Cat 2 Computer Forensics
Cat 2 Computer Forensics
i. Identification: Determining the extent of the incident, including identifying the systems,
devices, and data involved.
ii. Preservation: Ensuring the integrity of the digital evidence by preserving it in a forensically
sound manner to prevent any alteration or tampering.
iii. Collection: Gathering relevant data and evidence from various sources such as computers,
servers, mobile devices, and networks.
iv. Analysis: Examining the collected data to uncover any potential evidence related to the
incident, including deleted files, communication logs, timestamps, and digital artifacts.
v. Documentation: Documenting the findings, methodologies, and procedures followed during
the investigation to maintain a clear chain of custody and provide support for any legal
proceedings.
i. Collection: Recording how, when, and by whom the evidence was collected, including
relevant details such as location and condition of the evidence at the time of collection.
ii. Documentation: Providing detailed documentation of every action taken with the evidence,
including any changes made, transfers, access, and analysis conducted. This documentation
often includes timestamps, signatures, and descriptions of the evidence.
iii. Storage: Ensuring that the evidence is stored securely and in a manner that prevents
tampering, alteration, or unauthorized access. This may involve using specialized equipment,
encryption, and access controls.
iv. Transfer: Documenting any transfers of custody between individuals or organizations,
including details of the individuals involved and the reason for the transfer.
v. Authentication: Verifying the authenticity and integrity of the evidence throughout its
lifecycle, including through the use of digital signatures, checksums, and other cryptographic
methods.
Maintaining a controlled environment in the laboratory is crucial for computer forensics investigators
due to several reasons:
Disk Imaging:
Description: Disk imaging involves creating a bit-by-bit copy or "image" of the entire storage
medium, including allocated and unallocated space. This process captures not only the active files
but also deleted or hidden data, preserving the integrity of the original evidence.
Procedure:
Identify the target storage device, such as a hard drive or solid-state drive.
Use specialized forensic software or hardware write-blocking devices to prevent any changes to the
original data.
Create a forensic image of the entire storage device, typically using tools like FTK Imager, EnCase, or
dd (Unix/Linux command).
Verify the integrity of the acquired image using cryptographic hash functions such as MD5 or SHA-
256.
Advantages:
Preserves the original state of the evidence, including deleted or hidden data.
Allows for offline analysis, reducing the risk of altering the original evidence during examination.
Description: Live data acquisition involves collecting volatile data from a running system or device.
This method captures information currently stored in the system's memory (RAM), as well as other
volatile data sources such as network connections and system processes.
Procedure:
Access the target system using appropriate forensic tools or techniques, ensuring minimal disruption
to the system's operation.
Use specialized software tools such as FTK Imager, Volatility, or Belkasoft Live RAM Capturer to
capture volatile data from the system's memory.
Document the system's state, including running processes, open network connections, and other
relevant information.
Preserve the acquired data in a forensically sound manner, ensuring that it can be analyzed without
modification.
Advantages:
Provides real-time information about the system's state, including active processes and network
connections.
Processing a digital crime scene involves a series of steps aimed at systematically collecting,
preserving, and analyzing digital evidence in a manner that maintains its integrity and ensures
admissibility in legal proceedings. Here are the steps typically taken when processing a digital crime
scene:
Secure the physical location of the digital devices to prevent unauthorized access or tampering.
Document the scene thoroughly, including the layout of devices, connections, and any physical
evidence present.
Identify all digital devices present at the scene, including computers, mobile phones, storage devices,
and network equipment.
Document the make, model, serial numbers, and other relevant information about each device.
Take photographs or videos of the scene to document the condition and arrangement of the devices.
Establish a Chain of Custody:
Assign unique identifiers to each piece of evidence and record details of who collected it, when, and
from where.
Maintain a detailed chain of custody log, documenting all transfers and handling of evidence
throughout the investigation.
Prioritize the collection of volatile data, such as system memory (RAM), open network connections,
and running processes, which may be lost upon system shutdown.
Use specialized tools and techniques to capture and preserve volatile data in a forensically sound
manner.
Perform disk imaging or data acquisition to create forensic copies of storage devices, capturing both
active and deleted data.
Use write-blocking devices or software to prevent any changes to the original data during the
acquisition process.
Conduct a thorough analysis of the acquired digital evidence, using forensic tools and techniques to
extract and examine relevant information.
