diff options
| author | anand <anand.panchdhari@gmail.com> | 2025-11-25 16:28:48 +0530 |
|---|---|---|
| committer | anand <anand.panchdhari@gmail.com> | 2025-11-25 16:28:48 +0530 |
| commit | ecfb1ebe3812067dee1fd5f3537279ab92e017f1 (patch) | |
| tree | ed45f86fa80e9578599c5a1fe0ac46dede768851 | |
| parent | c7b61d3a366a86afc8a1b16373a5e9f7573235fb (diff) | |
Finished
| -rw-r--r-- | questionbank.typ | 514 |
1 files changed, 484 insertions, 30 deletions
diff --git a/questionbank.typ b/questionbank.typ index fe0c1ab..16e7f31 100644 --- a/questionbank.typ +++ b/questionbank.typ @@ -51,7 +51,7 @@ These crimes target a person’s private, financial, health or identity informat A recent example is the widespread phishing-based Aadhaar and PAN data theft incidents in India (2023-2024), where attackers used fake KYC update messages and links to steal citizens’ identity details, bank information, and OTPs. This led to large-scale financial fraud, identity misuse, and unauthorized digital transactions. The attacks specifically targeted individual users, exploiting their trust and lack of awareness. 2. *Cyber crimes against Organisations:* These crimes are aimed at companies and institutions to steal customer data, disrupt operations, or demand ransom. -A major recent example is the Capita data breach (2023), where hackers infiltrated the UK-based outsourcing firm’s systems and accessed data belonging to millions of people, including confidential corporate information and special-category personal data (health and criminal record details). Although individuals were affected indirectly, the primary target was the organisation, which faced operational disruption, financial penalties, and loss of trust. +A major recent example is the Capita data breach (2023), where hackers infiltrated the UK-based outsourcing firm’s systems and accessed data belonging to millions of people, including confidential corporate information and special-category personal data. Although individuals were affected indirectly, the primary target was the organisation, which faced operational disruption, financial penalties, and loss of trust. 3. *Cyber crimes against Government:* These target government agencies, national databases, or critical infrastructure, often putting entire populations at risk. A notable recent example is the Bangladesh Government Birth & Death Registration breach (2023), where weaknesses in a government website exposed personal information of more than 50 million citizens. This incident highlighted how government systems, if poorly secured, can cause wide-scale identity threats, compromise national records, and undermine citizen trust in public digital services. @@ -101,7 +101,7 @@ Professionalism ensures that forensic work maintains accuracy, integrity, and tr - *Maintaining Confidentiality*: Professionals must protect all case-related information from unauthorised disclosure. == Legal Issues: Legal issues directly affect whether evidence is accepted in court and whether the investigation itself is lawful. -- *Search and Seizure Laws*: Investigators must follow proper legal authority (warrants, permissions) before accessing devices or networks; unauthorised search makes evidence inadmissible. +- *Search and Seizure Laws*: Investigators must follow proper legal authority before accessing devices or networks; unauthorised search makes evidence inadmissible. - *Chain of Custody Requirements*: Every transfer of evidence must be documented to prove it was not tampered with. - *Admissibility Rules*: Evidence must meet standards of authenticity, integrity, and relevance. Improper handling or contamination may lead to rejection. - *Jurisdictional Challenges*: Cybercrimes often cross national borders, creating legal conflicts regarding which country’s laws apply. @@ -112,7 +112,7 @@ Legal issues directly affect whether evidence is accepted in court and whether t - *Bias and Objectivity*: Pressure from employers, clients, or law enforcement may influence findings. The expert must avoid bias and maintain neutrality even if results go against expected outcomes. - *Handling Sensitive or Confidential Data*: Access to emails, chats, medical records, or financial information can tempt misuse. The dilemma arises between what is legally required and what is ethically appropriate to view. - *Reporting Unfavourable Findings*: When evidence contradicts the client’s interests, experts may struggle between honesty and professional pressure. - - *Scope Creep*: Investigators may discover evidence unrelated to the case (e.g., personal files or unrelated crimes). Deciding whether to report or ignore such findings can create ethical conflicts. + - *Scope Creep*: Investigators may discover evidence unrelated to the case. Deciding whether to report or ignore such findings can create ethical conflicts. 2. *Professional Responsibilities:* - *Objectivity and Impartiality*: Evidence must be examined without personal bias. Conclusions should be based solely on facts and scientific methods. - *Competence and Skill*: The expert must possess up-to-date technical knowledge, use validated tools, and continuously improve skills to avoid errors. @@ -200,7 +200,7 @@ Legal issues directly affect whether evidence is accepted in court and whether t ) = 11. Importance of boot sector and windows registry == Importance of the Boot Sector - The boot sector is the first sector of a storage device (HDD, SSD, USB) and contains essential information required to start the operating system. It plays a foundational role in the system startup process. + The boot sector is the first sector of a storage device and contains essential information required to start the operating system. It plays a foundational role in the system startup process. 1. *Contains Boot Loader Code*\ The boot sector stores the initial boot program (MBR or VBR). When a computer starts, the BIOS/UEFI loads this code into memory to begin the operating system boot process. If this sector is corrupted, the system will fail to boot. 2. *Stores File System Information*\ @@ -251,19 +251,19 @@ Legal issues directly affect whether evidence is accepted in court and whether t 7. *Target for Malware*\ Many malware programs modify registry keys to persist at startup, hide their presence, or disable security tools. This makes registry examination an essential part of incident response. = 12. Importance of understanding file system in identifying cyber crimes and forensic tracing. -Understanding file systems is a fundamental requirement in digital forensics because every action performed on a computer—saving a file, installing software, deleting data, or running a program—interacts with the file system. Cyber criminals often attempt to hide, modify, or destroy evidence, and only a deep understanding of the file system enables forensic investigators to uncover these traces. +Understanding file systems is a fundamental requirement in digital forensics because every action performed on a computer-saving a file, installing software, deleting data, or running a program-interacts with the file system. Cyber criminals often attempt to hide, modify, or destroy evidence, and only a deep understanding of the file system enables forensic investigators to uncover these traces. 