Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory (English Edition)
Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory (English Edition)
Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory (English Edition)
Ebook516 pages8 hours

Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory (English Edition)

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Forensics offers every IT and computer professional a wide opportunity of exciting and lucrative career. This book is a treasure trove of practical knowledge for anyone interested in forensics, including where to seek evidence and how to extract it from buried digital spaces.

The book begins with the exploration of Digital Forensics with a brief overview of the field's most basic definitions, terms, and concepts about scientific investigations. The book lays down the groundwork for how digital forensics works and explains its primary objectives, including collecting, acquiring, and analyzing digital evidence. This book focuses on starting from the essentials of forensics and then practicing the primary tasks and activities that forensic analysts and investigators execute for every security incident. This book will provide you with the technical abilities necessary for Digital Forensics, from the ground up, in the form of stories, hints, notes, and links to further reading.

Towards the end, you'll also have the opportunity to build up your lab, complete with detailed instructions and a wide range of forensics tools, in which you may put your newly acquired knowledge to the test.
LanguageEnglish
Release dateJan 10, 2023
ISBN9789355511508
Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory (English Edition)

Related to Practical Digital Forensics

Related ebooks

Computers For You

View More

Related articles

Reviews for Practical Digital Forensics

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Practical Digital Forensics - Dr. Akashdeep Bhardwaj

    CHAPTER 1

    Introduction to Digital Forensics

    Introduction

    As the world continues to digitize, both the public and private sectors will become dependent upon technology to do business. Organizations use technology to improve productivity, reduce internal and external operating costs, improve data security, and extend business capabilities in today’s information age. The key to realizing these benefits is to digitally transform all aspects of work, particularly through data stored digitally instead of using paper documents. Individuals have also become increasingly reliant on technology in their everyday lives; nearly everything they do now involves technology in some capacity. The fast transition to the digital era has been associated with an increase in cybercrime. Cybercrime losses are expected to surpass $6 trillion yearly by 2022, according to cyber security ventures. According to the same report, there may be 6 billion internet users by 2023 (75% of the anticipated world population of 8 billion), resulting in a massive volume of digital data being generated every second.

    Structure

    In this chapter, we will cover the following topics:

    Defining digital forensics and goals

    Defining cybercrime and cybercrime sources

    Computers in cybercrimes

    Digital forensics categories

    Forensic data analysis

    Digital forensic users

    Investigation types

    Forensics readiness

    Digital evidence types

    Electronic evidence location

    Chain of custody

    Examination process

    Objectives

    The reader will get to understand digital forensics, goals, cybercrime, and the sources involved as well as computers used in cybercrimes. This chapter discusses the different types of digital forensics categories such as mobile, network, database, and analysis of Forensic Data and users such as law enforcement, civil litigation, intelligence, and counterintelligence agencies. Further, the various investigations and evidence types, as well as Forensics Readiness, is discussed, including user, machine, and network-created Data, Chain of Custody, and the Forensic examination process.

    Defining digital forensics

    Digital forensics is a branch of forensic science that uses scientific understanding to acquire, evaluate, record, and present digital evidence related to computer crime in court. The main goal is to figure out what happened, when it happened, and who did it. The term "digital forensics is a catch-all word for computer forensics or, more recently, cyber forensics." These investigations include user laptops, computers, mobile phones, network devices, Webcams, tablets, camcorders, IoT and smart home devices, and storage media such as USB drives, CD/DVD, SD cards, and tapes, among other digital systems and devices that can send, receive, and store digital data.

    Data breaches, phishing, ransomware, DoS assaults, and SQL Injunctions are all examples of cyberattacks on digital systems that may be investigated using digital forensics. Cyberespionage or adversarial assaults that compromise accounts and services, unauthorized system and network access, or other associated cyberattacks that cause commercial or reputational harm are all included in this category. Conducting a computer forensic investigation necessitates adhering to certain guidelines that can withstand cross-examination in court. This includes gathering data (both static and volatile) in a forensically sound manner, assessing data using court-approved forensics tools, sifting through the data to locate evidence, and finally, presenting conclusions to the court in an official report. If these procedures are not followed correctly, we risk damaging or erasing digital evidence, rendering it inadmissible in court.

    Digital forensics is a relatively new profession in the cybersecurity domain that is becoming increasingly important as the number of crimes and unlawful actions in cyberspace increases. In comparison to conventional forensic science (blood tests, DNA profiling, or fingerprinting), digital forensics is a young science; the fact that it interacts with rapid changes in the computing ecosystem around us and reaches other domains (such as the judicial process, law enforcement, management consulting, information technology, and the borderless scope of the internet), makes it a difficult field that requires constant development of its foes.

