SlideShare a Scribd company logo
n|u Pardhasaradhi.ch
COMPUTER FORENSICS Process Rules Software's  Hardware Steganography Some important windows files Reporting Sites Contents :
n|u Computer Forensics : It is the application of  computer  investigation and analysis techniques to gather evidence It is also called as cyber forensics Goal : The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it. Pardhasaradhi.ch
n|u Preparation Search and seizure Acquisition and Authentication Case storage and Archival  Analysis and Reporting Stages in digital investigation process Pardhasaradhi.ch
n|u Rules of computer forensics :  Rule 1 : Never mishandle Evidence Rule 2 : Never trust the subject operating system Chain of custody Asset tags Crime scene details Ex : Ex : Avoid Live forensics Use drive encryption Check hash value with the image Pardhasaradhi.ch
n|u Rule 3 : Never work on original evidence Rule 4 : Document Every thing Ex : Create a bit stream copy  Do not access the file system during imaging Document the errors while imaging If any If any errors arise while imaging take another copy  Pardhasaradhi.ch
n|u Clone Vs. image : To copy or replicate the entire contents of a hard disk drive by creating an image of the hard disk drive. Hard disk drives are often cloned for batch installation on other computers, particularly those on a network, or for use as backups.  Clone : Image : Some of the image types are dd,E01,smart,ad1,ISO,NRG, Images are locked  format ,these are easy to carry EX: Symantec ghost Clone is used to execute the images Pardhasaradhi.ch
n|u Access data  MAC times Modified  Accessed  Created FTK imager Password recovery toolkit Registry viewer Forensic toolkit Software Forensic Hub Pardhasaradhi.ch
Stego suite Mount image pro Ultimate forensics Tool kit Elcomsoft Helix DD for Linux
n|u Devices used for forensics Shadow device :  write   blocker As an investigative tool, boot the suspect client and connect to their network Allows read commands to pass but by blocks write commands, Hardware Forensic Hub : Faraday bag The product was designed for E items which would isolate it from the networks  Pardhasaradhi.ch
n|u Wde Drive wiper Ex: True crypt whole disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Full Disk Encryption prevents unauthorized access to data storage Wipe all data off of two drives at up to 8 GB per minute  Automatically unlocks and wipes Host Protected Areas  Cut your drive wiping time in half  Very light weight - less than a pound, plus the laptop style power supply  Simple, fast, portable data destruction   Pardhasaradhi.ch
n|u Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination Steganography Pardhasaradhi.ch Alternate Data Streams (NTFS) New Technology File System allows for Alternate Data Streams One file can be a link to multiple Alternate Data Streams of files of any size.
n|u Pardhasaradhi.ch
n|u Importance of windows files Pardhasaradhi.ch Sam SYSTEM32\COFIG User names User information like last logon count ,last login time. Ntldr NTLDR will display the versions of operating systems in a boot menu and waits a specified number of seconds before loading the first in the list System This file will help us to know details regarding the USB connected and exact time stamps for drive operations done index This file will store all the internet related data cookies, Recent history
n|u Making a report for forensic case Executive summary Detailed activity log Proof of  process Forensic image processing Restoration and verification of images Document evidences discovered during analysis Pardhasaradhi.ch
n|u File slack Terminology used Data carving Data carving or File Carving is a powerful tool for recovering files and fragments of files when directory entries are corrupt or missing,  Memory carving is a useful tool for analyzing physical and virtual memory dumps when the memory structures are unknown or have been overwritten.   The data storage space that exists from the end of the file to the end of the last cluster assigned to the file is called "file slack"  Pardhasaradhi.ch Cluster Storage of data in fixed length blocks of bytes called clusters. Clusters are essentially groupings of sectors which are used to allocate the data storage area
Sites: Access data-  www.accessdata.com     --  ace LADS -  www.heysoft.de Elcom soft –  www.elcomsoft.com Helix -  www.e-fense.com/helix / Stego suite –  www.logon-int.com/product.asp I2analyst notebook www.Forensicfocus.com www.computerforensics1.com www.forensics.nl www.blogs.sans.org /computer-forensics/
n|u THANK YOU Pardhasaradhi.ch

More Related Content

PPS
intro to forensics
PDF
Debian Linux as a Forensic Workstation
PPTX
Autopsy Digital forensics tool
PPTX
Memory Forensic - Investigating Memory Artefact
PPT
Ie Storage, Multimedia And File Organization
PPTX
Windows 8 Forensics & Anti Forensics
PPT
File Carving
intro to forensics
Debian Linux as a Forensic Workstation
Autopsy Digital forensics tool
Memory Forensic - Investigating Memory Artefact
Ie Storage, Multimedia And File Organization
Windows 8 Forensics & Anti Forensics
File Carving