1. *Recovering Deleted or Hidden Data*\ File systems such as FAT32, NTFS, ext4, and APFS manage how files are stored, referenced, and deleted. Even when criminals delete files: - File entries may remain in the file table. - Data may still exist in clusters, slack space, or unallocated space. - - Metadata such as timestamps (created, accessed, modified) may remain intact. + - Metadata such as timestamps may remain intact. Knowing file system behaviors helps investigators retrieve deleted logs, documents, malware, or communication records. 2. *Tracing User Activities Through Metadata*\ File systems store extensive metadata about files, including: - File creation and modification timestamps - Ownership and access permissions - File size and structure - - Alternate data streams (e.g., NTFS ADS) + - Alternate data streams (NTFS ADS) This metadata helps reconstruct user actions, identify tampering, and build a timeline of events critical for cybercrime cases. 3. *Identifying File Tampering and Anti-Forensic Techniques*\ Cyber criminals may use anti-forensic methods such as: @@ -300,31 +300,454 @@ Understanding file systems is a fundamental requirement in digital forensics bec - Hashing ensures data integrity Forensic experts use these features to prove evidence has not been tampered with. = 13. Explain data carving techniques and recovery of deleted graphic files with example scenarios. -== Whys this so big!! + - Data carving is the act of searching for particular strings or bytes within a structure. A hex editor or other data-viewing tools can be used to carve for data. + - The analyst determines a string or binary pattern to search for, then initiates a search across a device or structure for that string or pattern. + - The target can be of whatever scope is appropriate for the task, such as a file, slackspace, unallocated space, a full volume, a memory image, or a swapfile. + - The technique can be used to carve for full files–such as recovering deleted JPG image files; or for records–such as recovering portions of a deleted Windows event log. +== How data carving works + - File Signatures: Every file type has a unique header and footer that can be identified by specialized software. These are called "magic numbers" or "file signatures." Data carving uses these signatures to locate the start and end of files within the raw data. + - Search for Patterns: The process involves scanning the unallocated space or fragmented storage, looking for these specific signatures. Once identified, the tool "carves" out the data between the known start and end points of a file. + - Reconstructing Files: After finding the file's start and end, the carving tool will attempt to reconstruct the file. Even if parts of the file are missing or fragmented, it may still be possible to recover significant portions of the file. +== Data Carving Techniques + 1. Header–Footer Carving: + - This method searches for known file headers and footers that identify file boundaries. For example, a JPEG file typically starts with FFD8 and ends with FFD9 in hexadecimal. The tool extracts all data between these markers. + - Scenario: Recovering images from a formatted memory card in which directory entries are lost, but JPEG signatures remain intact in unallocated sectors. + 2. Header-Only Carving (Fragmented Files): + - If footers are missing, like in cases of fragmentation or partial overwrites, tools rely on the header alone and extract a fixed block size after it or use heuristic rules. + - Scenario: During ransomware analysis, only the beginning of each encrypted JPEG remains. Carvers recover partial images using header-based rules. + 3. Content-Based or Structure-Aware Carving: + - Advanced techniques recognise internal file structure to carve files more accurately. + - Scenario: Recovering photos from a physically damaged SD card where only parts of the file structure remain readable. + 4. Fragment Carving / Reassembly: + - Used when files are stored non-contiguously. Algorithms analyse byte patterns, entropy, and statistical similarities to reassemble fragmented files. + - Scenario: On a large hard drive with heavy fragmentation, images are scattered across sectors. Tools like Scalpel or Foremost reassemble them. + 5. Semantic Carving (Content Validation): + - After extracting data, the carved file is validated by checking if it opens correctly or displays expected structure. + - Scenario: Carved images are verified to ensure they are not random data or corrupted fragments. +== Recovery of graphic files +Graphic files exist in different categories such as bitmap graphics, vector graphics, and metafile graphics, and understanding their structure is essential for recovering deleted images during forensic investigations. +1. *Bitmap graphics* consist of pixels arranged in a grid, where each pixel stores a specific color value. These files are also known as raster images and are arranged in rows to make printing easier. Bitmap files vary in quality based on resolution and color depth. Higher resolutions and greater color depth provide more detail. During recovery, forensic tools look for pixel structures, color patterns, and known file signatures to reconstruct deleted bitmap images. +2. *Vector graphics* store images using mathematical equations, making them scalable without loss of quality. Because they are not pixel-based, forensic recovery focuses on identifying vector instructions and structures rather than pixel grids. +3. *Metafile graphics* combine both raster and vector components. Forensics must handle mixed data-bitmap portions lose resolution when enlarged, while vector portions remain sharp. +4. Graphics files are created and edited using graphics editors like Microsoft Paint, Adobe Photoshop, GIMP, or Illustrator. These tools support various standard formats such as PNG, GIF, JPEG, TIFF, BMP and DXF, HPGL. Some formats are proprietary or obsolete, and forensic investigators may need special software to open them. Unknown files can be identified through online signature databases such as Gary Kessler’s file signature library or Webopedia. +- In recovering deleted graphic files, it is important to understand that format conversion may change metadata or reduce color information. Bitmap and raster images store color based on bits per pixel, and saving them in a format with lower color depth can degrade image quality. +// - Digital photographs, including RAW and EXIF formats, are especially significant in forensics. RAW files store unprocessed image data like a digital negative, offering the highest quality but often requiring manufacturer-specific tools for viewing. EXIF format stores metadata such as camera model, shutter speed, resolution, date, time, and GPS location. Tools such as Exif Reader, IrfanView, Autopsy, and Magnet Axiom extract metadata that helps investigators determine when and where a photo was taken and which device captured it. = 14. Process of forensic imaging using industrial data acquisition tools. -== Even this! -== Why are 13 and 14 2 pages long +Forensic imaging is the process of creating an exact bit-by-bit copy of digital storage media for investigation. Industrial data acquisition