Task 1: Recovering Scrambled Bits
In computer forensic digital information is identified and analyzed and used as a digital evidence in criminal, civil and administrative cases .Using different rules documents are maintained in a computer. Computer forensics need search warrants when preparing to search for a digital evidence. Reporting, analysis and analysis are the three stages in digital forensics.
First we have to gather the evidence from the suspect computer and identify whether the crime happen are not. Using computer forensics tools we can determine whether the suspect committed a crime or violated the company policy. Investigation process involves investigating the suspect computer and then collecting the evidence and preserving the evidence on a different computer. Computer forensic involves recovering deleted files and hidden files. In computer crimes and misuses evidence must be required.
2. Background Scenario:
EMTS is one of the best marketing and Service Company for the customer. In this company finished the marketing and customer service with Superior bicycles. EMTS is the best one compare to other Company. EMTS aimed to advertising the Superior Bicycles Product.in this EMTS Company, the person are gathering the Sensitive data for the marketing purpose to transfer the other Company. The EMTS are find out the suspected person.
Thus the Company signed the agreement for Superior bicycles, so the company details are much secured. The Bob Aspen stored the all information about the Superior Bicycles into the USB derive. The EMTS manager found out the USB drive and check out all the files, but the person deleted the whole files. The EMTS manager used to retrieve the data using the forensics tool. Thus help of the tool to retrieve all the deleted message, through the network. Web based is received the attachments fie through e-mail.
3. Forensic Tools used:
- Win hex
- Pro discover Basic
- Hex Workshop
3.1Win hex:
Win hex is the most powerful tool. Win hex tool is discovered by AG Germany. Win hex tool is the latest version, it will produced the new advance one called hex editor. The tool is mainly used to gathering the information for the purpose of evidence. The tool widely used for analysis the data , editing and recovery the deleted data.
3.2Pro discover basic:
Pro discover basic tool is one of the forensic tool. Mainly used for the change the image file into the bootable file. It’s made by the Technology pathways, it’s one of the user friendly tool.
4. Scope of Engagement:
DFS:
The method are used to derive the scientific tools, they are collection, validation, analysis, identification and presentation. The digital source are most important for gathering the evidence.
4.1Three types of digital Forensics communities:
- Law Enforcement
- Military
- Business and Industry
Digital Forensics Science:
4.2 Process:
The DFS activities are naturally investigated by the following Process are given below:
- Identification
- Examination
- Analysis
- Decision
4.3Subtypes of DFS: They are three types of the DFS Analysis are given below:
- Media Analysis
- Code Analysis
- Network Analysis.
- 4.3.1Media Analysis:
Computer are mainly used to refer the Media. Media is the major parts of the Digital Forensics Science. Media analysis is the stored medium, it could be focused on the flash Memory and RAM. Media Analysis is also called as the network Analysis.
Task 2: Digital Forensics Report
4.3.2Methodology of Digital Forensics:
- Acquire
- Authenticate
- Analyze
4.3.3Context of Computer Forensic
5. Summary of findings:
Our windows system installed the two forensic tool named as Hex Editor and pro discover basic. The hex editor tool mainly used for the shifting the bits. In our system contains the file name.txt. Thus the file contains the Cipher text data Converted into the Scrambled bits. By taking the scramble bits data to analysis and put into the hex editor tool .Thus the tool are easily finding out the plain text. The hex editor tool contains the operation toolbar, thus the toolbar are converted the bits into the plain text. If the original Palin text are generated could be change the bits type. This tool contains the 8,16,32,64 bits types, Change the bits one by one dependent on the original plain text. Another tool used for our windows system .Thus tool are mainly used for the converting the image file only. Thus any viruses occur any images, it could be easily find out the pro discover basic tool. Thus the tool are Commercial one for our windows System.
In digital evidence analysis you need to recover data. Suspect deleted the file or damage the file or overwritten files on a disk. Now the files are deleted the existing space become free. Forensic investigator need to recover the data .Identify the recourses and gathering the resource in your investigation plan. To acquire Bob Aspen’s from the Information department and then secure the evidence. Forensics workstation must require to conduct investigation and analysis. Computer forensic and data recovery are different.
