SlideShare une entreprise Scribd logo
1  sur  25
COMPUTER
           FORENSICS



              - Bense Tony .J
Scientific process of preserving,
identifying,               extracting ,
documenting, and interpreting data on
computer

Act of detecting informations   from
deleted and encrypted or hidden files
from systems for the purpose of legal
activities
 Recovering   thousands   of   deleted
  mails
 Performing      investigations     on
  computers History
 Recovering evidence post formatting
  Hard drive
 View network history related to it
   Hacking
   Child pornography
   Fraud
   Virus distribution
   SPAM investigations
   Data theft
   Sexual Harassment
   Software piracy
   Investigation Departments
   Civil Litigations
   Insurance Companies
   Private Corporations
   Law Enforcement Officials
   Individual/Private Citizens
   Comparison with known data
   Transaction sequencing
   Extraction of data from devices
   Recovering deleted data files
   Format conversion
   Keyword searching
   Decrypting passwords
   According to many professionals, Computer
    Forensics is a four (4) step process

    Acquisition
    Identification
    Evaluation
    Presentation
 Acquisition

  Physically or remotely obtaining
   possession of the computer
  All network mappings from the system
  And external physical storage devices
 Identification
  what data could be recovered ?
  electronically retrieving it by running various
   Computer      Forensic   tools   and   software
   suites
 Evaluation
  Evaluating the information/data recovered to
   determine
  How     it   could  be    used    again  the
   suspect for employment termination
 Presentation
  This step involves the presentation of
   evidence discovered in a manner which is
   understood by lawyers, non-technically
   staff/management, and suitable as
   evidence
   Hardware
    ◦ Familiarity with all internal and external
      devices/components of a computer
    ◦ Thorough understanding of hard drives and settings
    ◦ Understanding motherboards and the various chipsets used
    ◦ Power connections
    ◦ Memory
   BIOS
    ◦ Understanding how the BIOS works
    ◦ Familiarity with the various settings and limitations of the
      BIOS
   Operation Systems
       Windows 3.1/95/98/ME/NT/2000/2003/XP
       DOS
       UNIX
       LINUX
       VAX/VMS
   Software
     Familiarity with most popular software packages
      such as Microsoft Office
   Forensic Tools
     Familiarity with computer forensic techniques and the
      software packages that could
   Software that limits and/or corrupts
    evidence that could be collected by an
    investigator
   Performs data hiding and distortion
   Exploits limitations of known and used
    forensic tools
   Works both on Windows and LINUX based
    systems
   Covert Channels in Hiding
    Transmission
    ◦ Take advantage of timing or shared storage to
      pass
      data through unsuspected channel


 Steganography: The art of storing
    information in such a way that the existence
    of the information is hidden.
   Watermarking:
   Hiding data within data
    ◦ Information can be hidden in almost any
      file format.
    ◦ File formats with more room for
      compression are best
       Image files (JPEG, GIF)
       Sound files (MP3, WAV)
       Video files (MPG, AVI)
•   Hard Drive/File System manipulation
    – Hidden drive space is a non-partitioned
      space in-between partitions
    – Bad sectors occur when the OS attempts
      to read info from a sector unsuccessfully
Extra Tracks: most hard disks have more
 than the rated no of tracks to make up for
 flaws in manufacturing
Change file names and extensions – i.e.
 rename a .doc file to a .dll file
Encryption: The problem with this is
 that existence of data is not
 hidden, instead it draws attention to
 itself.
  With strong enough encryption, it
    doesn’t matter if its existence is
    known
   Steganalysis –
   the art of detecting and decoding hidden
    data
     Hiding information within electronic
      media requires alterations of the media
      properties that may introduce some form
      of degradation or unusual characteristics
   Steganalysis Methods
   - Detection
     Human Observation
        Opening a text document in a common word processor may
         show appended spaces and “invisible” characters
        Images and sound/video clips can be viewed or listened to
         and distortions may be found
     Software analysis
        Even small amounts of processing can filter out echoes and
         shadow noise within an audio file to search for hidden
         information
        If the original media file is available, hash values can easily
         detect modifications
Firewall
  Firewall/Routing filters can be
    applied to search for hidden or
    invalid data in IP datagram headers
  Proxy Sites
 The intrusion through proxy
  sites[except a few] can be easily found
   Steganalysis Methods – Recovery
     Recovery of watermarked data is
      extremely hard
     Data hidden on disk is much easier to
      find. Once found, if unencrypted, it is
      already recovered
     Deleted data can be reconstructed (even
      on hard drives that have been
      magnetically wiped)
Check swap files for passwords and
 encryption keys which are stored in the
 clear (unencrypted)
Software Tools
  Scan for and reconstruct deleted data
  Break encryption
  Destroy hidden information (overwrite)
   Never go the black side of the world
   Never try to handle systems without
    complete knowledge
   Never leave your passwords carelessly in
    Internet
   Always use “https” type connections than
    “http”
   Implement the technical updates in a +ve
    way
Thank
     You
Everyone

Contenu connexe

Tendances

Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating proceduresSoumen Debgupta
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationSam Bowne
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Anti forensic
Anti forensicAnti forensic
Anti forensicMilap Oza
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Forensic Investigation of Android Operating System
Forensic Investigation of Android Operating SystemForensic Investigation of Android Operating System
Forensic Investigation of Android Operating Systemnishant24894
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensicsanupriti
 