tools such as Cellebrite UFED, FTK Imager, EnCase Imager, X-Ways Forensics, Tableau hardware imagers, and write-blockers are used to ensure accuracy, integrity, and legal admissibility. The goal is to acquire data without altering the original source. + 1. *Preparation and Documentation*\ + The investigator begins by documenting the device details such as storage type, serial number, condition, and connection interfaces. Chain of custody is initiated. A secure forensic workstation is prepared with write-blockers and industrial imaging tools. + 2. *Device Isolation and Write-Blocking*\ + The source drive or mobile device is isolated to prevent any accidental write operations. Hardware write-blockers or software write-protection features ensure that no data is modified during acquisition. This guarantees that the original evidence remains untouched. + 3. *Selecting the Acquisition Method*\ + Depending on the device and investigation needs, the tool performs: + - *Physical imaging:* bit-by-bit copy of entire disk including deleted space + - *Logical imaging:* extracts active files and folders + - *Targeted acquisition:* specific partitions or directories + - *Industrial tools* automatically detect supported acquisition modes. + 4. *Using Industrial Imaging Tools*\ + Tools like FTK Imager or EnCase Imager allow the investigator to choose the destination path, image format, and hashing algorithms. The tool reads the source bit-by-bit and writes an exact forensic copy to the destination storage. + 5. *Hash Generation and Verification*\ + Before and after imaging, the tool generates hash values of both original media and the forensic image. Matching hashes confirm that the acquired image is an exact, unaltered replica of the original device. + 6. *Image Integrity Checking*\ + Industrial tools perform automated integrity checks, verify sectors, and log any read errors. Bad sectors or unreadable areas are documented to maintain transparency in the forensic process. + 7. *Documentation and Logging*\ + All actions taken by the imaging tool-start time, end time, hash values, errors, device details-are automatically recorded in a log file. This documentation is essential for legal presentation and court testimony. + 8. *Secure Storage of Forensic Image*\ + The acquired forensic image is stored in a secure repository with controlled access. Backup copies may be created for analysis while preserving the original image as primary evidence. + 9. *Preservation of Original Device*\ + After imaging, the source device is sealed, labelled, and preserved for future verification. Further investigation is performed only on the forensic image, not the original device. = 15. Process of file reconstruction and recovery +File reconstruction and recovery is a key digital forensic process used to restore deleted, damaged, or fragmented files from storage media. When files are deleted, the file system usually removes only directory entries while the actual data remains on disk until overwritten. Forensic tools use low-level analysis, file signatures, metadata, and data patterns to rebuild files back to their usable form. The process generally involves the following steps: + 1. *Identifying File System and Storage Layout*\ + The investigator examines the file system to understand how files are stored, how deletion works, and where unallocated space or slack space resides. This helps determine whether files are contiguous or fragmented. + 2. *Scanning for File Signatures (Header/Footer Examination)*\ + File reconstruction begins by locating known file signatures. Many file types have identifiable headers and footers . Tools scan the entire disk surface-including unallocated space-for these patterns to identify deleted files. + 3. *Carving Data Blocks from Storage*\ + - Once signatures are found, the forensic tool extracts corresponding data blocks. + - Header–footer carving is used when both boundaries exist. + - Header-only carving is used when the file is fragmented or partially overwritten. + - This step reconstructs the raw content of the file. + 4. *Reassembling Fragmented Files*\ + In many cases, files are not stored contiguously. Fragmentation requires the tool to identify and reorder fragments using: + - File structure patterns + - Byte similarity + - Entropy analysis + - Sector sequencing + - Content continuity + 5. *Validating File Structure*\ + Recovered files are checked for internal consistency. For example: + - JPEGs are validated by checking EXIF blocks and segment markers. + - PNGs must have proper chunk structures. + - Documents must match expected XML or binary layout. + - Invalid or corrupted fragments are discarded. + 6. *Metadata Analysis*\ + Tools examine metadata associated with recovered files-timestamps, hash values, EXIF tags, file size, authorship-to confirm authenticity and origin. Metadata also helps link the file to user activities or devices. + 7. *Repairing Partially Damaged Files*\ + If the file is incomplete, tools attempt reconstruction by: + - Rebuilding headers + - Filling missing values + - Repairing internal structure + - Merging partial fragments + - For images, analysts may recover partial pixels or thumbnails. + 8. *Hashing and Integrity Checking*\ + Recovered files are hashed to generate digital fingerprints. Hash values ensure that reconstructed content remains unaltered during subsequent analysis. + 9. *Documentation of Recovery Process*\ + All steps-methods used, tools applied, fragments found, errors, and final reconstruction results-are fully documented. This supports legal admissibility and forensic transparency. + 10. *Exporting and Storing Recovered Files*\ + The reconstructed files are saved in standard formats and stored securely. Original recovered chunks may be preserved for further analysis or verification. += 16. Demonstrate how whole disk encryption affects forensic imaging and retrieval. +Whole Disk Encryption (WDE) encrypts an entire storage device-operating system files, user data, temporary files, and even unallocated space. Tools like BitLocker, VeraCrypt, FileVault, and LUKS transform all disk sectors into unreadable ciphertext. While this protects user privacy, it creates several challenges for forensic imaging and evidence retrieval. + 1. *Imaging Captures Only Encrypted Data*\ + - When a forensic analyst performs a sector-by-sector image of an encrypted disk, the resulting forensic image contains only encrypted ciphertext, not the actual readable files. + - File names, folder structure, metadata, and content remain inaccessible. + - Even deleted data is encrypted, preventing carving or recovery. + 2. *No Access Without Decryption Keys*\ + - Retrieving usable evidence requires: + - User password/PIN + - Recovery keys + - TPM-protected keys + - Keyfiles + - Without these, the forensic image is practically useless because modern encryption cannot be brute-forced. + 3. *Live System Acquisition May Be Required*\ + - If the encrypted machine is powered on and unlocked, investigators often perform live acquisition, because encryption keys reside in RAM. + - Tools extract keys from memory (cold boot attacks, RAM imaging). + - Shutting down the system destroys keys, making data