SlideShare a Scribd company logo
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Introduction
• In most cases, items or devices containing
digital evidence can be collected using
standard seizure tools and materials.
• Avoid using any tools or materials that may
produce or emit static electricity or a
magnetic field as these may damage or
destroy the evidence.
Tools and Materials for Collecting
Digital Evidence
• In addition to tools for processing crime scenes in
general, first responders should have the following
items in their digital evidence collection toolkit:
• Cameras (photo and
video).
• Cardboard boxes.
• Notepads.
• Gloves.
• Evidence inventory
logs.
• Evidence tape.
• Paper evidence bags.
• Evidence stickers,
labels, or tags.
• Crime scene tape.
• Antistatic bags.
• Permanent markers.
• Nonmagnetic tools.
• First responders should also have radio
frequency-shielding material such as faraday
isolation bags or aluminum foil to wrap cell
phones, smart phones, and other mobile
communication devices after they have been
seized.
• Wrapping the phones in radio frequency-
shielding material prevents the phones from
receiving a call, text message, or other
communications signal that may alter the
evidence.
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Software Recommendations
• Guidance Software’s EnCase
– www.encase.com
• AccessData’s Forensic ToolKit (FTK), AccessData
Password Recovery Toolkit (PRTK).
• Prodiscover
– www.techpathways.com
• AccessData’s Distributed Network Attack
– www.accessdata.com
• Irfanview (freeware for non commercial use)
– www.irfanview.com
Software Recommendations (Contd.)
• Windows Forensic Toolchest
(WFT)
– http://www.foolmoon.net/secu
rity/wft/
• Computer Online Forensic
Evidence Extractor
• The Sleuth Kit
– http://www.sleuthkit.org/
• CD-R Diagnostic
• DIBS Computer Forensic
Workstation
• Image
• E-mail examiner
• MOBILedit! Forensic
• Oxygen Forensic Suite
• Photorecovery
• Safeback
• SIMCon
• Stego Detect
• Steghide
• Write Blocker
• Undelete SMS
• VOOM
• Passware Kit (Forensic & Enterprise Editions)
• Mobile Phone Examiner Plus (AccessData)
• CHAT Examiner
• PDF Password Cracker
• SIM card seizure
• X-Ways Forensics
Software Recommendations (Contd.)
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
IMAGE
• Image: exact copy of a hard drive including
deleted files and areas of the hard drive that a
“normal” backup software would not copy
– Normal backup software only copies data, no
deleted files or areas of the hard drive that may
contain information from previous activity
• Imaging of a computer is a forensically sound
method of collecting computer evidence
• A proper image MAY be admissible in court
• If performed properly the process will not
alter anything on the target hard drive
Imaging Tools
• Safeback
• EnCase
• ImageMaster
• Ghost
Recovery
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
EnCase Forensic
• EnCase is a computer forensics product produced
by Guidance Software used to analyze digital
media (for example in civil/criminal
investigations, network investigations, data
compliance and electronic discovery).
• The software is available to law enforcement
agencies and corporations.
• EnCase includes tools for data acquisition, file
recovery, indexing/search and file parsing.
• Special training is usually required to operate the
software.
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
AccessData’s Forensic Toolkit
• FTK® Imager is a data preview and imaging
tool that lets you quickly assess electronic
evidence to determine if further analysis with
a forensic tool such as AccessData Forensic
Toolkit® (FTK) is warranted.
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
PRTK (Password Recovery Tool Kit)
• AccessData Corporation offers two software
solutions for password recovery: Password
Recovery Toolkit™, or PRTK, and Distributed
Network Attack®, or DNA.
• These applications work on the same
technologies, but provide a choice on
distribution, or how the work load of guessing
passwords is shared among multiple machines.
• For simple password recovery jobs, PRTK is the
perfect application. If large numbers of encrypted
files need processing, consider DNA the solution.
• PRTK operates on a single computer to recover
passwords from a wide variety of file types such
as Excel®, Zip
• Multiple files can be added as jobs, and each job
is prioritized based on the complexity of the
encryption algorithm used by the program that
created the encrypted file.
• Simpler encryption algorithms are faster to
process, so jobs with those kinds of files are
attacked first.
• Recovered passwords are displayed with their
corresponding job and are also stored in a file
called a Golden Dictionary.
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
DNA
• Distributed Network Attack (DNA) is a solution
that addresses this issue by allowing many
machines to be designated as resources for
password recovery.
• DNA is able to use each processor in a multi-
processor or multi-core processor machine,
enhancing the overall performance.
Passware Forensic Kit
• You can use the Password Recovery Kit to recover passwords of file, e-
mail and other Internet passwords, as well as search for password-
protected files.
• The Passware Password Recovery Kit can reduce the time you spend
recovering passwords, improves password recovery rates, and gives
you more control over the password recovery process.
• It can recover all kinds of passwords for the world's most popular
office application files, including Excel, Word, WinZip, Windows
2008/Vista/2003/XP, Internet Explorer, Firefox, Access, Outlook,
Acrobat, QuickBooks, FileMaker, WordPerfect, VBA, Lotus Notes, ACT!,
and more.
• The Passware Recovery Kit includes 30+ password recovery modules
integrated in an all-in-one user interface. Advanced acceleration
methods are used to recover difficult passwords. Instant online
decryption is supported for MS Word and Excel files up to version
2007.
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Oxygen Forensic Suite
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
MPE+ (Mobile Phone Examiner Plus)
• Mobile Phone Examiner Plus (MPE+) is a
stand-alone mobile device investigation
solution that includes enhanced smart device
acquisition and analysis capabilities.
• With a different approach to digital mobile
forensics, MPE+ allows mobile forensic
examiners to take control of the investigation
by providing them with unique tools
necessary to quickly collect, easily identify and
effectively obtain the key data other solutions
miss.
• With support for more than 7,000 cell phones
and mobile devices, including Legacy GSM/CDMA
devices, iOS® , Android , Blackberry, Windows
Mobile™ , MPE+ enables examiners to perform
advanced mobile device investigations without
having to purchase an overpriced suite of
modules or cumbersome hardware.
• Featuring advanced data collection capabilities,
MPE+ extracts more data from iOS and Android
devices 30% faster than any other solution on the
market.
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Challenges for a
Cyber Crime Expert
Steganography
Information hiding
e.g.
Maps tattooed on heads
Books with pinpricks through letters
Low-order bits in image files
Difficult to detect, plenty of free tools
Often combined with cryptographic techniques.
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Worse yet
CryptoSteg
SteganoCrypt
Combination of two techniques...
Encryption
Purpose
To increase the cost of recovery to a point where
it is not worth the effort
Symmetric and Asymmetric
Reversible – encrypted version contains full
representation of original
Costly for criminal,
costly for investigator
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Other Software
• Other small software will be taught you in lab.
practically.
Equipment
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
DIBS Forensic Workstation
Assignment
• Make a list of all the equipments used for the
digital forensic investigation from internet.
• Make an assignment on any one software
used to detect and investigate Cyber Crime in
detail on whichever software you liked.
Any Questions??
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani

