Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory (English Edition)
()
About this ebook
The book begins with the exploration of Digital Forensics with a brief overview of the field's most basic definitions, terms, and concepts about scientific investigations. The book lays down the groundwork for how digital forensics works and explains its primary objectives, including collecting, acquiring, and analyzing digital evidence. This book focuses on starting from the essentials of forensics and then practicing the primary tasks and activities that forensic analysts and investigators execute for every security incident. This book will provide you with the technical abilities necessary for Digital Forensics, from the ground up, in the form of stories, hints, notes, and links to further reading.
Towards the end, you'll also have the opportunity to build up your lab, complete with detailed instructions and a wide range of forensics tools, in which you may put your newly acquired knowledge to the test.
Related to Practical Digital Forensics
Related ebooks
Cracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsCuckoo Malware Analysis Rating: 0 out of 5 stars0 ratings7 Rules To Become Exceptional At Cyber Security Rating: 5 out of 5 stars5/5Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing with Kali Linux: Unlocking industry-oriented VAPT tactics (English Edition) Rating: 0 out of 5 stars0 ratingsUnauthorised Access: Physical Penetration Testing For IT Security Teams Rating: 4 out of 5 stars4/5Computer Forensics: A Pocket Guide Rating: 4 out of 5 stars4/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsMastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Rating: 0 out of 5 stars0 ratingsThe Little Book of Cybersecurity Rating: 0 out of 5 stars0 ratingsAdvanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsHands-on Incident Response and Digital Forensics Rating: 0 out of 5 stars0 ratingsCISSP:Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans Rating: 0 out of 5 stars0 ratingsCyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsImproving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit Rating: 0 out of 5 stars0 ratingsDigital Forensics Basics: A Practical Guide Using Windows OS Rating: 0 out of 5 stars0 ratingsPenetration Testing with Kali Linux: Learn Hands-on Penetration Testing Using a Process-Driven Framework (English Edition) Rating: 0 out of 5 stars0 ratingsModern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization Rating: 0 out of 5 stars0 ratingsCybersecurity Design Principles: Building Secure Resilient Architecture Rating: 0 out of 5 stars0 ratingsPenetration Testing: Protecting networks and systems Rating: 0 out of 5 stars0 ratingsCEH v11: Certified Ethical Hacker Version 11 Practice Tests Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratingsDigital Forensics Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratings#HACKED: 10 Practical Cybersecurity Tips to Help Protect Personal or Business Inform Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Mindset: Cultivating a Culture of Vigilance Rating: 0 out of 5 stars0 ratingsSecuring Critical Infrastructures Rating: 0 out of 5 stars0 ratings
Computers For You
CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsStandard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Uncanny Valley: A Memoir Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 5 out of 5 stars5/5The Invisible Rainbow: A History of Electricity and Life Rating: 5 out of 5 stars5/5The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Elon Musk Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 4 out of 5 stars4/5Excel 101: A Beginner's & Intermediate's Guide for Mastering the Quintessence of Microsoft Excel (2010-2019 & 365) in no time! Rating: 0 out of 5 stars0 ratingsEverybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5People Skills for Analytical Thinkers Rating: 5 out of 5 stars5/5Computer Science I Essentials Rating: 5 out of 5 stars5/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratings
Reviews for Practical Digital Forensics
0 ratings0 reviews
Book preview
Practical Digital Forensics - Dr. Akashdeep Bhardwaj
CHAPTER 1
Introduction to Digital Forensics
Introduction
As the world continues to digitize, both the public and private sectors will become dependent upon technology to do business. Organizations use technology to improve productivity, reduce internal and external operating costs, improve data security, and extend business capabilities in today’s information age. The key to realizing these benefits is to digitally transform all aspects of work, particularly through data stored digitally instead of using paper documents. Individuals have also become increasingly reliant on technology in their everyday lives; nearly everything they do now involves technology in some capacity. The fast transition to the digital era has been associated with an increase in cybercrime. Cybercrime losses are expected to surpass $6 trillion yearly by 2022, according to cyber security ventures. According to the same report, there may be 6 billion internet users by 2023 (75% of the anticipated world population of 8 billion), resulting in a massive volume of digital data being generated every second.