Identify potential artifacts, file metadata, communication logs, and other digital traces that may
provide insights into the crime.
Document Findings:
Document all findings, observations, and analysis results in detail, including timestamps and relevant
metadata.
Prepare comprehensive reports that summarize the investigation process, methodologies used, and
key findings.
Ensure that all investigative procedures adhere to legal requirements, including obtaining necessary
warrants or permissions for evidence collection.
Follow established protocols for handling and preserving evidence to maintain its admissibility in
court.
Windows Registry:
Definition: The Windows Registry is a centralized database used by the Microsoft Windows operating
system to store configuration settings, options, and system information for the operating system and
installed applications.
Structure: It is organized hierarchically into keys, subkeys, and values, similar to a file system. Each
key and value within the registry corresponds to a specific configuration setting or piece of system
information.
Purpose: The Windows Registry is essential for the proper functioning of the Windows operating
system and applications. It contains settings related to user accounts, hardware devices, software
configurations, system policies, and more.
Access: Users can access and modify the Windows Registry using built-in tools such as Registry Editor
(regedit.exe) or programmatically through APIs provided by the Windows operating system.
DOS Registry:
Definition: The term "DOS Registry" is less commonly used and may refer to different concepts
depending on the context.
Historical Context: In the context of older versions of Microsoft Disk Operating System (DOS), such as
MS-DOS, there was no centralized registry database like in modern Windows operating systems.
Configuration Files: Instead of a registry, MS-DOS relied on configuration files, such as CONFIG.SYS
and AUTOEXEC.BAT, to manage system settings, device drivers, and startup procedures.
Simplicity: MS-DOS systems were simpler and lacked the complexity of modern Windows systems, so
there was no need for a centralized registry database to store configuration settings.
Legacy: In modern computing, references to a "DOS Registry" might pertain to historical discussions
or documentation regarding MS-DOS systems and their configuration files, rather than an actual
registry database.
Name two widely used computer forensics tools and briefly explain their primary functions.
EnCase Forensic:
Primary Function: EnCase Forensic is a comprehensive digital forensic investigation tool used by law
enforcement agencies, government organizations, and corporate security teams. Its primary function
is to acquire, analyze, and report on digital evidence from various sources such as computers, mobile
devices, and cloud storage.
Features:
i. Disk Imaging: Allows for the creation of forensic images of storage devices, including both
active and deleted data.
ii. Keyword Searching: Enables investigators to search through acquired data for specific
keywords, phrases, or patterns.
iii. Timeline Analysis: Provides a chronological timeline of events and activities based on
timestamps extracted from digital evidence.
iv. File Carving: Recovers fragmented or deleted files from storage media based on file
signatures and metadata.
v. Reporting: Generates comprehensive reports detailing findings, analysis results, and
evidence artifacts for use in legal proceedings.
Autopsy:
Primary Function: Autopsy is an open-source digital forensic tool used for analyzing disk images and
conducting forensic investigations. It is widely used by forensic examiners, law enforcement, and
cybersecurity professionals.
Features:
i. Disk Imaging and Analysis: Supports the acquisition and analysis of disk images in various
formats, including raw images and those produced by other forensic tools.
ii. Keyword Search and Filtering: Allows for the searching and filtering of files, emails, and
other digital artifacts based on keywords or file attributes.
iii. Timeline Analysis: Provides a timeline view of file activity, user actions, and system events
extracted from the disk image.
iv. Artifact Analysis: Parses and analyzes various artifacts such as internet history, registry
entries, file metadata, and email messages to uncover relevant evidence.
v. Reporting: Generates detailed reports summarizing investigation findings, including
timelines, keyword hits, and extracted artifacts, for documentation and presentation
purposes.
When the Macintosh computer is powered on, the firmware (typically EFI or UEFI) initiates a Power-
On Self-Test (POST).
POST checks the hardware components, including the CPU, RAM, storage devices, and other
peripherals, to ensure they are functioning properly.
If any hardware issues are detected during POST, the computer may display error messages or
audible alerts indicating the problem.
EFI Initialization:
After completing POST, the Extensible Firmware Interface (EFI) or Unified Extensible Firmware
Interface (UEFI) firmware initializes.
EFI/UEFI firmware is responsible for initializing essential hardware components, configuring system
settings, and preparing for the next stage of the boot process.