    Digital forensics goals

    The basic goal of digital forensics is to investigate crimes committed with computer systems that store and processes digital data and to extract forensic’ digital evidence to present in court. This is achieved in the following ways using digital forensics. Locating and preserving legal evidence on computer devices in a way that is acceptable in a court of law.

    Follow court-approved technological methods to preserve and recover evidence.

    Assigning responsibility for an activity to the person who initiated it.

    Determining data breaches inside a company.

    Identifying the extent of any damage that may occur as a result of a data breach.

    Compiling the findings into a formal report that may be submitted in court.

    Providing expert evidence in court as a guide.

    Defining cybercrime

    Any illegal activity carried out on a computer or via a computer network, such as the internet, is referred to as cybercrime. According to the US Department of Justice, cybercrime is defined as any unlawful behavior done against or with the use of a computer or computer network. The fundamental motivation for cybercrime is financial gain (for example: spreading malware to steal access codes to bank accounts). However, different motives drive a significant portion of cybercrime, including disrupting service (for example, DDoS attacks to shut down a target organization’s services), stealing confidential data (for example, consumer data and medical information), cyber espionage (corporate trade and military secrets), or illegally exchanging copyrighted materials.

    Sources of cybercrime

    Insider threats and external attacks are the two primary sources of cybercrime.

    Insider threats: Since they might go unnoticed for a long period, this is the most significant cyber risk threatening enterprises today. Employees—or other persons working within the target company, such as former employees, third-party contractors, or business associates—with authorized access to the target organization’s computing systems and/or information about its cybersecurity procedures and defenses—commit insider attacks. This is exemplified by economic espionage.

    External attacks: These attempts are typically carried out by skilled hackers who operate from outside the target company. These are the most typical types of cyberattacks against organizations all across the world. A black hat hacker may attempt to enter the target company’s networks from another country to get illicit access. To aid their unlawful access, external attackers may gain information about the target corporation’s security systems from an insider (disgruntled staff member).

    Computers in cybercrimes

    Cybercrime may be classified into three types based on how a computer was used to commit a crime.

    The computer is used as a weapon in the commission of a crime. Launching denial-of-service (DoS) attacks or delivering ransomware are two examples.

    Crime has been committed against a computing device. Obtaining illegal access to a target computer, for example.

    The computer is used to aid in the commission of a crime. Using a computer to keep incriminating data or communicate with other criminals online, for example.

    Example of cybercrime: Various types of computer intrusions result in various types of undesirable results. For example, certain cyberattacks may damage or destroy the operating system, compelling you to reinstall it. Another type may try to steal your passwords and login details. Other assaults, on the other hand, may not completely damage your computer, but they will track your online activities and jeopardize your privacy. Criminals are more sophisticated than ever, and harmful software is more complicated than ever. Modern malware may infect a computer and remain undetected for a long time. Rather than inflicting harm on your computer, the majority of intrusions these days are carried out to steal money, acquire access to personal information, or obtain login credentials. Cybercrime, like traditional crime, may be divided into a variety of categories depending on the motivation of the criminals.

    Digital forensics categories

    Digital forensics can be classified based on the source of the obtained digital evidence. The collection of digital artifacts contained on the target computer device, which can be used as evidence in court, is referred to as digital evidence, as presented in figure 1.1.

    Figure 1.1: Types of digital forensics

    Computer forensics

    This is the most common type of digital forensics; it involves investigating digital evidence on laptops, desktops, and storage devices such as USB drives, SD cards, system memory (RAM), operating systems, and application logs and traces. The primary goal of this type of investigation is to retrieve deleted data from the target device’s storage and examine it for incriminating or vindicating evidence.

    Mobile forensics

    Mobile forensics is a subset of digital forensics that specializes in gathering data from mobile devices. A mobile device is any computing device (such as phones, smartphones, tablets, and wearable devices such as smartwatches) that can make phone calls through traditional communication networks. Such gadgets are usually geolocation-aware, which means they have a GPS or other satellite positioning system built-in. Because of the extensive usage of mobile technology among customers globally, mobile forensics will soon supersede existing methods of digital forensics.

    Network forensics

    This field of digital forensics entails monitoring and analyzing network traffic to extract evidence, such as the source of a network breach, or to identify intrusions. Data flow via networks can be gathered in bulk in real-time and stored for later analysis. Alternatively, it can be reviewed in real-time with the option of preserving chosen chunks of relevant events for later study (this option requires less storage space). Unlike other types of digital forensics, network forensics focuses solely on volatile live data.