More Related Content

PPT
Collecting and preserving digital evidence
Online
 
PPTX
Digital Evidence by Raghu Khimani
Dr Raghu Khimani
 
PDF
01 Computer Forensics Fundamentals - Notes
Kranthi
 
PDF
Digital forensic principles and procedure
newbie2019
 
PPTX
Difference between Cyber and digital Forensic.pptx
Applied Forensic Research Sciences
 
PPTX
mobile forensic.pptx
Ambuj Kumar
 
PPTX
Mobile Forensics
primeteacher32
 
PPTX
cyber security and forensic tools
Sonu Sunaliya
 
Collecting and preserving digital evidence
Online
 
Digital Evidence by Raghu Khimani
Dr Raghu Khimani
 
01 Computer Forensics Fundamentals - Notes
Kranthi
 
Digital forensic principles and procedure
newbie2019
 
Difference between Cyber and digital Forensic.pptx
Applied Forensic Research Sciences
 
mobile forensic.pptx
Ambuj Kumar
 
Mobile Forensics
primeteacher32
 
cyber security and forensic tools
Sonu Sunaliya
 

What's hot (20)

PPTX
Digital forensic tools
Parsons Corporation
 
PPTX
Cybercrime investigation
Prof. (Dr.) Tabrez Ahmad
 
PDF
Social Media Forensics
John J. Carney, Esq.
 
PPTX
E-mail Investigation
edwardbel
 
PPTX
Computer forensics ppt
Nikhil Mashruwala
 
PPTX
Introduction to filesystems and computer forensics
Mayank Chaudhari
 
PDF
Tracking Emails
prashant3535
 
PDF
Cyber Forensics Module 2
Manu Mathew Cherian
 
PDF
04 Evidence Collection and Data Seizure - Notes
Kranthi
 
PPTX
Intro to digital forensic imaging
Detectalix
 
PDF
Cyber Forensics Module 1
Manu Mathew Cherian
 
PPTX
Data recovery tools
university of Gujrat, pakistan
 
PPTX
Digital forensics
vishnuv43
 
PPTX
Analysis of digital evidence
rakesh mishra
 
PPT
Windowsforensics
Santosh Khadsare
 
PPTX
Mobile forensic
DINESH KAMBLE
 
PPT
Preserving and recovering digital evidence
Online
 
PPTX
Intro to cyber forensics
Chaitanya Dhareshwar
 
PDF
Search & Seizure of Electronic Evidence by Pelorus Technologies
urjarathi
 
PPT
Cyber forensics
pranjal dutta
 
Digital forensic tools
Parsons Corporation
 
Cybercrime investigation
Prof. (Dr.) Tabrez Ahmad
 
Social Media Forensics
John J. Carney, Esq.
 
