/
Cyber forensics principles Cyber forensics principles

Cyber forensics principles - PowerPoint Presentation

KingOfTheWorld
KingOfTheWorld . @KingOfTheWorld
Follow
343 views
Uploaded On 2022-08-03

Cyber forensics principles - PPT Presentation

31 July 2020 1 Jayaram P CDAC 31 July 2020 2 Plan Cyber Crime Cyber Forensics Steps Live Forensics 31 July 2020 3 31 July 2020 4 31 July 2020 5 31 July 2020 6 31 July 2020 7 ID: 933265

tool july tools forensics july tool forensics tools live evidence files data forensic file dump analysis extractor memory computer

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Cyber forensics principles" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Cyber forensics principles

31 July 2020

1

Jayaram

P

CDAC

Slide2

31 July 20202Plan

Cyber Crime

Cyber Forensics StepsLive Forensics

Slide3

31 July 20203

Slide4

31 July 20204

Slide5

31 July 20205

Slide6

31 July 20206

Slide7

31 July 20207

Slide8

31 July 20208

Slide9

31 July 20209

Slide10

31 July 202010

Slide11

31 July 202011

Slide12

31 July 202012

Slide13

31 July 202013

Slide14

31 July 202014

Slide15

31 July 202015

Slide16

31 July 202016

Slide17

31 July 202017

Slide18

31 July 202018

Slide19

31 July 202019

Slide20

31 July 202020

Slide21

31 July 202021

Slide22

31 July 202022

Slide23

31 July 202023

Slide24

31 July 202024

Slide25

31 July 202025

Slide26

31 July 202026

Slide27

31 July 202027

Slide28

31 July 202028

Slide29

31 July 202029

Slide30

31 July 202030

Slide31

31 July 202031

Slide32

31 July 202032

Live Forensics

Slide33

31 July 202033

Need access to the system

Minimize impact on system.

Some tools leave footprint and hence proper audit/notes to be made.

Timely evidence acquisition and analysis.

Live Forensics - Challenges

Slide34

31 July 202034

Retrieval of volatile data

Forensic imaging of live s

ystem

Analysis of evidence collected

Conducting Live

Forensics

Slide35

31 July 202035

Want to catch them “in the act”

See how things change (web pages, file access times, registry, memory, etc.)

Want to understand:

How they got in

What they compromised

Where they are

Who they are

Scenario : Ongoing Crime

Slide36

31 July 202036

System time

Logged-on

user(s)

Open

files

Network

information

Network

connections

Process

information

Process-to-port

mapping

Process memory

Network status

Clipboard contents

Service/driver information

Command history

Mapped drives

Shares

Live Data

Slide37

31 July 202037

Event

logs

Registry

Disks

Non-volatile Data

Slide38

31 July 202038

Memory Acquisition

Dump file

Dump File Analysis

Perform Ram Dump to a file

[Using

Tools like

DumpIt

,

mdd

etc]

Dump file

Analyzed using tools

(

eg.Volatility

,

Win-

LiFT

)

Report Generation

Memory Analysis

Slide39

31 July 202039

Live Forensics Tools

Slide40

31 July 202040

C-DAC’s Win-

LiFT

COFEE(Computer

Online Forensic Evidence Extractor

)

EnCase

Portable

Slide41

31 July 202041

https://cyberforensics.in/

Slide42

31 July 202042

Investigator’s Machine

Investigator’s Machine

Suspect’s Machine

Slide43

31 July 202043

Slide44

31 July 202044

Slide45

31 July 202045

Slide46

31 July 202046

Slide47

31 July 202047

Live Forensic Tools - COFEE

Slide48

31 July 202048

Computer Online Forensics Evidence Extractor

Easy to use

Capture important "live" computer evidence

Special forensics expertise not needed.

Slide49

31 July 202049

Computer Online Forensics Evidence Extractor

Slide50

31 July 202050

Easy to Use

Forensically Sound

Ultra-Portable

Stealth 

Live Forensic Tools - Encase Portable

Slide51

31 July 202051Forensic Tools in

Kali Linux 

Slide52

31 July 202052More than

200 penetration testing tools are packaged in Kali Linux.More than 20

tools for forensics packaged inside Kali Linux.

Binwalk

tool

:

searches a specified binary image for executable code and files.

Bulk extractor tool:

E

xtracts

credit card numbers, URL links, email

addresses etc..

Works

on compressed data and incomplete or damaged data

.

HashDeep

tool:

For hashing

of

files.

Magic rescue tool:

Performs

scanning operations on a blocked device

.

Recovers

files deleted or

from corrupted

partition

.

Guymager

tool:

Used

to acquire media for forensic imagery

Slide53

31 July 202053Pdfid

tool:

Scans pdf files for specific keywords.

7.

Pdf

-parser

tool

:

8.

Peepdf

tool

:

9.

Autopsy tool:

An autopsy is all in one forensic utility for fast data recovery and hash filtering

.

This tool carves deleted files and media from unallocated

space.

10.

img_cat

tool

:

 

Slide54

31 July 202054

Thank

You

jayaram@cdac.in