What's hot (19)

PDF
2010 2013 sandro suffert memory forensics introdutory work shop - public
PPT
Linux forensics
PDF
Ntfs forensics
PDF
Memory Analysis of the Dalvik (Android) Virtual Machine
PPT
File access methods.54
DOCX
Data hiding and finding on Linux
PPT
File structures
PPT
Computers12 Ch6
PPTX
Group project linux helix
PPT
File organization
PPTX
Forensic imaging tools
PDF
Disk forensics
PDF
Windows 7 forensics -overview-r3
PPT
Linux Forensics
PPT
Computers14 Ch6
PPT
Windowsforensics
PDF
Workshop 2 revised
PPTX
Two-For-One Talk: Malware Analysis for Everyone
2010 2013 sandro suffert memory forensics introdutory work shop - public
Linux forensics
Ntfs forensics
Memory Analysis of the Dalvik (Android) Virtual Machine
File access methods.54
Data hiding and finding on Linux
File structures
Computers12 Ch6
Group project linux helix
File organization
Forensic imaging tools
Disk forensics
Windows 7 forensics -overview-r3
Linux Forensics
Computers14 Ch6
Windowsforensics
Workshop 2 revised
Two-For-One Talk: Malware Analysis for Everyone
Ad

Viewers also liked (20)

PPT
Computer and Communication Networks in ODL
PDF
Suhas desai _open_source_data_security - ClubHack2009
PPTX
Servidor DHCP Ubuntu 16.04
PDF
Security & Cryptography In Linux
PDF
Apache web server tutorial for linux
DOCX
Dhcp in linux
PDF
Steganography: Hiding information in past, present and future.
PPTX
Humla workshop on Android Security Testing - null Singapore
PDF
Deploy Linux servers at scale
PPTX
Identifying XSS Vulnerabilities
PPTX
Mail server configuration
PPS
network security, cryptography,steganography
PDF
Video Steganography
PDF
India legal 31 october 2014
PPTX
Steganography and Steganalysis
PPTX
Image Steganography using LSB
PPTX
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 7 - Compute...
PPTX
Cryptography & Steganography
PPT
Steganography presentation
Computer and Communication Networks in ODL
Suhas desai _open_source_data_security - ClubHack2009
Servidor DHCP Ubuntu 16.04
Security & Cryptography In Linux
Apache web server tutorial for linux
Dhcp in linux
Steganography: Hiding information in past, present and future.
Humla workshop on Android Security Testing - null Singapore
Deploy Linux servers at scale
Identifying XSS Vulnerabilities
Mail server configuration
network security, cryptography,steganography
Video Steganography
India legal 31 october 2014
Steganography and Steganalysis
Image Steganography using LSB
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 7 - Compute...
Cryptography & Steganography
Steganography presentation
Ad

Similar to Introduction to Forensics and Steganography by Pardhasaradhi C (20)

PDF
Digital Forensics
PPTX
Latest presentation
PDF
Watching the Detectives: Using digital forensics techniques to investigate th...
PPTX
Computer forensics libin
PDF
CNIT 121: 11 Analysis Methodology
PDF
AntiForensics - Leveraging OS and File System Artifacts.pdf
PDF
Accessing Forensic Images
PPT
Role of a Forensic Investigator
PPTX
Computer forensics and its role
PDF
CNIT 152 11 Analysis Methodology
PPT
Lecture 8 comp forensics 03 10-18 file system
PPT
Digital forensics
PPT
Digital Forensics
PPT
Introduction to computer forensic
DOCX
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
PDF
computerforensics-140529094816-phpapp01 (1).pdf
PPTX
Computer forensics
PPT
Codebits 2010
PDF
Guide to Computer Forensics'.pdf
PDF
11 Analysis Methodology
Digital Forensics
Latest presentation
Watching the Detectives: Using digital forensics techniques to investigate th...
Computer forensics libin
CNIT 121: 11 Analysis Methodology
AntiForensics - Leveraging OS and File System Artifacts.pdf
Accessing Forensic Images
Role of a Forensic Investigator
Computer forensics and its role
CNIT 152 11 Analysis Methodology
Lecture 8 comp forensics 03 10-18 file system
Digital forensics
Digital Forensics
Introduction to computer forensic
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
computerforensics-140529094816-phpapp01 (1).pdf
Computer forensics
Codebits 2010
Guide to Computer Forensics'.pdf
11 Analysis Methodology

