconsistencies are found in the timeline, investigators alert the authorities.
Since hackers or criminals may alter data to mislead the investigation, this step must be done
carefully and with caution.
Challenges
Windows remains the most popular operating system, which leads manufacturers to create
different system configurations, making it challenging for forensic software developers to ensure
compatibility. Modern systems have large storage capacities, requiring more time and space for
forensic imaging. Additionally, the rise of anti-forensic techniques, like disabling logs or using
encryption, makes investigations more difficult. Forensic investigators today face issues with tool
compatibility, device encryption, and access to device firmware/software.