The document discusses various techniques for analyzing digital evidence, including capturing memory and hard drive images using forensic imaging tools. It also describes analyzing RAM and hard drives using tools like Volatility and WinHex, investigating file systems and artifacts using Autopsy, and tracing emails. The role of the forensic analyst is to acquire evidence, perform analysis following standard procedures, and prepare a report of their examination and conclusions.
The document discusses various techniques for analyzing digital evidence, including capturing memory and hard drive images using forensic imaging tools. It also describes analyzing RAM and hard drives using tools like Volatility and WinHex, investigating file systems and artifacts using Autopsy, and tracing emails. The role of the forensic analyst is to acquire evidence, perform analysis following standard procedures, and prepare a report of their examination and conclusions.
The document discusses various techniques for analyzing digital evidence, including capturing memory and hard drive images using forensic imaging tools. It also describes analyzing RAM and hard drives using tools like Volatility and WinHex, investigating file systems and artifacts using Autopsy, and tracing emails. The role of the forensic analyst is to acquire evidence, perform analysis following standard procedures, and prepare a report of their examination and conclusions.
Outline • Introduction to Analysis of Digital Evidence • Capturing of Forensic Copy of Memory and Hard Drive with Toolkit Forensic Imager • RAM Analysis with Volatility • Analysing Hard Drive with WinHex • Working with Autopsy • Email Tracking and Tracing • Role of Forensic Analyst in Analysis
Introduction to Analysis of Digital Evidence • Analysis of Digital Evidence: Identifying, preserving, interpreting, and documenting the evidence recovered for presentation in a civil or criminal court.
Capturing of Forensic Copy of Memory and Hard Drive with Toolkit Forensic Imager • Capturing Main Memory using FTK Imager • Capturing Hard Drive • Acquiring memory dump • Acquiring memdump.mem in D: • Acquiring pagefile.sys in D: • Acquiring memory in D: • Image Summary • Acquiring forensic copy of hard drive in E: • Image summary shown by FTK Imager as directory listing
Analysing Hard Drive with WinHex Acquiring Forensic Copy of Drive • Open disk from Tools menu • Selecting drive to obtain forensic copy • Choosing Create Disk Image from File menu • Specifying file format of forensic copy and destination Computing Hash • Selecting Compute Hash • Computing hash value for the drive
Email Tracking and Tracing Email Tracking • Adding Mail Tracker to Gmail account • Composing email for recipient • Tracking Status • Sent email status • Number of times mail read Email Tracing • Selecting Show Original to acquire email header
Email Tracking and Tracing (Cont…) • Email Tracking with emailTracker Pro • Clicking the Trace Headers option. • The radio button Trace an Email I have Received is chosen. • The email header is copy–pasted. • Then the Trace button is clicked. The result of Trace Header is shown. • If the radio button Look Up Network Responsible for an Email Address is chosen, an email address is given and the resultant network addresses are displayed.
Email Tracking and Tracing (Cont…) • Email Tracing with Online EMailTracer • Email header of the recipient is copied and pasted. • Clicking the Start Tracing button.