E-mail Investigation
edwardbel
 
Computer forensics ppt
Nikhil Mashruwala
 
Introduction to filesystems and computer forensics
Mayank Chaudhari
 
Tracking Emails
prashant3535
 
Cyber Forensics Module 2
Manu Mathew Cherian
 
04 Evidence Collection and Data Seizure - Notes
Kranthi
 
Intro to digital forensic imaging
Detectalix
 
Cyber Forensics Module 1
Manu Mathew Cherian
 
Data recovery tools
university of Gujrat, pakistan
 
Digital forensics
vishnuv43
 
Analysis of digital evidence
rakesh mishra
 
Windowsforensics
Santosh Khadsare
 
Mobile forensic
DINESH KAMBLE
 
Preserving and recovering digital evidence
Online
 
Intro to cyber forensics
Chaitanya Dhareshwar
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
urjarathi
 
Cyber forensics
pranjal dutta
 
Ad

Similar to Investigative Tools and Equipments for Cyber Crime by Raghu Khimani (20)

PPTX
Presentation cyber forensics & ethical hacking
Ambuj Kumar
 
PPTX
Remote forensics fsec2016 delija draft
Damir Delija
 
PDF
Best Cyberforensic Tools.pdf
Bytecode Security
 
PDF
Uncover important digital evidence with digital forensic tools
Paraben Corporation
 
PPT
computer forensicsPPT4-SESI4-20220406071621.ppt
Bimo Septyo Prabowo
 
PPT
Digital forensics Computer and mobile forensic
SyedaHira10
 
PPTX
Sujit
Sujit George
 
PDF
digital forensics-9 of cyber security.pdf
AdyakantaSahoo
 
PDF
Digital Forensic Tools / Technologies For Beginners
youngvision99
 
PPTX
Computer forensics
deaneal
 
PDF
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
PPTX
Draft current state of digital forensic and data science
Damir Delija
 
PPTX
Mobile_Forensics- General Introduction & Software.pptx
gouriuplenchwar63
 
PPT
Digital forensics
Nicholas Davis
 
PPT
Digital Forensics
Nicholas Davis
 
PDF
02 Types of Computer Forensics Technology - Notes
Kranthi
 
PPT
Introduction to computer forensic
Online
 
PDF
Data recovery and Digital evidence controls in digital frensics.pdf
Abhijit Bodhe
 
PPTX
Computer forensics toolkit
Milap Oza
 
PPTX
DIGITAL FORENSICS_PRESENTATION
Amina Baha
 
Presentation cyber forensics & ethical hacking
Ambuj Kumar
 
Remote forensics fsec2016 delija draft
Damir Delija
 
Best Cyberforensic Tools.pdf
Bytecode Security
 
Uncover important digital evidence with digital forensic tools
Paraben Corporation
 
computer forensicsPPT4-SESI4-20220406071621.ppt
Bimo Septyo Prabowo
 
Digital forensics Computer and mobile forensic
SyedaHira10
 
digital forensics-9 of cyber security.pdf
AdyakantaSahoo
 
Digital Forensic Tools / Technologies For Beginners
youngvision99
 
Computer forensics
deaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
Draft current state of digital forensic and data science
Damir Delija
 
Mobile_Forensics- General Introduction & Software.pptx
gouriuplenchwar63
 
Digital forensics
Nicholas Davis
 
Digital Forensics
Nicholas Davis
 
02 Types of Computer Forensics Technology - Notes
Kranthi
 
Introduction to computer forensic
Online
 
Data recovery and Digital evidence controls in digital frensics.pdf
Abhijit Bodhe
 
Computer forensics toolkit
Milap Oza
 
DIGITAL FORENSICS_PRESENTATION
Amina Baha
 
Ad

More from Dr Raghu Khimani (13)

