SlideShare une entreprise Scribd logo
1  sur  25
COMPUTER
           FORENSICS



              - Bense Tony .J
Scientific process of preserving,
identifying,               extracting ,
documenting, and interpreting data on
computer

Act of detecting informations   from
deleted and encrypted or hidden files
from systems for the purpose of legal
activities
 Recovering   thousands   of   deleted
  mails
 Performing      investigations     on
  computers History
 Recovering evidence post formatting
  Hard drive
 View network history related to it
   Hacking
   Child pornography
   Fraud
   Virus distribution
   SPAM investigations
   Data theft
   Sexual Harassment
   Software piracy
   Investigation Departments
   Civil Litigations
   Insurance Companies
   Private Corporations
   Law Enforcement Officials
   Individual/Private Citizens
   Comparison with known data
   Transaction sequencing
   Extraction of data from devices
   Recovering deleted data files
   Format conversion
   Keyword searching
   Decrypting passwords
   According to many professionals, Computer
    Forensics is a four (4) step process

    Acquisition
    Identification
    Evaluation
    Presentation
 Acquisition

  Physically or remotely obtaining
   possession of the computer
  All network mappings from the system
  And external physical storage devices
 Identification
  what data could be recovered ?
  electronically retrieving it by running various
   Computer      Forensic   tools   and   software
   suites
 Evaluation
  Evaluating the information/data recovered to
   determine
  How     it   could  be    used    again  the
   suspect for employment termination
 Presentation
  This step involves the presentation of
   evidence discovered in a manner which is
   understood by lawyers, non-technically
   staff/management, and suitable as
   evidence
   Hardware
    ◦ Familiarity with all internal and external
      devices/components of a computer
    ◦ Thorough understanding of hard drives and settings
    ◦ Understanding motherboards and the various chipsets used
    ◦ Power connections
    ◦ Memory
   BIOS
    ◦ Understanding how the BIOS works
    ◦ Familiarity with the various settings and limitations of the
      BIOS
   Operation Systems
       Windows 3.1/95/98/ME/NT/2000/2003/XP
       DOS
       UNIX
       LINUX
       VAX/VMS
   Software
     Familiarity with most popular software packages
      such as Microsoft Office
   Forensic Tools
     Familiarity with computer forensic techniques and the
      software packages that could
   Software that limits and/or corrupts
    evidence that could be collected by an
    investigator
   Performs data hiding and distortion
   Exploits limitations of known and used
    forensic tools
   Works both on Windows and LINUX based
    systems
   Covert Channels in Hiding
    Transmission
    ◦ Take advantage of timing or shared storage to
      pass
      data through unsuspected channel


 Steganography: The art of storing
    information in such a way that the existence
    of the information is hidden.
   Watermarking:
   Hiding data within data
    ◦ Information can be hidden in almost any
      file format.
    ◦ File formats with more room for
      compression are best
       Image files (JPEG, GIF)
       Sound files (MP3, WAV)
       Video files (MPG, AVI)
•   Hard Drive/File System manipulation
    – Hidden drive space is a non-partitioned
      space in-between partitions
    – Bad sectors occur when the OS attempts
      to read info from a sector unsuccessfully
Extra Tracks: most hard disks have more
 than the rated no of tracks to make up for
 flaws in manufacturing
Change file names and extensions – i.e.
 rename a .doc file to a .dll file
Encryption: The problem with this is
 that existence of data is not
 hidden, instead it draws attention to
 itself.
  With strong enough encryption, it
    doesn’t matter if its existence is
    known
   Steganalysis –
   the art of detecting and decoding hidden
    data
     Hiding information within electronic
      media requires alterations of the media
      properties that may introduce some form
      of degradation or unusual characteristics
   Steganalysis Methods
   - Detection
     Human Observation
        Opening a text document in a common word processor may
         show appended spaces and “invisible” characters
        Images and sound/video clips can be viewed or listened to
         and distortions may be found
     Software analysis
        Even small amounts of processing can filter out echoes and
         shadow noise within an audio file to search for hidden
         information
        If the original media file is available, hash values can easily
         detect modifications
Firewall
  Firewall/Routing filters can be
    applied to search for hidden or
    invalid data in IP datagram headers
  Proxy Sites
 The intrusion through proxy
  sites[except a few] can be easily found
   Steganalysis Methods – Recovery
     Recovery of watermarked data is
      extremely hard
     Data hidden on disk is much easier to
      find. Once found, if unencrypted, it is
      already recovered
     Deleted data can be reconstructed (even
      on hard drives that have been
      magnetically wiped)
Check swap files for passwords and
 encryption keys which are stored in the
 clear (unencrypted)
Software Tools
  Scan for and reconstruct deleted data
  Break encryption
  Destroy hidden information (overwrite)
   Never go the black side of the world
   Never try to handle systems without
    complete knowledge
   Never leave your passwords carelessly in
    Internet
   Always use “https” type connections than
    “http”
   Implement the technical updates in a +ve
    way
Thank
     You
Everyone

