Cyber Forensic Investigation Techniques
Introduction:
What
is cyber forensics?
The
practice of gathering and preserving data from a specific computer or device so
that it can be used as evidence in court is known as cyber forensics. Cyber
forensics uses a structured investigation and a recorded chain of evidence to
try to pinpoint precisely what happened on a computer system and who was at
fault.
Why
cyber forensic is important?
The
use of digital evidence in both civil and criminal court proceedings is
protected by cyber forensics. The importance of digital evidence—and the
forensic procedures used to acquire, store, and examine it—in resolving crimes
and other legal issues has grown as computers and other data-gathering tools
are employed in more parts of society.
Types
of cyber forensics:
Database
Forensic: Examining information contained in databases, both
data and associated metadata.
Email
forensic: Recovery and analysis of emails and other
information contained in email platforms such as schedules and contacts.
Malware
Forensic: Scan code to identify possible malicious programs
and analyse their payloads. Such programs may include Trojan horses, ransomware
or various viruses.
Memory
forensics: Collecting information stored in the computer's RAM
and cache memory.
Mobile
forensics: Examining mobile devices to obtain and analyse the
information they contain, including contacts, incoming and outgoing text
messages, images and video files.
Network
forensics: Finding evidence by monitoring network traffic
using tools such as a firewall or intrusion detection system.
Cybercrimes
in general can be classified into four categories:
Individual cybercrimes : It includes cyber defamation, email spoofing, email spamming, cyber stalking and more.
Cybercrime Organization : This type of crime is committed by criminal teams, including hacking, virus attack, email bombing, salami attack, logic bomb, Trojan horse, data manipulation, malware attacks, and denial of service attacks.
Property cybercrime : This type targets assets such as credit card fraud, theft of internet time and intellectual property rights.
Cybercrime society : This is the most dangerous form of cybercrime as it includes cyber terrorism, counterfeiting, web jacking.
How
does computer forensics work?
Forensic
investigators typically follow standard procedures that vary depending on the
context of the forensic investigation. These procedures involve the following
three steps:
Data
Collection: It is necessary to get electronically
stored data in a way that preserves its integrity. To avoid unintentional
contamination or tampering, this frequently involves physically isolating the
device under inquiry. Examiners make a digital copy of the storage media of the
device, often known as a forensic image, and then lock the original device in a
safe or another secure container to preserve its original state. A digital copy
is used for the investigation. In other situations, publicly accessible data
can be used for forensic purposes, such as Facebook posts or public Bitcoin
charges for the purchase of illegal items or services advertised on the Vicemo
website.
Analysis:
In a secure environment, investigators examine digital copies of storage media
to collect data for a case. A number of instruments are utilized in this
procedure, including the Wireshark network protocol analyzer and Basis
Technology's Autopsy for hard disk inspection. In order to prevent the computer
from going to sleep while being examined and losing non-volatile memory data
that is lost when the computer turns off or loses power, a mouse shifter is
helpful.
Presentation: Forensic investigators present their findings in court proceedings, where a judge or jury uses them to determine the outcome of a lawsuit. In a data recovery situation, forensic investigators present what they were able to recover from a compromised system.
Techniques forensic investigators use:
Investigators
examine the copy they made from the infected device using a variety of methods
and specialized forensic software. They look for copies of deleted, encrypted,
or corrupted files in hidden folders and free drive space. In advance of court
proceedings that involve discovery, depositions, or actual litigation, any
evidence discovered on the digital copy is thoroughly documented in a discovery
report and checked against the original device.
Reverse
steganography: Data can be hidden using steganography
in any kind of digital file, message, or data stream. Through analysis of the
data hashing the file included, specialists in computer forensics were able to
recover from the steganography attempt. The image or other digital file may
appear the same before and after if a cybercriminal hides crucial information
inside of it, but the underlying hash or sequence of data that the image
represents will change.
Stochastic
Forensic Science: Without using digital artifacts, the
investigators in this case analyze and reconstruct digital activities. Data
alterations that result from digital processes are called artifacts. Digital
forensic evidence such as modifications applied to file characteristics during
data theft is included in artifacts. In hacking investigations where the
attacker is thought to be an insider who might not leave behind digital
evidence, stochastic forensics is frequently used.
Cross-drive
analysis: This method recovers, analyzes, and retains
information important to an investigation by matching and comparing information
located on multiple computer units. The information on other units is compared
to suspicious events to look for patterns and give context. This is sometimes
known as anomaly detection.
Live
analysis: Using system tools on the computer, the computer is
analyzed from the operating system while the computer or device is in use.
Analysis is concentrated on volatile data, which is frequently kept in RAM or
cache. In order to maintain the credibility of the chain of evidence, several
tools used to retrieve volatile data demand that the computer be in a forensics
lab.
Deleted
file recovery: This method involves searching through
the computer's memory and operating system for parts of files that have been
partially erased in one location but have remains in another. This is sometimes
known as file carving or data carving.
Top
12 cybercrime investigation and forensic tools :
- SIFT Workstation
- The Sleuth Kit
- X-Ways Forensics
- CAINE
- PALADIN
- ProDiscover Forensic
- Digital Forensics Framework
- Oxygen Forensic Detective
- Open Computer Forensics Architecture
- Bulk Extractor
- Exif Tool
- SurfaceBrowser™
Investigating
cybercrime is not a simple science. It requires the right knowledge combined
with various techniques and tools to jump into the digital crime scene
effectively and productively. Investigating officer should be update his/her
knowledge or tools/techniques for analyse case/data. Once you have all this in
hand, you can properly analyse the data and investigate the root cause as well
as track down the perpetrators behind different types of cybercrime.
References:
- https://www.techtarget.com/searchsecurity/definition/computer-forensics
- https://cybertalents.com/blog/what-is-cyber-crime-types-examples-and-prevention
- https://securitytrails.com/blog/cyber-crime-investigation
- https://www.cybernx.com/b-5-benefits-of-digital-forensics

Comments