PPTX
Tracing An IP Address or Domain Name by Raghu Khimani
Dr Raghu Khimani
 
PPTX
Mobile Phone Seizure Guide by Raghu Khimani
Dr Raghu Khimani
 
PPTX
Guideline for Call Data Record Analysis by Raghu Khimani
Dr Raghu Khimani
 
PPTX
E mail Investigation
Dr Raghu Khimani
 
PPTX
Introduction to Cyber Crime
Dr Raghu Khimani
 
PPTX
Social Media Awareness
Dr Raghu Khimani
 
PPTX
Precursor chemicals
Dr Raghu Khimani
 
PPTX
Poisons
Dr Raghu Khimani
 
PPTX
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Dr Raghu Khimani
 
PPTX
Narcotic Drugs & Psychotropic Subtances
Dr Raghu Khimani
 
PPTX
Analysis of illicit liquor including methyl & ethyl alcohol
Dr Raghu Khimani
 
PPTX
Examination of chemicals in trap cases
Dr Raghu Khimani
 
PPTX
Analysis of jaggery
Dr Raghu Khimani
 
Tracing An IP Address or Domain Name by Raghu Khimani
Dr Raghu Khimani
 
Mobile Phone Seizure Guide by Raghu Khimani
Dr Raghu Khimani
 
Guideline for Call Data Record Analysis by Raghu Khimani
Dr Raghu Khimani
 
E mail Investigation
Dr Raghu Khimani
 
Introduction to Cyber Crime
Dr Raghu Khimani
 
Social Media Awareness
Dr Raghu Khimani
 
Precursor chemicals
Dr Raghu Khimani
 
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Dr Raghu Khimani
 
Narcotic Drugs & Psychotropic Subtances
Dr Raghu Khimani
 
Analysis of illicit liquor including methyl & ethyl alcohol
Dr Raghu Khimani
 
Examination of chemicals in trap cases
Dr Raghu Khimani
 
Analysis of jaggery
Dr Raghu Khimani
 

Recently uploaded (20)

PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
PDF
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
PDF
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Software Development Company | KodekX
KodekX
 
DOCX
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
GYTPOL If You Give a Hacker a Host
linda296484
 
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Software Development Company | KodekX
KodekX
 
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
GYTPOL If You Give a Hacker a Host
linda296484
 
