Step 2 : Collection & Preservation of evidence
The collecting process in digital forensics is a critical phase of the investigation. It involves the systematic and careful acquisition of digital data from electronic devices or storage media in a manner that preserves the integrity and authenticity of the evidence. The following are the steps involved in the collecting process:
Collection: This step involves the actual acquisition of the data from the device or storage media. This can be done by using a variety of techniques, including
- Imaging: The first step in the collection process is to create a forensic image of the digital device or media that is being investigated. This involves creating an exact copy of the device or media, including all data, file systems, and metadata. The imaging process ensures that the original evidence is preserved and can be examined without altering it.
- Live analysis: In some cases, it may be necessary to conduct a live analysis of the digital device or media in order to collect additional information or to gather volatile data that could be lost during imaging. Live analysis involves examining the operating system and applications in real-time and can include tasks such as searching for open files, network connections, and running processes.
- Remote acquisition: Remote acquisition is a collection method used when the device or media being investigated is located at a remote location. This involves establishing a remote connection to the device or media and creating a forensic image over the network. The remote acquisition can be challenging due to network latency, bandwidth limitations, and security considerations.
- Validation: This step involves verifying the integrity and authenticity of the acquired data. This can be done by comparing the original data with the acquired data to ensure that no changes or modifications were made during the acquisition process.
- Verification of tools and procedures: Forensic tools and procedures should be tested and verified to ensure that they are functioning correctly and producing accurate results.
- Reproducibility: The results of a forensic examination should be able to be reproduced by another examiner using the same tools and procedures.
- Chain of custody: The chain of custody for digital evidence should be maintained throughout the forensic process to ensure that the evidence has not been tampered with or altered.
- Peer review: The results of a forensic examination should be subject to peer review by other experts in the field to ensure that the analysis is sound and valid.
- Standards and guidelines: Digital forensic examiners should adhere to recognized standards and guidelines for forensic analysis, such as those published by the National Institute of Standards and Technology (NIST) or the International Organization for Standardization (ISO).
- Documentation: This step involves documenting the entire collecting process, including the identification of the devices or storage media, the preservation techniques used, the collection techniques used, and the validation process.
NIST SP 800-86, Guide to Integrating Forensic Techniques into Incident Response
Manuals and Guidelines | NIST
ISO/IEC 27037:2012 info_isoiec27037{ed1.0}en.pdf
ISO/IEC 27042:2015
ISO/IEC 27043:2015
Preservation of Evidence
1.Preservation of Evidence: one of the main in the digital forensics process is to preserve the evidence in its original form to ensure that it is not altered or damaged during the investigation. This may involve making a copy of the digital evidence or taking steps to prevent any changes to the original data.
Digital forensics involves the preservation, collection, and analysis of digital data as evidence in a wide range of criminal and civil investigations. The goal of preserving evidence is to maintain its integrity and authenticity, so that it can be used in a court of law.
The following are some best practices for preserving digital evidence:
1. Identify the scope of the investigation: Before starting the investigation, it's important to clearly define the scope of the investigation and the types of evidence that will be collected. This will help ensure that all relevant evidence is preserved and collected.
2. Document the evidence: All evidence collected during the investigation should be properly documented, including where and when it was collected, who collected it, and any other relevant information.
3. Use forensically sound methods: It's important to use forensically sound methods when collecting and analyzing digital evidence. This includes ensuring that the original data is not modified, and that all copies are made using verified and authenticated tools.
4. Preserve the chain of custody: The chain of custody refers to the documentation of all persons who have had custody of the evidence from the time it was collected until it is presented in court. This helps ensure that the evidence is not tampered with or altered in any way.
5. Store the evidence securely: All digital evidence should be stored securely to prevent unauthorized access or modification. This includes storing the evidence in a secure location, using encryption to protect sensitive data, and ensuring that only authorized personnel have access to the evidence.
6. Follow legal and ethical guidelines: Finally, it's important to follow all legal and ethical guidelines when collecting and analyzing digital evidence. This includes obtaining necessary warrants or permissions, and ensuring that the investigation is conducted in an ethical and unbiased manner.
By following these best practices, digital forensics professionals can ensure that evidence is properly preserved and collected, and that it remains admissible in court.
There are a number of tools and techniques used in digital forensics to preserve evidence, including:
1. Imaging tools: These tools create an exact duplicate of a storage device, such as a hard drive, so that the original data can be analyzed without changing it.(4ex: dd tool)
2. Hashing tools: Hashing tools generate a unique "fingerprint" of a file, which can be used to verify that the file has not been altered.(4ex:md5 tool)
3. Data recovery tools: These tools can help recover deleted or lost data, which can be important in an investigation. (4ex: Foremost )
4. Analysis tools: Digital forensics analysts use a variety of tools to analyze data, including forensic software, decryption tools, and other specialized software. (4ex:Autopsy)
5. Chain of custody documentation: Keeping a clear and comprehensive record of the handling of evidence is critical in digital forensics to ensure that the evidence is admissible in court.
It's important to note that the specific tools used in digital forensics will vary depending on the nature of the investigation and the type of evidence being collected.
1. Imaging tools
Imaging tools are software applications used in digital forensics to create exact copies or images of digital media, such as hard drives, memory cards, and other storage devices. These tools create a bit-by-bit copy of the original media, which is then used for analysis and investigation.
1.1 Here are some commonly used imaging tools in digital forensics:
1. dd: dd is a command-line tool used in Linux and other Unix-based operating systems to create images of digital media. It is a simple and powerful tool that can create exact copies of disks, partitions, and files.