    Database forensics

    The analysis of data and information held in databases such as Microsoft SQL Server, Oracle, MySQL, and others is known as database forensics. Database forensics looks at who has access to a database and what actions are made to spot malicious behavior.

    Forensic data analysis

    This analysis is capable of reviewing corporate data to prevent and identify financial criminal fraud. To identify and prevent corporate resource misuse, it searches for relevant patterns, combines data assets, and compares them to past findings. E-mail forensics, cloud storage forensics, forensics for specific applications such as Web browsers, file system forensics (FAT, NTFS, or EXT), hardware forensics, multimedia forensics (text, image, audio, or video), and live volatile or RAM forensics are all small sub-branches of the main types already mentioned.

    Digital forensics users

    Digital forensics can be used for a variety of scenarios across almost all sectors and businesses. This science has grown more integrated across other domains as a result of the expanding usage of computing technology and internet activities.

    Law enforcement

    Digital forensics is used by law enforcement authorities to assist them in upholding the law and protecting society and businesses from criminals. Law enforcement agents employ digital forensics in many settings to uncover crimes and connect them to their perpetrators. Most traditional crimes would almost certainly necessitate obtaining digital artifacts from the scene of the crime, such as a USB drive found in a drug dealer’s office, a laptop from a suspect’s home, or a mobile phone confiscated at a murder scene. Law enforcement computer forensics professionals should follow a specified digital forensics procedure while obtaining, evaluating, preserving, and presenting digital evidence.

    Civil ligation

    Businesses employ digital forensics procedures and methodologies as part of their electronic investigative process in civil litigation to help identify incriminating digital material that may be used as proof in a civil or criminal legal case. Although digital forensics procedures used in civil cases differ from those used in criminal cases in terms of the processes used to gather digital evidence, the scope of the investigation, and the legal ramifications of the case, e-discovery is seen as an essential component of the judicial system. The bulk of business cases is motivated by financial gain. Bribery, tax evasion, thefts of intellectual property or financial assets, fraud, misappropriation of business resources, industrial espionage, and commercial disputes are only a few instances. Other recorded digital crimes include gender, e-mail harassment, age discrimination, and sabotage. Companies employ digital forensics tools as part of their e-discovery process to locate and extract digital evidence to identify the source, entity, or person responsible for such violations. Such investigations may end in the guilty employee being fired, receiving a warning (if the violation was small and insignificant), or being prosecuted if the matter is brought to court. The application of digital forensics in civil litigation is not limited to business cases; it also extends to personal matters such as family conflicts and divorce.

    Intelligence and counterintelligence

    Intelligence agencies use digital forensics techniques and tools to combat terrorism, human trafficking, organized crime, and the drug trade, among other severe criminal activities. Digital forensics tool helps investigators uncover important information about crime syndicates by monitoring networks, investigating digital devices, or acquiring information about the person of interest from publicly available sources such as social media sites; this process is known as Open Source Intelligence (OSINT), which will be covered in another book soon.

    Digital forensics investigation types

    According to who is in charge of commencing the inquiry, digital forensic investigations may be divided into two categories:

    Public investigation

    Private sector investigations

    Criminal cases leveraging investigations are handled according to the legal guidelines set out by the appropriate authorities. Law enforcement agencies participate in public investigations, which are conducted under national or state legislation. The three main phases of these investigations are complaint, investigation, and prosecution. Private investigations are commonly conducted by businesses to investigate policy violations, legal problems, unfair dismissal, or the leak of secret information as industrial espionage. Because it is up to each corporation to determine, there are no fixed regulations for conducting such investigations; nonetheless, many companies are already implementing strict internal standards for investigating digital crimes. These procedures are similar to public investigations into crimes in that some cases may be presented to the court and ultimately transformed into official criminal prosecutions. Businesses can reduce liability associated with computer crime by developing a clear policy that is easy to read and comprehend by their employees. A policy like this can also help digital forensics investigations proceed more easily and with less downtime for the company if they are needed. The most important rule that all firm employees should sign is the computer usage policy. This policy outlines how employees may use business IT networks and computer systems and cautions them that they may face legal consequences if they break the guidelines.

