Advisor :
Assoc. Prof. Melih Kırlıdoğ
Computer forensics
Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic
science pertaining to legal evidence found in computers and digital storage media. The goal of
computer forensics is to examine digital media in a forensically sound manner with the aim of
identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.
A common technique used in computer forensics is the recovery of deleted files. Modern forensic
software have their own tools for recovering or carving out deleted data. Most operating systems and
file systems do not always erase physical file data, allowing investigators to reconstruct it from the
physical disk sectors.
Techniques used in forensics analysis
Properties of the application
• Program reads the hard disk by the given address .
• Program may zero down the hard drive with linux dd
if=/dev/… command .
• Program may show all cluster chain of any file even if the
file has been recently fragmented .
• Our aim in safe delete is to protect individuals’ privacy
against unauthorized access. Our application finds the
selected file’s cluster numbers from the FAT, then
overwrites on them as many times as the user desires, for at
least 3 times, 1st with zeros then FFs then with random
characters, which makes it impossible to recover even with
the latest and most expensive data recovery methods.
• Usb flash disks are not standard in the market
• When formatted in different FAT32 / FAT16 system FAT
location differs dramatically
• Different sizes of flash disks gave different results
• Flash disks in the market are usually low quality and most of
them have hidden bad sectors which made our job harder
• Some bugs and minor differences in Linux / Ubuntu versions
• Application gave us hard time between desktop and laptops
• Different C compilers gave us different results while
calculating sector / cluster numbers
• Being not very familiar in Unix / Linux environment
• Not many resources available in forensics programming
Difficulties encountered during programming
Fragmented Cluster Chain
Cluster Chain on Fat 32
Prepared by
Abdurrahman Aktaş
Mohammad kema Al-Turk
Design of the applicaiton according to fat data sturucture algorithms

More Related Content

PPTX
Operating system
PDF
PPT
Basic comp oper
PPT
Basic comp oper
PPT
System software os system and utility ggood
PPTX
Beauty of open source in cyber forensics
DOC
Unit IV with Answers
PPTX
541networking
Operating system
Basic comp oper
Basic comp oper
System software os system and utility ggood
Beauty of open source in cyber forensics
Unit IV with Answers
541networking

What's hot (18)

PPTX
541networking
PPTX
Introduction to computer lec (4)
PPTX
Evolution of operating system
PDF
Lecture 6
PPTX
K04 software
PPTX
L7 operating system
PPTX
Ingles sena do
PPTX
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
PPTX
The info system infs429
PPTX
Operating Systems 1: Syllabus
PPTX
Module 2
PPT
Network operating systems
PPT
Operating system.
PPTX
A presentation on system software
PPTX
Computers and more
PPTX
The different operating system
PPTX
The Computer
PPTX
Ingles sena b
541networking
Introduction to computer lec (4)
Evolution of operating system
Lecture 6
K04 software
L7 operating system
Ingles sena do
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
The info system infs429
Operating Systems 1: Syllabus
Module 2
Network operating systems
Operating system.
A presentation on system software
Computers and more
The different operating system
The Computer
Ingles sena b
Ad

Viewers also liked (20)

PPTX
PACE-IT: Storage Area Networks - N10 006
PPTX
PACE-IT, Security+ 2.5: Incident Response Concepts
PPTX
Pace IT - Secure Mobile Devices
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PPTX
PACE-IT: Troubleshooting Hard Drives and Raid
PPTX
PACE-IT: Network Hardening Techniques (part 2)
PPTX
PACE-IT, Security+1.3: Cloud Concepts
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PPTX
PACE-IT: Basic Forensic Concepts
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PPTX
PACE-IT: Network Hardening Techniques (part 3)
PPTX
PACE-IT: Common Network Vulnerabilities
PPTX
PACE-IT: WAN Technologies (part 1) - N10 006
PPTX
PACE-IT: WAN Technologies (part 2) - N10 006
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 2)
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT: Storage Area Networks - N10 006
PACE-IT, Security+ 2.5: Incident Response Concepts
Pace IT - Secure Mobile Devices
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT: Basic Forensic Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Common Network Vulnerabilities
PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+2.6: Security Related Awareness and Training
Ad

Similar to Forensics Analysis (20)