inaccessible. + 4. *Prevents Traditional Data Carving*\ + - Because all sectors are encrypted: + - No recognizable headers. + - No footers or signatures. + - No usable patterns. + - Thus, deleted files cannot be carved or reconstructed until the disk is decrypted. + 5. *Forensic Imaging Still Required for Integrity*\ + - Even though the data is encrypted, forensic imaging is still performed: + - To preserve the exact encrypted state + - To maintain chain of custody + - To enable later decryption if keys are recovered + - To document storage structure and encryption configuration + 6. *Challenges in Metadata Retrieval*\ + WDE encrypts: + - File system metadata + - Timestamps + - Directory entries + - Logs + This prevents timeline analysis, EXIF extraction, access history checks, and file structure inspection until decryption occurs. + 7. *Hardware-Backed Encryption Adds Difficulty*\ + - TPM encryption: + - Stores keys inside hardware + - Relies on boot integrity measurements + - Breaking this protection is extremely difficult without the correct authentication token. + 8. *Cloud-Synced Encrypted Devices Complicate Analysis*\ + Devices using WDE often sync data to cloud services. Encrypted disk contents may differ from cloud-stored versions, requiring separate legal access to cloud accounts for evidence collection. += 17. Process of analyzing network traffic for forensic investigation. +Network traffic analysis is a crucial part of cyber forensic investigations used to detect malicious activity, reconstruct events, and identify attackers. It involves capturing, inspecting, and interpreting packets flowing through a network. The process generally follows these systematic steps: + 1. *Identification of Network Sources and Scope*\ + Investigators begin by identifying what needs to be monitored-servers, routers, firewalls, switches, or endpoints. They determine log sources and define the time window relevant to the incident. + 2. *Capturing Network Traffic*\ + Live packet capture is performed using tools like Wireshark, tcpdump, Tshark, or specialized forensic appliances. Investigators may also analyze previously saved packet capture (PCAP) files. Capture points must be strategically placed to ensure visibility of inbound and outbound traffic. + 3. *Ensuring Integrity of Captured Data*\ + Captured packets are saved in forensic formats. Hash values are generated to ensure the traffic data remains unaltered. Maintaining chain of custody prevents tampering claims. + 4. *Filtering and Session Reconstruction*\ + Raw traffic is large and noisy. Investigators filter packets based on: + - Source/destination IP + - Ports + - Protocols + - Time of communication + They then reconstruct sessions such as HTTP requests, DNS queries, or TCP streams to understand how communication occurred. + 5. *Protocol and Payload Analysis*\ + Each protocol is inspected for anomalies or suspicious behaviour. Examples include: + - Unusual port usage + - DNS tunneling + - Suspicious HTTP POST requests + - Encrypted traffic with unexpected destinations + - Payload inspection reveals evidence of malware downloads, command-and-control communication, or data exfiltration. + 6. *Identifying Indicators of Compromise (IOCs)*\ + Analysts look for: + - Malicious IPs or domains + - Blacklisted URLs + - Known malware signatures + - Strange traffic patterns (spikes, beaconing, repeated failed logins) + These IOCs help trace back intrusions and identify compromised machines. + 7. *Timeline and Event Correlation*\ + Network events are correlated with system logs, firewall entries, authentication logs, and server events. This helps reconstruct the exact sequence of actions taken by an attacker, such as when they entered the network, what they accessed, and how data was transferred. + 8. *Detecting Data Exfiltration*\ + Investigators analyze outbound traffic for unusual uploads, encrypted payloads, or large data transfers to unknown destinations. Frequency analysis and bandwidth evaluation help detect covert exfiltration. + 9. *Analyzing Malware Communication Patterns*\ + If malware is suspected, analysts inspect: + - Repeated periodic connections (beaconing) + - Communication with foreign C2 servers + - Encrypted or hidden channels (VPN, proxies, Tor) + This provides insights into attacker behaviour and intent. + 10. *Reporting and Documentation*\ + After analysis, investigators prepare a detailed report describing tools used, packets analyzed, findings, IOCs, timelines, and conclusions. The report must be clear, legally admissible, and supported by PCAP evidence. += 18. Write the methods and tools used for capturing and analyzing network traffic during forensic investigation. +Network traffic analysis is an essential part of digital forensics used to detect intrusions, trace attackers, and reconstruct malicious activities. The process relies on well-defined methods of capturing traffic and specialized tools for examining the captured data.\ +The methods of Capturing and Analyzing Network Traffic are: + 1. *Packet Sniffing (Live Capture)*\ + - Involves capturing real-time network packets passing through an interface. + - Used to observe ongoing attacks, suspicious connections, or data exfiltration. + - Requires the network card to be in promiscuous mode. + 2. *Port Mirroring / SPAN (Switch Port Analyzer)*\ + - Traffic from one or more switch ports is mirrored to a monitoring port. + - Allows investigators to view all traffic flowing through a switch segment. + - Common in enterprise environments. + 3. *Network Tap*\ + - A dedicated hardware device placed between network links to copy traffic without interfering. + - Provides clean, complete packet capture. + - Ideal for forensic-grade monitoring. + 4. *Log Collection and Analysis*\ + - Captures network activity through logs rather than raw packets. + - Firewall logs, IDS/IPS logs, router logs, proxy logs. + - Useful for long-term investigations or when packet capture isn't possible. + 5. *Full Packet Capture (FPC)*\ + - Captures every packet, including headers and payloads. + - Enables deep analysis and session reconstruction. + - Storage-intensive but forensically powerful. + 6. *Flow-Based Monitoring*\ + - Captures metadata rather than full packets. + - Useful for detecting scans, anomalies, and large-scale data transfers. + - Less storage but limited detail. + 7. *Deep Packet Inspection*\ + - Analyzes packet content, protocols, and payloads. + - Detects hidden channels, malware signatures, and encrypted tunnels. + - Often used by IDS/IPS systems. +Tools used for network traffic capture and analysis are: + 1. *Wireshark*\ + - Industry-standard packet analysis tool. + - Supports live capture and PCAP analysis. + - Provides protocol decoding, filtering, and session reconstruction. + 2. *Tcpdump / Tshark*\ + - Command-line packet capture tools. + - Useful for quick capture, automation, and remote forensic work. + - Output stored as PCAP files for later analysis. + 3. *Network Miner*\ + - Forensic network analysis tool. + - Extracts files, images, credentials, and metadata from PCAP captures. + - Useful for reconstructing attacker activities. + 4. *Suricata / Snort*\ + - IDS/IPS systems used to detect malicious