Top Banner
n| u Pardhasaradhi.ch
18

Introduction to Forensics and Steganography by Pardhasaradhi C

Apr 16, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u

Pardhasaradhi.ch

Page 2: Introduction to Forensics and Steganography by Pardhasaradhi C

COMPUTER FORENSICS

Process

Rules

Software's

Hardware

Steganography

Some important windows files

Reporting

Sites

Contents :

Page 3: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u Computer Forensics :

• It is the application of computer investigation and analysis techniques to gather evidence

• It is also called as cyber forensics

Goal :

• The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it.

Pardhasaradhi.ch

Page 4: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u

Preparation

Search and seizure

Acquisition and Authentication

Case storage and Archival

Analysis and Reporting

Stages in digital investigation process

Pardhasaradhi.ch

Page 5: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u Rules of computer forensics :

• Rule 1 :Never mishandle Evidence

• Rule 2 :Never trust the subject operating system

Chain of custody

Asset tags

Crime scene details

Ex :

Ex :Avoid Live forensics

Use drive encryption

Check hash value with the image

Pardhasaradhi.ch

Page 6: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u

• Rule 3 :Never work on original evidence

• Rule 4 :Document Every thing

Ex : Create a bit stream copy

Do not access the file system during imaging

Document the errors while imaging If any

If any errors arise while imaging take another copy

Pardhasaradhi.ch

Page 7: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u

Clone Vs. image :

To copy or replicate the entire contents of a hard disk drive by creating an image of the hard disk drive. Hard disk drives are often cloned for batch installation on other computers, particularly those on a network, or for use as backups.

Clone :

Image :

Some of the image types are dd,E01,smart,ad1,ISO,NRG,

Images are locked format ,these are easy to carry

EX: Symantec ghost

Clone is used to execute the images

Pardhasaradhi.ch

Page 8: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u

Access data

MAC times•Modified

•Accessed

•Created

FTK imager

Password recovery toolkit

Registry viewer

Forensic toolkit

Software Forensic Hub

Pardhasaradhi.ch

Page 9: Introduction to Forensics and Steganography by Pardhasaradhi C

Stego suite

Mount image pro

Ultimate forensics Tool kit

Elcomsoft

Helix

DD for Linux

Page 10: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u

Devices used for forensics

•Shadow device :

•write blocker

As an investigative tool, boot the suspect client and connect to their network

Allows read commands to pass but by blocks write commands,

Hardware Forensic Hub :

•Faraday bag

The product was designed for E items which would isolate it from the networks

Pardhasaradhi.ch

Page 11: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u Wde

Drive wiper

Ex: True crypt

• whole disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Full Disk Encryption prevents unauthorized access to data storage

• Wipe all data off of two drives at up to 8 GB per minute • Automatically unlocks and wipes Host Protected Areas • Cut your drive wiping time in half • Very light weight - less than a pound, plus the laptop style power supply • Simple, fast, portable data destruction

Pardhasaradhi.ch

Page 12: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u

Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination

Steganography

Pardhasaradhi.ch

Alternate Data Streams (NTFS) New Technology File System allows for Alternate Data Streams One file can be a link to multiple Alternate Data Streams of files of any size.

Page 13: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u

Pardhasaradhi.ch

Page 14: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u Importance of windows files

Pardhasaradhi.ch

Sam SYSTEM32\COFIG

User namesUser information like last logon count ,last login time.

Ntldr

NTLDR will display the versions of operating systems in a boot menu and waits a specified number of seconds before loading the first in the list

System

This file will help us to know details regarding the USB connected and exact time stamps for drive operations done

index

This file will store all the internet related data cookies, Recent history

Page 15: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u Making a report for forensic case

Executive summary

Detailed activity log

Proof of process

Forensic image processing

Restoration and verification of images

Document evidences discovered during analysis

Pardhasaradhi.ch

Page 16: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u

• File slack

Terminology used

•Data carving

Data carving or File Carving is a powerful tool for recovering files and fragments of files when directory entries are corrupt or missing,

Memory carving is a useful tool for analyzing physical and virtual memory dumps when the memory structures are unknown or have been overwritten.

The data storage space that exists from the end of the file to the end of the last cluster assigned to the file is called "file slack"

Pardhasaradhi.ch

•Cluster

Storage of data in fixed length blocks of bytes called clusters. Clusters are essentially groupings of sectors which are used to allocate the data storage area

Page 17: Introduction to Forensics and Steganography by Pardhasaradhi C

Sites:

Access data- www.accessdata.com -- ace

LADS - www.heysoft.de

Elcom soft – www.elcomsoft.com

Helix - www.e-fense.com/helix/

Stego suite – www.logon-int.com/product.asp

I2analyst notebook

www.Forensicfocus.com

www.computerforensics1.com

www.forensics.nl

www.blogs.sans.org/computer-forensics/

Page 18: Introduction to Forensics and Steganography by Pardhasaradhi C

n|u

THANK YOU

Pardhasaradhi.ch