SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Ministère de l’Enseignement Supérieur
et de la Recherche Scientifique
Université de la Manouba
Ecole Nationale des Sciences de l’Informatique
Ghariani Tewfik
CSI
Année universitaire 2015/2016
Intro to Forensics
2
Introduction
I. Uses of computer forensics
II. Stages of Examination
III. Computer Forensics Method
Conclusion
Demo
PlanPlan
3
●
What is computer Forensics
To start, Forensic science is the
scientific method of gathering
and examining information about
the past which is then used in a
court of law. The word forensic
comes from the Latin forēnsis,
meaning "of or before the forum."
In Roman times, a criminal
charge meant presenting the case
before a group of public
individuals in the forum.
Another Definition:
Computer forensics is the practice of
collecting, analyzing and reporting
on digital data in a way that is
legally admissible. It can be used in
the detection and prevention of
crime and in any dispute where
evidence is stored digitally.
Computer forensics follows a similar
process to other forensic disciplines,
and faces similar issues.
Introduction
4
I. Uses Of Computer Forensics
There are few areas of crime or dispute where computer forensics cannot be applied. Law
enforcement agencies have been among the earliest and heaviest users of computer forensics
and consequently have often been at the forefront of developments in the field.
More recently, commercial organizations have used computer forensics to their benefit in a
variety of cases such as;
* Intellectual Property theft
* Industrial espionage
* Employment disputes
* Fraud investigations
* Forgeries
* Bankruptcy investigations
* Inappropriate email and Internet use in the work place
5
Readiness.
Evaluation
Collection
Analysis
Presentation
Review
II. Stages of examination
6
The computer forensic examination process is divided into six stages,
presented in their usual chronological order.
ReadinessReadiness:
For the forensic examiner himself, readiness will include appropriate training,
regular testing and verification of their software and equipment, familiarity
with legislation, dealing with unexpected issues
Evaluation:
The evaluation stage includes the receiving of instructions, the
clarification of those instructions if unclear or ambiguous, risk
analysis and the allocation of roles and resources
7
Analysis:Analysis:
Analysis depends on the specifics of each job. The
examiner usually provides feedback to the client
during analysis and from this dialogue the
analysis may take a different path or be narrowed
to specific areas.
Collection:Collection:
If acquisition is to be carried out on-site rather than in a computer
forensic laboratory, then this stage would include identifying and
securing devices which may store evidence and documenting the scene.
8
Presentation :
This stage usually involves the examiner producing a structured
report on their findings, addressing the points in the initial
instructions along with any subsequent instructions. It would
also cover any other information which the examiner deems
relevant to the investigation
Review:
As with the readiness stage, the review stage is often overlooked
or disregarded. This may be due to the perceived costs of doing
work that is not billable, or the need ‘to get on with the next
job’.
9
-safe seizure of computer systems and files, to avoid contamination
and/or interference
-safe collection of data and software
-safe and non-contaminating copying of disks and other data media
-reviewing and reporting on data media
-sourcing and reviewing of back-up and archived files
-recovery / reconstruction of deleted files - logical methods
-recovery of material from "swap" and "cache" files
-recovery of deleted / damaged files - physical methods
III. Computer Forensic Methods
10
-core-dump: collecting an image of the contents of the active memory of a
computer at a particular time
-estimating if files have been used to generate forged output
-reviewing of single computers for "proper" working during relevant period, including