traffic. + - Provide alerts, signatures, flow data, and logs useful in forensic analysis. + 5. *Zeek (formerly Bro)*\ + - Network security and monitoring framework. + - Logs detailed behavior of network activities. + - Excellent for timeline reconstruction and anomaly detection. + 6. *NetFlow and IPFIX Tools*\ + - Tools like SolarWinds NetFlow Analyzer, NfDump, Elastiflow parse flow records. + - Help identify large transfers, scanning patterns, or lateral movement. + 7. *Fiddler / Burp Suite*\ + - Used to capture and analyze HTTP/HTTPS web traffic. + - Useful in cases of web attacks, MITM analysis, and API inspection. + 8. *Hardware Taps and SPAN Tools*\ + - Devices like Garland TAPs, Dualcomm, NetScout are used for clean packet acquisition. + - Provide tamper-proof capturing without affecting traffic flow. + 9. *Security Information and Event Management (SIEM) Systems*\ + - Tools like Splunk, ELK Stack, QRadar, ArcSight collect and correlate network logs. + - Enable large-scale forensic analysis and event correlation. += 19. Explain malware analysis and identify ways to trace data hiding techniques with network flows. +== 1. Malware Analysis +Malware analysis is the process of examining malicious software to understand its behaviour, purpose, and impact on a system. It helps forensic investigators identify how malware infects a device, what data it targets, and how it communicates with attackers. Malware analysis supports incident response, evidence collection, and threat detection. + 1. *Static Analysis*\ + The malware is examined without executing it. Investigators inspect file headers, strings, hashes, and API calls to identify suspicious functions or embedded resources. Static analysis is useful for quick identification of malware families and their capabilities. + 2. *Dynamic Analysis*\ + The malware is executed in a controlled sandbox environment to observe real-time behaviour such as file creation, process injection, registry changes, and network communication. This reveals how the malware interacts with the system. + 3. *Code/Reverse Engineering*\ + Advanced analysis uses tools like disassemblers and debuggers to study the internal code. Reverse engineering helps uncover hidden logic, encryption routines, anti-forensic methods, and persistence mechanisms. +== 2. Tracing Data Hiding Techniques +Attackers commonly hide data to avoid detection and forensic analysis. They exploit hidden storage areas not included in conventional searches. Three major areas used for hiding data are: + 1. *Host Protected Area (HPA)*\ + - HPA is a hidden part of a hard disk that is not normally visible to the operating system. + - Attackers can store confidential files or malware components in the HPA, making them invisible to standard forensic tools. + - Traditional imaging tools may skip the HPA unless explicitly instructed. + - If malware executes from HPA, investigators may detect suspicious outbound connections or C2 communication even though the file itself is hidden on disk. + 2. *Slack Space*\ + - Slack space is the unused portion of a cluster between the end of a file and the end of the allocated block. + - Hackers use it to hide fragments of text, images, or small pieces of malware. + - Since slack space isn't normally visible in the file listing, hidden data can remain undetected. + - Recovered slack-space data may reveal configuration files, IP addresses, or URLs that point to malicious network flows. + 3. *Alternate Data Streams (ADS)*\ + - ADS is a feature of the NTFS file system that allows additional data to be stored in a file without changing its visible size. + - Attackers exploit ADS to hide executables or scripts behind innocent-looking files. Example: notepad.txt:hidden.exe. + - Windows Explorer does not show ADS content, making it an effective hiding place. + - Hidden malware stored in ADS may generate abnormal network flows-DNS queries, TCP connections, or data exfiltration-despite the main visible file appearing harmless. +== 3. How Network Flow Analysis Helps Detect Hidden Data +Even though the hidden content is stored in HPA, slack space, or ADS, malware must still communicate to perform actions like exfiltration or receiving commands. Network flows can reveal: + - Unusual outbound traffic to unknown IP addresses + - Repeated beaconing to command-and-control servers + - DNS or HTTP requests from processes whose files appear legitimate + - Sudden spikes in data upload despite no visible file activity + - Traffic associated with hidden executables +By correlating network behavioural anomalies with disk-level findings, investigators can uncover hidden data that traditional scanning would miss. += 20. Phases of malware analysis and methods used for detecting hidden or embedded data. +== 1. Phases of Malware Analysis +Malware analysis is carried out in a structured manner to understand how malicious software behaves, spreads, and impacts a system. The major phases are: + 1. *Preliminary Analysis*\ + - In this initial phase, investigators examine the malware file without executing it. + - Checking file hashes, size, headers, and metadata + - Extracting readable strings + - Identifying suspicious API calls + - This gives a quick overview of malware type and potential capabilities. + 2. *Static Analysis*\ + - A deeper non-executable examination of the binary. + - Disassembly to view code instructions + - Understanding logical flow, functions, and algorithms + - Identifying embedded resources like URLs, IPs, or encryption keys + - Static analysis is useful for signature creation and detecting obfuscation. + 3. *Dynamic Analysis*\ + - The malware is executed inside a controlled sandbox environment. + - Observing file system changes + - Monitoring processes and registry modifications + - Tracking network activity such as beaconing or C2 communication + - This reveals real behavior and helps detect persistence mechanisms. + 4. *Code/Reverse Engineering*\ + - The most advanced phase, performed when deeper insights are needed. + - Step-by-step debugging + - Identifying encryption routines, anti-debug tricks, packing, and hidden logic + - Recovering hidden strings and algorithms + - Reverse engineering is crucial for understanding complex malware like ransomware or rootkits. +== 2. Methods Used for Detecting Hidden or Embedded Data +Attackers often hide data inside areas not examined by normal tools. Forensics relies on specialized techniques to uncover such concealed information. + 1. *Host Protected Area Analysis*\ + - The HPA is a hidden region on a disk not normally accessible by the OS. + - Attackers store hidden files or malware components here. + - Tools must explicitly scan for HPA regions since traditional imaging may skip them. + 2. *Slack Space Analysis*\ + - Slack space is the unused portion of a disk cluster after the end of a file. + - Hackers hide small fragments of data here. + - Forensic tools scan slack space to extract such embedded content. + 3. *Alternate Data Streams in NTFS*\ + - NTFS allows files to carry extra data streams without affecting visible size. + - Attackers hide executables or scripts using syntax like: + ```bash file.txt:hidden.exe``` + - ADS is invisible to standard file listings and