PPT
Role of a Forensic Investigator
PPT
Computer Software and it's various types
PPT
PPTX
Computer systems
PPTX
Distributive operating system
PPT
Unix and its Components
PDF
Poking The Filesystem For Fun And Profit
PDF
File000173
PPTX
JULY-DEC_2023_BSCBT_3_SEM_V9_BSCBT301_BSCBT301_Fundamentals_of_IT_Unit_2__Ppt...
PPT
PDF
Computer Forensic
PPTX
OS- Introduction to opertaing systems.pptx
PPTX
Operating system of computer
PPTX
Computer Forensics and investigation module 3
PPTX
Operating system
PDF
Introduction to os module 1 pdf operating system
PPTX
operatinndnd jdj jjrg-system-1(1) (1).pptx
PDF
Operating system
PPT
Fs Ch 18
PDF
Lec9chap8f04
Role of a Forensic Investigator
Computer Software and it's various types
Computer systems
Distributive operating system
Unix and its Components
Poking The Filesystem For Fun And Profit
File000173
JULY-DEC_2023_BSCBT_3_SEM_V9_BSCBT301_BSCBT301_Fundamentals_of_IT_Unit_2__Ppt...
Computer Forensic
OS- Introduction to opertaing systems.pptx
Operating system of computer
Computer Forensics and investigation module 3
Operating system
Introduction to os module 1 pdf operating system
operatinndnd jdj jjrg-system-1(1) (1).pptx
Operating system
Fs Ch 18
Lec9chap8f04

Recently uploaded (20)

PDF
AI Guide for Business Growth - Arna Softech
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PDF
Workplace Software and Skills - OpenStax
PPTX
Airline CRS | Airline CRS Systems | CRS System
PDF
E-Commerce Website Development Companyin india
PDF
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
Practical Indispensable Project Management Tips for Delivering Successful Exp...
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PDF
BoxLang Dynamic AWS Lambda - Japan Edition
PPTX
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
PDF
novaPDF Pro 11.9.482 Crack + License Key [Latest 2025]
PPTX
Lecture 5 Software Requirement Engineering
PDF
DNT Brochure 2025 – ISV Solutions @ D365
PPTX
Trending Python Topics for Data Visualization in 2025
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PPTX
Matchmaking for JVMs: How to Pick the Perfect GC Partner
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
AI Guide for Business Growth - Arna Softech
CCleaner 6.39.11548 Crack 2025 License Key
Workplace Software and Skills - OpenStax
Airline CRS | Airline CRS Systems | CRS System
E-Commerce Website Development Companyin india
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
Wondershare Recoverit Full Crack New Version (Latest 2025)
iTop VPN Crack Latest Version Full Key 2025
Practical Indispensable Project Management Tips for Delivering Successful Exp...
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
BoxLang Dynamic AWS Lambda - Japan Edition
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
novaPDF Pro 11.9.482 Crack + License Key [Latest 2025]
Lecture 5 Software Requirement Engineering
DNT Brochure 2025 – ISV Solutions @ D365
Trending Python Topics for Data Visualization in 2025
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Matchmaking for JVMs: How to Pick the Perfect GC Partner
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
MLforCyber_MLDataSetsandFeatures_Presentation.pptx

Forensics Analysis

  • 1. Advisor : Assoc. Prof. Melih Kırlıdoğ Computer forensics Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. A common technique used in computer forensics is the recovery of deleted files. Modern forensic software have their own tools for recovering or carving out deleted data. Most operating systems and file systems do not always erase physical file data, allowing investigators to reconstruct it from the physical disk sectors. Techniques used in forensics analysis Properties of the application • Program reads the hard disk by the given address . • Program may zero down the hard drive with linux dd if=/dev/… command . • Program may show all cluster chain of any file even if the file has been recently fragmented . • Our aim in safe delete is to protect individuals’ privacy against unauthorized access. Our application finds the selected file’s cluster numbers from the FAT, then overwrites on them as many times as the user desires, for at least 3 times, 1st with zeros then FFs then with random characters, which makes it impossible to recover even with the latest and most expensive data recovery methods. • Usb flash disks are not standard in the market • When formatted in different FAT32 / FAT16 system FAT location differs dramatically • Different sizes of flash disks gave different results • Flash disks in the market are usually low quality and most of them have hidden bad sectors which made our job harder • Some bugs and minor differences in Linux / Ubuntu versions • Application gave us hard time between desktop and laptops • Different C compilers gave us different results while calculating sector / cluster numbers • Being not very familiar in Unix / Linux environment • Not many resources available in forensics programming Difficulties encountered during programming Fragmented Cluster Chain Cluster Chain on Fat 32 Prepared by Abdurrahman Aktaş Mohammad kema Al-Turk Design of the applicaiton according to fat data sturucture algorithms