Digital Forensics is the application of scientific methods in preserving, recovering, and investigating digital evidence in a Digital crime scenario. Experts can correctly define it as the collection, examination, analysis, and documentation using scientifically proven methods to investigate a digital crime and present it before the court. Table of Contents Elements of a Digital Crime […]
Forensic Investigation: Preserve TimeStamp
As a Digital Forensic Investigator, you might understand, how important it is to preserve timestamps of any evidence gathered at the scene of a crime. You will stay alert to ensure that no one alters the timestamps of the original evidence at the time of acquisition. This is important as you have to maintain the […]
USB Forensics: Detection & Investigation
Digital Forensics Investigators commonly find Universal Serial Bus flash drives, known as USB flash drives, as the most common storage devices used as evidence. Investigators must follow a defined procedure for the investigation and conduct it in such a manner that they do not destroy the evidence. So, let us get started with the Forensics […]
Anti-Forensic: Swipe Footprint with Timestomp
In this article, we will learn how we can swipe our footprint after hacking the victim’s system. We can achieve that with the help of the Timestomp feature provided by Metasploit Framework. Let’s understand the scenario In this scenario, how a hacker can remove his footsteps in the victim system after the hack. So, that […]
Forensic Investigation: Autopsy Forensic Browser in Linux
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is an open-source tool for digital forensics which was developed by Basis Technology. Autopsy Forensic Browser is a built-in application in Kali Linux operating system, so let’s power on the Kali in a Virtual Machine. This tool […]
Forensic Investigation: Examine Corrupt File Metadata
In this article, we will learn how we can examine a corrupt file with the help of Exiftool to get ahead in a forensic investigation. Let’s understand a scenario In this Scenario, a forensic investigator is stuck in a situation. He gets a suspicious folder, where no file has any kind of file extension. Now, […]
Forensic Investigation: Windows Registry Analysis
In this article, we will learn how we can use RegRipper to analyze the windows registry in the forensic investigation environment. Table of Content Introduction to RegRipper Creating a Registry Hives SAM Hive Analyzing Log: SAM Analyzing Report: SAM System Hive Analyzing Log: System Analyzing Report: System Software Hive Analyzing Log: Software Analyzing Report: Software […]
Forensic Investigation: Ghiro for Image Analysis
In this article, we will learn how we can use the Ghiro image analysis tool in forensic investigation. Ghiro is a digital image forensic tool. Which is fully automated and opensource. Table of Content What is Ghiro? Features of Ghiro Setup the Ghiro Working on case with Ghiro What is Ghiro? It is developed by […]
Forensic Investigation: Examining Corrupted File Extension
In this article, we will learn how we can Examine Corrupted File Extension to identify the basic file header in a Forensic Investigation. Let’s understand this with the following Scenario In this Scenario, a forensic investigator has gone for an investigation and found out a suspicious folder where no file has any kind of file […]
Forensic Investigation: Extract Volatile Data (Manually)
In this article, we will run a couple of CLI commands that help a forensic investigator to gather volatile data from the system as much as possible. The commands we discuss in this post are not the whole list of commands, but these are the most commonly used ones. As per forensic investigator, create a […]