must be detected using specialized NTFS analysis tools. + 4. *Steganography Detection*\ + - Embedded data may be hidden inside images, audio, or video. + - Detection involves: + - Checking file size anomalies + - Statistical analysis of pixel or sample patterns + - Comparing originals with suspected modified files + 5. *Signature and Entropy Analysis*\ + - Hidden or embedded data often displays irregular structure. + - High entropy indicates encrypted or packed content + - Unusual file signatures help detect appended or injected data + 6. *File Carving and Metadata Inspection*\ + - Forensic tools carve out embedded content by scanning raw disk space for known headers/footers. + - Useful for recovering hidden graphic files, thumbnails, or EXIF metadata + - Supports identification of tampering or hidden fragments += 21. Explain the acquisition for mobile device and sim card data. +Acquisition is the process of collecting data from a mobile device and its SIM card in a forensically sound manner so that the original evidence remains intact and admissible in court. The goal is to extract all relevant information without altering the source. +== 1. Acquisition Procedure for Mobile Devices +1. *Securing and Isolating the Device*\ + - The device is first isolated from networks to prevent remote wiping or incoming data. Airplane mode, Faraday bags, or disabling Wi-Fi, mobile data, and Bluetooth are used. The device condition, model, IMEI, and screen state are documented. +2. *Maintaining Chain of Custody*\ + - All handlers, timestamps, and actions taken on the device are recorded. This ensures the evidence is legally admissible. +3. *Choosing the Appropriate Acquisition Method*\ + - Logical Acquisition: Extracts accessible data such as contacts, messages, call logs, app data. + - File System Acquisition: Retrieves file system structure, databases, and application folders. + - Physical Acquisition: Creates a bit-by-bit copy of the device memory, including deleted data. + - Manual Acquisition: Screens are photographed when other methods cannot be used. +4. *Using Certified Forensic Tools*\ + - Tools like Cellebrite UFED, Magnet AXIOM, XRY, Oxygen Forensics extract data safely. These tools prevent modification of original data through built-in protection mechanisms. +5. *Bypassing Locks (If Permitted legally)*\ + - Recovery mode, exploit-based unlocking, JTAG, chip-off techniques, or vendor-supported methods are used if the device is locked or encrypted. This step must follow legal procedures. +6. *Hashing and Verification*\ + - Once acquired, the extracted data is hashed using MD5/SHA-1/SHA-256 to verify that the copy matches the original. Identical hashes confirm integrity. +7. *Documentation*\ + - Every action, tool, acquisition mode, and result is thoroughly documented for the final forensic report. +== 2. Acquisition Procedure for SIM Cards +1. *SIM Documentation and Removal*\ + - The SIM is removed carefully and details such as ICCID, IMSI, serial number, and carrier information are recorded. +2. *SIM Card Imaging*\ + - A forensic SIM reader connects the card to a forensic workstation. A bit-stream copy is created to avoid altering the original SIM content. +3. *Extracting Stored Data*\ + - Common recoverable data includes: + - Contacts stored on the SIM + - SMS messages + - IMSI and authentication keys + - Last dialed/received numbers + - Network information and location-related identifiers +4. *Handling PIN/PUK Protection*\ + - If the SIM is locked, investigators obtain PUK codes or use authorised unlocking procedures from the service provider following legal guidelines. +5. *Hashing and Integrity Checking*\ + - Hash values are generated for the SIM image to prove that no modification occurred during extraction. +6. *Secure Storage and Reporting*\ + - The original SIM is sealed, labeled, and stored securely. All steps-tools used, extracted data, timestamps-are entered in the forensic report. += 22. Write a note on mobile mobile device acquisition techniques for Android and iOS platform with their limitations. +Mobile device acquisition is the process of extracting data from smartphones in a forensically sound manner. Because Android and iOS differ in architecture, security models, and file systems, the acquisition techniques and their limitations vary across both platforms. +== 1. Android Mobile Device Acquisition Techniques +1. *Logical Acquisition*\ + - Extracts user-level data such as messages, contacts, call logs, app data through standard APIs. + - Limitations: + - Cannot recover deleted data. + - Restricted if device is locked or encrypted. + - App sandboxing may prevent access to internal databases. +2. *File System Acquisition*\ + - Extracts the entire file system structure including app folders, SQLite databases, configuration files, and media. + - Limitations: + - Requires elevated permissions. + - Rooting may alter timestamps or violate forensic integrity. + - Not all partitions or system areas are accessible. +3. *Physical Acquisition*\ + - Creates a bit-by-bit copy of the entire device storage, including deleted files, unallocated space, and hidden data. + - Limitations: + - Increasingly difficult due to full-disk encryption on modern Android devices. + - Chip-off and JTAG methods may be risky and can damage hardware. + - Lock screens and secure boot mechanisms complicate access. +4. *ADB Based Extraction*\ + - Uses USB debugging to extract certain categories of data. + - Limitations: + - Requires USB debugging to be enabled. + - Limited access; cannot retrieve system-level or deleted data. + - Ineffective on newer Android versions due to tightened security. +== 2. iOS Mobile Device Acquisition Techniques +1. *iTunes/Backup-Based Logical Acquisition*\ + - Extracts data from an unencrypted or password-known iTunes/iCloud backup. + - Limitations: + - Encrypted backups require the backup password. + - Deleted data is not recovered. + - Some sensitive app data may not be included in backups. +2. *File System Acquisition (Jailbroken Devices)*\ + - Full access to internal directories such as app containers, logs, and system files. + - Limitations: + - Jailbreak not available for all iOS versions/devices. + - Jailbreaking alters system state, affecting forensic integrity. + - Can void evidence authenticity if not carefully documented. +3. *Physical Acquisition (Limited to Older iPhones)*\ + - Complete dump of the flash storage, including deleted data. + - Limitations: + - Not supported on newer iPhones with strong Secure Enclave encryption. + - Requires advanced expertise and risk of device damage. + - Full-disk encryption prevents access to sensitive areas without passcode. +4. *AFU and BFU Extraction (After/Before First Unlock)*\ + - Advanced commercial tools extract data based on device unlock state. + - Limitations: + - BFU extraction yields very little data. + - AFU extraction still requires the passcode in most cases. + - Apple’s security architecture restricts file access even for forensic tools. +== 3. Common Limitations Across Both Platforms +- *Full Disk Encryption:* Makes physical acquisition extremely difficult without user authentication. +- *Secure Boot/Trusted Execution Environments:* Prevents low-level access to storage. +- *App Sandboxing:* Limits access to app-specific data. +- *Frequent OS Updates:* Break existing forensic methods. +- *Cloud Syncing:* Many artifacts are stored in the cloud, not on the device. = 23. Write challenges faced during mobile forensics Mobile forensics involves extracting and analysing data from smartphones and handheld devices, but investigators face several challenges due to rapid technological changes, security features, and device diversity. 