Structure
In this chapter, we will cover the following topics:
Defining digital forensics and goals
Defining cybercrime and cybercrime sources
Computers in cybercrimes
Digital forensics categories
Forensic data analysis
Digital forensic users
Investigation types
Forensics readiness
Digital evidence types
Electronic evidence location
Chain of custody
Examination process
Objectives
The reader will get to understand digital forensics, goals, cybercrime, and the sources involved as well as computers used in cybercrimes. This chapter discusses the different types of digital forensics categories such as mobile, network, database, and analysis of Forensic Data and users such as law enforcement, civil litigation, intelligence, and counterintelligence agencies. Further, the various investigations and evidence types, as well as Forensics Readiness, is discussed, including user, machine, and network-created Data, Chain of Custody, and the Forensic examination process.
Defining digital forensics
Digital forensics is a branch of forensic science that uses scientific understanding to acquire, evaluate, record, and present digital evidence related to computer crime in court. The main goal is to figure out what happened, when it happened, and who did it. The term "digital forensics is a catch-all word for computer forensics or, more recently,
cyber forensics." These investigations include user laptops, computers, mobile phones, network devices, Webcams, tablets, camcorders, IoT and smart home devices, and storage media such as USB drives, CD/DVD, SD cards, and tapes, among other digital systems and devices that can send, receive, and store digital data.
Data breaches, phishing, ransomware, DoS assaults, and SQL Injunctions are all examples of cyberattacks on digital systems that may be investigated using digital forensics. Cyberespionage or adversarial assaults that compromise accounts and services, unauthorized system and network access, or other associated cyberattacks that cause commercial or reputational harm are all included in this category. Conducting a computer forensic investigation necessitates adhering to certain guidelines that can withstand cross-examination in court. This includes gathering data (both static and volatile) in a forensically sound manner, assessing data using court-approved forensics tools, sifting through the data to locate evidence, and finally, presenting conclusions to the court in an official report. If these procedures are not followed correctly, we risk damaging or erasing digital evidence, rendering it inadmissible in court.
Digital forensics is a relatively new profession in the cybersecurity domain that is becoming increasingly important as the number of crimes and unlawful actions in cyberspace increases. In comparison to conventional forensic science (blood tests, DNA profiling, or fingerprinting), digital forensics is a young science; the fact that it interacts with rapid changes in the computing ecosystem around us and reaches other domains (such as the judicial process, law enforcement, management consulting, information technology, and the borderless scope of the internet), makes it a difficult field that requires constant development of its foes.
Digital forensics goals
The basic goal of digital forensics is to investigate crimes committed with computer systems that store and processes digital data and to extract forensic’ digital evidence to present in court. This is achieved in the following ways using digital forensics. Locating and preserving legal evidence on computer devices in a way that is acceptable in a court of law.
Follow court-approved technological methods to preserve and recover evidence.
Assigning responsibility for an activity to the person who initiated it.
Determining data breaches inside a company.
Identifying the extent of any damage that may occur as a result of a data breach.
Compiling the findings into a formal report that may be submitted in court.
Providing expert evidence in court as a guide.
Defining cybercrime
Any illegal activity carried out on a computer or via a computer network, such as the internet, is referred to as cybercrime. According to the US Department of Justice, cybercrime is defined as any unlawful behavior done against or with the use of a computer or computer network. The fundamental motivation for cybercrime is financial gain (for example: spreading malware to steal access codes to bank accounts). However, different motives drive a significant portion of cybercrime, including disrupting service (for example, DDoS attacks to shut down a target organization’s services), stealing confidential data (for example, consumer data and medical information), cyber espionage (corporate trade and military secrets), or illegally exchanging copyrighted materials.
Sources of cybercrime
Insider threats and external attacks are the two primary sources of cybercrime.