service logs, fault records, etc.
-proving / testing of reports produced by complex client / server applications
-reviewing of complex computer systems and networks for "proper" working during
relevant period, including service logs, fault records, etc.
-review of system / program documentation for: design methods, testing, audit,
revisions, operations management.
11
-reviewing of applications programs for "proper" working during relevant
period, including service logs, fault records, etc.
-identification and examination of audit trails
-identification and review of monitoring logs
-telecoms call path tracing (PTTs and telecoms utilities companies only)
-reviewing of access control services - quality and resilience of facilities (hardware
and software, identification / authentication services)
-reviewing and assessment of access control services - quality of security
management
-reviewing and assessment of encryption methods - resilience and implementation
12 Conclusion
Well my friends, weather you heard about it before or not, I can
assure you that this field is so interesting and challenging. To keep it
simple, once again, Computer forensics is the practice of collecting,
analyzing and reporting on digital data in a way that is legally
admissible.
It is basicly like you saw in the movies, the main aspect is to gather
evidence which will help you solve any digital crimes that might
have occurred.
There are a lot of investigation technics which includes analyzing
memory dump , logs or network cache...
I have chosen few of the best potentiol tools that might help you
through your investigation.
13
Time For
Practice!
14 Volatility
A single, cohesive framework analyzes RAM dumps from 32- and 64-bit windows,
linux, mac, and android systems. Volatility's modular design allows it to easily
support new operating systems and architectures as they are released. All your
devices are targets...so don't limit your forensic capabilities to just windows
computers.
Note that the is an open source program written with python, you can access its
source code via github, or even if you still are a windows user, a stand-alone version
can be executed directly:
_ sudo apt-get install volatility
_https://volatility.googlecode.com/files/volatility-2.3.1.standalone.exe
it's a powerfull tool that allows you to extract data , register elements , list of network
connections, processus... from the memory dump. In fact, the memory dump is the
recorded state of the working memory of a computer program at a specific
time,generally when the program has crashed. The memory dump file is extracted
often with these possible extensions : dmp , .raw , .dd
15
La première démonstration consiste à analyser un memory dump ( celui de hackmeif you
can )
Il s'agissait tout simplement de déterminer le nom d'utilisateur du Pc depuis lequel on a eu
ce fichier !
1) sudo apt-get install volatility
2) volatility -f username.raw imageinfo // les informtations générales
3)volatility -f Username.raw hivelist --profile=Win7SP0x64 //les registres
4) Parfait ! maintenant, nous pouvons utiliser cette information pour aller plus loin , par
exemple en obtenant la liste des programmes installés sur le système , qui peuvent être
extraites de la “ hive“ Software (   System32  Config  SOFTWARE ) " en utilisant le "
hive- dump " option et spécifiant l'adresse de la mémoire virtuelle de la hive spécifiée
16
TestDisk
is a powerful data recovery software ! It was originally designed to help recover
lost partitions , repair corrupted partitions tables when these symptoms are
caused by faulty software, certain types of viruses or human error such as
accidental deletion of Sheet of the table .
TestDisk is OpenSource software and is licensed under the GNU General
Public License (GPL v2 +).
PhotoRec
is file data recovery software designed to recover lost files including video,
documents and archives from hard disks, CD-ROMs, and lost pictures (thus
the Photo Recovery name) from digital camera memory. PhotoRec ignores the
file system and goes after the underlying
17
Merci Pour Votre
Attention