1. *Device Diversity:* -There are thousands of mobile models with different hardware, operating systems (Android, iOS), file systems, and chipsets. A single forensic tool cannot support all devices, making standardisation difficult. +There are thousands of mobile models with different hardware, operating systems, file systems, and chipsets. A single forensic tool cannot support all devices, making standardisation difficult. 2. *Strong Security and Encryption:* -Modern smartphones use advanced encryption (e.g., full-disk encryption, Secure Enclave on iPhones). Without the passcode, it becomes extremely difficult to extract data. +Modern smartphones use advanced encryption. Without the passcode, it becomes extremely difficult to extract data. 3. *Locked or Damaged Devices:* -If a device is password-protected, damaged, or has biometric locks (fingerprint, face unlock), accessing internal storage becomes challenging. +If a device is password-protected, damaged, or has biometric locks, accessing internal storage becomes challenging. 4. *Frequent OS Updates:* Constant updates to Android and iOS introduce new security patches that may break existing forensic methods. Tools quickly become outdated. 5. *Cloud Storage and Syncing:* -Much user data is stored in the cloud (Google Drive, iCloud), not on the device. Accessing cloud data requires additional legal permissions and credentials, complicating evidence extraction. +Much user data is stored in the cloud, not on the device. Accessing cloud data requires additional legal permissions and credentials, complicating evidence extraction. 6. *Volatile Data:* -Mobile devices store volatile data in RAM (running apps, chats, temp files) which may disappear when the phone powers off or restarts. Capturing such data requires immediate action. +Mobile devices store volatile data in RAM which may disappear when the phone powers off or restarts. Capturing such data requires immediate action. 7. *Third-Party Apps:* Apps like WhatsApp, Telegram, Signal, and social media platforms use encryption and proprietary storage formats. Extracting chats or metadata is difficult and often restricted. 8. *Remote Wipe and Auto-Delete Features:* Phones may be configured to wipe data after failed login attempts or allow remote wiping from linked accounts. This can destroy evidence before acquisition. 9. *Data Volume and Complexity:* -Modern devices store large amounts of data—photos, videos, app data, location history—requiring significant time and processing power for analysis. +Modern devices store large amounts of data-photos, videos, app data, location history-requiring significant time and processing power for analysis. 10. *Legal and Privacy Restrictions:* Accessing a mobile device may involve sensitive personal information. Investigators must follow strict legal procedures for search, seizure, and privacy laws to avoid violating rights. = 24. Explain the acquisition procedure for mobile device and sim card data. @@ -345,12 +768,12 @@ Acquisition is the process of extracting data from a mobile device and its SIM c 5. Using Certified Forensic Tools: Tools like Cellebrite UFED, XRY, Magnet AXIOM, or Oxygen Forensics extract data securely. These tools prevent modification of original data and create secure forensic images. 6. Verification and Hashing: - The extracted data is hashed (MD5/SHA-1/SHA-256) to prove that the acquired copy is identical to the original content. + The extracted data is hashed to prove that the acquired copy is identical to the original content. 7. Documentation: - Every step—methods used, tools, configurations, and extracted datasets—is documented for reporting and future reference. + Every step-methods used, tools, configurations, and extracted datasets-is documented for reporting and future reference. 2. Acquisition Procedure for SIM Card Data 1. SIM Isolation and Documentation: - The SIM card is removed carefully and its identifiers (ICCID, IMSI, carrier name) are recorded. + The SIM card is removed carefully and its identifiers are recorded. 2. SIM Card Imaging: A SIM card reader is used to connect the SIM to a forensic workstation. A bit-stream copy of the SIM is created to ensure non-destructive acquisition. 3. Extracting Stored Data: @@ -358,7 +781,7 @@ Acquisition is the process of extracting data from a mobile device and its SIM c - Contacts stored in SIM memory - SMS messages - IMSI and authentication keys - - Location information (LAC, Cell IDs) + - Location information - Network information and service provider details 4. Handling PIN/PUK Locks: If the SIM is locked, investigators may use authorised unlocking procedures or PUK codes obtained legally from the service provider. @@ -367,11 +790,11 @@ Acquisition is the process of extracting data from a mobile device and its SIM c 6. Proper Storage and Reporting: The original SIM is sealed, stored securely, and all acquisition steps are documented clearly in the forensic report. = 25. Describe cyber law in India with respect to data privacy, investigation, and digital evidence. -Cyber law in India is primarily governed by the Information Technology Act, 2000 (IT Act) and its amendments. It provides the legal framework for regulating digital activities, protecting data, guiding cyber-crime investigations, and ensuring admissibility of electronic evidence. +Cyber law in India is primarily governed by the Information Technology Act, IT Act 2000 and its amendments. It provides the legal framework for regulating digital activities, protecting data, guiding cyber-crime investigations, and ensuring admissibility of electronic evidence. 1. *Data Privacy*\ The IT Act along with the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 lays the foundation for data privacy in India. Overall, Indian cyber law aims to safeguard personal information and ensure responsible data handling. - Organisations collecting personal data must follow lawful, fair, and informed practices. - - Sensitive data (passwords, financial info, health data, biometrics) must be protected using strong security measures. + - Sensitive data must be protected using strong security measures. - Section 43A holds companies liable for negligence if they fail to protect personal data, resulting in compensation to affected individuals. - The Digital Personal Data Protection Act (DPDP Act), 2023 further strengthens privacy rights by introducing consent-based data processing, data-principal rights, and obligations for data fiduciaries. @@ -384,7 +807,7 @@ Cyber law in India is primarily governed by the Information Technology Act, 2000 3. *Digital Evidence*\ Cyber law in India also recognises and regulates electronic evidence. Proper chain of custody, forensic imaging, and secure handling