    Forensics readiness

    Forensics readiness refers to an organization’s ability to acquire, retain, secure, and analyze digital evidence in a forensically sound manner. To keep costs down, the procedure should take place without interfering with existing operations. The usage of digital forensics preparation planning in businesses offers many benefits, which are listed as follows:

    For instances requiring digital evidence, a quick response time is required. When a data breach or information leak occurs, having a clear e-discovery policy in place can allow businesses to respond promptly and get digital evidence in a forensically sound manner.

    The government’s regulations must be adhered to; US Federal Procedures have produced a set of guidelines for parties in legal disputes on how to obtain and manage digital evidence so that it may be used in court. If the case gets to court, forensic readiness will reduce the cost of gathering digital evidence and almost certainly, result in a faster resolution. Increasing the security defenses of the firm. Monitoring endpoint computer usage may uncover dangerous malware, such as ransomware, before the infection spreads to the entire organization’s network, and using forensic readiness will make an organization well-prepared to handle internal and external security incidents and able to identify an attack quickly before it dives deeply into its IT infrastructure (for example, monitoring endpoint computer usage may uncover dangerous malware, such as ransomware before the infection spreads to the entire organization’s network).

    Reducing the number of internal attacks, as previously stated, internal threats such as rogue employees are more dangerous than external attacks; the presence of a forensic readiness plan in an organization will make hostile insiders fear being discovered if they participate in illegal behavior.

    Increasing the security posture of an organization as a company’s forensic readiness strategy will set it apart as a powerful defender against cyber-attacks. Customers will be more inclined to do business with this organization since their data will be kept private and secure. Investors will also feel secure in the knowledge that their money is protected and that there is a minimal probability that successful attacks on this organization would result in their money being lost.

    Type of digital evidence

    User-created data and machine-created data are the two most common sorts of digital artifacts.

    User-created data

    User-generated data is anything created by a person (human) using a digital device. Metadata is data that is included in files created by a computer user; the metadata may be created by the computer user on purpose (for example: author name and e-mail), or it may be generated automatically by the software that created the file, such as captured camera model/type, date and time of clicking the photograph, GPS coordinates of the photograph, and resolution). Metadata should be thoroughly examined throughout any inquiry since it may include important information about the subject at hand. It includes the following, among other things:

    Previous backups (including both cloud storage backups and offline backups such as CDs/DVDs and tapes)

    Account details (username, picture, and password)

    E-mail messages and attachments (both online and client e-mails as Outlook)

    Audio and video files

    Address book and calendar

    Webcam recordings (digital photos and videos)

    Content files (for example, MS Office documents, IM conversations, bookmarks), spreadsheets, databases, and any other digitally stored text

    Hidden and encrypted files (including zipped folders) created by the computer user

    Machine and network-created data

    Any data that is automatically generated by a digital device is considered machine/network-created data. It includes the following, among other things:

    Configuration files and audit trails, including third-party service providers (for example, Internet service providers (ISPs) often retain customers’ accounts and browser history logs)

    Logs on the computer under Windows OS contain the following logs: Logs for application, security, setup, system, forward events, apps, and services

    GPS tracking information history

    Temporary files

    Information from the browser (browser history, cookies, and download history)

    In addition to the IP addresses associated with a LAN network and the broadcast settings, devices have Internet protocol (IP) and MAC addresses

    Instant messenger history and buddy list (Skype and WhatsApp) (from devices with GPS capability)

    Application and Windows history (for example, a recently opened file in MS Office)

    Under Windows computers, restore points

    E-mail header information

    Registry files in Windows OS

    Hidden and conventional system files

    Printer spooler files

    Virtual machines

    Surveillance video recordings

    Paging and hibernation files and memory dump files

    As a result, digital evidence can be defined as any file or data/metadata that is provided in a digital (binary) format and could be used in a trial.

    Locations of electronic evidence

    Digital evidence is frequently found on hard drives, but as computer technology advances, digital evidence is increasingly discovered in practically all digitally aware devices. The following is a list of the most common types of devices that must be examined for digital evidence:

    Systems: Desktops, Laptops, Tablets, Servers, and RAIDs

    Network devices: Hubs, switches, modems, routers, and wireless access points

    Internet-enabled home automation and IoT devices: Air conditioners and Smart refrigerators

    DVRs and surveillance systems

    MP3 players

    GPS devices

    Smartphones

    PDA

    Game stations—Xbox, PlayStation

    Digital cameras

    Smart cards

    Pagers

    Digital voice recorders

    Chain of custody

    A chain of custody is required for any digital forensic investigation approach. A proper chain of custody should detail how digital evidence was discovered, gathered, transported, researched (analyzed), stored, and maintained by the various parties involved in the

    Enjoying the preview?
    Page 1 of 1