You need the following items
- Bit stream imaging tool -Win Hex
- ProDiscover basic software
- Evidence custody form
- Evidence container for the storage media
- Computer to store the collected evidence and evidence locker
Evidence form which is used in corporate world
Report generated using evidence collection form.
7. Task 1: Recovering Scrambled bits
Win hex editor is the most powerful tool for analyzing. It can be converted the real image into the VMware, thus the tool are converted any of the file System like FAT, NTFS, CDFS, UDF media files. It is the important and good tool for analyzing.
TASK -2
8. Acquire a USB Drive using ProDiscover basics
ProDiscover basic is a computer forensic tools which is used to recover the deleted files. After analyzing the computer you can retrieve the damaged and deleted files. To conduct an investigation you need to you forensic software.
Using variety of method evidence is collected. No single method retrieves all data from the disk so using several software’s retrieve the evidence. Evidence custody form contains case number, investigating organization (name of the organization), name of the investigator, short description of the case, exact location where the evidence was collected. A list of Evidence item collected, Evidence recovery tools, Date and time of evidence collected. You need to create a folder on your computer to store the digital evidence .create a sub folder to organize all the related files. Create two folder named as bicycle and Bob .copy the folder into USB drives. ProDiscover can convert a raw image of a disk into a bootable VMWare Machine.
11. Conclusion:
Digital forensic is the application used to support the Criminal activities. Digital forensic is also known as digital forensic science. It is the branch of the forensic science. This is mainly used for the forensic report evidence and investigation purpose. Thus tool are used for the recovering the deleted data from the secondary storage. We are using the two forensic tool. Hex editor and pro discover basics tool are the Commercial one for the user. The user are easily view the raw file and image file. Thus file are converted to the binary data .
If the binary data file are access the forensic tool. Thus the tool change the binary file into the plain original text file. Before converting the plain text file, the data should be stored the computer file, it could be the hexadecimal format. The features of the tool are learning themselves. Many tutorials point are not available. In thus tool some of the files are open or not open based on the Source code. The pro basic tool are mainly used for the converting the image file into VMware manner. Thus the data could be secreted to pass through the client to server, could not be share the third party.
12. Reference
Carrier, B (2001). “Defining digital forensic examination and analysis tools”. Digital Research Workshop II. Archived from the original on 15 October 2012. Retrieved 2 August 2010.
Peter Sommer (January 2004). “The future for the policing of cybercrime”. Computer Fraud & Security 2004.
“Technology Crime Investigation::Mobile forensics”. Archived from the original on 17 May 2008. Retrieved 18 August 2010.
Gary C. Kessler, “Anti-Forensics and the Digital Investigator, Champlain College Burlington”, 5th Australian Digital Forensics Conference, December 2007
Reilly .D, Wren .C, Berry .T, “Cloud computing: Forensic challenges for law enforcement”, Internet Technology and Secured Transactions (ICITST), 2010 International Conference for , vol., no., pp.1-7, 8-11 Nov. 2010 [URL]
Federal Bureau of Investigation (FBI), “Regional Computer Forensics Laboratory (RCFL)”, Program Annual Report for Fiscal Year 2007, Washington, DC, 2008
Peter Mell, Timothy Grance, “The NIST Definition of Cloud Computing”, NIST Special Publication, September 2011,
Dominik Birk, Christopher Wegener, “Technical Issues of Forensic Investigations in Cloud Computing Environments”, Systematic Approaches to Digital Forensic Engineering (SADFE), IEEE Sixth International Workshop on , vol., no., pp.1-10, 26-26 May 2011,
Stephen Biggs, Stilianos Vidalis, “Cloud Computing: The impact on digital forensic investigations”, Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for, vol., no., pp.1-6, 9-12 Nov. 2009,
Ben Kepes, “Understanding the Cloud Computing Stack SaaS, Paas, IaaS”, Diversity Limited, 2011,