are essential to ensure that digital evidence is not altered or tampered with during investigation. - - Under the Indian Evidence Act, Section 65B, electronic records (emails, logs, documents, CCTV footage, call data, digital logs) are admissible in court only if accompanied by a Section 65B certificate. + - Under the Indian Evidence Act, Section 65B, electronic records are admissible in court only if accompanied by a Section 65B certificate. - The certificate confirms the authenticity of the electronic record, the device used to produce it, and the integrity of the data. - The IT Act also validates electronic signatures and digital signatures, enabling legally binding digital communication and transactions. = 26. Write a short note on provision of IT act 2000 ( ammended 2008 ) which deals with cyber investigation and digital evidence admisibility. @@ -403,11 +826,11 @@ The Information Technology Act, 2000, along with its significant 2008 amendment, - Permits monitoring and collection of traffic data for cyber security and threat assessment. - Useful for tracing attackers, analysing network intrusions, and reconstructing cyber-attacks. 5. Section 80 - Search and Seizure Powers - - Allows police officers (Inspector rank and above) to enter premises, search, and arrest without warrant in certain cyber-crime scenarios. + - Allows police officers to enter premises, search, and arrest without warrant in certain cyber-crime scenarios. - Enables quick seizure of digital devices to prevent evidence destruction. 2. *Provisions for Digital Evidence Admissibility* 1. Section 65B of the Indian Evidence Act (linked to IT Act) - - Recognises electronic records (emails, logs, CCTV, documents, call records) as legally valid evidence. + - Recognises electronic records as legally valid evidence. - Requires a Section 65B certificate to prove authenticity, the device used, and that the data has not been altered. - Ensures digital evidence is accepted in court with proper documentation. 2. Section 3 & 4 - Legal Recognition of Digital Signatures and E-records @@ -418,9 +841,40 @@ The Information Technology Act, 2000, along with its significant 2008 amendment, - Introduced in the 2008 amendment. - Recognises government-approved digital forensic labs as official experts whose reports and certifications hold high evidentiary value in court. = 27. Write a note on forensic report writing format. -This is in some experiment. I'll look into it later. +Forensic report writing format is: +```text +1 Executive Summary +1.1 Case Number +1.2 Name of authors, investigators and examiners +1.3 Purpose of investigation +1.4 Significant Findings +2 Investigation Objectives +3 Details of the investigation +3.1 Date and time of incident +3.2 Date and time of report +4 Investigation Process +4.1 Date and time the investigators were assigned +4.2 Alloted Investigators +4.3 Nature of claim +5 Evidence Information +5.1 Location of the evidence +5.2 List of collected evidences +5.3 Tools involved in collecting the evidence +5.4 Preservation of the evidence +6 Evaluvation and analysis process +6.1 Initial evaluvation of the evidence +6.2 Investigative techniques +6.3 Analysis of the computer evidence +7 Relevant Findings +8 Supporting Files +8.1 Attachments and appendices +8.2 Full path of the important files +9 Attacker’s methodology +10 Recommendations +``` +== This is in some experiment. I'll look into it later. = 28. Discuss how file time stamp metadata is used as evidence in legal proceedings with challenges. -File timestamp metadata includes Created, Modified, and Accessed times (often called MAC times). These timestamps are automatically generated by the operating system and record when a file was created, last edited, or last opened. In digital forensics and legal proceedings, timestamp metadata is a crucial source of evidence because it helps reconstruct user activity and establish timelines of events. +File timestamp metadata includes Created, Modified, and Accessed times. These timestamps are automatically generated by the operating system and record when a file was created, last edited, or last opened. In digital forensics and legal proceedings, timestamp metadata is a crucial source of evidence because it helps reconstruct user activity and establish timelines of events. - *Use of Timestamp Metadata as Evidence* 1. Establishing a Timeline of Events: Timestamps allow investigators to determine when a file was created, modified, or accessed. This helps reconstruct the sequence of activities during a cybercrime, such as when malware was installed or when sensitive files were copied. @@ -429,14 +883,14 @@ File timestamp metadata includes Created, Modified, and Accessed times (often ca 3. Corroborating Evidence: Timestamp information can be matched with logs, network records, CCTV, or email timestamps to strengthen the overall case and confirm the suspect’s presence or actions. 4. Detecting Anti-Forensic Techniques: - If timestamps appear inconsistent (e.g., a file “created” after it was “modified”), investigators may identify attempts at tampering or the use of time-altering tools. + If timestamps appear inconsistent, investigators may identify attempts at tampering or the use of time-altering tools. 5. Attributing Actions to Devices or Users: Different users or systems may leave different timestamp patterns. This helps link specific actions to particular accounts or machines involved in an incident. - *Challenges in Using Timestamp Metadata* 1. Easily Altered: Timestamps are not secure and can be changed intentionally using anti-forensic tools like "touch", timestomping malware, or system clock manipulation. This reduces their reliability as standalone evidence. 2. System and Software Behaviour: - Operating systems automatically update timestamps during normal use—for example, opening a file may update the “Accessed” timestamp. These automatic changes can mislead investigations. + Operating systems automatically update timestamps during normal use-for example, opening a file may update the “Accessed” timestamp. These automatic changes can mislead investigations. 3. Timezone and Clock Issues: Incorrect system clocks, timezone differences, or daylight-saving adjustments can cause anomalies or conflicting timelines if not properly accounted for. 4. Metadata Loss During Copying/Transfer: @@ -444,6 +898,6 @@ File timestamp metadata includes Created, Modified, and Accessed times (often ca 5. Different File Systems Handle Timestamps Differently: FAT32, NTFS, ext4, APFS, and mobile OS file systems store timestamps differently. Some don’t store milliseconds or access times, leading to incomplete data. 6. Volatility and Incomplete Records: - Some timestamps (especially Access Time) may be disabled for performance reasons, leaving gaps in the forensic record. Cache cleaning or OS housekeeping may also overwrite metadata. + Some timestamps may be disabled for performance reasons, leaving gaps in the forensic record. Cache cleaning or OS housekeeping may also overwrite metadata. 7. Need for Corroboration: Timestamp metadata alone is rarely sufficient for conviction. Courts often require it to be supported by log files, system traces, or witness testimony. |