Contenu connexe

Similaire à Forensics

Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docxsmile790243
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsShanaAneevan
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the ArchiveGarethKnight
 
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docxASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docxedmondpburgess27164
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Malware analysis
Malware analysisMalware analysis
Malware analysisAnne ndolo
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...theijes
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionIJERA Editor
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesSandeep Kumar Seeram
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 

Similaire à Forensics (20)

Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the Archive
 
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docxASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
ASSIGNMENT2 Computer Architecture and Imaging So you’re telling .docx
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data Acquisition
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on Examples
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 

Dernier

BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxolyaivanovalion
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 

Dernier (20)

(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 

Forensics

  • 1. Ministère de l’Enseignement Supérieur et de la Recherche Scientifique Université de la Manouba Ecole Nationale des Sciences de l’Informatique Ghariani Tewfik CSI Année universitaire 2015/2016 Intro to Forensics
  • 2. 2 Introduction I. Uses of computer forensics II. Stages of Examination III. Computer Forensics Method Conclusion Demo PlanPlan
  • 3. 3 ● What is computer Forensics To start, Forensic science is the scientific method of gathering and examining information about the past which is then used in a court of law. The word forensic comes from the Latin forēnsis, meaning "of or before the forum." In Roman times, a criminal charge meant presenting the case before a group of public individuals in the forum. Another Definition: Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines, and faces similar issues. Introduction
  • 4. 4 I. Uses Of Computer Forensics There are few areas of crime or dispute where computer forensics cannot be applied. Law enforcement agencies have been among the earliest and heaviest users of computer forensics and consequently have often been at the forefront of developments in the field. More recently, commercial organizations have used computer forensics to their benefit in a variety of cases such as; * Intellectual Property theft * Industrial espionage * Employment disputes * Fraud investigations * Forgeries * Bankruptcy investigations * Inappropriate email and Internet use in the work place
  • 6. 6 The computer forensic examination process is divided into six stages, presented in their usual chronological order. ReadinessReadiness: For the forensic examiner himself, readiness will include appropriate training, regular testing and verification of their software and equipment, familiarity with legislation, dealing with unexpected issues Evaluation: The evaluation stage includes the receiving of instructions, the clarification of those instructions if unclear or ambiguous, risk analysis and the allocation of roles and resources
  • 7. 7 Analysis:Analysis: Analysis depends on the specifics of each job. The examiner usually provides feedback to the client during analysis and from this dialogue the analysis may take a different path or be narrowed to specific areas. Collection:Collection: If acquisition is to be carried out on-site rather than in a computer forensic laboratory, then this stage would include identifying and securing devices which may store evidence and documenting the scene.
  • 8. 8 Presentation : This stage usually involves the examiner producing a structured report on their findings, addressing the points in the initial instructions along with any subsequent instructions. It would also cover any other information which the examiner deems relevant to the investigation Review: As with the readiness stage, the review stage is often overlooked or disregarded. This may be due to the perceived costs of doing work that is not billable, or the need ‘to get on with the next job’.
  • 9. 9 -safe seizure of computer systems and files, to avoid contamination and/or interference -safe collection of data and software -safe and non-contaminating copying of disks and other data media -reviewing and reporting on data media -sourcing and reviewing of back-up and archived files -recovery / reconstruction of deleted files - logical methods -recovery of material from "swap" and "cache" files -recovery of deleted / damaged files - physical methods III. Computer Forensic Methods
  • 10. 10 -core-dump: collecting an image of the contents of the active memory of a computer at a particular time -estimating if files have been used to generate forged output -reviewing of single computers for "proper" working during relevant period, including service logs, fault records, etc. -proving / testing of reports produced by complex client / server applications -reviewing of complex computer systems and networks for "proper" working during relevant period, including service logs, fault records, etc. -review of system / program documentation for: design methods, testing, audit, revisions, operations management.
  • 11. 11 -reviewing of applications programs for "proper" working during relevant period, including service logs, fault records, etc. -identification and examination of audit trails -identification and review of monitoring logs -telecoms call path tracing (PTTs and telecoms utilities companies only) -reviewing of access control services - quality and resilience of facilities (hardware and software, identification / authentication services) -reviewing and assessment of access control services - quality of security management -reviewing and assessment of encryption methods - resilience and implementation
  • 12. 12 Conclusion Well my friends, weather you heard about it before or not, I can assure you that this field is so interesting and challenging. To keep it simple, once again, Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It is basicly like you saw in the movies, the main aspect is to gather evidence which will help you solve any digital crimes that might have occurred. There are a lot of investigation technics which includes analyzing memory dump , logs or network cache... I have chosen few of the best potentiol tools that might help you through your investigation.
  • 14. 14 Volatility A single, cohesive framework analyzes RAM dumps from 32- and 64-bit windows, linux, mac, and android systems. Volatility's modular design allows it to easily support new operating systems and architectures as they are released. All your devices are targets...so don't limit your forensic capabilities to just windows computers. Note that the is an open source program written with python, you can access its source code via github, or even if you still are a windows user, a stand-alone version can be executed directly: _ sudo apt-get install volatility _https://volatility.googlecode.com/files/volatility-2.3.1.standalone.exe it's a powerfull tool that allows you to extract data , register elements , list of network connections, processus... from the memory dump. In fact, the memory dump is the recorded state of the working memory of a computer program at a specific time,generally when the program has crashed. The memory dump file is extracted often with these possible extensions : dmp , .raw , .dd
  • 15. 15 La première démonstration consiste à analyser un memory dump ( celui de hackmeif you can ) Il s'agissait tout simplement de déterminer le nom d'utilisateur du Pc depuis lequel on a eu ce fichier ! 1) sudo apt-get install volatility 2) volatility -f username.raw imageinfo // les informtations générales 3)volatility -f Username.raw hivelist --profile=Win7SP0x64 //les registres 4) Parfait ! maintenant, nous pouvons utiliser cette information pour aller plus loin , par exemple en obtenant la liste des programmes installés sur le système , qui peuvent être extraites de la “ hive“ Software ( System32 Config SOFTWARE ) " en utilisant le " hive- dump " option et spécifiant l'adresse de la mémoire virtuelle de la hive spécifiée
  • 16. 16 TestDisk is a powerful data recovery software ! It was originally designed to help recover lost partitions , repair corrupted partitions tables when these symptoms are caused by faulty software, certain types of viruses or human error such as accidental deletion of Sheet of the table . TestDisk is OpenSource software and is licensed under the GNU General Public License (GPL v2 +). PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from hard disks, CD-ROMs, and lost pictures (thus the Photo Recovery name) from digital camera memory. PhotoRec ignores the file system and goes after the underlying