Contenu connexe

Tendances

cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
Milap Oza
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
Kranthi
 

Tendances (20)

Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 

Similaire à Computer Forensics

computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
computer forensics
computer forensicscomputer forensics
computer forensics
Akhil Kumar
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
pable2
 

Similaire à Computer Forensics (20)

Sujit
SujitSujit
Sujit
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Introduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi CIntroduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi C
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkits
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the Archive
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Computer Forensics

  • 1. COMPUTER FORENSICS - Bense Tony .J
  • 2. Scientific process of preserving, identifying, extracting , documenting, and interpreting data on computer Act of detecting informations from deleted and encrypted or hidden files from systems for the purpose of legal activities
  • 3.  Recovering thousands of deleted mails  Performing investigations on computers History  Recovering evidence post formatting Hard drive  View network history related to it
  • 4. Hacking  Child pornography  Fraud  Virus distribution  SPAM investigations  Data theft  Sexual Harassment  Software piracy
  • 5. Investigation Departments  Civil Litigations  Insurance Companies  Private Corporations  Law Enforcement Officials  Individual/Private Citizens
  • 6. Comparison with known data  Transaction sequencing  Extraction of data from devices  Recovering deleted data files  Format conversion  Keyword searching  Decrypting passwords
  • 7. According to many professionals, Computer Forensics is a four (4) step process Acquisition Identification Evaluation Presentation
  • 8.  Acquisition  Physically or remotely obtaining possession of the computer  All network mappings from the system  And external physical storage devices
  • 9.  Identification  what data could be recovered ?  electronically retrieving it by running various Computer Forensic tools and software suites  Evaluation  Evaluating the information/data recovered to determine  How it could be used again the suspect for employment termination
  • 10.  Presentation  This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence
  • 11. Hardware ◦ Familiarity with all internal and external devices/components of a computer ◦ Thorough understanding of hard drives and settings ◦ Understanding motherboards and the various chipsets used ◦ Power connections ◦ Memory  BIOS ◦ Understanding how the BIOS works ◦ Familiarity with the various settings and limitations of the BIOS
  • 12. Operation Systems  Windows 3.1/95/98/ME/NT/2000/2003/XP  DOS  UNIX  LINUX  VAX/VMS  Software  Familiarity with most popular software packages such as Microsoft Office  Forensic Tools  Familiarity with computer forensic techniques and the software packages that could
  • 13. Software that limits and/or corrupts evidence that could be collected by an investigator  Performs data hiding and distortion  Exploits limitations of known and used forensic tools  Works both on Windows and LINUX based systems
  • 14. Covert Channels in Hiding Transmission ◦ Take advantage of timing or shared storage to pass data through unsuspected channel  Steganography: The art of storing information in such a way that the existence of the information is hidden.
  • 15. Watermarking:  Hiding data within data ◦ Information can be hidden in almost any file format. ◦ File formats with more room for compression are best  Image files (JPEG, GIF)  Sound files (MP3, WAV)  Video files (MPG, AVI)
  • 16. Hard Drive/File System manipulation – Hidden drive space is a non-partitioned space in-between partitions – Bad sectors occur when the OS attempts to read info from a sector unsuccessfully
  • 17. Extra Tracks: most hard disks have more than the rated no of tracks to make up for flaws in manufacturing Change file names and extensions – i.e. rename a .doc file to a .dll file
  • 18. Encryption: The problem with this is that existence of data is not hidden, instead it draws attention to itself. With strong enough encryption, it doesn’t matter if its existence is known
  • 19. Steganalysis –  the art of detecting and decoding hidden data Hiding information within electronic media requires alterations of the media properties that may introduce some form of degradation or unusual characteristics
  • 20. Steganalysis Methods  - Detection  Human Observation  Opening a text document in a common word processor may show appended spaces and “invisible” characters  Images and sound/video clips can be viewed or listened to and distortions may be found  Software analysis  Even small amounts of processing can filter out echoes and shadow noise within an audio file to search for hidden information  If the original media file is available, hash values can easily detect modifications
  • 21. Firewall Firewall/Routing filters can be applied to search for hidden or invalid data in IP datagram headers Proxy Sites  The intrusion through proxy sites[except a few] can be easily found
  • 22. Steganalysis Methods – Recovery Recovery of watermarked data is extremely hard Data hidden on disk is much easier to find. Once found, if unencrypted, it is already recovered Deleted data can be reconstructed (even on hard drives that have been magnetically wiped)
  • 23. Check swap files for passwords and encryption keys which are stored in the clear (unencrypted) Software Tools Scan for and reconstruct deleted data Break encryption Destroy hidden information (overwrite)
  • 24. Never go the black side of the world  Never try to handle systems without complete knowledge  Never leave your passwords carelessly in Internet  Always use “https” type connections than “http”  Implement the technical updates in a +ve way
  • 25. Thank You Everyone