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 

Investigative Tools and Equipments for Cyber Crime by Raghu Khimani

  • 3. Introduction • In most cases, items or devices containing digital evidence can be collected using standard seizure tools and materials. • Avoid using any tools or materials that may produce or emit static electricity or a magnetic field as these may damage or destroy the evidence.
  • 4. Tools and Materials for Collecting Digital Evidence • In addition to tools for processing crime scenes in general, first responders should have the following items in their digital evidence collection toolkit: • Cameras (photo and video). • Cardboard boxes. • Notepads. • Gloves. • Evidence inventory logs. • Evidence tape. • Paper evidence bags. • Evidence stickers, labels, or tags. • Crime scene tape. • Antistatic bags. • Permanent markers. • Nonmagnetic tools.
  • 5. • First responders should also have radio frequency-shielding material such as faraday isolation bags or aluminum foil to wrap cell phones, smart phones, and other mobile communication devices after they have been seized. • Wrapping the phones in radio frequency- shielding material prevents the phones from receiving a call, text message, or other communications signal that may alter the evidence.
  • 7. Software Recommendations • Guidance Software’s EnCase – www.encase.com • AccessData’s Forensic ToolKit (FTK), AccessData Password Recovery Toolkit (PRTK). • Prodiscover – www.techpathways.com • AccessData’s Distributed Network Attack – www.accessdata.com • Irfanview (freeware for non commercial use) – www.irfanview.com
  • 8. Software Recommendations (Contd.) • Windows Forensic Toolchest (WFT) – http://www.foolmoon.net/secu rity/wft/ • Computer Online Forensic Evidence Extractor • The Sleuth Kit – http://www.sleuthkit.org/ • CD-R Diagnostic • DIBS Computer Forensic Workstation • Image • E-mail examiner • MOBILedit! Forensic • Oxygen Forensic Suite • Photorecovery • Safeback • SIMCon • Stego Detect • Steghide • Write Blocker • Undelete SMS • VOOM
  • 9. • Passware Kit (Forensic & Enterprise Editions) • Mobile Phone Examiner Plus (AccessData) • CHAT Examiner • PDF Password Cracker • SIM card seizure • X-Ways Forensics Software Recommendations (Contd.)
  • 17. IMAGE • Image: exact copy of a hard drive including deleted files and areas of the hard drive that a “normal” backup software would not copy – Normal backup software only copies data, no deleted files or areas of the hard drive that may contain information from previous activity
  • 18. • Imaging of a computer is a forensically sound method of collecting computer evidence • A proper image MAY be admissible in court • If performed properly the process will not alter anything on the target hard drive
  • 19. Imaging Tools • Safeback • EnCase • ImageMaster • Ghost
  • 22. EnCase Forensic • EnCase is a computer forensics product produced by Guidance Software used to analyze digital media (for example in civil/criminal investigations, network investigations, data compliance and electronic discovery). • The software is available to law enforcement agencies and corporations. • EnCase includes tools for data acquisition, file recovery, indexing/search and file parsing. • Special training is usually required to operate the software.
  • 24. AccessData’s Forensic Toolkit • FTK® Imager is a data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis with a forensic tool such as AccessData Forensic Toolkit® (FTK) is warranted.
  • 27. PRTK (Password Recovery Tool Kit) • AccessData Corporation offers two software solutions for password recovery: Password Recovery Toolkit™, or PRTK, and Distributed Network Attack®, or DNA. • These applications work on the same technologies, but provide a choice on distribution, or how the work load of guessing passwords is shared among multiple machines. • For simple password recovery jobs, PRTK is the perfect application. If large numbers of encrypted files need processing, consider DNA the solution.
  • 28. • PRTK operates on a single computer to recover passwords from a wide variety of file types such as Excel®, Zip • Multiple files can be added as jobs, and each job is prioritized based on the complexity of the encryption algorithm used by the program that created the encrypted file. • Simpler encryption algorithms are faster to process, so jobs with those kinds of files are attacked first. • Recovered passwords are displayed with their corresponding job and are also stored in a file called a Golden Dictionary.
  • 30. DNA • Distributed Network Attack (DNA) is a solution that addresses this issue by allowing many machines to be designated as resources for password recovery. • DNA is able to use each processor in a multi- processor or multi-core processor machine, enhancing the overall performance.
  • 31. Passware Forensic Kit • You can use the Password Recovery Kit to recover passwords of file, e- mail and other Internet passwords, as well as search for password- protected files. • The Passware Password Recovery Kit can reduce the time you spend recovering passwords, improves password recovery rates, and gives you more control over the password recovery process. • It can recover all kinds of passwords for the world's most popular office application files, including Excel, Word, WinZip, Windows 2008/Vista/2003/XP, Internet Explorer, Firefox, Access, Outlook, Acrobat, QuickBooks, FileMaker, WordPerfect, VBA, Lotus Notes, ACT!, and more. • The Passware Recovery Kit includes 30+ password recovery modules integrated in an all-in-one user interface. Advanced acceleration methods are used to recover difficult passwords. Instant online decryption is supported for MS Word and Excel files up to version 2007.
  • 74. MPE+ (Mobile Phone Examiner Plus) • Mobile Phone Examiner Plus (MPE+) is a stand-alone mobile device investigation solution that includes enhanced smart device acquisition and analysis capabilities. • With a different approach to digital mobile forensics, MPE+ allows mobile forensic examiners to take control of the investigation by providing them with unique tools necessary to quickly collect, easily identify and effectively obtain the key data other solutions miss.
  • 75. • With support for more than 7,000 cell phones and mobile devices, including Legacy GSM/CDMA devices, iOS® , Android , Blackberry, Windows Mobile™ , MPE+ enables examiners to perform advanced mobile device investigations without having to purchase an overpriced suite of modules or cumbersome hardware. • Featuring advanced data collection capabilities, MPE+ extracts more data from iOS and Android devices 30% faster than any other solution on the market.
  • 81. Challenges for a Cyber Crime Expert
  • 82. Steganography Information hiding e.g. Maps tattooed on heads Books with pinpricks through letters Low-order bits in image files Difficult to detect, plenty of free tools Often combined with cryptographic techniques.
  • 86. Encryption Purpose To increase the cost of recovery to a point where it is not worth the effort Symmetric and Asymmetric Reversible – encrypted version contains full representation of original Costly for criminal, costly for investigator
  • 88. Other Software • Other small software will be taught you in lab. practically.
  • 94. Assignment • Make a list of all the equipments used for the digital forensic investigation from internet. • Make an assignment on any one software used to detect and investigate Cyber Crime in detail on whichever software you liked.

Editor's Notes

  • #4: Seizure = જપ્ત કરવું Emit = બહાર કાઢીને ફેંકવું
  • #9: The Sleuth Kit is a library and collection of Unix- and Windows-based utilities to facilitate the forensic analysis of computer systems. It was written and is maintained primarily by digital investigator Brian Carrier.
  • #23: Acquition = To get data Parsing =  the process of analysing a string of symbols