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation theory and applications.pdf
Spectroscopy.pptx food analysis technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
sap open course for s4hana steps from ECC to s4
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
MYSQL Presentation for SQL database connectivity
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Per capita expenditure prediction using model stacking based on satellite ima...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Programs and apps: productivity, graphics, security and other tools
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation_ Review paper, used for researhc scholars

Introduction to Forensics and Steganography by Pardhasaradhi C

  • 2. COMPUTER FORENSICS Process Rules Software's Hardware Steganography Some important windows files Reporting Sites Contents :
  • 3. n|u Computer Forensics : It is the application of computer investigation and analysis techniques to gather evidence It is also called as cyber forensics Goal : The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it. Pardhasaradhi.ch
  • 4. n|u Preparation Search and seizure Acquisition and Authentication Case storage and Archival Analysis and Reporting Stages in digital investigation process Pardhasaradhi.ch
  • 5. n|u Rules of computer forensics : Rule 1 : Never mishandle Evidence Rule 2 : Never trust the subject operating system Chain of custody Asset tags Crime scene details Ex : Ex : Avoid Live forensics Use drive encryption Check hash value with the image Pardhasaradhi.ch
  • 6. n|u Rule 3 : Never work on original evidence Rule 4 : Document Every thing Ex : Create a bit stream copy Do not access the file system during imaging Document the errors while imaging If any If any errors arise while imaging take another copy Pardhasaradhi.ch
  • 7. n|u Clone Vs. image : To copy or replicate the entire contents of a hard disk drive by creating an image of the hard disk drive. Hard disk drives are often cloned for batch installation on other computers, particularly those on a network, or for use as backups. Clone : Image : Some of the image types are dd,E01,smart,ad1,ISO,NRG, Images are locked format ,these are easy to carry EX: Symantec ghost Clone is used to execute the images Pardhasaradhi.ch
  • 8. n|u Access data MAC times Modified Accessed Created FTK imager Password recovery toolkit Registry viewer Forensic toolkit Software Forensic Hub Pardhasaradhi.ch
  • 9. Stego suite Mount image pro Ultimate forensics Tool kit Elcomsoft Helix DD for Linux
  • 10. n|u Devices used for forensics Shadow device : write blocker As an investigative tool, boot the suspect client and connect to their network Allows read commands to pass but by blocks write commands, Hardware Forensic Hub : Faraday bag The product was designed for E items which would isolate it from the networks Pardhasaradhi.ch
  • 11. n|u Wde Drive wiper Ex: True crypt whole disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Full Disk Encryption prevents unauthorized access to data storage Wipe all data off of two drives at up to 8 GB per minute Automatically unlocks and wipes Host Protected Areas Cut your drive wiping time in half Very light weight - less than a pound, plus the laptop style power supply Simple, fast, portable data destruction Pardhasaradhi.ch
  • 12. n|u Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination Steganography Pardhasaradhi.ch Alternate Data Streams (NTFS) New Technology File System allows for Alternate Data Streams One file can be a link to multiple Alternate Data Streams of files of any size.
  • 14. n|u Importance of windows files Pardhasaradhi.ch Sam SYSTEM32\COFIG User names User information like last logon count ,last login time. Ntldr NTLDR will display the versions of operating systems in a boot menu and waits a specified number of seconds before loading the first in the list System This file will help us to know details regarding the USB connected and exact time stamps for drive operations done index This file will store all the internet related data cookies, Recent history
  • 15. n|u Making a report for forensic case Executive summary Detailed activity log Proof of process Forensic image processing Restoration and verification of images Document evidences discovered during analysis Pardhasaradhi.ch
  • 16. n|u File slack Terminology used Data carving Data carving or File Carving is a powerful tool for recovering files and fragments of files when directory entries are corrupt or missing, Memory carving is a useful tool for analyzing physical and virtual memory dumps when the memory structures are unknown or have been overwritten. The data storage space that exists from the end of the file to the end of the last cluster assigned to the file is called "file slack" Pardhasaradhi.ch Cluster Storage of data in fixed length blocks of bytes called clusters. Clusters are essentially groupings of sectors which are used to allocate the data storage area
  • 17. Sites: Access data- www.accessdata.com -- ace LADS - www.heysoft.de Elcom soft – www.elcomsoft.com Helix - www.e-fense.com/helix / Stego suite – www.logon-int.com/product.asp I2analyst notebook www.Forensicfocus.com www.computerforensics1.com www.forensics.nl www.blogs.sans.org /computer-forensics/
  • 18. n|u THANK YOU Pardhasaradhi.ch