Boot Loader:
The EFI firmware locates and loads the boot loader, which is typically located on the system's internal
storage device (e.g., SSD or HDD).
On Macintosh computers with Intel processors, the boot loader is typically Apple's own boot loader
called "Boot.efi." On newer Macs with Apple Silicon processors, the boot loader is named "iBoot."
Kernel Initialization:
The boot loader loads the macOS kernel (kernelcache) into memory.
The kernel initializes essential system services, drivers, and subsystems required for the operating
system to function.
Launchd Initialization:
Launchd is responsible for starting and managing system services, daemons, and user applications. It
replaces the traditional init process found in Unix-like operating systems.
After launchd starts, user space processes and services are initialized.
This includes loading system-level daemons, such as network services, file sharing, and user interface
components.
Finally, the graphical user interface (GUI) login window or desktop environment is displayed, allowing
users to log in and interact with the system.
QUESTION NINE(5Marks)
i. Recovery of Deleted Files: Data carving enables forensic analysts to recover files that have
been deleted from storage media. When a file is deleted, its data may still reside on the disk
until it is overwritten by new data. Data carving techniques can identify and reconstruct
these deleted file fragments, allowing investigators to recover potentially valuable evidence.
ii. Identification of Fragmented Files: Files stored on disk may become fragmented over time,
meaning that their data is scattered across multiple non-contiguous sectors. Data carving
algorithms can identify and piece together these fragmented file fragments to reconstruct
the original files, even if the file system metadata does not provide complete information
about their locations.
iii. Extraction of Embedded Files and Objects: Data carving can extract embedded files and
objects from within other files, such as documents, archives, or disk images. This is
particularly useful for recovering attachments from email messages, embedded images from
documents, or hidden data within file formats.
iv. Detection of File Signatures and Magic Numbers: Data carving algorithms often rely on file
signatures or magic numbers—unique patterns or sequences of bytes that identify the
beginning or structure of a file. By scanning the raw data on disk and identifying these
signatures, data carving tools can locate and extract files without relying on file system
metadata.
v. Reconstruction of Corrupted Files: In cases where file system metadata is corrupted or
missing, data carving can be used to reconstruct files based on their content alone. This can
help recover data from damaged or corrupted storage media, allowing investigators to access
potentially valuable evidence.
Explain how file carving can be used to recover graphics files in computer forensics.
File carving can be particularly useful in recovering graphics files in computer forensics due to the
distinct signatures and structures of common graphics file formats. Here's how file carving can be
used to recover graphics files:
Graphics files, such as JPEG (Joint Photographic Experts Group), PNG (Portable Network Graphics),
GIF (Graphics Interchange Format), and BMP (Bitmap), have unique file signatures or magic numbers
at their beginning that identify their file type.
File carving tools scan the raw data on disk, looking for these signatures to identify potential graphics
files.
Graphics files stored on disk may become fragmented over time, meaning that their data is scattered
across multiple non-contiguous sectors.
File carving algorithms can identify and piece together these fragmented file fragments using the
identified file signatures, reconstructing the original graphics files.
Graphics file formats often have recognizable header and footer structures that delineate the
beginning and end of the file.
File carving tools analyze the raw data on disk, searching for these header and footer structures to
delineate the boundaries of graphics files and extract them accordingly.
Content-Based Carving:
In addition to relying on file signatures, file carving tools can perform content-based carving by
analyzing the byte sequences and structures within the raw data.
Graphics files typically have characteristic structures, such as color tables, image data, and metadata
segments, that can be used to identify and extract them from the raw data.
Once potential graphics file fragments are identified and extracted, file carving tools attempt to
reassemble these fragments into complete graphics files.
By analyzing the content and structure of the recovered fragments, file carving tools can reconstruct
the original graphics files, enabling forensic examiners to access and analyze the recovered images.
REFERENCES:
Yusoff, Y., Ismail, R., & Hassan, Z. (2011). Common phases of computer forensics investigation
models. AIRCC's International Journal of Computer Science and Information Technology, 17-31.
Ali, R. R., Mohamad, K. M., Jamel, S. A. P. I. E. E., & Khalid, S. K. A. (2018). A review of digital
forensics methods for JPEG file carving. J. Theor. Appl. Inf. Technol, 96(17), 5841-5856.