Insider threats: Since they might go unnoticed for a long period, this is the most significant cyber risk threatening enterprises today. Employees—or other persons working within the target company, such as former employees, third-party contractors, or business associates—with authorized access to the target organization’s computing systems and/or information about its cybersecurity procedures and defenses—commit insider attacks. This is exemplified by economic espionage.
External attacks: These attempts are typically carried out by skilled hackers who operate from outside the target company. These are the most typical types of cyberattacks against organizations all across the world. A black hat hacker may attempt to enter the target company’s networks from another country to get illicit access. To aid their unlawful access, external attackers may gain information about the target corporation’s security systems from an insider (disgruntled staff member).
Computers in cybercrimes
Cybercrime may be classified into three types based on how a computer was used to commit a crime.
The computer is used as a weapon in the commission of a crime. Launching denial-of-service (DoS) attacks or delivering ransomware are two examples.
Crime has been committed against a computing device. Obtaining illegal access to a target computer, for example.
The computer is used to aid in the commission of a crime. Using a computer to keep incriminating data or communicate with other criminals online, for example.
Example of cybercrime: Various types of computer intrusions result in various types of undesirable results. For example, certain cyberattacks may damage or destroy the operating system, compelling you to reinstall it. Another type may try to steal your passwords and login details. Other assaults, on the other hand, may not completely damage your computer, but they will track your online activities and jeopardize your privacy. Criminals are more sophisticated than ever, and harmful software is more complicated than ever. Modern malware may infect a computer and remain undetected for a long time. Rather than inflicting harm on your computer, the majority of intrusions these days are carried out to steal money, acquire access to personal information, or obtain login credentials. Cybercrime, like traditional crime, may be divided into a variety of categories depending on the motivation of the criminals.
Digital forensics categories
Digital forensics can be classified based on the source of the obtained digital evidence. The collection of digital artifacts contained on the target computer device, which can be used as evidence in court, is referred to as digital evidence, as presented in figure 1.1.
Figure 1.1: Types of digital forensics
Computer forensics
This is the most common type of digital forensics; it involves investigating digital evidence on laptops, desktops, and storage devices such as USB drives, SD cards, system memory (RAM), operating systems, and application logs and traces. The primary goal of this type of investigation is to retrieve deleted data from the target device’s storage and examine it for incriminating or vindicating evidence.
Mobile forensics
Mobile forensics is a subset of digital forensics that specializes in gathering data from mobile devices. A mobile device is any computing device (such as phones, smartphones, tablets, and wearable devices such as smartwatches) that can make phone calls through traditional communication networks. Such gadgets are usually geolocation-aware, which means they have a GPS or other satellite positioning system built-in. Because of the extensive usage of mobile technology among customers globally, mobile forensics will soon supersede existing methods of digital forensics.
Network forensics
This field of digital forensics entails monitoring and analyzing network traffic to extract evidence, such as the source of a network breach, or to identify intrusions. Data flow via networks can be gathered in bulk in real-time and stored for later analysis. Alternatively, it can be reviewed in real-time with the option of preserving chosen chunks of relevant events for later study (this option requires less storage space). Unlike other types of digital forensics, network forensics focuses solely on volatile live data.
Database forensics
The analysis of data and information held in databases such as Microsoft SQL Server, Oracle, MySQL, and others is known as database forensics. Database forensics looks at who has access to a database and what actions are made to spot malicious behavior.
Forensic data analysis
This analysis is capable of reviewing corporate data to prevent and identify financial criminal fraud. To identify and prevent corporate resource misuse, it searches for relevant patterns, combines data assets, and compares them to past findings. E-mail forensics, cloud storage forensics, forensics for specific applications such as Web browsers, file system forensics (FAT, NTFS, or EXT), hardware forensics, multimedia forensics (text, image, audio, or video), and live volatile or RAM forensics are all small sub-branches of the main types already mentioned.