Eg. Scenario: we need to clone usb drive
· make sure USB is present with USB 3
· open terminal : $ sudo fdisk -l
· create image using dd command : sudo dd if=/dev/sdb1 of=/home/sansforensics/Desktop/cases/usb_image.img bs=4M
FTK Imager: FTK Imager is a popular imaging tool used in digital forensics. It supports a wide range of file formats and allows investigators to create images of disks, partitions, and individual files. It also has advanced features such as the ability to view and extract data from memory dumps.
· Scenario: we need to dump memory from running suspect machine and finf store password in ram
Eg. https://www.sans.org/blog/forensics-101-acquiring-an-image-with-ftk-imager/
· First download FTK from Accessdata website to windows machine
· Copy the entire "FTK Imager" installation folder (default installation folder is in C:Program FilesAccessDataFTK
· run FTK one victim
· Capture memory
· Open analyze machine
· FTK open memory dump location
· Right-click on ASCII
· Find example www to search open site , password ……
2. Hash image file
In digital forensics, a hashing tool is a software application used to calculate and verify hash values of files, data, and other digital artifacts. Hashing is a process of generating a unique fixed-size digital fingerprint of a file or data set, which can be used to identify and verify the integrity of the original data. Hashing tools are used extensively in digital forensics investigations to verify the authenticity of digital evidence, ensuring that the data has not been tampered with or altered. These tools can also be used to compare the hash values of different versions of the same file, helping investigators to determine if any modifications have been made.
Some commonly used hashing tools in digital forensics include:
· FTK Imager: A popular digital forensics tool that includes a hashing module, allowing investigators to quickly generate hash values for files and data sets.
· Md5sum
· sha256sum
In summary, a hashing tool is an essential component of any digital forensics’ investigation, allowing investigators to verify the integrity and authenticity of digital evidence.
Eg. Scenario: generate a hash value for evidence to make sure no one alter it
1. Md5sum
$ md5sum filename. Extensions
8be0a2700ed6e587ee9c6d5bd89b8ce2 reg.reg
Note : for big file it take time
Eg. Scenario: make sure file content not change: create text file and generate hash value for it then modify file and create new hash the compare:
$ md5sum cv.txt
fd2b2ef1f3f3f7f5da52623f8b84fa3d cv.txt
Change some content
$ md5sum cv.txt
d6b29ea623deb3fdb1a6314be853b032 cv.txt
$ sha256sum cv.txt
27a72ef1f0236d7e3a1d406723f9c58c3427c6979934d4c37fee09f0bb7005e5 cv.txt
$ sha256sum cv2.txt
f137f03fc4543c8158b1607012e44e3286bedd280c6795a9c5fb4727b429589d cv2.txt
Note that the likelihood of two different files having the same hash value is extremely low, which makes hash values a useful tool for verifying the integrity of files.
Compare 2 results
To compare two MD5 checksum results, you can follow these steps:
You can compare the checksums manually by visually inspecting them, or you can use a software tool to compare them automatically. Most file comparison tools have the ability to compare checksums, and they will indicate if the checksums are identical or different.
It's worth noting that MD5 checksums are not 100% reliable for verifying the integrity of files, as it is possible for two different files to have the same MD5 checksum (known as a "collision"). For stronger security, you can use a more secure hashing algorithm like SHA-256.
$ diff -u cv.txt cv2.txt
If no result that mean two files identical
To perform the verification function using md5sum, simply run the command:
$ md5sum cv.txt > cv.md5
$ md5sum -c cv.md5
cv.txt: OK
when we change some content:
$ md5sum -c cv.md5
cv.txt: FAILED
md5sum: WARNING: 1 computed checksum did NOT match
3. Data recovery tools
In the context of digital forensics, data recovery tools can be useful in recovering evidence that has been deleted or damaged on a digital device. Some commonly used data recovery tools in digital forensics include:
FTK Imager: FTK Imager is a free data recovery tool that can be used to create forensic images of a device, allowing investigators to analyze the data without risking the integrity of the original data. It can also be used to recover deleted or damaged files.
EnCase: This is a popular forensic tool that can be used to recover data from a variety of devices, including computers, smartphones, and tablets. EnCase is known for its advanced file carving capabilities, which allow it to recover data even if the file system has been damaged or deleted.
Recuva: Recuva is a free data recovery tool that is useful for recovering deleted files from a variety of devices, including hard drives, memory cards, and USB drives. It is easy to use and can recover a wide range of file types.
· TestDisk: TestDisk is an open-source data recovery tool that can be used to recover lost partitions and repair damaged file systems. It can also be used to recover deleted files from a variety of devices, including hard drives, USB drives, and memory cards.
PhotoRec: PhotoRec is another open-source data recovery tool that is useful for recovering deleted files, particularly photos and videos. It can be used to recover data from a variety of devices, including hard drives, memory cards, and USB drives.
E.g: Scenario : check USB for deleted file include Arabic word and ISO image
· FTK Imager
· Add evidence item
· Select Physical drive
· Select USB
· Browse to root
· Select file with red cross
· Export files
· Select location
Recuva: is windows tools https://recoverit.wondershare.net/ad/data-recovery.html?gclid=CjwKCAiAr4GgBhBFEiwAgwORreArYxolXEAnPyIsFgsi0rlfBcqNO07joHKm095LHb8qQoOnCaBs3BoC0gQQAvD_BwE
Test Disk
$sudo fdisk -l
$ sudo testdisk /dev/sdb1
$ select un deleted
***PhotoRec, its recovery many types of files.
$sudo fdisk -l
$ sudo photorec /dev/sdb1
Comments
Post a Comment