Computer Forensics Final
Computer Forensics Final
Computer Forensics Final
Prathima Prahlad
Presentation Outline
Preview Computer Forensics Encase Forensic tool kit Encase Features and screenshots Forensic Tool kit Features and screenshots Case Study Conclusion References
Computer forensics
To gather data from evidence recovered at crime scenes. Evidence usually is in digital format and more often than not is sparse. The aim to recover the sparse evidence, link and understand the information. There are tools that are used to understand, decode and help solve crimes using the information.
EnCase
EnCase is a standard, commercially available software program that is specifically designed as a tool for computer forensic investigations. Developed by guidance software. It is used by many law enforcement agencies, which help in solving crimes.
Features EnCase
Supports file types like FAT,NTFS. Security features include protecting files using passwords, encryption. Can combine files to create a common case. Has graphical allocation map showing the disk cluster by cluster.
EnCase - Options
EnCase
EnCase
EnCase not just locates the deleted folders, but also gets back the content. You could read the file back in its original form Encase lets you to copy the folder to any destination.
Forensic Toolkit
Developed by AccessData It is one of the most advanced tools in computer forensics Helps in recovery and management of data There are 4 phases Acquiring, Preserving, Analyzing and Presenting.
Analyzing
To analyze the evidence, FTK uses a variety of tools, including hashing, the Known File FilterTM (KFFTM) database, and searching. Message Digest 5 (MD5) and Secure Hash Algorithm (SHA-1) are the two hash functions available in FTK. Individual files are hashed to compare the results with a known database of hashes, such as KFF. KFF is an FTK utility that compares file hashes against a database of hashes from known files. The purpose of KFF is to eliminate ignorable files or to alert you to known illicit or dangerous files. It also checks for duplicate files. FTK uses dtSearch as its index search engine. dtSearch, one of the leading search tools available, can quickly search gigabytes of text.
Analyzing.
Message Digest 5 (MD5) A 128-bit digital fingerprint based on a file's content that was designed by Ron Rivest of RSA. It takes as input an arbitrarylength file and outputs a fixed-length number referred to as a hash or digest. The number is derived from the input in such a way that it is computationally infeasible to derive any information about the input from the hash. MD5 hashes are used by the KFF to identify known file. Secure Hash Algorithm (SHA-1) A 160-bit digital fingerprint based on a files content that was designed by the National Institute of Standards and Technology (NIST). It takes as input an arbitrary-length file and outputs a fixed-length number referred to as a hash or digest. It is also computationally infeasible to find another file that will produce the same output.
Presenting
FTK presents computer evidence by creating a case report and case log to document the evidence and investigation results. Uses the Report Wizard to create and modify reports. The case log assists in documenting and logging activities during the investigation and analysis of a case. Bookmarks customize graphics references, select file listings, and include supplementary files and the case log can be added in the report.
FTK- Refining
FTK- Status
FTK- Processing
Conclusion
Many researchers believe that computer forensics may play a part in every case that has to be solved. Taking into account the features provided by the two tools, both the tools are essential for a thorough and complete forensic investigation. Research in computer forensics is being done. Government agencies are investing heavily in forensics, to help in solve crime. Many new tools are being developed, to help solve crime.
References
Zhang Yan; Lin Ying; Research on the key technology of secure forensics, 2010 Third international symposium on Intelligent information technology and security informatics. April 2010. Page(s): 649 - 652 Dixon, P.D; An overview of computer forensics, IEEE potentials, Dec 2005. Page(s) 7-10 Liu Zhijun; Wang Ning; Developing a computer forensics program in police higher education, 4th international conference on Computer science and education, 2009. Page(s): 1431 - 1436 Website: accessdata.com Website: mediarecovery.pl
Thank you