Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Diving in to Digital forensics

Diving in to Digital forensics

Slides from my session on Introduction to digital forensics AT NullAhmedabad Meetup

Pranjal Vyas

June 24, 2018
Tweet

More Decks by Pranjal Vyas

Other Decks in Education

Transcript

  1. What is Digital Forensics The science of identifying, preserving, recovering,

    analyzing and presenting facts about digital evidence found on computers or digital storage media devices.
  2. Goal Of Digital Forensics The main goal of computer forensic

    experts is not only to find the criminal but also to find out the evidence, the presentation of the evidence in a manner that leads to legal action of the criminal.
  3. What is Evidence ? Evidence is anything that can be

    used to determine whether a crime has been committed. Evidence may link a suspect to a scene, corroborate or refute an alibi or statement, identify a perpetrator or victim, exonerate the innocent, induce a confession, or direct further investigation.
  4. Types Of Evidence(s) 1.PERSISTANT DATA data that remains intact when

    the computer is turned off. E.g. hard drives, disk drives and removable storage devices (such as USB drives or flash drives). 2.VOLATILE DATA data that would be lost if the computer is turned off. E.g. deleted files, computer history, the computer's registry, temporary files and web browsing history.
  5. Phases of Digital Forensics Preservation >>Preserve evidence with least amount

    of change possible >>Must be able to account for any change >>Chain of custody
  6. Phases of Digital Forensics Analysis >> Extracting facts(data/information) Methods for

    extracting Facts(data/information) 1. Bit stream Disk to image 2. Bit stream Disk to Disk
  7. Phases of Digital Forensics Presentation/Documentation Evidence will be accepted in

    court on:- >> Manner of presentation >> Qualifications of the presenter >> Credibility of the processes used to preserve and analyze evidence
  8. Skills required for Digital Forensics • Networking skills, including TCP/IP-based

    network communications (much of modern forensics involves reading network traces) • Windows, *nix operating systems • C, Python or any programming language(s) • Computer hardware and software systems • Cryptography principles • eDiscovery tools (NUIX, Relativity, Clearwell, etc.) • Forensic software applications (e.g. TSK, FTK, Helix, Cellebrite etc.) • Data processing skills in electronic disclosure environments • Evidence handling procedures • Cloud computing
  9. Forensics Tools (Commercial/Proprietary) • UFED • Oxygen • Santoku •

    Belkasoft • CyberCheck • OSForensics • FTK Imager
  10. Forensics Tools (Free/Opensource) • Volatility • GRR • DFF •

    Autospy/TSK • Regripper • Caine Distro • HashMyFiles