S2-Digital Forensics Life Cycle
S2-Digital Forensics Life Cycle
The second reason this principle is important is that it highlights the reason why you should
only work with a copy of the suspect storage media, not the original, and why you should
write-protect media. You as a forensic investigator are interacting with the evidence, and you
could inadvertently introduce trace evidence.
NIST SP study and analyze the data to draw conclusions from it. The foundation of forensics
is using a methodical approach to reach appropriate conclusions based on the
available data or determine that no conclusion can yet be drawn.
800-86 Reporting : The process of preparing and presenting the information resulting from
the analysis phase. Many factors affect reporting, including the following:
1 2 3 4 5
Admissible : Admissible is Authentic : If you can’t tie Complete : It’s not enough Reliable : The evidence you Believable : The evidence
the most basic rule (the the evidence positively with to collect evidence that just collect must be reliable. you present should be
evidence must be able to the incident, you can’t use shows one perspective of Your evidence collection clearly understandable and
be used) in court or it to prove anything. You the incident. Not only and analysis procedures believable by a jury. There’s
otherwise. Failure to must be able to show that should you collect evidence must not cast doubt on the no point presenting a
comply with this rule is the evidence relates to the that can prove the evidence authenticity and binary dump of process
equivalent to not collecting incident in a relevant way attacker’s actions, but also veracity. memory if the jury has no
the evidence in the first evidence that could prove idea what it all means.
place, except the cost is their innocence. For Similarly, if you present
higher. instance, if you can show them with a formatted,
the attacker was logged in human-understandable
at the time of the incident, version, you must be able
you also need to show who to show the relationship to
else was logged in, and why the original binary,
you think they didn’t do it. otherwise there’s no way
This is called exculpatory for the jury to know
evidence and is an whether you’ve faked it.
important part of proving a
case.
• Minimize handling/corruption of original data
• Account for any changes and keep detailed logs of
your actions.
• Comply with the five rules of evidence.
• Do not exceed your knowledge
• Follow your local security policy
Acquisitio Disassemble the case of the computer to be examined to permit physical access to the storage
devices. — Take care to ensure equipment is protected from static electricity and magnetic fields.
n
Identify storage devices that need to be acquired. These devices can be internal, external, or
both.
Document internal storage devices and hardware configuration.
Drive condition (e.g., make, model, geometry, size, jumper settings, location, drive interface).
Disconnect storage devices (using the power connector or data cable from the back of the drive
or from the motherboard) to prevent the destruction, damage, or alteration of data
The term chain of custody refers to the process of maintaining and documenting the
handling of evidence. It involves keeping a detailed log showing who collected,
handled, transferred, or analyzed evidence during an investigation.
A forensics investigator carefully studies the scene and takes photographs and detailed
notes for each piece of evidence found. These notes should include:
• Location of evidence
• Time and date of evidence recovery
• Description of item
Chain of • Condition of item
Custody
• Unique markings on items
To maintain an accurate and complete record, these examples of chain of evidence
elements must be met:
• Limit the number of people handling evidence
• Confirm all names, identification numbers, and dates on the chain
of evidence documents
• Seal the package
• Double check markings before submission
• Obtain signed receipts upon transfer
Sample
Chain of
Custody
Form
Types of Forensic Imaging
1. Physical Image:
2. Logical Image
3. Targeted Collection
Software Write Blockers: Disable USB mount key in Registry; Encase Fast Block SE; Disk Arbitrator for Mac OS
Network based Acquisition using
TD3
Live Imaging using Forensic boot
CD
Live Imaging using FTK Imager
file slack, and unallocated file space. Steps may include:
Extraction of the file system information to reveal
characteristics such as directory structure, file attributes,
file names, date and time stamps, file size, and file
location.
Data reduction to identify and eliminate known files
through the comparison of calculated hash values to
authenticated hash values.
Evidence Extraction of files pertinent to the examination. Methods
Extraction to accomplish this may be
based on file name and extension, file header, file
content, and location on the drive.
Recovery of deleted files.
Extraction of password-protected, encrypted, and
compressed data.
Extraction of file slack.
Extraction of the unallocated space.
Analysis is the process of interpreting the
extracted data to determine their significance
to the case.
Analysis Timeline analysis
of Reviewing the time and date stamps
extracted contained in the file system metadata
Reviewing system and application logs that
data may be present. These may include error
logs, installation logs, connection logs,
security logs, etc.
Renaming of file extensions
Hidden Partitions
Hidden
Encrypted containers ( True Crypt, Disk Cryptor, Vera Crypt etc.)
Analysis Steganography
imaging
verify the evidence report carefully and document if there are any
bad sectors/ disk read errors
Be patient while doing forensic imaging
Always have a duplicate copy of Forensic image
Make sure the chain of custody document has captured information
accurately, that includes any challenges that were encountered during
forensic imaging.
Potential sources of Digital Evidence
Common practices of Digital
Forensics in Enterprise Network
Potential sources of evidence
from storage media
Potential End user Devices Laptops/ Mac books
Cloud storage locations One Drive
sources of
Mailbox – O365 Security & Compliance
evidence console
from Code 42 – Cloud Backup
Corporate Networks Shares (Project/ Team Specific)
Infrastruct AWS Cloud
ure Azure Cloud
Popular Forensic Tools
Challenges for Digital Forensics
Increase in Physical Memory and Secondary Storage
Decryption support for Forensic Tools
Limited tool support for forensically sound extraction of data from mobile devices, IoT
devices
Ensuring the integrity of evidence while collecting evidence in an enterprise/ corporate
network (Requires setting up of isolated VLAN and secure inbound/ out bound
connections)
Forensically sound Collection and analysis of data from legacy systems
Anonymity of IP Address
Missing of logs
Delay in Detection of an incident and collection and preserve relevant evidence for
investigation
• Easy availability of hacking tools
Continued • Lack of physical evidence makes prosecution
difficult.
.. • Any technological changes require an
upgrade or changes to solutions.
Lack of transparency from commercial
forensic software
Challenges for Data Recovery restrictions on Solid State
Digital Drives (SSDs) (Limitation with SSD Technology)