Digital forensics users
Digital forensics can be used for a variety of scenarios across almost all sectors and businesses. This science has grown more integrated across other domains as a result of the expanding usage of computing technology and internet activities.
Law enforcement
Digital forensics is used by law enforcement authorities to assist them in upholding the law and protecting society and businesses from criminals. Law enforcement agents employ digital forensics in many settings to uncover crimes and connect them to their perpetrators. Most traditional crimes would almost certainly necessitate obtaining digital artifacts from the scene of the crime, such as a USB drive found in a drug dealer’s office, a laptop from a suspect’s home, or a mobile phone confiscated at a murder scene. Law enforcement computer forensics professionals should follow a specified digital forensics procedure while obtaining, evaluating, preserving, and presenting digital evidence.
Civil ligation
Businesses employ digital forensics procedures and methodologies as part of their electronic investigative process in civil litigation to help identify incriminating digital material that may be used as proof in a civil or criminal legal case. Although digital forensics procedures used in civil cases differ from those used in criminal cases in terms of the processes used to gather digital evidence, the scope of the investigation, and the legal ramifications of the case, e-discovery is seen as an essential component of the judicial system. The bulk of business cases is motivated by financial gain. Bribery, tax evasion, thefts of intellectual property or financial assets, fraud, misappropriation of business resources, industrial espionage, and commercial disputes are only a few instances. Other recorded digital crimes include gender, e-mail harassment, age discrimination, and sabotage. Companies employ digital forensics tools as part of their e-discovery process to locate and extract digital evidence to identify the source, entity, or person responsible for such violations. Such investigations may end in the guilty employee being fired, receiving a warning (if the violation was small and insignificant), or being prosecuted if the matter is brought to court. The application of digital forensics in civil litigation is not limited to business cases; it also extends to personal matters such as family conflicts and divorce.
Intelligence and counterintelligence
Intelligence agencies use digital forensics techniques and tools to combat terrorism, human trafficking, organized crime, and the drug trade, among other severe criminal activities. Digital forensics tool helps investigators uncover important information about crime syndicates by monitoring networks, investigating digital devices, or acquiring information about the person of interest from publicly available sources such as social media sites; this process is known as Open Source Intelligence (OSINT), which will be covered in another book soon.
Digital forensics investigation types
According to who is in charge of commencing the inquiry, digital forensic investigations may be divided into two categories:
Public investigation
Private sector investigations
Criminal cases leveraging investigations are handled according to the legal guidelines set out by the appropriate authorities. Law enforcement agencies participate in public investigations, which are conducted under national or state legislation. The three main phases of these investigations are complaint, investigation, and prosecution. Private investigations are commonly conducted by businesses to investigate policy violations, legal problems, unfair dismissal, or the leak of secret information as industrial espionage. Because it is up to each corporation to determine, there are no fixed regulations for conducting such investigations; nonetheless, many companies are already implementing strict internal standards for investigating digital crimes. These procedures are similar to public investigations into crimes in that some cases may be presented to the court and ultimately transformed into official criminal prosecutions. Businesses can reduce liability associated with computer crime by developing a clear policy that is easy to read and comprehend by their employees. A policy like this can also help digital forensics investigations proceed more easily and with less downtime for the company if they are needed. The most important rule that all firm employees should sign is the computer usage policy. This policy outlines how employees may use business IT networks and computer systems and cautions them that they may face legal consequences if they break the guidelines.
Forensics readiness
Forensics readiness refers to an organization’s ability to acquire, retain, secure, and analyze digital evidence in a forensically sound manner. To keep costs down, the procedure should take place without interfering with existing operations. The usage of digital forensics preparation planning in businesses offers many benefits, which are listed as follows:
For instances requiring digital evidence, a quick response time is required. When a data breach or information leak occurs, having a clear e-discovery policy in place can allow businesses to respond promptly and get digital evidence in a forensically sound manner.