Tendances (20)

Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Forensic Investigation of Android Operating System
Forensic Investigation of Android Operating SystemForensic Investigation of Android Operating System
Forensic Investigation of Android Operating System
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Incident response process
Incident response processIncident response process
Incident response process
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 

Similaire à Computer Forensics

Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Vipin George
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsVikas Jain
 
Introduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi CIntroduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi Cn|u - The Open Security Community
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkitsamiable_indian
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsDaksh Verma
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the ArchiveGarethKnight
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...pable2
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsNeilg42
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 

Similaire à Computer Forensics (20)

Sujit
SujitSujit
Sujit
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Introduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi CIntroduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi C
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkits
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the Archive
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Computer Forensics

  • 1. COMPUTER FORENSICS - Bense Tony .J
  • 2. Scientific process of preserving, identifying, extracting , documenting, and interpreting data on computer Act of detecting informations from deleted and encrypted or hidden files from systems for the purpose of legal activities
  • 3.  Recovering thousands of deleted mails  Performing investigations on computers History  Recovering evidence post formatting Hard drive  View network history related to it
  • 4. Hacking  Child pornography  Fraud  Virus distribution  SPAM investigations  Data theft  Sexual Harassment  Software piracy
  • 5. Investigation Departments  Civil Litigations  Insurance Companies  Private Corporations  Law Enforcement Officials  Individual/Private Citizens
  • 6. Comparison with known data  Transaction sequencing  Extraction of data from devices  Recovering deleted data files  Format conversion  Keyword searching  Decrypting passwords
  • 7. According to many professionals, Computer Forensics is a four (4) step process Acquisition Identification Evaluation Presentation
  • 8.  Acquisition  Physically or remotely obtaining possession of the computer  All network mappings from the system  And external physical storage devices
  • 9.  Identification  what data could be recovered ?  electronically retrieving it by running various Computer Forensic tools and software suites  Evaluation  Evaluating the information/data recovered to determine  How it could be used again the suspect for employment termination
  • 10.  Presentation  This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence
  • 11. Hardware ◦ Familiarity with all internal and external devices/components of a computer ◦ Thorough understanding of hard drives and settings ◦ Understanding motherboards and the various chipsets used ◦ Power connections ◦ Memory  BIOS ◦ Understanding how the BIOS works ◦ Familiarity with the various settings and limitations of the BIOS
  • 12. Operation Systems  Windows 3.1/95/98/ME/NT/2000/2003/XP  DOS  UNIX  LINUX  VAX/VMS  Software  Familiarity with most popular software packages such as Microsoft Office  Forensic Tools  Familiarity with computer forensic techniques and the software packages that could
  • 13. Software that limits and/or corrupts evidence that could be collected by an investigator  Performs data hiding and distortion  Exploits limitations of known and used forensic tools  Works both on Windows and LINUX based systems
  • 14. Covert Channels in Hiding Transmission ◦ Take advantage of timing or shared storage to pass data through unsuspected channel  Steganography: The art of storing information in such a way that the existence of the information is hidden.
  • 15. Watermarking:  Hiding data within data ◦ Information can be hidden in almost any file format. ◦ File formats with more room for compression are best  Image files (JPEG, GIF)  Sound files (MP3, WAV)  Video files (MPG, AVI)
  • 16. Hard Drive/File System manipulation – Hidden drive space is a non-partitioned space in-between partitions – Bad sectors occur when the OS attempts to read info from a sector unsuccessfully
  • 17. Extra Tracks: most hard disks have more than the rated no of tracks to make up for flaws in manufacturing Change file names and extensions – i.e. rename a .doc file to a .dll file
  • 18. Encryption: The problem with this is that existence of data is not hidden, instead it draws attention to itself. With strong enough encryption, it doesn’t matter if its existence is known
  • 19. Steganalysis –  the art of detecting and decoding hidden data Hiding information within electronic media requires alterations of the media properties that may introduce some form of degradation or unusual characteristics
  • 20. Steganalysis Methods  - Detection  Human Observation  Opening a text document in a common word processor may show appended spaces and “invisible” characters  Images and sound/video clips can be viewed or listened to and distortions may be found  Software analysis  Even small amounts of processing can filter out echoes and shadow noise within an audio file to search for hidden information  If the original media file is available, hash values can easily detect modifications
  • 21. Firewall Firewall/Routing filters can be applied to search for hidden or invalid data in IP datagram headers Proxy Sites  The intrusion through proxy sites[except a few] can be easily found
  • 22. Steganalysis Methods – Recovery Recovery of watermarked data is extremely hard Data hidden on disk is much easier to find. Once found, if unencrypted, it is already recovered Deleted data can be reconstructed (even on hard drives that have been magnetically wiped)
  • 23. Check swap files for passwords and encryption keys which are stored in the clear (unencrypted) Software Tools Scan for and reconstruct deleted data Break encryption Destroy hidden information (overwrite)
  • 24. Never go the black side of the world  Never try to handle systems without complete knowledge  Never leave your passwords carelessly in Internet  Always use “https” type connections than “http”  Implement the technical updates in a +ve way
  • 25. Thank You Everyone