The government’s regulations must be adhered to; US Federal Procedures have produced a set of guidelines for parties in legal disputes on how to obtain and manage digital evidence so that it may be used in court. If the case gets to court, forensic readiness will reduce the cost of gathering digital evidence and almost certainly, result in a faster resolution. Increasing the security defenses of the firm. Monitoring endpoint computer usage may uncover dangerous malware, such as ransomware, before the infection spreads to the entire organization’s network, and using forensic readiness will make an organization well-prepared to handle internal and external security incidents and able to identify an attack quickly before it dives deeply into its IT infrastructure (for example, monitoring endpoint computer usage may uncover dangerous malware, such as ransomware before the infection spreads to the entire organization’s network).
Reducing the number of internal attacks, as previously stated, internal threats such as rogue employees are more dangerous than external attacks; the presence of a forensic readiness plan in an organization will make hostile insiders fear being discovered if they participate in illegal behavior.
Increasing the security posture of an organization as a company’s forensic readiness strategy will set it apart as a powerful defender against cyber-attacks. Customers will be more inclined to do business with this organization since their data will be kept private and secure. Investors will also feel secure in the knowledge that their money is protected and that there is a minimal probability that successful attacks on this organization would result in their money being lost.
Type of digital evidence
User-created data and machine-created data are the two most common sorts of digital artifacts.
User-created data
User-generated data is anything created by a person (human) using a digital device. Metadata is data that is included in files created by a computer user; the metadata may be created by the computer user on purpose (for example: author name and e-mail), or it may be generated automatically by the software that created the file, such as captured camera model/type, date and time of clicking the photograph, GPS coordinates of the photograph, and resolution). Metadata should be thoroughly examined throughout any inquiry since it may include important information about the subject at hand. It includes the following, among other things:
Previous backups (including both cloud storage backups and offline backups such as CDs/DVDs and tapes)
Account details (username, picture, and password)
E-mail messages and attachments (both online and client e-mails as Outlook)
Audio and video files
Address book and calendar
Webcam recordings (digital photos and videos)
Content files (for example, MS Office documents, IM conversations, bookmarks), spreadsheets, databases, and any other digitally stored text
Hidden and encrypted files (including zipped folders) created by the computer user
Machine and network-created data
Any data that is automatically generated by a digital device is considered machine/network-created data. It includes the following, among other things:
Configuration files and audit trails, including third-party service providers (for example, Internet service providers (ISPs) often retain customers’ accounts and browser history logs)
Logs on the computer under Windows OS contain the following logs: Logs for application, security, setup, system, forward events, apps, and services
GPS tracking information history
Temporary files
Information from the browser (browser history, cookies, and download history)
In addition to the IP addresses associated with a LAN network and the broadcast settings, devices have Internet protocol (IP) and MAC addresses
Instant messenger history and buddy list (Skype and WhatsApp) (from devices with GPS capability)
Application and Windows history (for example, a recently opened file in MS Office)
Under Windows computers, restore points
E-mail header information
Registry files in Windows OS
Hidden and conventional system files
Printer spooler files
Virtual machines
Surveillance video recordings
Paging and hibernation files and memory dump files
As a result, digital evidence can be defined as any file or data/metadata that is provided in a digital (binary) format and could be used in a trial.
Locations of electronic evidence
Digital evidence is frequently found on hard drives, but as computer technology advances, digital evidence is increasingly discovered in practically all digitally aware devices. The following is a list of the most common types of devices that must be examined for digital evidence:
Systems: Desktops, Laptops, Tablets, Servers, and RAIDs
Network devices: Hubs, switches, modems, routers, and wireless access points
Internet-enabled home automation and IoT devices: Air conditioners and Smart refrigerators
DVRs and surveillance systems
MP3 players
GPS devices
Smartphones
PDA
Game stations—Xbox, PlayStation
Digital cameras
Smart cards
Pagers
Digital voice recorders
Chain of custody
A chain of custody is required for any digital forensic investigation approach. A proper chain of custody should detail how digital evidence was discovered, gathered, transported, researched (analyzed), stored, and maintained by the various parties involved in the